Nashik, Mar 26: In the first case registered under the new beef ban law in Maharashtra, three persons have been booked for allegedly slaughtering calves in Malegaon town of the district and search is on to trace them.
Acting on a tip-off, police raided a shack in Azad Nagar area, about 90 kms from here, and seized two heads of slaughtered calves and 150 kg of beef, assistant police inspector Shivaji Bantewad said today.
The new Maharashtra Animal Preservation (Amendment) Act, banning slaughter of bulls and bullocks, was enforced by the BJP-led Government on March 4.
Under the law, anyone found selling beef or possessing it can be jailed upto five years and fined Rs 10,000.
Offences have been registered against the accused-- Rashid alias Pandya, Hamid alias Lendi and Asif Talathi-- under the Maharashtra Animal Preservation (Amendment) Act, the police officer said.
Samples of the beef were sent to Mumbai for laboratory tests while the rest of it had been disposed of, he said.
Search is on to nab the three absconding persons, he said adding that further investigation is on.
The beef ban has triggered protests from some political and cultural outfits, arguing that it amounted to encroachment of individual choices and food habits of a large section of people, especially minority communities.
However, state Finance Minister Sudhir Mungantiwar had yesterday defended the enforcement of the law holding that during the national movement, Mahatma Gandhi backed total ban on cow slaughter and even veteran Congress leaders like Motilal Vora supported the cause.
"Congress leader Motilal Vora and Gandhian Chandrashekhar Dharmadhikari had written to the state government seeking ban on cow slaughter. We liked the idea and accepted it," Mungantiwar said while replying to a two-day debate on state budget in the Assembly.
Search
- Home
- Three booked under Maharashtra's new beef ban law
Three booked under Maharashtra's new beef ban law

Rs 34,800 crore aid to 39 cr people under PMGKP till May 5: Govt

New Delhi, May 6: Around 39 crore people have received financial assistance of Rs 34,800 crore amid the COVID-19 lockdown under the Pradhan Mantri Garib Kalyan Package (PMGKP) as on May 5, the government said in a statement.
These people received the assistance, which was announced by Union Finance Minister Nirmala Sitharaman on March 26 to protect them from the impact of the lockdown due to COVID 19, via digital payment infrastructure.
The swift implementation of the free food grain and cash payment package under PMGKP is being continuously monitored by Central and state governments. Also, Fintech and digital technology have been employed for swift and efficient transfer to the beneficiary.
As per the data provided by the government, Rs 16,394 crore front-loaded towards payment of the first installment of PM-KISAN was provided to 8.19 crore beneficiaries.
Rs 10,025 crore credited to 20.05 crore (98.33 per cent) women Jan Dhan account holders as first installment and Rs 2,785 crore credited to 5.57 crore women in the second installment.
Further, Rs 1,405 crore was disbursed to about 2.82 crore old age persons, widows and disabled persons and Rs 3,492.57 crore financial support was given to 2.20 crore building and construction workers.
Moreover, foodgrain has been distributed, covering 60.33 crore beneficiaries in all 36 Union Territories and states till April and 12.39 crore beneficiaries by 22 states/UTs for May. Pulses have been distributed so far to 5.21 crore household beneficiaries out of 19.4 crore such beneficiaries.
Over 5 crore cylinders have been booked under the Pradhan Mantri Ujjwala Yojana (PMUY) and 4.82 crore free cylinders already delivered to beneficiaries.
While 9.6 lakh members of Employees' Provident Fund Organisation (EPFO) has taken benefit of online withdrawal of non-refundable advance from EPFO account amounting to Rs 2,985 crore, 24 per cent EPF contribution transferred to 44.97 lakh employees account amounting to Rs 698 crore.
In the current financial year, 5.97 crore person's man-days of work generated under MNREGA scheme and Rs 21,032 crore were released to states to liquidate pending dues of both wage and material.
Insurance scheme for health workers in government hospitals and health care centres has been operationalised by New India Assurance covering 22.12 lakh health workers.
Comments
Add new comment
- Coastaldigest.com reserves the right to delete or block any comments.
- Coastaldigset.com is not responsible for its readers’ comments.
- Comments that are abusive, incendiary or irrelevant are strictly prohibited.
- Please use a genuine email ID and provide your name to avoid reject.
Indian soldiers losing lives on China border a first in 45 years

