‘Modi’s Kedarnath show after campaign is poll code violation’: TMC complains to EC

Agencies
May 19, 2019

New Delhi, May 19: The Trinamool Congress (TMC) on Sunday lodged a complaint with the Election Commission of India (ECI) against Prime Minister Narendra Modi for allegedly violating the Model Code of Conduct (MCC) on polling day.

"Though the campaign for the last phase of polling for 2019 Lok Sabha elections got over on May 17 at 6 p.m., Narendra Modi's Kedarnath Yatra is being covered and widely reported in local media as well as the national for the last two days. This is a gross violation of the Model Code Of Conduct," said Derek O'Brien, leader of the TMC Parliamentary Party in the Rajya Sabha.

Modi announced that the "Master Plan" for the Kedarnath Temple was "ready" and he also addressed the public and the media at Kedarnath, O'Brien alleged. "It is absolutely unethical and morally incorrect," he said in a letter written to the ECI.

He sought immediate action to "stop telecast of such surreptitious and unfair campaign".

Trinamool's Rajya Sabha member also alleged, "It is unfortunate that the Election Commission, the highest body and the eyes and ears of the democratic process, remains blind and deaf to the gross violation of the MCC."

Comments

Dodanna
 - 
Sunday, 19 May 2019

Fekurajaas aakhri drama.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 5,2020

New Delhi, Feb 5: Taking on Delhi Chief Minister Arvind Kejriwal after Shaheen Bagh shooter Kapil Baisala was identified as an AAP worker by police, BJP chief J P Nadda on Tuesday said it exposed the party and Kejriwal who were playing with the country's security.

The Aam Aadmi Party hit back, questioning the police investigation.

In a series of tweets, Nadda said people of the country and Delhi today have seen the "dirty face" of AAP.

"For political longing, Kejriwal and his people even sold the security of the country. Earlier, Kejriwal used to insult the Army and advocate terrorists, but today relations with those who carry out their terrorist activities came to light," he said.

Nadda said he wanted to make it clear to Kejriwal that this country is bigger than any election, any government, and "this nation will not forgive those who play with its security. Kejriwal and his entire team have been exposed. The people of Delhi will give a befitting reply".

He claimed the entire country has seen "photos of Imam Hussain, the MLA and former minister of the Delhi government, with a radical terrorist organisation, PFI".

Days before Delhi goes to polls, police claimed that Baisala is a member of the Aam Aadmi Party. They said Baisala joined the party in early 2019 along with his father.

Police said it had photos of Baisala purportedly joining AAP along with his father Gaje Singh last year.

AAP's Rajya Sabha MP Sanjay Singh alleged that photos which were part of investigation were leaked to the BJP. He also said the party will approach the Election Commission to raise this issue, which has cropped up four days before the polling date.

"On whose instance, the police is giving statement? How did the photos which were part of the investigation reach the BJP? Before the news came out, Manoj Tiwari in the morning stated that the accused was from AAP. How did Manoj Tiwari get this news," Singh questioned in a press conference.

Union minister and BJP's in-charge for the Delhi polls, Prakash Javadekar, in a press conference alleged that "their (AAP's) designs are very clear from the beginning and they are trying every trick".

The whole conspiracy of AAP is to "divide society, cause fear in a community and create a vote bank," he charged.

Javadekar also claimed that photos of Baisala were recovered by police from his mobile phone although they were erased.

He also claimed that Baisala and his father were welcomed by Sanjay Singh at their joining of AAP.

"This proves AAP misleads youth and pushes them on the wrong path. AAP's strategy is to divide two communities, they want to instigate riots in Delhi," Javadekar alleged.

He further alleged that AAP leader Sanjay Singh had said violence would take place in Delhi. Their "conspiracy has been exposed by Delhi Police," he claimed.

"We condemn this politics of AAP," he said.

Javadekar also claimed this was "not an isolated incident" as AAP member Amanatullah Khan made a "very provocative speech" and the party supported Shaheen Bagh and did not give permission for the prosecution of members of the "tukde-tukde gang".

He hinted the BJP could approach the Election Commission against AAP over the issue.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 13,2020

Mumbai, Mar 13:  Investor wealth worth nearly Rs 12 lakh crore was wiped out in less than 15 minutes of trading on the stock exchanges on Friday, with the two benchmarks, the BSE Sensex and the NSE Nifty, crashing over 10 per cent.

The 30-share BSE Sensex plummeted 3,380.59 points, or 10.31 per cent, to 29,397.55. It hit an intra-day low of 29,388.97, falling up to 3,389.17 points.

Trading was halted for 45 minutes in the early session after the index hit its lower circuit limit.

The BSE and NSE benchmark indices, however, pared most losses with the Sensex trading 835.40 points, or 2.55 per cent, lower at 31,942.74, and the Nifty was down 253.25 points or 2.64 per cent at 9,336.90 at 10.40 am.

The mayhem on Dalal Street eroded investor wealth worth Rs 12,92,479.88 crore, taking the total m-cap to Rs 1,12,78,172.75 crore on the BSE at 1020 hours.

The m-cap of BSE-listed companies stood at Rs 1,25,70,652.63 crore at the end of trading on Thursday.

Traders said besides global selloff, incessant foreign fund outflows also weighed on investor sentiments.

On a net basis, foreign institutional investors sold equities worth Rs 3,475.29 crore on Thursday, data available with stock exchanges showed.

On the BSE, 1,279 scrips declined, while 193 advanced and 40 remained unchanged.

Volatility heightened in global markets as benchmarks world over went into panic mode, insinuating a freakish selloff.

Bourses in Shanghai dropped over 3.32 per cent, Hong Kong 5.61 per cent, Seoul 7.58 per cent and Tokyo cracked up to 7.97 per cent.

Wall Street lost 10 per cent in overnight trade.

More than 1,30,000 cases of the novel coronavirus have been recorded in 116 countries and territories, killing at least 4,900 people.

The number of coronavirus patients in India has risen to 74, as per the health ministry.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.