Lotus will now bloom in Karnataka, Kerala, says Yogi Adityanath

Agencies
March 4, 2018

Lucknow, Mar 4: Uttar Pradesh Chief Minister Yogi Adityanath on Sunday credited the BJP's "historic" performance in Northeastern states to "development-oriented" policies of Prime Minister Narendra Modi and "organisational skills" of Amit Shah and said the day is not far when one party will be in power right from Kashmir to Kanyakumari.

The chief minister was addressing a press conference at the BJP headquarters here after the party's good show in assembly polls in Tripura, Nagaland and Meghalaya.

"The BJP's sterling performance in the Northeast will go a long way in fulfilling development aspirations of people," he said.

Adityanath said for the first time after Independence, these Northeastern states will get a chance to join the national mainstream and enjoy fruits of development.

The Uttar Pradesh chief minister, who had campaigned for the saffron party in these Assembly elections, said Prime Minister Narendra Modi's development-oriented policies and organisational skills of BJP president Amit Shah led to his party's "sterling performance".

He said the "lotus" will now bloom in Karnataka, Kerala, West Bengal and Odisha, thanks to the development-oriented policies of the prime minister and his good governance, and the guidance of the party chief Amit Shah.

"That day is not far when one party will be in power right from Kashmir down to Kanyakumari," he said.

He also exuded confidence that the BJP will win Lok Sabha byelections next week in Gorakhpur and Phulpur constituencies in Uttar Pradesh.

Continuing its winning streak, the BJP wrested Tripura, and received an invitation to be part of the government in Nagaland, while Meghalaya elected a hung Assembly.

Comments

INDIAN
 - 
Sunday, 4 Mar 2018

jOGi Bogithyanath's Jumulappa party taking control all over states but not in KARNATAKA Amit sah ka JUMLA karnataka mein nahi Chalega 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 14,2020

Kathmandu, Jul 14: After staking claim to Indian territories of Lipulekh-Kalapani in  a new controversial map,  Nepal Prime Minister KP Sharma Oli on Monday claimed that Ayodhya, the birthplace of Lord Rama, is in Nepal and Lord Rama was Nepali.

“Although real Ayodhya lies at Thori, city in the west of Birgunj, India has claimed that Lord Rama was born there. Due to these continuous claims, even we have believed that deity Sita got married to Prince Rama of India. However, in reality, Ayodhya is a village lying west of Birgunj,” Oli claimed at an event organised at Prime Minister's residence in Kathmandu.

The Prime Minister also blamed India of cultural encroachment by “creating a fake Ayodhya.”

“Balmiki Ashram is in Nepal and the holy place where King Dashrath had executed the rites to get the son is in Ridi. Dashrath’s son Ram was not an Indian and Ayodhya is also in Nepal,” he claimed.

In an attempt to save self from criticism, Oli questioned how Lord Rama could come to Janakpur to marry Sita when there were "no means" of communication. He further said that it to be impossible for Lord Rama to come to Janakpur from present Ayodhya that lies in India.

“Janakpur lies here and Ayodhya there and there is talk of marriage. There was neither telephone nor mobile then how could he know about Janakpur,” Oli said.

Comments

Ahmed Ali Kulai
 - 
Tuesday, 14 Jul 2020

New controversy

 
BJP got next election Muddah

Farhan
 - 
Tuesday, 14 Jul 2020

Ab Ram Mandir Kaha Banega???

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 14,2020

New Delhi, Jul 14: India's COVID-19 tally breached the 9 lakh mark as 28,498 new coronavirus cases were reported in the last 24 hours, informed the Union Ministry of Health and Family Welfare on Tuesday.

As per the Health Ministry, there are a total of 9,06,752 coronavirus cases in the country of which 3,11,565 patients are active cases.

5,71,459 patients have been cured/discharged while one patient has been migrated, the Ministry informed further.

553 more deaths due to COVID-19 were reported in the last 24 hours in the country, taking the number of patients succumbing to the virus to 23,727.

The Centre further informed that India's recovery rate from COVID-19 stands at 63.02 per cent while the recoveries and deaths ratio stood at 96.01 per cent and 3.99 per cent respectively.

As per the Ministry, Maharashtra -- the worst-affected state from the infection -- has a total of 2,60,924 COVID-19 cases and 10,482 fatalities. While Tamil Nadu has a tally of 1,42,798 cases and 2,032 deaths due to COVID-19.

Delhi has reported a total of 1,13,740 cases and 3,411 deaths due to COVID-19.

As per the information provided by the Indian Council of Medical Research (ICMR) 1,20,92,503 samples have been tested for COVID-19 till July 13, of these 2,86,247 samples were tested on Monday.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.