Never talked about charging migrant labourers; 85% fare borne by railways, 15% by state govts: Centre

Agencies
May 4, 2020

New Delhi, May 4: The government has not talked about charging anything from migrant labourers as 85 per cent of the transportation cost is borne by the railways and 15 per cent by state governments, the Centre said on Monday amid a row over the national transporter allegedly charging the workers for ferrying them home during the COVID-19-induced lockdown.

The government also said the process of transporting the stranded migrant labourers was being coordinated by states “except for one or two states”.

Asked if the migrant labourers were being charged for being ferried home, Joint Secretary at the Health Ministry Lav Agarwal said that as far as migrant labourers are concerned, the guidelines have clearly stated that under the infectious disease management one should stay where he or she is.

“Based on the request given from states for particular cases, permission was given to run special trains. Be it government of India or the Railways, we have not talked about charging from workers. Eighty-five per cent of the transportation cost is borne by the Railways, while states have to bear 15 per cent of the cost,” he told reporters.

“Based on the request of the states the process that started, under which limited number of stranded migrant labourers have to be transported for a particular reason, is being coordinated by the state governments, except for one or two states,” Agarwal said.

At the daily briefing on the COVID-19 situation, Agarwal also said that in the last 24 hours, 1,074 COVID-19 patients have recovered, the highest number of recoveries in one day.

The recovery rate stands at 27.52 per cent with 11,706 COVID-19 patients cured till now, he said.

Agarwal said in the last 24 hours, 2,553 novel coronavirus cases were reported, taking the number of overall cases to 42,533. The total number of active cases stands at 29,453, he said.

The joint secretary also said that the COVID-19 curve is relatively flat as of now and it was not right to talk in terms of when the peak would come.

“If we collectively work then the peak might not ever come, while if we fail in any way we might experience a spike in cases,” he said.

Amitabh Kant, Chairman of the Empowered Group dealing with civil society, NGOs, industries and international partners, said in 112 aspirational districts, “we worked with the collectors and in these 112 districts only 610 cases have been reported which is two per cent of the national level infection”.

In these 112 districts, 22 per cent of India's population resides, he said.

In a few districts like Baramulla, Nuh Rachi, Kupwara and Jaisalmer more than 30 cases have been reported, while in the rest of the places very few cases are there, Kant said.

Comments

alert
 - 
Tuesday, 5 May 2020

why is no one talking about privatized railways? why Adani is not offering free travel to laborers?

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 28,2020

Several India-based firms are spoofing the World Health Organisation (WHO) by creating fake Gmail accounts and luring business leaders in disguise of informing them of latest COVID-19 announcements and hack their personal and financial information, Google has warned.

These "hack-for-hire" firms, many based in India, have been creating Gmail accounts spoofing the WHO, largely targeting business leaders in financial services, consulting, and healthcare corporations within numerous countries including, the US, Slovenia, Canada, India, Bahrain, Cyprus, and the UK.

"The lures themselves encourage individuals to sign up for direct notifications from the WHO to stay informed of COVID-19 related announcements, and link to attacker-hosted websites that bear a strong resemblance to the official WHO website," security researchers from Google's Threat Analysis Group said on Wednesday.

The sites typically feature fake login pages that prompt potential victims to give up their Google account credentials, and occasionally encourage individuals to give up other personal information, such as their phone numbers.

On any given day, Google's Threat Analysis Group (TAG) said it is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.

Last month, it sent 1,755 warnings to users whose accounts were targets of government-backed attackers.

"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users," said the tech giant.

Google continues to see attacks from groups like Charming Kitten on medical and healthcare professionals, including WHO employees.

"We're seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers," said the company.

Government-backed or state-sponsored groups have different goals in carrying out their attacks: Some are looking to collect intelligence or steal intellectual property; others are targeting dissidents or activists, or attempting to engage in coordinated influence operations and disinformation campaigns.

Google said that since March, it has removed more than 1,000 YouTube channels that were part of a large campaign and behaving in a coordinated manner.

"These channels were mostly uploading spammy, non-political content, but a small subset posted primarily Chinese-language political content similar to the findings of a recent Graphika report," said the company.

