Rajiv assassins' death sentence commuted to life imprisonment

February 18, 2014

Rajiv_assassins_Death_Penalty

Rajiv_assassinsNew Delhi, Feb 18: Supreme Court Tuesday commuted the death sentence to the three assassins of former prime minister Rajiv Gandhi to life imprisonment, holding that the 11-year long delay in deciding their mercy petition had a dehumanising effect on them.

The apex court bench headed by Chief Justice P. Sathasivam said that the delay was not only inordinate but also unreasonable and unexplained.

The court said that life imprisonment would mean life in jail till end.

Gandhi was killed in 1991. His assassins were convicted by a TADA court in January 1998 and were awarded death sentence, which was confirmed by the apex court May 11, 1999.

The three assassins - V. Sriharan alias Murugan, A.G. Perarivlan alias Arivu and T. Suthendraraja alias Santhan - sought the commutation of their death sentence to life imprisonment on account of the inordinate delay of nearly 11-years in deciding their mercy petitions.

The court while commuting the death sentence rejected the contentions advanced by Attorney General G.E. Vahanvati on behalf of the central government.

The court said that though there is no time limit given in deciding the mercy petition by the president, but it was incumbent upon the government to decide the same at the earliest.

The court said this should be included as an additional criteria amongst the several government has already issued.

While rejecting the government's contention that it was incumbent upon the death row convicts to prove that they have suffered torture and dehumanisation during the pendency of the mercy petition, the court said there is nothing in Indian law and international law that puts the burden of proving torture and dehumanising condition on the death row convicts.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 5,2020

New Delhi, Apr 5: Joining efforts to fight COVID-19, the Defence Research and Development Organisation (DRDO) has designed a full-body disinfection chamber and a special face protection mask for healthcare professionals, officials said.

The special chamber called 'PSE' has been designed by Vehicle Research Development Establishment (VRDE), Ahmednagar, a DRDO Laboratory.

The walk through enclosure is designed for personnel decontamination, one person at a time. It is a portable system equipped with sanitiser and soap dispenser, officials said.

The decontamination is started using a foot pedal at the entry. On entering the chamber, electrically-operated pump creates a disinfectant mist of hypo sodium chloride for disinfecting, the DRDO said in a statement.

The mist spray is calibrated for an operation of 25 seconds and stops automatically indicating completion of operation. As per procedure, personnel undergoing disinfection will need to keep their eyes closed while inside the chamber, it said.

The system consists of roof mounted and bottom tanks with a total of 700 litres capacity. Approximately 650 personnel can pass through the chamber for disinfection until the refill is required, the DRDO said.

The system has see-through glass panels on side walls for monitoring purpose and is fitted with lights for illumination during night-time operations, it added.

This system can be used for disinfection of personnel at the areas of controlled ingress and egress such as entry and exit to hospitals, malls, office buildings and critical installations, officials said.

Also, Research Centre Imarat (RCI), Hyderabad, and Terminal Ballistics Research Laboratory (TBRL), Chandigarh, have developed face protection mask for healthcare professionals handling COVID-19 patients, the DRDO added.

Its light weight construction makes it convenient for comfortable wear for long duration. This design uses commonly available A4 size Over-Head Projection (OHP) film for face protection, it said.

One thousand face shields are being produced daily in TBRL and provided to Postgraduate Institute of Medical Education and Research (PGIMER), Chandigarh, it said.

Similarly, 100 are produced at RCI and these have been handed over to Employees' State Insurance Corporation (ESIC), Hyderabad. A demand of 10,000 shields has been received from PGIMER and ESIC hospitals based on successful user trials, the DRDO added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 28,2020

Several India-based firms are spoofing the World Health Organisation (WHO) by creating fake Gmail accounts and luring business leaders in disguise of informing them of latest COVID-19 announcements and hack their personal and financial information, Google has warned.

These "hack-for-hire" firms, many based in India, have been creating Gmail accounts spoofing the WHO, largely targeting business leaders in financial services, consulting, and healthcare corporations within numerous countries including, the US, Slovenia, Canada, India, Bahrain, Cyprus, and the UK.

"The lures themselves encourage individuals to sign up for direct notifications from the WHO to stay informed of COVID-19 related announcements, and link to attacker-hosted websites that bear a strong resemblance to the official WHO website," security researchers from Google's Threat Analysis Group said on Wednesday.

The sites typically feature fake login pages that prompt potential victims to give up their Google account credentials, and occasionally encourage individuals to give up other personal information, such as their phone numbers.

On any given day, Google's Threat Analysis Group (TAG) said it is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.

Last month, it sent 1,755 warnings to users whose accounts were targets of government-backed attackers.

"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users," said the tech giant.

Google continues to see attacks from groups like Charming Kitten on medical and healthcare professionals, including WHO employees.

"We're seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers," said the company.

Government-backed or state-sponsored groups have different goals in carrying out their attacks: Some are looking to collect intelligence or steal intellectual property; others are targeting dissidents or activists, or attempting to engage in coordinated influence operations and disinformation campaigns.

Google said that since March, it has removed more than 1,000 YouTube channels that were part of a large campaign and behaving in a coordinated manner.

"These channels were mostly uploading spammy, non-political content, but a small subset posted primarily Chinese-language political content similar to the findings of a recent Graphika report," said the company.

Several cybersecurity firms have seen a spike in COVID-19 related scams and hacking attempts. Hackers are also creating scam sites similar to COVID-19 relief packages.

Researchers at Check Point Software Technologies revealed in mid-May that they have seen 192,000 coronavirus-related cyber-attacks per week over the past three weeks, a 30 % increase compared to previous weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 19,2020

Attari, Mar 19: At least 29 Indians, who had gone to Dubai to watch a cricket match which was called off later, on Wednesday night returned to India through the land transit route of Attari-Wagah border here.

Earlier, when they entered India after being cleared by the Pakistan Immigration Authority, they were detained at Attari border, as they were not having requisite permission on their passport to return to India through Pakistan.

According to officials, they had earlier flown to Dubai from New Delhi to watch a Pakistan League Cricket match there.

The match, however, was aborted and they decided to return India via Pakistan. They took a flight to Pakistan and after landing there, they took land route to reach Attari-Wagah border.

All were cleared by Indian immigration authority after being allowed by the Union Ministry of Home Affairs.

Amritsar Civil Surgeon Dr Prabdeep Kaur Johal said that by 9.30 PM all the Indian nationals were not handed over to the medical team for checkup.

She said if anyone of them are found with any symptoms of the virus, they would be admitted to Amritsar Government Hospital or else they would be allowed to continue their journey to Delhi or elsewhere.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.