Pakistan: Terrorists target Masjid, kill over 40 including children

January 30, 2015

Karachi, Jan 30: At least 40people, including children, were killed and over 55 injured when a powerful blast ripped through a packed minority Shia mosque in Pakistan's Sindh province during the Friday prayers, in the deadliest sectarian attack to hit the country in recent times.Shiya masjid attacked

The roof of a central Shia Muslim Imambargah came down after an explosion in Lakhi Dar area of Shikarpur - around 470 kilometres north of here - when worshippers had assembled for the Friday prayers, burying them.

At least 40 people were killed and over 55 were injured in the attack, some critically. Private media said it could be suicide bombing.

Many were trapped under the debris and hundreds of people rushed to the scene to dig out survivors.

The explosion was heard several kilometers away. Children are also said to be among the victims. Television footage showed chaotic scenes as people rushed to take the wounded for treatment using cars, motorbikes and rickshaws.

"It was a big explosion inside the Imambargah and was set off with a remote device. The intensity of the blast led to the roof of the make-shift building caving in completely which has led to many deaths," senior police official Abdullah Mehr said over telephone.

Geo TV quoted DIG Shikarpur Rakhio Mirani as saying that a man brought a device inside the Imambargah and used it to detonate a bomb.

The blast is the latest in a rising tide of sectarian violence blighting Pakistan, where radical Sunni Muslim groups often target Shia Muslims, who form about one-fifth of the 180 million-population.

Jundullah militant group took responsibility of the attack. "Our target was the Shia because they are our enemies," spokesman Fahad Marwat said.

The group last year parted ways with the Taliban and announced allegiance with the Islamic State militant group.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 12,2020

London, Feb 12: Fugitive liquor baron Vijay Mallya returned to the courtroom here on Wednesday, the second day of hearing at the UK High Court, where the former billionaire has appealed against the extradition decision of Westminster Magistrates Court in December 2018.

On being asked about his expectations from the lengthy appeals process against the extradition order as today is the last day for Mallya to present his defence, the embattled former Kingfisher Airlines boss replied, "I have no clue. You see. I'll also see it. Let's not get into a speculative game."

When asked on what would happen if Mallya loses the case and has to return to India, the liquor baron responded: "We do have arguments."

The UK High Court, on Tuesday, had also heard Mallya's appeal against the Westminster Magistrates' Court order extraditing him to India to face alleged fraud and money laundering charges amounting to Rs 9,000 crore.

Mallya was present in the court along with his counsel Clare Montgomery during the hearing. Officials from Enforcement Directorate (ED) and Central Bureau of Investigation (CBI) along with counsel Mark Summers representing the Indian government were also present.

When the judge asked if there was a timeline in the case, Clare said," This is a very dense case," involving multiple individuals and organisations and that not everything had been taken into account by the magistrate Emma Arbuthnot in her ruling against Mallya.

Montgomery contended that the magistrate's ruling had been riddled with "multiple errors". She also brought into question the admissibility of documents submitted by the Indian government - including witness statements and emails that proved crucial in the ruling by judge Arbuthnot, who found "clear evidence of misapplication of loan funds" and that there was a prima facie case of fraud against Mallya.

As she had done throughout the trial, Montgomery continued to assert that Mallya had not acted in a fraudulent manner or run a pyramid and that the collapse of Kingfisher Airlines was, in fact, the failure of a business in difficult economic circumstances.

She also reiterated concerns about the conduct of the Central Bureau of Investigation (CBI) in bringing charges against Mallya, claiming that the tycoon had been made a scapegoat.

Montgomery also stated that the Indian government had presented the loan taken out by Kingfisher Airlines, not as a simple business loan but was part of a larger and elaborate attempt at defrauding the banks by Mallya and Kingfisher Airlines management.

This, Montgomery contended, was but one example of a wider misinterpretation of the case by judge Arbuthnot.

The High Court justices reprimanded Montgomery for concentrating on the evidence - in essence rehashing the case presented at the lower court - rather than the apparent "mistakes" made by judge Arbuthnot in her ruling.

Mallya remains on bail of £650,000 as he has done throughout this legal process.

The Crown Prosecution Service which is representing the Government of India will present its case for the extradition of Mallya on Wednesday.

The 63-year-old businessman fled India in March 2016 and has been living in the UK since then.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 18,2020

British lawmaker Debbie Abrahams' e-Business visa was revoked as she was involved in anti-India activities and the cancellation was conveyed to her on February 14, government sources said on Tuesday.

Asserting that the grant, rejection or revocation of a visa or electronic travel authorisation is the sovereign right of a country, the sources said Abrahams was issued an e-Business visa on October 7 last year which was valid till October 5, 2020 for attending business meetings.

"Her e-Business visa was revoked on February 14, 2020 on account of her indulging in activities which went against India's national interest. The rejection of the e-Business visa was intimated to her on February 14," a source said.

Abrahams, who chairs a British parliamentary group on Kashmir, was denied entry into India upon her arrival at the New Delhi airport on Monday.

Government officials had said on Monday also that she was informed in advance that her e-visa had been cancelled.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.