Rahul's elevation as Congress President likely in October

News Network
September 5, 2017

New Delhi, Sept 5: Rahul Gandhi is likely to be elevated as the Congress President next month after the culmination of the organisational elections currently under way across the country.

Though there is no opposition from within the party to the much-anticipated change of guard at the helm, Rahul is expected to take the election route to the post instead of being appointed by the Congress Working Committee.

“Rahul will take over as Congress President after the culmination of the election process next month,” a Congress leader said.

The elevation comes ahead of the year end Gujarat assembly elections, where Rahul has challenged the supremacy of Prime Minister Narendra Modi and BJP President Amit Shah in their home state.

Rahu's leadership skills will also be put to test in Himachal Pradesh where Chief Minister Virbhadra Singh has raised a banner of revolt against the state unit chief Sukhvinder Singh Sukhu and declared that he will not contest the November assembly elections.

However, Rahul's team is expected to be a mix of the old guard and new faces as senior leaders such as Ashok Gehlot, Sushilkumar Shinde, Kamal Nath have been given key responsibilities in the organisation.

It has almost 10 months now since the Congress Working Committee urged Rahul, who was appointed as vice president in 2013, to take over the reins of the party.

The November 7 meeting last year was attended by top leaders including former prime minister Manmohan Singh, former Defence Minister A K Antony among others. Congress President had skipped the CWC meeting on account of ill-health.

Organisational elections in the Congress have begun last month and according to the schedule approved by the CWC are expected to conclude by October 15.

Sonia Gandhi, who has been keeping indifferent health off late, has already withdrawn from day to day running of the organisational work and delegated most of the responsibilities to Rahul.

Sonia Gandhi has created a record by being the Congress President for nearly two decades since she assumed the post in 1998 after the ouster of Sitaram Kesari. Her term had ended in December 2015, but the CWC had been delaying internal elections which prompted the Election Commission to set a deadline of December this year to complete the process.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 11,2020

New Delhi, Apr 11: Calling upon chief ministers to popularise Aarogya Setu app, Prime Minister Narendra Modi on Saturday said it will an essential tool in India's fight against coronavirus and referred to the possibility of the app being an "e-pass which could subsequently facilitate travel from one place to other".

Interacting with chief ministers through video conference, the Prime Minister mentioned how South Korea and Singapore had got success in contact tracing and said India has made its own effort through the app amid efforts to contain the spread of coronavirus.

A PMO release said that the Prime Minister spoke about popularizing the Aarogya Setu app to ensure downloads in greater numbers.

"He referred to how South Korea and Singapore got success in contact tracing. Based on those experiences, India has made its own effort through the app which will be an essential tool in India's fight against the pandemic, he said. He also referred to the possibility of the app being an e-pass which could subsequently facilitate travel from one place to another," the release said.

The Prime Minister had earlier this week urged people to download the app saying it is an important step in the fight against COVID-19 and its effectiveness will increase as more people use it.

"Aarogya Setu is an important step in our fight against COVID-19. By leveraging technology, it provides important information. As more and more people use it, it's effectiveness will increase. I urge you all to download it," he had said in a tweet.

The app launched earlier this month in public-private partnership enables people to themselves assess the risk for their catching the coronavirus infection.

The app makes its calculations based on a person's interaction with others, using Bluetooth technology, algorithms and artificial intelligence.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 17,2020

New Delhi, 17: Tensions on the Indo-China border have spiked to the highest since 1962 after over 20 troops, including an Indian commanding officer, were killed in the face-off in Galwan valley that has seen a six-week long standoff underway with the Peoples Liberation Army.

The Army said that the soldiers – including the Commanding Officer of 16 Bihar regiment in charge of the area – died while a `de-escalation process’ was underway. Sources said that this death toll could rise up as some soldiers are currently not accounted for after PLA troops attacked with spiked sticks and stones in the Galwan valley.

Chinese side also has casualties but the number is still not known. The Indian death toll is perhaps the worst single day loss in decades and has come at a time when thousands of troops are forward deployed in Eastern Ladakh.

ET was the first to report on May 12 about a massive troop build up in the Galwan valley, which is an old flashpoint that had seen action in the 1962 war as well.

There have been reports of casualties on the Chinese side in the clash but numbers are currently not available. Worryingly, information from the ground suggests that several Indian soldiers, including four officers, are missing and could have been taken captive by a vastly larger Chinese force. Their status is still not known.

“During the de-escalation process underway in the Galwan Valley, a violent face-off took place yesterday night with casualties. The loss of lives on the Indian side includes an officer and two soldiers. Senior military officials of the two sides are currently meeting at the venue to defuse the situation,” an Indian Army statement reads.

The Ministry of External Affairs said that the clash occurred when the Chinese side violated the LAC. “On the late-evening and night of 15th June, 2020 a violent face-off happened as a result of an attempt by the Chinese side to unilaterally change the status quo there. Both sides suffered casualties that could have been avoided had the agreement at the higher level been scrupulously followed by the Chinese side,” a statement reads.

The loss of the Commanding Officer is especially devastating and he had been directly involved in de-escalation talks with the Chinese side, including one hours before the clash took place. Sources said that the talks on Monday morning had led to an agreement for Chinese forces to withdraw from Indian territory as part of the disengagement.

According to one version, the CO had gone to the standoff point with a party of 50 men to check if the Chinese had retreated as promised. As the Indian side proceeded to demolish and burn illegal Chinese structures on its side of the LAC, including an observation post constructed on the South bank of the river, a fresh stand off took place as a large force of Chinese troops returned back.

Sources said that a Chinese force in excess of 250 quickly assembled near Patrol Point 14 and were physically stopped by Indian soldiers from entering Indian territory. Soldiers from both sides did not use firearms but the Chinese soldiers carried spiked sticks to attack.

Given the terrain of the region, a part of the standoff and clash took place in the middle of the Galwan river that is currently flowing at full spate, leading to high casualties as injured soldiers got swept away. Indian soldiers have to cross the Galwan river at atleast five points to reach PP 14, which marks the LAC.

Chinese media reports on Tuesday quoted the spokesperson from its Western Theatre Command as laying claim over the Galwan valley region and blaming the Indian side for the clash. Reports quoted Col Zhang Shuili as saying that India has violated the consensus made during Army commander level talks.

As reported, Galwan river area has a painful history with China, with Peoples Liberation Army (PLA) soldiers surrounding a freshly set up Indian Army post in July 1962, in what would be one of the early triggers to the Sino-Indian war. At an Army post that was overrun at Galwan, 33 Indian soldiers were killed and several dozen taken captive in 1962.

In the past, the Doklam crisis in 2017 saw tensions building up along the Pangong Tso lake as well with soldiers engaging in a fight with sticks and stones. However, the Eastern Ladakh standoff is of a much more serious nature, with over 6000 Chinese troops lined up with tanks and artillery, faced off with a larger Indian forces. Troop build up has also been reported across the borders in Himachal Pradesh, Uttarakhand, Sikkim and Arunachal.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.