Groups clash inside Golden Temple complex, 7 wounded

June 6, 2014

Golden Temple clash

Amritsar, Jun 6: At least seven people, including a child, were injured in a clash between task force volunteers of the Shiromani Gurdwara Parbandhak Committee (SGPC) and radical Sikh activists Friday on the 30th anniversary of the army's Operation Bluestar at the Sikh shrine complex here.

Swords and sticks were openly used as scores of men from both sides chased each other outside the Akal Takht building inside the complex, which is home to the holiest of Sikh shrines - `Harmandar Sahib'. Many people could be seen running for cover to save themselves.

Eyewitnesses said the clash occurred when activists of the Shiromani Akali Dal (Amritsar) were stopped by the SGPC task force volunteers from brandishing swords and other traditional weapons and raising pro-Khalistan slogans inside the complex.

This led to a clash between both sides just after the religious ceremony to commemorate the 30th anniversary of Operation Bluestar had ended Friday morning.

Tension continued to prevail inside the shrine complex. Even media personnel were manhandled during the incident.

No uniformed police personnel were present inside the complex to intervene in or prevent the clash.

Top SGPC functionaries, including its president Avtar Singh Makkar, and Akal Takht Jathedar Gurbachan Singh were present inside the complex when the incident took place.

Heavily armed terrorists, led by separatist leader Jarnail Singh Bhindranwale, were flushed out of the Golden Temple complex by the Indian Army in its Operation Bluestar in June 1984. The then prime minister Indira Gandhi had ordered the army operation.

Punjab had witnessed a bloody phase of terrorism between 1981 to 1992 as separatists demanded a Sikh homeland - Khalistan (Land of the pure). The terrorism phase left over 25,000 people dead, including hundreds of personnel of security forces.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
August 1,2020

New Delhi, Aug 1: Rajya Sabha MP and former Samajwadi Party leader Amar Singh has died in Singapore where he was undergoing treatment.

Amar Singh, 64, had undergone kidney transplant in 2011 and was not keeping well for a long time.

“Saddened to know about the death of senior leader and parliamentarian Amar Singh,” Defence Minister Rajnath Singh tweeted.

Earlier in the day, the former Samajwadi leader had posted messages on Twitter, paying tributes to Bal Gangadhar Tilak on his 100th death anniversary and also wishing people on Eid.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 1,2020

New Delhi, Feb 1: Prime Minister Narendra Modi on Saturday greeted the Indian Coast Guard on its raising day, appreciating its efforts to keep the country's coasts safe.

The Coast Guard came into being in 1977.

"Greetings to the Indian Coast Guard on their foundation day. Our Coast Guard has made a mark due to their remarkable efforts to keep our coasts safe," Modi tweeted.

The prime minister said the force's "concern towards the marine ecosystem is also noteworthy".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.