For killing Indian techie Srinivas Kuchibhotla, US man faces death or life in prison

Agencies
March 7, 2018

Washington, Mar 7: A 52-year-old former US navy veteran charged with killing Indian software engineer Srinivas Kuchibhotla at a bar in Kansas last year pleaded guilty on Tuesday to murder in the shooting that was linked to a surge in ethnic, racial and anti-immigrant tensions after President Donald Trump’s election.

Adam W Purinton has been charged with one count of murder, two counts of first-degree murder and two counts of attempted first-degree murder for the shootings of Kuchibhotla’s friend Alok Madasani and another patron, Ian Grillot.

Asked by the judge how he would plead to the first-degree murder charge, Purinton said, “Guilty, your honour.”

He was also charged with hate crime. Purinton faces life in prison with no chance of parole for 50 years when he is sentenced on May 4 for premeditated first-degree murder.

Witnesses said Purinton, who is white, yelled “Get out of my country!” before firing at the two men, who had stopped for an after-work drink at Austin’s Bar and Grill in Olathe, Kansas on February 22, 2017.

The men, both 32, had come to the US as students and worked as engineers at nearby GPS-maker Garmin.

Kuchibhotla’s widow, Sunayana Dumala, was not at the court Tuesday, issued a statement later.

“We must understand and love one another. Let us continue to work for peace, understanding and love -- the things Srinu stood for and will be his legacy,” Dumala said.

She is expected to speak on Friday, which would have been her husband’s 34th birthday.

Dumala, who now has an H-1B visa and started a Facebook page to bring attention to immigration and related issues, was local Congressman Kevin Yoder’s guest at President Trump’s first state of the union address in January.

According to court documents, Purinton was asked to leave the bar when he made the derogatory comments. He returned with a gun 30 minutes later with the lower portion of his face hidden in a scarf.

Madasani told detectives that the gunman asked the men if their “status was legal” before he opened fire, according to an affidavit released last year.

Kuchibhotla, who was shot at least three times, was declared dead at a nearby hospital. Madasani was shot in the leg and Grillot, who had set off after the gunman, in the arm and chest.

After the shooting, Purinton drove 70 miles (110 kilometres) east to Clinton, Missouri, and stopped at a restaurant, where he allegedly confessed to the killings to a bartender, who called the police.

Purinton was a regular customer at Austin’s. Neighbours in the Olathe cul-de-sac where he lived told The Associated Press after the shooting that he became “a drunken mess” following his father’s death about two years before the shooting and had physically and mentally deteriorated.

He still faces federal hate crime charges in the slaying. Federal prosecutors have not determined whether they will seek the death penalty.

Comments

Abdullah
 - 
Wednesday, 7 Mar 2018

Every culprit should be punished. In India also RSS Terrorists should be hanged where ever they kill human beings.

 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 24,2020

Washington, Jun 24: Twitter has once again flagged a tweet from US President Donald Trump which promoted violence by saying if protesters tried to set up an "autonomous zone" in Washington, DC they would be met with "serious force".

This is the fourth time Twitter has red flagged Trump's tweet for glorifying violence or violating its policies.

Trump has been critical of the "autonomous zone" in Seattle, an area occupied by protestors for much of this month.

"We've placed a public interest notice on this Tweet for violating our policy against abusive behaviour, specifically, the presence of a threat of harm against an identifiable group," Twitter's safety team tweeted late Tuesday.

Trump had tweeted: "There will never be an ‘Autonomous Zone' in Washington, D.C., as long as I'm your President. If they try they will be met with serious force!"

Twitter earlier labeled a video tweeted by him which mocked CNN as manipulated media.

According to Twitter, "this Tweet has been labeled per our synthetic and manipulated media policy to give people more context".

In May, Twitter labeled two Trump tweets that made false claims about mail-in ballots in California.

Twitter later labeled another Trump tweet glorifying violence in which he said, "when the looting starts, the shooting starts."

Facebook also removed a Trump campaign ad featuring a symbol used by Nazis for political dissenters, saying the ad violated its policies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 12,2020

Washington, May 12: The US Federal Bureau of Investigation and cybersecurity experts believe Chinese hackers are trying to steal research on developing a vaccine against coronavirus, two newspapers reported Monday.

The FBI and Department of Homeland Security are planning to release a warning about the Chinese hacking as governments and private firms race to develop a vaccine for COVID-19, the Wall Street Journal and New York Times reported.

The hackers are also targeting information and intellectual property on treatments and testing for COVID-19.

US officials alleged that the hackers are linked to the Chinese government, the reports say.

The official warning could come within days.

In Beijing Foreign Affairs ministry spokesman Zhao Lijian rejected the allegation, saying China firmly opposes all cyber attacks.

"We are leading the world in COVID-19 treatment and vaccine research. It is immoral to target China with rumors and slanders in the absence of any evidence," Zhao said.

Asked about the reports, President Donald Trump did not confirm them, but said: "What else is new with China? What else is new? Tell me. I'm not happy with China."

"We're watching it very closely," he added.

A US warning would add to a series of alerts and reports accusing government-backed hackers in Iran, North Korea, Russia and China of malicious activity related to the pandemic, from pumping out false news to targeting workers and scientists.

The New York Times said it could be a prelude to officially-sanctioned counterattacks by US agencies involved in cyber warfare, including the Pentagon's Cyber Command and the National Security Agency.

Last week in a joint message Britain and the United States warned of a rise in cyber attacks against health professionals involved in the coronavirus response by organised criminals "often linked with other state actors."

Britain's National Cyber Security Centre and the US Cybersecurity and Infrastructure Security Agency said they had detected large-scale "password spraying" tactics -- hackers trying to access accounts through commonly used passwords -- aimed at healthcare bodies and medical research organisations.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.