Two get death, Abu Salem, another get life term in 1993 Mumbai blasts case

Agencies
September 7, 2017

Mumbai, Sept 7: A Special TADA Court on Thursday awarded the death penalty to two convicts, life sentences to two others, including gangster Abu Salem, while giving 10 years jail to one accused in the 1993 Mumbai blasts case.

Special Judge G.A. Sanap pronounced the death verdicts on convicts Mohammed Taher Merchant and Feroze Khan for their role in the blasts, said Special Public Prosecutor Deepak Salve.

Besides Salem, the Special Court awarded life sentence to Karimullah Khan and 10 years rigorous imprisonment to the fifth convict, Riyaz Siddiqui.

The Special Judge also slapped varying amounts of fines on the convicts after finding them guilty on various charges, including murder, conspiracy to hatch the blasts, supplying arms and ammunition, and other serious offences, Salve told mediapersons after the ruling.

All the six accused were earlier pronounced "guilty" by the Special Court on June 16, including Mustafa Dossa, who died on June 28.

The much-awaited verdict on the quantum of sentencing came 24 years after the March 12, 1993 serial blasts and nearly 80 days after they were found guilty (on June 16) by the Special Court.

On a quiet afternoon of March 12, 1993, the country's commercial capital was shattered by a series of 13 blasts in quick succession at various locations in the city and suburbs, creating the worst unprecedented mayhem in the country, killing 257 and injuring 700 others.

The prime targets included the Air India Building, Bombay Stock Exchange, Zaveri Bazar, then existing five star hotels, Hotel SeaRock and Hotel Juhu Centaur, and others leading to damage to public and private properties worth Rs 27 crore.

Comments

Abdullah
 - 
Thursday, 7 Sep 2017

What about Malegaun, Samjotha express, Makkah masjid, Gujarath blast terrorists???

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 13,2020

New Delhi, July 13: The number of active Covid-19 cases in India crossed the 3 lakh mark on Sunday even as fresh infections during the day surged to another new peak, crossing 29,000 for the first time. After staying over 500 for the past two days, the daily death toll came down slightly to 492.

While the focus has been on recoveries, the number of active Covid-19 cases in the country has been steadily rising. It hit the 1 lakh mark on June 4 and went past 2 lakh 23 days later. It has taken just 15 days more to reach 3 lakh.

India reported 29,271 new cases on Sunday, the fifth straight day of record rise in daily infections. With this, the country’s coronavirus caseload has risen to 8,79,060, two days after hitting the 8 lakh mark, as per data collated from state governments. Active cases stood at 3,02,466 while more than 5.53 lakh people were declared cured of the infection.

Covid-19 deaths in the country rose to 23,175 after 492 fatalities were added on Sunday, translating to a case fatality rate of 2.6%. The CFR has been steadily dropping with the surge in cases.
 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 21,2020

New Delhi, Jul 21: The Centre has written to all states and union territories warning against the use of N-95 masks with valved respirator by people, saying these don't prevent the virus from spreading out and are "detrimental" to the measures adopted for its containment.

The Director-General of Health Services in the Ministry of Health, in a letter to the Principal Secretaries of health and medical education of states, said it has been observed that there is "inappropriate use" of N-95 masks, particularly those with valved respirator, by the public other than designated health workers.

The DGHS referred to the advisory on the use of homemade protective cover for face and mouth available on the website of the Ministry of Health.

"It is to bring to your knowledge that the use of valved respirator N-95 masks is detrimental to the measures adopted for preventing the spread of coronavirus as it does not prevent the virus from escaping out of the mask. In view of the above, I request you to instruct all concerned to follow the use of face/mouth cover and prevent inappropriate use of N-95 masks," DGHS Rajiv Garg said in the letter.

The government had in April issued an advisory on the use of homemade protective cover for face and mouth, asking people to wear it, particularly when they step out of their residences.

The advisory stressed such face covers must be washed and cleaned each day, as instructed and states that any used cotton cloth can be used to make this face cover. 

The colour of the fabric does not matter but one must ensure that the fabric is washed well in boiling water for five minutes and dried well before making the face cover. Adding salt to this water is recommended, it said.

It also listed the procedures of making such homemade masks, asking to ensure it fits the face well and there are no gaps on the sides.

It urges people to wash hands thoroughly before wearing the face cover,  switching to another fresh one as the face cover becomes damp or humid, and never reusing it after single use without cleaning it. 

"Never share the face cover with anyone. Every member in a family should have separate face cover," the advisory stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.