Blast triggers war of words ahead of Karnataka polls

[email protected] (Imran Khan, Tehelka)
April 21, 2013

Blast_triggersJUST A day after the Boston Marathon terror attack and less than a month after twin blasts rocked Hyderabad, 17 people were injured in a low-intensity blast near the Karnataka BJP's office in Bengaluru. Among the injured were 11 policemen who had been deployed there as it was the last day of filing nominations for the upcoming Assembly election on 5 May.

While the police are yet to ascertain who is behind the blast, suspicions are now being raised about the timing of the blast and who might possibly benefit from it.

“I was in my kitchen cooking, when I heard a deafening noise,” says Nanjamma, 43, who lives near the blast site. The explosion shattered the window panes of her house. “When I rushed outside, I saw cars engulfed in flames and bits of broken glass everywhere.”

Nine vehicles were damaged in the blast and the fire that followed. Police officials informed the media that the blast was caused by an IED (Improvised Explosive Device) mounted on a 100cc Yamaha motorcycle (chassis number: 1108F001-568/ registration number: TN-22R- 3769). The police, however, are yet to fathom whether the blast was triggered by a timer mounted on the vehicle or through a remote device.

A police van parked close to the blast site too was damaged. The explosion occurred in the Malleswaram residential area of north Bengaluru, about 100 metres from the newly inaugurated state BJP office, christened Jagannath Bhavan. “There were 20 of us on duty when the blast happened. Eight of us were in the van, but the rest were outside,” says Vishweshwaraiyya, 50, a head constable with the Karnataka State Reserve Police Force who was admitted at the KC General Hospital along with 10 of his colleagues.

Among the injured was Assistant Sub-Inspector BC Kunyappa, who received several cuts from shards of glass on the left side of the body, from neck to ankle. “I was reading the newspaper inside a police jeep when I heard a sound, like the bursting of crackers, followed by thick smoke,” he says. “I jumped out from the vehicle, otherwise I would have been dead.” Asked whether he saw anybody parking the bike, he says he has no idea.

Besides the policemen, six others, including three women, were also injured.

An unseemly blame game has broken out between the BJP and the Congress over the blast with both sides politicising the issue. Karnataka Home Minister R Ashok, who reached the spot immediately after the blast, declared it an act of terror intended to hurt the state BJP leaders. He even speculated that it might have been intended to “celebrate” the third anniversary of the Chinnaswamy Stadium blasts of 2010 as both of the incidents occurred on 17 April while the Indian Premier League season was on.

BJP state spokesperson S Prakash too said the bomb was definitely intended to hurt party workers and state BJP leaders as it was nomination day and activists of the party would be milling around the party office.

Opposition leaders, however, slammed the BJP for the remarks. Congress leader and Leader of the Opposition Siddaramaiah called the blasts a political gimmick and held the state government responsible for it. Raising suspicion about the timing of the blast, Congress MP H Vishwanath said the role of the Rashtriya Swayamsewak Sangh could not be ruled out and demanded an inquiry that should submit its findings before the Assembly election.

So was it an act of terror? “Though no shrapnel or splinters were found in the bodies of the injured, nothing conclusive has come out so far,” says Joint Commissioner of Police (Law & Order) Pranab Mohanty. The only fact that seems to support the Congress' view is that the bike was parked 100 metres away from the BJP office and seemed designed for minimum damage.

While all interpretations of the blast are premature, it's interesting to note that past experiences have shown that similar acts were used for a political purpose. In the thick of elections in May 2008, a low-intensity bomb exploded in the district court of Dharward, 429 km west of Bengaluru. Initially, the Students Islamic Movement of India was deemed to be behind the blasts but later investigations showed the hand of extremist Hindutva groups. However, given that there have been blasts elsewhere in the country that have involved Muslim extremists, the sanest course might be to rush to no conclusions.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 7,2020

Washington, Jan 7: Facebook will ban deepfake videos ahead of the US elections but the new policy will still allow heavily edited clips so long as they are parody or satire, the social media giant said Tuesday.

Deepfake videos are hyper-realistic doctored clips made using artificial intelligence or programs that have been designed to accurately fake real human movements.

In a blog published following a Washington Post report, Facebook said it would begin removing clips that were edited--beyond for clarity and quality--in ways that "aren't apparent to an average person" and could mislead people.

Clips would be removed if they were "the product of artificial intelligence or machine learning that merges, replaces or superimposes content onto a video, making it appear to be authentic," the statement from Facebook vice-president Monika Bickert said.

However, the statement added: "This policy does not extend to content that is parody or satire, or video that has been edited solely to omit or change the order of words."

US media noted the new guidelines would not cover videos such as the 2019 viral clip -- which was not a deepfake -- of House Speaker Nancy Pelosi that appeared to show her slurring her words.

Facebook also gave no indication on the number of people assigned to identify and take down the offending videos, but said videos failing to meet its usual guidelines would be removed, and those flagged clips would be reviewed by teams of third-party fact-checkers -- among them AFP.

The news agency has been paid by the social media giant to fact-check posts across 30 countries and 10 languages as part of a program starting in December 2016, and including more than 60 organisations.

Content labeled "false" is not always removed from newsfeeds but is downgraded so fewer people see it -- alongside a warning explaining why the post is misleading.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 26,2020

New Delhi, Feb 26: With the government pushing for the disinvestment of Air India, industrial conglomerate Adani Group may emerge as one of the bidders for the debt-laden national carrier, sources said.

According to highly placed sources, the Group has held internal rounds of deliberations on whether or not to submit an Expression of Interest (EoI) and the discussions are still in the preliminary stage.

If the company actually submits an EoI, it would be a major move towards further diversification of the company which has business interests across sectors right from edible oil, food to mining and minerals. 

It also entered into airport operations and maintenance business and won bids for privatisation of six airports, Ahmedabad, Lucknow, Jaipur, Guwahati, Thiruvananthapuram and Mangaluru in 2019. 

On being contacted by IANS, the company did not comment on the matter.

Air India is one of the most important divestment proposals for the current fiscal to reach the huge Rs 2.1 lakh crore target.

The government in January restarted the divestment process of the airline and invited bids for selling 100 per cent of its equity in the state-owned airline, including Air India's 100 per cent shareholding in AI Express Ltd. and 50 per cent in Air India SATS Airport Services Private Ltd.

After its unsuccessful bid to sell Air India in 2018, the government this time has decided to offload its entire stake. In 2018, it had offered to sell its 76 per cent stake in the airline.

Of the total debt of Rs 60,074 crore as of March 31, 2019, the buyer would be required to absorb Rs 23,286 crore.

Air India, along with its subsidiary Air India Express, has a total operational fleet of 146 aeroplanes.

Further, the disinvestment department has extended the last date for submission of written queries on the Performance Information Memorandum and Share Purchase Agreement to March 6.

The last date for submission of written queries on PIM and SPA was originally set for February 11, following which the Department of Investment and Public Asset Management (DIPAM) on February 21 issued 20 clarifications on the queries raised and expected.

Any delay in the tentatively rolled out timeline would also delay DIPAM's plan to identify the pre-qualified bidders by March 31 and the financial bids invitation as well. It is expected to take more than two months after the selection of the pre-qualified bidders to complete Air India's sale.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.