Prithvi II successfully test-fired

August 25, 2012

Prithvi-flight

Balasore (Odisha), August 25: India's nuclear-capable Prithvi-II ballistic missile with a strike range of 350 km was today successfully test-fired from the Integrated Test Range near here as part of user trial by the army.

"The flight test of the surface-to-surface missile was conducted around 1100 hrs from a mobile launcher from ITR's launch complex-III at Chandipur," defence sources said.

Describing the trial of the indigenously developed strategic missile as "fully successful", ITR Director MVKV Prasad said, "It was a perfect launch. All the mission objectives were accomplished during the trial."

Prithvi is the first ballistic missile developed under the country's prestigious Integrated Guided Missile Development Programme and has the capability to carry 500 kg of both nuclear and conventional warheads with a strike range of 350 km.

The missile uses advanced inertial guidance system with manoeuvring trajectory.

The test-fire of the sophisticated short-range ballistic missile, which has already been inducted into the armed forces, was a user's trial by the army and monitored by scientists of Defence Research and Development Organisation.

The sleek missile is handled by the strategic force command (SFC), they said, adding the trial was conducted to gauge the effectiveness of the weapon in a real time situation.

"The whole exercise was aimed at studying the control and guidance system of the missile besides providing training to the Army, which happens to be the user," said an official.

The state-of-the-art missile is 9 metre-long and is one metre in diameter with liquid propulsion twin engine.

A defence scientist associated with the trial said radars and electro optical systems located along the coast tracked and monitored all the parameters of the missile throughout the flight path.

Prithvi-II has been successfully flight tested several times as part of the training exercise and today’s launch again proved its reliability and accuracy, he said.

A twin user trial of Prithvi-II missiles planned on December 21, 2011 from ITR had to be deferred due to a technical snag, sources said.

Its trial was, however, a complete success on September 26, 2011 as the missile reached the predefined target in Bay of Bengal with a very high accuracy of better than 10 meters, they said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 3,2020

New Delhi, Mar 3: Delhi's Tihar Prison authorities had made all necessary preparations for the hanging of four convicts in the Nirbhaya gangrape-and-murder case which was scheduled for Tuesday, officials said Monday.

However, on Monday evening, a city court deferred the hanging till further orders.

Postponing the execution, Additional Sessions Judge Dharmender Rana said the hanging cannot be carried out pending disposal of Pawan Gupta's mercy plea before the President, observing any condemned convict must not meet his "Creator" with grievance against courts for not acting fairly on the opportunity to exhaust legal remedies.

"We had made all the necessary arrangements for the execution of the four convicts which was scheduled for Tuesday at 6 AM. Now, the execution has been postponed and we are waiting for the further order by the court," a senior jail official said.

The hanging of the four men -- Mukesh Kumar Singh (32), Vinay Kumar Sharma (26), Akshay Kumar Singh (31) and Pawan -- who are lodged in Tihar jail, was fixed for March 3 in Tihar jail on a court order.

"We had checked the ropes. Hangman was called and dummy executions were carried out," another senior jail official said.

Barring Pawan, the other three had in the previous weeks moved curative petitions and mercy pleas which were all dismissed.

The first date of execution -- January 22 -- fixed on January 7 was postponed by the court to February 1. But on January 31, the court indefinitely postponed the hanging. On February 17, the court again issued fresh date for execution of death warrants for March 3 at 6 AM.

The court in its orders observed that the four convicts cannot be hanged since a mercy plea of one or the other convict was pending.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 31,2020

New Delhi, Jan 31: The Supreme Court Friday dismissed the plea filed by one of the four death row convicts in the Nirbhaya gang-rape and murder case, Pawan Gupta, seeking review of its order rejecting his juvenility claim.

The review plea filed earlier in the day was taken up for consideration in-chamber by a bench comprising Justices R Banumathi, Ashok Bhushan and A S Bopanna. 

On January 20, the apex court had rejected the plea by Pawan who had challenged the Delhi High Court's order dismissing his juvenility claim.

Advocate A P Singh, who is representing Pawan in the case, said he filed a petition on his behalf seeking review of the top court's January 20 order on Friday.

While dismissing the plea, the top court had said there was no ground to interfere with the high court order that rejected Pawan's plea and his claim was rightly rejected by the trial court as also the high court.

It had said the matter was raised earlier in the review petition before the apex court which rejected plea of juvenility taken by Pawan and another co-accused Vinay Kumar Sharma and that order has attained finality.

Singh had argued that as per his school leaving certificate, he was a minor at the time of the offence and none of the courts, including trial court and high court, ever considered his documents.

Solicitor General Tushar Mehta, appearing for the Delhi Police, had said Pawan's claim of juvenility was considered at each and every judicial forum and it will be a travesty of justice if the convict is allowed to raise the claim of juvenility repeatedly and at this point of time.

The trial court on January 17 issued black warrants for the second time for the execution of all the four convicts in the case -- Mukesh Kumar Singh (32), Pawan (25), Vinay (26) and Akshay (31) -- in Tihar jail at 6 am on February 1. Earlier, on January 7, the court had fixed January 22 as the hanging date.

As of now, only Mukesh has exhausted all his legal remedies including the clemency plea which was dismissed by President Ram Nath Kovind on January 17 and the appeal against the rejection was thrown out by the Supreme Court on January 29.

Convict Akshay's curative petition was dismissed by the top court on January 30. Another death row convict Vinay moved mercy plea before President on January 29, which is pending.

Singh has also approached the trial court seeking stay on the execution scheduled on February 1, saying the legal remedies of some of the convicts are yet to be availed.

A 23-year-old paramedic student, referred to as Nirbhaya, was gang-raped and brutally assaulted on the intervening night of December 16-17, 2012, in a moving bus in south Delhi by six people before she was thrown out on the road.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.