Several cybersecurity firms have seen a spike in COVID-19 related scams and hacking attempts. Hackers are also creating scam sites similar to COVID-19 relief packages.

Researchers at Check Point Software Technologies revealed in mid-May that they have seen 192,000 coronavirus-related cyber-attacks per week over the past three weeks, a 30 % increase compared to previous weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 3,2020

Kashmir, Mar 3: Four days after the National Investigation Agency made a major breakthrough in the Pulwama terror attack case over a year after the bombing, arresting one person who had sheltered the suicide bomber Adil Ahmad Dar, the NIA on Tuesday arrested two more people in the case - a father-daughter duo - who had also provided shelter to the bomber, officials said.

The NIA also claimed that the video of the suicide bomber was also recorded at their residence and released by the Jaish-e-Mohammad (JeM) terror group from Pakistan after the attack. An NIA spokesperson in Delhi said: "Two more persons have been arrested by the agency in the Pulwama terror attack case and they have been identified as Insha Jan, 23, and her father Tariq Ahmed Shah, 50, who works as a tipper driver."

The official said that the father-daughter duo have been arrested from Hakripora area in Pulwama for their involvement in the attack. The two were arrested on early Tuesday morning after senior officials of the NIA raided their house on Monday night.

A senior NIA official related to the probe told IANS: "The video of Dar, who attacked the CRPF convoy, was recorded at the home of the duo. And the same video was released soon after the Pulwama terror attack by the JeM terrorists from a Pakistani IP address."

He said, "The video was shared by them to their handlers in Pakistan."

The spokesperson further claimed that during the probe Tariq Ahmed Shah disclosed that his house in Hakripora area was used by Dar, Mohammad Umar Farooq, a Pakistani terrorist and IED maker, Kamran - another Pakistani terrorist (both were later killed in encounters with security forces), Sameer Ahmed Dar, a Jaish-e-Mohammad terrorist from Pulwama and Mohammad Ismail aka Ibrahim, a Pakistani terrorist.

The spokesperson said that Shah facilitated all the terrorists at his house for sheltering and for planning of the heinous attack on the CRPF convoy. He said Jan, daughter of Shah, facilitated the terrorists at their home and provided food and other logistics during their stay on more than 15 occasions for two to four days each time, in their house during the year 2018-2019.

"Initial interrogation has revealed that Jan was in constant touch with Farooq and was in communication with him over telephone and other social media applications," the spokesperson said. The fresh arrests of the two accused brings the total number of arrests in the case to three.

The arrests were made on the revelations of Shakir Bashir Magrey, who was arrested by the anti-terror probe agency on February 28. According to senior NIA officials, more arrests will be made in the coming days. Magrey, a resident of Hajibal, Kakapora in Pulwama district of Jammu & Kashmir, is an overground worker (OGW) of the Pakistan-based Jaish-e-Mohammad (JeM).

According to agency sources, Magrey allegedly provided shelter and other logistical assistance to the Pulwama suicide bomber. He was sent to 15 days' NIA custody by a special NIA court in Jammu & Kashmir on Friday. During interrogation, Magrey revealed that he had harboured Dar and Pakistan-based terrorist Mohammad Umar Farooq in his house from late 2018 till the attack in February 2019 and assisted them in the preparation of the Improvised Explosive Device (IED). His shop is located near Lethpora bridge, and as advised by Mohammad Umar, he started conducting reconnaissance of the movement of CRPF convoys on Jammu-Srinagar Highway in January 2019, and informed Mohammad Umar and Adil Ahmad Dar about it.

Magrey was also involved in modifying the Maruti Eeco car and fitting the IED into it in early February, 2019 and was introduced to Adil Ahmad Dar in mid-2018 by Mohammad Umar and he became a full-time OGW of JeM.

"During his initial interrogation, he disclosed that on several occasions, he collected and delivered arms, ammunition, cash and explosive material to JeM terrorists, including those involved in the Pulwama attack," the agency had said on February 28.

