US: Racist punches Sikh clerk thinking he’s Muslim; arrested

Agencies
February 18, 2019

California, Feb 18: A man was arrested in the US on charges of hate crime after he allegedly punched a Sikh clerk and threw hot coffee on him at a shop in California, believing that the victim was a Muslim.

According to the store's CCTV footage, the man dressed in black and identified as John Crain, entered the 7-Eleven convenience store in Marysville at around 2 am on February 13.

Moments later, the Sikh clerk emerged and the suspect attacked him near the front door of the shop, punching him on his face and throwing hot coffee on him before fleeing from the spot.

The victim suffered injuries on his face and is reported to be recovering.

The Sikh clerk later told the officers that the suspect had prepared a cup of coffee and tried to leave without paying, according to a police statement.

Later on that day, law enforcement personnel responded to another case of assault in an area and found the suspect walking away from the scene which matched his description from the earlier incident based on the CCTV footage. Subsequently, the man was arrested.

During interrogation, Crain told the police that he assaulted the Sikh clerk because he thought that he was a Muslim, and he "hated Muslims.

Comments

Mohammed
 - 
Monday, 18 Feb 2019

So much of hate all over for being a Muslim... May allah sho them right path and let them learn about islam...Surely they will regreat later..

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

United Nations, May 21: At least 19 million children in parts of Bangladesh and India are at "imminent risk" from flash flooding and heavy rain as Cyclone Amphan makes landfall and the state of West Bengal is expected to take a direct hit from the powerful storm, the UN's children agency has warned.

The extremely severe cyclonic storm Amphan made a landfall at Digha in West Bengal and Bangladesh on Wednesday, leaving a trail of destruction. At least three persons were killed in India and seven in Bangladesh.

The UNICEF said that at least 19 million children in parts of Bangladesh and India are at “imminent risk from flash flooding, storm surges and heavy rain as Cyclone Amphan makes landfall.”

West Bengal, “home to more than 50 million people, including over 16 million children, is expected to take a direct hit from the powerful storm,” the UN agency said in a statement on Wednesday.

The UNICEF said it is also very concerned that the COVID-19 could deepen the humanitarian consequences of Cyclone Amphan in both the countries. Evacuees who have moved to crowded temporary shelters would be especially vulnerable to the spread of respiratory diseases like COVID-19, as well as other infections.

“We continue to monitor the situation closely,” said UNICEF Regional Director for South Asia Jean Gough.

“The safety of children and their families in the areas that will be impacted is a priority and it is good to see that the authorities have planned their urgent response factoring in the on-going COVID-19 pandemic.”

Across the region, the UNICEF is “working closely with the governments of Bangladesh and India and stands ready to support humanitarian operations to reach children and families affected by Cyclone Amphan.”

Based on the storm’s current trajectory, Cox’s Bazar in Bangladesh – now sheltering over 850,000 Rohingya refugees – is likely to experience high winds and heavy rains which may cause damage to homes and shelters in the refugee camps and Bangladeshi communities. This population is already highly vulnerable and cases of COVID-19 have recently been confirmed in the camps and host communities.

The UNICEF said it is working with the Deputy Commissioner’s Office in Cox’s Bazar, the Office of the Refugee Relief and Repatriation Commissioner, and humanitarian partners to help ensure Bangladeshi and Rohingya children and families remain protected.

These efforts include raising awareness among Rohingya and Bangladeshi communities on cyclone preparedness and prepositioning emergency life-saving water, sanitation, hygiene and medical supplies to meet immediate humanitarian needs.

Meanwhile, UN Secretary-General Antonio Guterres’ spokesperson Stephane Dujarric said at the daily press briefing that UN teams on the ground continue to work with the Government of Bangladesh to prepare and support those in need in the wake of the cyclone.

“Given the current pandemic, this support includes distributing personal protective equipment, disinfectants and other materials to evacuation shelters. To reduce the person-to-person contact during the delivery of aid, e-cash distributions will be used,” he said adding that the UN along with its partners is mobilising more than 1,700 mobile health teams and preparing for emergency food deliveries.

