Rohingya's protest for justice on crackdown anniversary

Agencies
August 25, 2018

Bazar (Bangladesh), Aug 25: Thousands of Rohingya refugees staged protests for "justice" today on the first anniversary of a Myanmar military crackdown that forced them to flee to camps in Bangladesh.

About 700,000 of the Muslim minority poured across the border after attacks by the Myanmar military and Buddhist groups that the United Nations has likened to ethnic cleansing.

Thousands held peaceful marches and attended rallies chanting "We want justice from the UN." At the Kutupalong camp, a giant banner proclaimed: "Never Again: Rohingya Genocide Remembrance Day. 25 August, 2018."

Some wore bandanas emblazoned with the slogan "Save Rohingya" while others waved flags.

Other marches and gatherings were planned across what has become the world's biggest refugee camp, activists said.

Rohingya militants staged attacks on Myanmar police posts on August 25 last year sparking the crackdown in which an unknown number of Rohingya were killed. Many have arrived in the Bangladesh camps with stories of rape, torture and villages burned to the ground.

Myanmar authorities have insisted their forces only targeted radicals.

They have made an agreement with Bangladesh to take back refugees but no progress has been made on returns and the Rohingya insist they will not go back unless their safety is guaranteed.

Mohammad Hossain, a 40-year-old protester at Kutupalong, said "We are here remember to August 25. We want justice.

"We want them to recognise us as Rohingya. We are very sad because we are not in our native land. Everyone wants justice. We are complaining about this to the world."

Another protester, Noor Kamal, added: "We faced genocide. Last year, August 25, we faced genocide in Myanmar. We want justice for that."

Comments

ABDUL AZIZ
 - 
Sunday, 26 Aug 2018

HasbunAllahu wa nimal wakeel  niamal maula nimal naseer

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 23,2020

Minneapolis, Jul 23: The former Minneapolis police officer charged with murder in the death of George Floyd was charged Wednesday with multiple felony counts of tax evasion.

Derek Chauvin and his wife, Kellie May Chauvin, were each charged in Washington County with six counts of filing false or fraudulent tax returns for the tax years 2014 through 2019 and three counts of failing to file tax returns for 2016, 2017 and 2018.

Floyd, a Black man who was handcuffed, died May 25 after Chauvin, who is white, pressed his knee against Floyd's neck for nearly eight minutes as Floyd pleaded for air.

Chauvin is charged with second-degree murder, third-degree murder and manslaughter. He and three other officers who were at the scene were fired.

Chauvin is in custody on the charges in the Floyd case. Kellie Chauvin, who filed for divorce after Floyd's death, is not in custody.

Online court records didn't list attorneys for either in the tax evasion case, and calls to Kellie Chauvin did not go through.

Washington County Attorney Pete Orput said the investigation into the Chauvins was started in June by the Minnesota Department of Revenue and Oakdale Police Department.

Authorities allege in the criminal complaints that the Chauvins failed to file income tax returns and pay state income taxes, and that they underreported and underpaid taxes on income they earned from various jobs each year.

The complaints allege that they also failed to pay proper sales tax on a $100,000 BMW purchased in Minnesota in 2018.

Prosecutors say the Chauvins bought the car in Minnetonka but registered it in Florida, where they paid lower sales taxes.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 4,2020

Geneva, Jul 4: The World Health Organization has updated its account of the early stages of the COVID crisis to say it was alerted by its own office in China, and not by China itself, to the first pneumonia cases in Wuhan.

The UN health body has been accused by US President Donald Trump of failing to provide the information needed to stem the pandemic and of being complacent towards Beijing, charges it denies.

On April 9, WHO published an initial timeline of its communications, partly in response to criticism of its early response to the outbreak that has now claimed more than 521,000 lives worldwide.

In that chronology, WHO had said only that the Wuhan municipal health commission in the province of Hubei had on December 31 reported cases of pneumonia. The UN health agency did not however specify who had notified it.

WHO director Tedros Adhanom Ghebreyesus told a press conference on April 20 the first report had come from China, without specifying whether the report had been sent by Chinese authorities or another source.

But a new chronology, published this week by the Geneva-based institution, offers a more detailed version of events.

It indicates that it was the WHO office in China that on December 31 notified its regional point of contact of a case of "viral pneumonia" after having found a declaration for the media on a Wuhan health commission website on the issue.

The same day, WHO's epidemic information service picked up another news report transmitted by the international epidemiological surveillance network ProMed -- based in the United States -- about the same group of cases of pneumonia from unknown causes in Wuhan.

After which, WHO asked the Chinese authorities on two occasions, on January 1 and January 2, for information about these cases, which they provided on January 3.

WHO emergencies director Michael Ryan told a press conference on Friday that countries have 24-48 hours to officially verify an event and provide the agency with additional information about the nature or cause of an event.

Ryan added that the Chinese authorities immediately contacted WHO's as soon as the agency asked to verify the report.

US President Donald Trump has announced that his country, the main financial contributor to WHO, will cut its bridges with the institution, which he accuses of being too close to China and of having poorly managed the pandemic.

The WHO denies any complacency toward China.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.