SC refers ban on women's entry at Sabarimala to constitution bench

Agencies
October 13, 2017

New Delhi, Oct 13: The Supreme Court today referred to its constitution bench the matter pertaining to a ban on the entry of women at Kerala's historic Sabarimala temple.

A three-judge bench headed by Chief justice Dipak Misra framed several questions to be dealt with by the constitution bench, including whether the temple can restrict women's entry.

The apex court also framed a question whether restricting the entry of women at the temple was violative of their rights under the Constitution.

It said the constitution bench will also deal with the question whether this practice amounted to discrimination against the women.

The court had on February 20 reserved its order on whether to refer the matter to a constitution bench.

The management of the Sabarimala temple, located on a hilltop in the Western Ghats of Pathanamthitta district, had earlier told the apex court that the ban on entry of women aged between 10 and 50 years was because they cannot maintain "purity" on account of menstruation.

The court is hearing a plea challenging the practice of banning entry of such women in the temple.

On November 7 last year, the Kerala government had informed the apex court that it favoured the entry of women of all age groups in the historic Sabarimala temple.

Initially, the LDF government had taken a progressive stand in 2007 by favouring women's entry into the temple, which was overturned by the Congress-led United Democratic Front(UDF) dispensation later.

The UDF government had taken a view that it was against the entry of women of the age group of 10-to-50 years as such a practice was being followed since time immemorial.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 2,2020

New Delhi, Jul 2: In the midst of India's tense border standoff with China, the defence ministry on Thursday approved procurement of a number of frontline fighter jets, missile systems and other platforms at a cost of Rs 38,900 crore to bolster the combat capability of the armed forces, officials said.

They said 21 MiG-29 fighter jets are being bought from Russia while 12 Su-30 MKI aircraft will be procured from Russia. The ministry has also approved a separate proposal to upgrade existing 59 MiG-29 aircraft.

The decisions were taken at a meeting of the Defence Acquisition Council (DAC) chaired by Defence Minister Rajnath Singh.

The procurement of 21 MiG-29 and upgrading of the existing fleet of MiG-29 are estimated to cost the government Rs 7,418 crore while purchase of 12 new Su-30 MKI from the Hindustan Aeronautics Ltd will be made at a cost of Rs 10,730 crore, the officials said.

The DAC also approved procurement of long-range land-attack cruise missile systems with a range of 1,000 KM and Astra Missiles for Navy and Air Force.

The officials said cost of these design and development proposals is in the range of Rs 20,400 crore.

"While acquisition of Pinaka missile systems will enable raising additional regiments over and above the ones already inducted, addition of long-range land attack missile systems having a firing range of 1000 KM to the existing arsenal will bolster the attack capabilities of the Navy and the Air Force," said a defence ministry official.

"Similarly induction of Astra Missiles having beyond visual range capability will serve as a force multiplier and immensely add to the strike capability of the Indian Navy and the Indian Air Force," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 29,2020

Thiruvananthapuram, Feb 29: With Saudi Arabia indefinitely suspending visas for visit to Islam's holiest site for the Umrah pilgrimage in the wake of coronavirus outbreak, more than 10,000 people in the state who are awaiting their turn this year for the annual Hajj pilgrimage are a worried lot.

"This year more than 10,000 people in Kerala have been cleared by the Hajj committee," said C Muhammed Faizy, chairman, Kerala State Hajj Committee.

"There is no cause of worry. We hope that during the time of the pilgrimage, the travel restriction by Saudi Arabia will be lifted," he said.

Umrah is a pilgrimage to the holy site that can be undertaken at any time of the year, while the annual Hajj pilgrimage has specific months according to the lunar calendar.

"The move by the Saudi Arabian Government to impose travel restriction was due to the outbreak of coronavirus. It is a preventive step to contain it. In such large gatherings, if one person is affected, it will spread to others. So we fully understand the concerns of the Saudi Government," Muhammed Faizy added.

He said that the Hajj Committee only processes the requests of annual Hajj visit pilgrims and not Umrah.

"This year we expect the Hajj pilgrimage season to be from June to August after Ramzan. But it may vary according to the Ramzan date. We are yet to get any official correspondence from the Saudi Government regarding travel restrictions," he added.

The Saudi Arabian Government suspended visas for tourists from countries affected by the coronavirus, with many having to cancel their Umrah pilgrimage at the last minute.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.