"During investigation, the make, model and number of the car used in the attack was quickly ascertained by NIA to be a Maruti Eeco through forensic examination of the tiny remnants of the car which were found at the spot during extended searches," the agency stated.

"This has been corroborated by accused Shakir Bashir Magrey. The explosives used in the attack were determined to be ammonium nitrate, nitro-glycerin and RDX, through forensic investigation," it said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 16,2020

New Delhi, Jan 16: In trouble brewing for the Gautam Adani-led M/S Adani Enterprises, the Central Bureau of Investigation (CBI) on Thursday said that it has registered a case against former officials of the National Co-operative Consumer Federation (NCCF) and others over alleged irregularities in supply of coal to the Andhra Pradesh Power Generation Corporation (APGENCO) in 2010.

The CBI in its FIR has named Virendra Singh, the then Chairman of the NCCF, G P Gupta, the then MD of the NCCF, S C Singhal, the then Senior Advisor of NCCF, Adani Enterprises Ltd and other unknown public servants and others for criminal conspiracy, cheating and criminal misconduct by public servants.

According to CBI, the case was filed on Wednesday after the preliminary enquiry revealed the crime by the officials named in the FIR and the Adani Enterprises was found to be true.

The FIR alleged that on June 26, 2010, APGENCO floated a tender enquiry for supply of six lakh metric tonnes of imported coal "on free on rail destination" basis to Dr Narla Tata Rao Thermal Station (NTTPS), Vijaywada and Rayalasaleema Thermal Power Plant (RTTP), Kadapa, Andhra Pradesh/RTPP via Kakinada-Vizag-Chennai-Krishnapatnam or any other ports

The same was forwarded by the Chief Engineer, APGENCO to seven PSUs -- PEC Limited, STC Limited, MSTC Limited, NCCF, MMTC, Coal India Limited and SCCL Limited.

The FIR alleged that during the probe, the Adani Enterprises used a proxy company to get the supply contract. It said, "NCCF received bids from six companies -- Adani Enterprises Ltd, Maheshwari Brothers Coal Limited (MBCL), Vyom Trade Links Pvt. Ltd, Swarana Projects Pvt. Ltd, Gupta Coal India Ltd and Kyori Oremen Ltd.

During investigation it was found that Gupta Coal India Ltd had quoted the NCCF margin of 11.3 percent, while the MBCL quoted the margin of 2.25 percent and rest did not quote any margin to the NCCF.

The FIR said the quotes of the Gupta Coal India Ltd, Kyori Oremen Ltd and Swarana Projects Pvt. Ltd were rejected by the NCCF as they were not found to be fulfilling the tender conditions.

"Post tender negotiation was done by senior officials of NCCF to give undue favour to Adani Enterprises Ltd despite it not qualifing the tender (terms)," the FIR said, adding instead of cancelling the bid of Adani Enterprise Ltd, senior management of NCCF conveyed the offer margin to the company through one of its representative -- Munish Sehgal, who was sitting in the NCCF head office. It is prima facie evident that when the bids were being processed at NCCF head office in Delhi, a representative of Adani Enterprises Ltd. was informed regarding their imminent rejection due to non-submission of NCCF margin and also that MBCL was eligible bidder quoted 2.25 percent margin," it alleged.

The CBI in its FIR, further alleged that Adani Enterprises Ltd. had given an unsecured loan of Rs 16.81 crore to Vyom Trade Links Ltd in 2008-09. "And further it was revealed that the bank guarantees of the Adani Enterprises Ltd. and Vyom Trade Links Ltd. were issues by the same branch of the State Bank of India and at the same time," it said.

"It was clear that Adani Enterprises Ltd. presented Vyom Trade Links Ltd. as a proxy company in this particular tender and Vyom Trade Links Ltd. later withdrew its offer on flimsy ground," the CBI FIR said.

"The aforesaid acts of commissions and omissions on the part of the senior management of the NCCF disclose that during their tenure, they acted in a manner unbecoming of public servants and committed irregularities by way of manipulation in the selection of bidders, thereby giving undue favours to Adani Enterprises Ltd. in award of work for supply of coal to APGENCO despite its disqualification," it added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.