2002 Godhra riots: Convict Yakkub Patadiya awarded life imprisonment

Agencies
March 20, 2019

Ahmedabad, Mar 20: A Special SIT court on Wednesday awarded life imprisonment to convict Yakkub Patadiya in connection with 2002 Godhra train carnage incident.

Patadiya was awarded imprisonment for life for his role in the incident.

In August last year, the court had convicted two people and acquitted three others in the case in which 58 people lost their lives.

Special judge HC Vora convicted Farukh Bhana and Imran alias Sheru Batik, and acquitted Hussain Suleman Mohan, Kasam Bhamedi and Faruk Dhantiya.

The five accused, who were arrested by different investigation agencies between 2015-2016, were put on trial at the special court, set up at the Sabarmati Central Jail here.

Around 58 people lost their lives when some coaches of Sabarmati Express were torched at the Godhra Railway Station in Gujarat on February 27, 2002. The incident had triggered large scale riots in Gujarat.

Comments

shiju
 - 
Thursday, 21 Mar 2019

This is a strange verdict.   Innocent is convicted and real culprits are set free.   Train was burnt by sanghis in well planned way to create riots and blame muslims.   ATS is acting as an agent of Sangh parivar and convicting innocents.   Same way, planners of samjotha express explosion are also set free and innocents are in jail.   India law is very strange and it has become very very strange since last five years. 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest.com news network
May 6,2020

New Delhi, May 6: The government on Wednesday said no data or security breach has been identified in Aarogya Setu after an ethical hacker raised concerns about a potential security issue in the app.

The app is the government's mobile application for contact tracing and disseminating medical advisories to users in order to contain the spread of coronavirus.

On Tuesday, a French hacker and cyber security expert Elliot Alderson had claimed that "a security issue has been found" in the app and that "privacy of 90 million Indians is at stake".

Dismissing the claims, the government said "no personal information of any user has been proven to be at risk by this ethical hacker".

"We are continuously testing and upgrading our systems. Team Aarogya Setu assures everyone that no data or security breach has been identified," the government said through the app’s Twitter handle.

The tweet gave point-by-point clarification on the red flags raised by the hacker.

"We discussed with the hacker and were made aware of the following... the app fetches user location on a few occasions," it said, but added that this was by design and is clearly detailed in the privacy policy.

The app fetches users’ location and stores on the server in a secure, encrypted, anonymised manner - at the time of registration, at the time of self assessment, when users submit their contact tracing data voluntary through the app or when it fetches the contact tracing data of users after they have turned COVID-19 positive, it said.

On another issue that users can get COVID-19 stats displayed on the home screen by changing the radius and latitude-longitude using a script, Aarogya Setu said that all this information is already public for all locations and hence does not compromise on any personal or sensitive data.

"We thank the ethical hacker on engaging with us. We encourage any users who identify a vulnerability to inform us immediately...," it said.

Responding to Aarogya Setu's clarification, Alderson tweeted, "I will come back to you tomorrow".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 9,2020

Srinagar, Jan 9: Envoys from 15 countries including the United States were shown around Srinagar on Thursday, the first visit by New Delhi-based diplomats since the government stripped Kashmir of its semi-autonomous status and began a harsh crackdown five months ago.

The diplomats were driven by Indian authorities in a motorcade amid tight security from the airport to the military headquarters in Srinagar, where they were briefed on the security situation, an army officer said. He spoke on condition of anonymity as he was not authorized to speak to reporters.

They also held discussions with civil society members and some Kashmiri politicians, said Raveesh Kumar, spokesman for the Ministry of External Affairs (MEA).

The objective of the visit, organized by the Union government, was for the envoys to see first-hand “how things have progressed and how normalcy has been restored to a large extent'' in Kashmir since August, Kumar told reporters in New Delhi.

In October, a group of European Parliament members had visited the region, which is claimed by both India and Pakistan.

The delegation that visited Kashmir on Thursday included US ambassador to India Kenneth Juster and diplomats from Bangladesh, Vietnam, Norway, the Maldives, South Korea, Morocco, Niger, Nigeria, Argentina, the Philippines, Fiji, Uzbekistan, Peru and Togo.

Offices, shops and businesses were open in Srinagar on the cold winter day, but the diplomats did not stop to talk to people as they moved to different venues of their meetings.

They were to fly to Jammu, the winter capital of Kashmir, later Thursday and return to New Delhi on Friday.

Congress leader Jairam Ramesh pointed out the oddity of taking foreign diplomats to the troubled state but not allowing allowing Indian political leaders to freely visit it.

The National Conference said it was "disappointed" with the way the government brought envoys from various countries to "endorse" its "claims of normalcy" in the union territory. The party alleged that it was no more than a "guided tour" with access limited to "handpicked individuals who toe the government line".

“The NC wishes to ask these envoys that if the situation in Jammu & Kashmir is "normal", then why are scores of people, including three former chief ministers, under detention for almost 160 days and why have the people been denied access to the internet for over 5 months?" a statement issued by the party said.

Kumar dismissed as unfounded criticism of the visit, and said more such visits to Kashmir by New Delhi-based diplomats are likely in the near future.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.