Modi govt copies Shaadi bhagya; offers Rs 51k wedding bounty for graduate Muslim girls

coastaldigest.com news network
August 7, 2017

Bengaluru, Aug 7: Do you remember those days when Bharatiya Janata Party staged protests across Karnataka against chief minister Siddaramaiah-led Congress government’s ‘Shaadi Bhagya’ scheme which provided financial assistance of Rs 50,000 to brides of minority communities such as Muslims, Christians, Sikhs, Parsis, Jains and Buddhists in Karnataka? Now, the Prime Minister Narendra Modi-led NDA has come up with almost a similar scheme. Interestingly, this scheme is only for Muslims — not for all minority communities.

Christened as ‘Shaadi Shagun’, the Centre’s new scheme will provide a wedding gift of Rs 51,000 to “graduate” Muslim women. However, those Muslim girls who fail to complete graduation will be deprived of this bounty.

Currently, a website is currently being put up by Maulana Azad Educational Foundation where all details of the scheme would be made available. The Shaadi Shagun amount will be made available only to those graduate Muslim girls who have already received MAEF scholarships earlier.

Maulana Azad Educational Foundation, which works under the National Commission for Minorities, has decided to take this step to encourage Muslim women to opt for higher studies. MAEF says this scheme is tailored only for Muslim women and their guardians to egg them on to complete their studies at the college or university level.

Recently the MAEF, headed by minorities welfare minister Mukhtar Abbas Naqvi, held a meeting during which important decisions were taken vis-a-vis scholarships offered to Muslim women. Besides, it was also decided that a sum of Rs 10,000 would be awarded to Muslim girls studying in Classes IX and X. Up to now, only (Muslim) girls studying in Classes XI and XII were eligible to receive a scholarship of Rs 12,000 each.

MAEF treasurer Shakir Hussain Ansari said, “Girl children in a large part of Muslim society are deprived of higher education even today, often due to financial constraints. We mean to encourage girls and their parents and guardians to ensure that the students complete their graduation. Hence, we've decided on the Rs 51,000 wedding gift.”

“Though this isn't a large amount, we do believe it would be firm step forward in encouraging higher education among Muslim women,” he added.

Comments

Isra
 - 
Sunday, 3 Dec 2017

We need the money now to find a good groom also to pay for match maker..

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 8,2020

Bhatkal, May 8: In a shocking development 12 new coronavius positive cases were detected in Bhatkal town of Uttara Kannada district in a single day. 

Around 20 days ago an 18-year-old girl in Bhatkal was tested positive for the covid-19. The source of this infection was the First Neuro hospital located at Padil in Mangaluru where a covid-19 patient from Bantwal had undergone treatment. 

Now, the Bhatkal girl’s family members and neighbours also have tested positive for the deadly virus. Madeena Colony, Usmainya Colony, Nawayath Colony, Tengungundi Cross, Hindu Colony, Kukti Nagar, Jali Cross and Azad Nagar are sealed down by officials after the confirmation of new cases. 

Those infected include a 5-month-old baby, elderly people aged 60, 75, 83 and children aged 3, 11 and 12 years. 

Meanwhile, Kumata-Honnavar MLA Dinakar K Shetty has written to Uttara Kannada DC urging the complete seal down of Bhatkal taluk.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 27,2020

Mysuru, Mar 27: A 35-year old man from Mysuru, Karnataka was tested positive for coronavirus infection on Thursday, taking the state-wide count to 52 altogether.

This new case could be an indication that Covid-19 has entered into the third stage of community transmission in Karnataka, as the infected person neither has any travel history nor have been in contact with Covid-affected persons.

The patient works in the quality assurance section of a pharmaceutical company in Nanjangud in Mysuru district, and has been in continuous contact with medical care professionals.

Mysuru DC Mr Abhiram G Shankar informs that detailed investigation is under process.

He is currently undergoing treatment at an isolation ward in a designated hospital in Mysuru. So far his seven primary contacts have been traced and they are under home quarantine, Mr Abhiram Shankar said.

A 35 year old Mysurean, and another 46 year old Keralite, both who had come from Dubai, were the first and second cases tested positive for Covid-19 in Mysuru. They are also currently kept under isolation.

Mysuru district administration has identified 898 international passengers in Mysuru district including 152 in the taluks. Among them, while 149 persons have completed home quarantine period by now, the rest are still in isolation.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.