New Delhi, Jun 16: Despite Prime Minister Narendra Modi led government’s attempt to downplay the border dispute with China, matters have heated up unprecedentedly along the Line of Actual Control (LAC)- the effective Sino-India border in Eastern Ladakh.
The country has lost three precious lives – an army officer and two soldiers. The last time blood was spilled on the LAC, before the latest episode, was 45 years ago when the Chinese ambushed an Assam Rifles patrol in Tulung La.
India had lost four soldiers on October 20, 1975 in Tulung La, the last time bullets were fired on the India-China border though both the countries witnessed bitter stand-offs later at Sumdorong Chu valley in 1987, Depsang in 2013, Chumar in 2014 and Doklam in 2017.
Between 1962 and 1975, the biggest clash between India and China took place in Nathu La pass in 1967 when reports suggest that around 80 Indian soldiers were killed and many more Chinese personnel.
While three soldiers, including a Commanding Officer, were killed in the latest episode in Galwan Valley, the government describes it as a "violent clash" and does not mention opening fire.
New Delhi described the locality where the 1975 incident took place as "well within" its territory only to be rebuffed by Beijing as "sheer reversal of black and white and confusion of right and wrong".
The Ministry of External Affairs had then said that the Chinese had crossed the LAC and ambushed the soldiers while Beijing claimed the Indians entered their territory and did not return despite warnings.
The Indian government maintained that the ambush on the Assam Rifles' patrol in 1975 took place "500 metres south of Tulung" on the border between India and Tibet and "therefore in Indian territory". It said Chinese soldiers "penetrating" Indian territory implied a "change in China's position" on the border question but the Chinese denied this and blamed India for the incident.
The US diplomatic cables quoted an Indian military intelligence officer saying that the Chinese had erected stone walls on the Indian side of Tulung La and from these positions fired several hundred rounds at the Indian patrol.
"Four of the Indians had gone into a leading position while two (the ones who escaped) remained behind. The senior military intelligence officer emphasised that the soldiers on the Indian patrol were from the area and had patrolled that same region many times before," the cable said.
One of the US cables showed that former US Secretary of State and National Security Adviser Henry Kissinger sought details of the October 1975 clash "without approaching the host governments on actual location of October 20 incident". He also wanted to know what ground rules were followed regarding the proximity of LAC by border patrols.
A cable sent from the US mission in India on November 4, 1975 appeared to have doubts about the Chinese account saying it was "highly defensive".
"Given the unsettled situation on the sub-continent, particularly in Bangladesh, both Chinese and Indian authorities have authorised stepped up patrols along the disputed border. The clash may well have ensued when two such patrols unexpectedly encountered each other," it said.
Another cable from China on the same day quoted another October 1974 cable, which spoke about Chinese officials being concerned for long that "some hotheaded person on the PRC (People's Republic of China) might provoke an incident that could lead to renewed Sino-Indian hostilities. It went on to say that this clash suggested that "such concerns and apprehensions are not unwarranted".
According to the United States diplomatic cables, Chinese Foreign Ministry on November 3, 1975 disputed the statement of the MEA spokesperson, who said the incident took place inside Indian territory.
The Chinese had said "sheer reversal of black and white and confusion of right and wrong". In its version of the 1975 incident, they said Indian troops crossed the LAC at 1:30 PM at Tulung Pass on the Eastern Sector and "intruded" into their territory when personnel at the Civilian Checkpost at Chuna in Tibet warned them to withdraw.
Ignoring this, they claimed, Indian soldiers made "continual provocation and even opened fire at the Chinese civilian checkpost personnel, posing a grave threat to the life of the latter. The Chinese civilian checkpost personnel were obliged to fire back in self defence."
The Chinese Foreign Ministry spokesperson had also said they told the Indian side that they could collect the bodies "anytime" and on October 28, collected the bodies, weapons and ammunition and "signed a receipt".
The US cables from the then USSR suggested that the official media carried reports from Delhi on the October 1975 incident and they cited only Indian accounts of the incident "ridiculing alleged Chinese claims that the Indians crossed the line and opened fire first".
Comments
Add new comment
- Coastaldigest.com reserves the right to delete or block any comments.
- Coastaldigset.com is not responsible for its readers’ comments.
- Comments that are abusive, incendiary or irrelevant are strictly prohibited.
- Please use a genuine email ID and provide your name to avoid reject.
How an obscure Indian cyber firm spied on politicians, investors through horoscopes and porn

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.
New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.
Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.
Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.
Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.
Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.
"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.
Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."
A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.
The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.
On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.
Reuters was not able to establish how many of the hacking attempts were successful.
BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.
Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.
"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."
Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.
HOROSCOPES AND PORNOGRAPHY
Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.
Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.
Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."
Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.
U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.
Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."
While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.
Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."
Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.
Comments
Add new comment
- Coastaldigest.com reserves the right to delete or block any comments.
- Coastaldigset.com is not responsible for its readers’ comments.
- Comments that are abusive, incendiary or irrelevant are strictly prohibited.
- Please use a genuine email ID and provide your name to avoid reject.
Comments
Add new comment