“The Super Cyclone is taking a westerly trajectory towards India, but nearly 8 million people in Bangladesh remain at risk,” he said adding that the Bangladesh government has evacuated more than 2 million people in high-risk areas. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 16,2020

New Delhi, Jan 16: In trouble brewing for the Gautam Adani-led M/S Adani Enterprises, the Central Bureau of Investigation (CBI) on Thursday said that it has registered a case against former officials of the National Co-operative Consumer Federation (NCCF) and others over alleged irregularities in supply of coal to the Andhra Pradesh Power Generation Corporation (APGENCO) in 2010.

The CBI in its FIR has named Virendra Singh, the then Chairman of the NCCF, G P Gupta, the then MD of the NCCF, S C Singhal, the then Senior Advisor of NCCF, Adani Enterprises Ltd and other unknown public servants and others for criminal conspiracy, cheating and criminal misconduct by public servants.

According to CBI, the case was filed on Wednesday after the preliminary enquiry revealed the crime by the officials named in the FIR and the Adani Enterprises was found to be true.

The FIR alleged that on June 26, 2010, APGENCO floated a tender enquiry for supply of six lakh metric tonnes of imported coal "on free on rail destination" basis to Dr Narla Tata Rao Thermal Station (NTTPS), Vijaywada and Rayalasaleema Thermal Power Plant (RTTP), Kadapa, Andhra Pradesh/RTPP via Kakinada-Vizag-Chennai-Krishnapatnam or any other ports

The same was forwarded by the Chief Engineer, APGENCO to seven PSUs -- PEC Limited, STC Limited, MSTC Limited, NCCF, MMTC, Coal India Limited and SCCL Limited.

The FIR alleged that during the probe, the Adani Enterprises used a proxy company to get the supply contract. It said, "NCCF received bids from six companies -- Adani Enterprises Ltd, Maheshwari Brothers Coal Limited (MBCL), Vyom Trade Links Pvt. Ltd, Swarana Projects Pvt. Ltd, Gupta Coal India Ltd and Kyori Oremen Ltd.

During investigation it was found that Gupta Coal India Ltd had quoted the NCCF margin of 11.3 percent, while the MBCL quoted the margin of 2.25 percent and rest did not quote any margin to the NCCF.

The FIR said the quotes of the Gupta Coal India Ltd, Kyori Oremen Ltd and Swarana Projects Pvt. Ltd were rejected by the NCCF as they were not found to be fulfilling the tender conditions.

"Post tender negotiation was done by senior officials of NCCF to give undue favour to Adani Enterprises Ltd despite it not qualifing the tender (terms)," the FIR said, adding instead of cancelling the bid of Adani Enterprise Ltd, senior management of NCCF conveyed the offer margin to the company through one of its representative -- Munish Sehgal, who was sitting in the NCCF head office. It is prima facie evident that when the bids were being processed at NCCF head office in Delhi, a representative of Adani Enterprises Ltd. was informed regarding their imminent rejection due to non-submission of NCCF margin and also that MBCL was eligible bidder quoted 2.25 percent margin," it alleged.

The CBI in its FIR, further alleged that Adani Enterprises Ltd. had given an unsecured loan of Rs 16.81 crore to Vyom Trade Links Ltd in 2008-09. "And further it was revealed that the bank guarantees of the Adani Enterprises Ltd. and Vyom Trade Links Ltd. were issues by the same branch of the State Bank of India and at the same time," it said.

"It was clear that Adani Enterprises Ltd. presented Vyom Trade Links Ltd. as a proxy company in this particular tender and Vyom Trade Links Ltd. later withdrew its offer on flimsy ground," the CBI FIR said.

"The aforesaid acts of commissions and omissions on the part of the senior management of the NCCF disclose that during their tenure, they acted in a manner unbecoming of public servants and committed irregularities by way of manipulation in the selection of bidders, thereby giving undue favours to Adani Enterprises Ltd. in award of work for supply of coal to APGENCO despite its disqualification," it added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.