Class 7 boy threatens to rape teacher; Class 8 boy seeks sex from another teacher

News Network
February 21, 2018

A Class 7 student from a reputed school in Haryana’s Gurugram has threatened to rape his class teacher and her daughter, who studies with him in the same class. Ever since the boy sent the threat on social media, both the teacher and her daughter are too traumatised. Although the teacher, reluctantly, has returned to her school routine, the daughter is still too scared to come back.

Another appalling incident surfaced from the same school in the same week when a Class 8 boy proposed to her teacher and asked her out to a candlelight dinner. The proposal did not just end there as the boy went on to ask her for sex in his proposal that he sent through e-mail.

Both incidents have sent shockwaves across the teaching community in Gurugram schools. The school has taken cognisance of the matter and investigating it.

After the incidents came to light, the school authorities were quick to respond on the matter and released a statement which read, “This is an incident involving a lower middle school student allegedly indulging in an offensive and a highly objectionable cyber prank involving a teacher. A thorough investigation was carried out and stern action was taken, including suspension along with mandated counselling. The school has a zero-tolerance policy towards such acts.”

Comments

ali
 - 
Wednesday, 21 Feb 2018

jaise raaja,,, vaise praja.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 2,2020

Mount Maunganui, Feb 2: India registered a rare 5-0 whitewash against New Zealand after notching up a seven-run win in the fifth and final T20 International at Bay Oval here on Sunday.

Electing to bat, India posted 163 for three, riding on Rohit Sharma's 60 off 41 balls and a 33-ball 45 from K L Rahul.

The visitors then restricted the hosts to 156 for nine with Jasprit Bumrah claiming three wickets for 12 runs.

Chasing the target, the Black Caps were tottering at 17 for three in 3.2 overs.

Tim Seifert (50) and Ross Taylor (53) then added 99 runs for the fourth wicket as New Zealand recovered to 116.

Seifert clobbered a 30-ball 50 studded with five fours and three sixes, while Ross Taylor hit two sixes and five fours in his 47-ball 53-run innings.

However, once Seifert was dismissed in the 13th over, the hosts suffered a collapse, losing five wickets, including Taylor, for 25 runs to loss the plot in the end.

Brief Score:

India: 163 for 3 in 20 overs (Rohit Sharma 60; S Kuggeleijn 2/25)    

New Zealand: 156 for 9 in 20 overs (Ross Taylor 53, Tim Seifert 50; Jasprit Bumrah 3/12).

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 14,2020

Washington, Feb 14: The United States has called for making Jamaat-ud-Dawa (JuD) chief Hafiz Saeed accountable for his involvement in the planning of "numerous acts of terrorism, including 2008 Mumbai attacks". "We continue to call for Hafiz Saeed to be held accountable for his involvement in the planning of numerous acts of terrorism, including 2008 Mumbai attacks that killed 166 innocent people, including 6 Americans," US State Department spokesperson said on Thursday (February 13, 2020).

US State Department spokesperson said this while commenting on the Saeed`s conviction in terror financing cases.

The spokesperson said Hafiz Saeed`s conviction on terror financing is a step towards curtailing the operation of a terrorist group that threatens peace and stability in South Asia.

"We urge Pakistan to continue to take appropriate legal action against individuals who commit acts of terrorism, raise funds for, or advocate for terrorism," the official said.

On Wednesday, Alice Wells, Principal Deputy Assistant Secretary of US for South and Central Asian Affairs had termed the conviction of 26/11 Mumbai terror attack mastermind Hafiz Saeed as an "important step forward" towards holding terrorist organisation LeT "accountable for its crimes".

"Today`s conviction of Hafiz Saeed and his associate is an important step forward - both toward holding LeT accountable for its crimes and for #Pakistan in meeting its international commitments to combat terrorist financing," she tweeted.

"And as @ImranKhanPTI has said, it is in the interest of #Pakistan`s future that it not allow non-state actors to operate from its soil," she said in another tweet.

An anti-terrorism court in Lahore, Pakistan on Wednesday sentenced Mumbai terror attack mastermind and chief of the banned Jamaat-ud -Dawa (JuD) Hafiz Saeed to five-and-a-half years in prison each in two terror financing cases.

Pakistan based Dawn reported that he was slapped with a prison sentence of five-and-a-half years and a fine of Rs15,000 in each case and the sentences of both cases will run concurrently.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.