Modi claims Pakistan interfering in Gujarat polls, seeks explanation from Congress

Agencies
December 10, 2017

Palanpur (Gujarat), Dec 10: Prime Minister Narendra Modi on Sunday alleged Pakistan was interfering in Gujarat Assembly polls, and sought an explanation from the Congress over its top partymen who are said to have recently met leaders from the neighbouring country.

Addressing a poll rally here, the prime minister also raised questions over the alleged appeal by former director general of the Pakistan Army, Sardar Arshad Rafiq, that senior Congress leader Ahmed Patel be made chief minister of Gujarat.

Modi said (former Congress minister) Mani Shankar Aiyar had called him "neech" (vile) a day after the alleged meeting of Pakistani leaders with top Congressmen.

"There were media reports yesterday about a meeting at Mani Shankar Aiyar's house. It was attended by Pakistan's high commissioner, Pakistan's former foreign minister, India's former vice president and former prime minister Manmohan Singh," Modi said.

The meeting at Aiyar's house carried on for almost three hours, Modi said.

"The next day, Mani Shankar Aiyar said Modi was 'neech'. This is a serious matter," he said.

Modi added that Rafiq had backed Ahmed Patel as the next chief minister of Gujarat.

"(On one side) Pakistan Army's former DG is interfering in Gujarat's election, on the other side, Pakistan's people are holding a meeting at Mani Shankar Aiyar's house," he said.

"And, after that meeting, people of Gujarat, backward communities, poor people and Modi were insulted. Don't you think such events raise doubts," Modi asked.

He said the Congress should inform the people of the country what exactly it was up to.

Modi was speaking at the rally for the ongoing state Assembly polls. The second phase of polling in north and central Gujarat, including the Banaskantha district, will be held on December 14.

Comments

Jameel
 - 
Monday, 11 Dec 2017

Modi feels pakistan is interfering in Gujarath polls because, modi is the one who hops to pakistan to participate in pakistani's funtions and he might have leaked some internal matters to pakistani leaders. cant believe this liar.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 11,2020

Kanpur, Jul 11: "The Uttar Pradesh administration has done the right thing by taking action against my son," said an old and feeble Ram Kumar Dubey, father of gangster Vikas Dubey.

The father said his son killed eight police officials and it was an unforgivable sin.

"Had he listened to us, his life would not have ended this way. Vikas never helped us in any way. Due to him, even our ancestral property was razed to the ground. He also killed eight policemen, which is an unforgivable sin. The administration has done the right thing. Had they not done so, tomorrow others would have acted similarly," Ram Kumar said.

"It is the chief minister's duty to protect every individual. The police is an extension of that. He attacked them which cannot be forgiven. I will not even take part in his cremation," he added.

Ram Kumar Dubey said that his only appeal to the government is to allow him entry to his ancestral property now.

Vikas Dubey was cremated at Bhairav Ghat in Kanpur. His wife, younger son and brother-in-law were present and no other member of his family attended the last rites.

Vikas Dubey was arrested by the police in Ujjain on Thursday morning. He was on the run for the last six days and had come to the city to offer prayers at a temple, where he was identified by a security guard.

He was killed in an encounter by the Uttar Pradesh Police earlier today after he "attempted to flee".

The gangster was the main accused in the encounter that took place in Bikru village in Chaubeypur area of Kanpur last week, in which a group of assailants opened fire on a police team, which had gone to arrest him.

Eight police personnel were killed in the encounter.

Vikas Dubey managed to escape after the incident. Uttar Pradesh police had launched a hunt and raised a bounty on him for Rs 5 lakh.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 28,2020

Pulwama, May 28: A major incident of a vehicle-borne IED blast was averted by the timely input and action by Pulwama Police, Central Reserve Police Force (CRPF) and Army, the Jammu and Kashmir Police said.

According to sources, Pulwama Police got credible information last night about a terrorist moving with an explosive-laden car ready to blast at some location. They took out various parties of police and security forces and covered all possible routes keeping themselves and the police and security forces away from the road at safer locations.

The suspected vehicle came and a few rounds were fired towards it. A little ahead this vehicle was abandoned and the driver escaped in the darkness. On close look, the vehicle was seen to be carrying heavy explosives in a drum on the rear seat. Possibly more explosive would be fitted elsewhere in the vehicle, sources added.

The vehicle was kept under watch for the night. People in nearby houses were evacuated and the vehicle exploded in situ by the Bomb Disposal Squad as moving the vehicle would have involved serious threat, sources said.

The vehicle reportedly sports a number plate of a scooter registered somewhere in Kathua district of Jammu zone, sources added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.