Don’t blame minority Brahmins for past ‘tragedies’: Pejawar seer

coastaldigest.com news network
October 18, 2017

Udupi, Oct 18: Strongly opposing the separation of Lingayat community from Hindu religion, Paryaya Pejawar Mutt chief pontiff Vishwesha Teertha Swami said that worshipping Hindu god Shiva is part of Lingayat-Veerashaiva tradition.

Speaking to media persons on the eve of Diwali, the seer said that in his opinion though there were two traditions (Lingayat and Veerashaiva) in the Lingayat community, they were not separate. Lingayat and Veerashaiva were branches of the same religion.

The Dwaita and Advaita schools had fundamental philosophical differences but were branches of the same Vedic religion. The two traditions of Lingayat and Veerashaiva could never be separate.

However, as this was an internal matter relating to the Veerashaiva-Lingayat community, he would not like to interfere in it. “But if these two traditions are accepted as branches of the same religion, the Veerashaiva-Lingayat community would get more strength. This is my opinion and suggestion. I leave it to that community to decide the rest,” he said.

The seer said that when people of both these traditions were worshipping Shiva as their chief deity, doing Shiva Panchakshari Japa and offering prayers to the Shiva Linga, how could they be different or separate from the Hindu religion?

The followers of Lingayat tradition had stated that they did not accept the caste system in Hinduism, he said. But even the followers of Sri Ramakrishna Mission and Arya Samaj did not accept the caste system and so also various other traditions of Vaishnavism and Shaivism. Did that make them separate religion? he asked.

He had posed this question some time ago but none had answered it. “Hence, all the Lingayats and Veerashaivas should not separate from Hinduism. They should stay with us. This is my fervent appeal,” he said.

Some had questioned his interference in this matter. “When a brother thinks of leaving a family, the other brothers persuade him not to do so. My fraternal intervention should be seen in this light. Let us all stay together and try to protect our religion and culture,” he said.

In today’s society, it was not possible for one community to exploit another community. “In the present political scenario, the minority Brahmin community could not do injustice to the majority non-Brahmin community. Is it correct to blame the Brahmins for the tragedy which took place during the time of Sri Basaveshwara? Is it correct to blame today’s Muslims for the violence during the medieval period in the country?” he said.

“Just as Hindus and Muslims have to live in harmony now, so too communities among Hindus too should live together in harmony. Besides Vaishnavas or the exponent of the Dwaita philosophy Sri Madhwacharya never lived during the period of Sri Basaveshwara,” the seer said.

Comments

Wake UP
 - 
Wednesday, 18 Oct 2017

Na Tasya Pratima Asti ... There is no image of God (Then U should really think "Why am I worshiping the stones, pictures and such things which are LIFELESS and will not harm or benefit anybody? Honesty in searching the TRUE GOD, will find your way to recognize the CREATOR of all that exists who is ever living & ever watching... Praise be to the lord who gave us the soul & intellect  in this life to think and PONDER and not just live like the ways of the demons... Even animals are praising the lord of the universe ... U will find it when U honestly look for the TRUTH. 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 26,2020

Bengaluru, Mar 26: The number of COVI D-19 cases in Karnataka spiked to 55 on Thursday after four new cases were reported. 

According to official sources, a 35-year-old man, who was a resident of Nanjanagud town in Mysuru taluk and worked in a pharma unit, tested positive for coronavirus. 

He had been quarantined in his home and efforts are being made to track down as many as seven persons, who had primary contact with 
him.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 3,2020

Beijing, Feb 3: The first batch of patients arrived on Monday at a specialised hospital built in just 10 days as part of China's intensive efforts to fight a new virus.

Huoshenshan Hospital and a second facility with 1,500 beds that's due to open this week were built by construction crews who are working around the clock in Wuhan, the city in central China where the outbreak was first detected in December.

The Wuhan treatment centres mark the second time Chinese leaders have responded to a new disease by building specialised hospitals almost overnight. As severe acute respiratory syndrome, or SARS, spread in 2003, a facility in Beijing for patients with that viral disease was constructed in a week.

The first batch of patients arrived at the Huoshenshan Hospital at 10 am on Monday, according to state media. The reports gave no details of the patients' identities or conditions.

The ruling Communist Party's military wing, the People's Liberation Army, sent 1,400 doctors, nurses and other personnel to staff the Wuhan hospital, the official Xinhua News Agency said. The government said earlier some have experience fighting SARS and other outbreaks.

Authorities have cut most road, rail and air access to Wuhan and surrounding cities, isolating some 50 million people, in efforts to contain the viral outbreak that has sickened more than 17,000 and killed more than 360 people.

The Huoshenshan Hospital was built by a 7,000-member crew of carpenters, plumbers, electricians and other specialists, according to the Xinhua News Agency.               Photos in state media showed workers in winter clothing, safety helmets and the surgical-style masks worn by millions of Chinese in an attempt to avoid contracting the virus.

About half of the two-storey, 600,000-square-foot building is isolation wards, according to the government newspaper Yangtze Daily. It has 30 intensive care units.

Doctors can talk with outside experts over a video system that links them to Beijing's PLA General Hospital, according to the Yangtze Daily. It said the system was installed in less than 12 hours by a 20-member "commando team" from Wuhan Telecom Ltd.

The building has specialised ventilation systems and double-sided cabinets that connect patient rooms to hallways and allow hospital staff to deliver supplies without entering the rooms.

The hospital received a donation of "medical robots" from a Chinese company for use in delivering medicines and carrying test samples, according to the Shanghai newspaper The Paper.

In other cities, the government has designated hospitals to handle cases of the new virus.

In Beijing, the Xiaotangshan Hospital built in 2003 for SARS is being renovated by construction workers. The government has yet to say whether it might be used for patients with the new disease.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.