Vyapam: Act on mantrani & minister's wife, says Cong

July 11, 2015

Bhopal, Jul 11: Report about mention of a "'mantrani' and a minister's wife" by a key accused in the Vyapam scam today gave fresh ammuntion to the Congress in its attack againt ruling BJP in MP, as it alleged that STF acted in a pick-and-choose manner due to presseure by government.Vyapam

"Our allegation that the STF is acting in a pick-and- choose manner proved in the case of an FIR in forest guard recruitment case, which mentions that one of the key accused, former Vyapam Controller, Pankaj Trivedi, had told the probe agency about a 'mantrani' (woman minister) and a minister's wife during questioning. It (STF) never found out who they were," state Congress chief spokesperson K K Mishra told media.

However, it was not clear as to whom Trivedi was pointing to as the FIR does not name any woman minister and minister's wife.

In the same FIR, MP Governor Ram Naresh Yadav was named as accused number 10, though the High Court had later quashed it with a direction that he (Governor) can be booked once he demits office.

Mishra accused the STF of not acting on Trivedi's statement under pressure from the state government. "Therefore my party insisted on a CBI probe in the case so that free and fair investigations take place in the matter."

On July 9, the Supreme Court ordered for a CBI probe into all Vyapam scam cases and alleged deaths related to it and also issued notice to the Centre, Madhya Pradesh Government and the Governor on a plea seeking his removal over his alleged involvement in the scandal.

The apex court's order transferring all Vyapam-related cases to the CBI came after the state government gave its consent to shift the probe from the Special Investigation Team (SIT) and the Special Task Force (STF).

It issued notice and sought response of Centre and the state government on a plea for removal of the MP Governor for his alleged involvement in the scam. The court also issued notice to the Governor.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 2,2020

Lucknow, Feb 2: In an early morning firing at Lucknow's Hazratganj, the city centre, Vishva Hindu Mahasabha state president Ranjit Bachchan was killed while he was out on a morning walk on Sunday.

Ranjit Bachchan was taking a stroll in Hazratganj in the morning when bike-borne assailants opened fire on him and killed him on the spot. The Mahasabha leader was shot in the head multiple times.

The incident took place near the CDRI building in Lucknow's Hazratganj.

In the firing, Ranjit Bachchan's brother also suffered bullet injuries. He has been rushed to the trauma centre. Ranjit Bachchan was a resident of Gorakhpur.

The early morning shootout in the Uttar Pradesh capital's central area has caused tension in the area.

Dinesh Singh, DCP Central Lucknow, said, "The body has been identified as of Ranjit Bachchan, who had gone out on morning walk when some unknown assailant shot him. A police team has been formed and further investigation is being carried out."

Before being associated with the Mahasabha, Ranjit Bachchan was a Samajwadi Party member and was often spotted with former UP chief minister Akhilesh Yadav.

The Samajwadi Party has hit out at the Yogi Adityanath government over the law and order situation in the state and demanded immediate resignation of the government.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 4,2020

New Delhi, July 4: India on Friday reported its highest single-day spike of COVID-19 cases with 22,771 cases reported in the last 24 hours, said the Union Ministry of Health and Family Welfare.

With these new cases, India's coronavirus cases tally has gone up to 6,48,315, out of which there are 2,35,433 active cases in the country and 3,94,227 cases have been cured/discharged or migrated.

As many as 442 deaths due to COVID-19 have been reported in the last 24 hours taking the number of patients succumbing to the deadly virus across the country to 18,655.

As per the Union Health Ministry, Maharashtra -- the worst affected state due to COVID-19 -- has a total of 1,92,990 cases which is inclusive of 8,376 deaths. Meanwhile, Tamil Nadu, the second worst-affected state, has a total of 1,02,721 cases and 1,385 fatalities. Delhi's tally of coronavirus cases stands at 94,695 which is inclusive of 2923 deaths due to the virus.

The Centre said that the recovery rate has further improved to 60.80 per cent. The recoveries/deaths ratio is 95.48 per cent : 4.52 per cent.

The Indian Council of Medical Research, earlier on Saturday, said that the total number of samples tested up to July 3 is 95,40,132, out of which 2,42,383 samples were tested yesterday.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 28,2020

Several India-based firms are spoofing the World Health Organisation (WHO) by creating fake Gmail accounts and luring business leaders in disguise of informing them of latest COVID-19 announcements and hack their personal and financial information, Google has warned.

These "hack-for-hire" firms, many based in India, have been creating Gmail accounts spoofing the WHO, largely targeting business leaders in financial services, consulting, and healthcare corporations within numerous countries including, the US, Slovenia, Canada, India, Bahrain, Cyprus, and the UK.

"The lures themselves encourage individuals to sign up for direct notifications from the WHO to stay informed of COVID-19 related announcements, and link to attacker-hosted websites that bear a strong resemblance to the official WHO website," security researchers from Google's Threat Analysis Group said on Wednesday.

The sites typically feature fake login pages that prompt potential victims to give up their Google account credentials, and occasionally encourage individuals to give up other personal information, such as their phone numbers.

On any given day, Google's Threat Analysis Group (TAG) said it is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.

Last month, it sent 1,755 warnings to users whose accounts were targets of government-backed attackers.

"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users," said the tech giant.

Google continues to see attacks from groups like Charming Kitten on medical and healthcare professionals, including WHO employees.

"We're seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers," said the company.

Government-backed or state-sponsored groups have different goals in carrying out their attacks: Some are looking to collect intelligence or steal intellectual property; others are targeting dissidents or activists, or attempting to engage in coordinated influence operations and disinformation campaigns.

Google said that since March, it has removed more than 1,000 YouTube channels that were part of a large campaign and behaving in a coordinated manner.

"These channels were mostly uploading spammy, non-political content, but a small subset posted primarily Chinese-language political content similar to the findings of a recent Graphika report," said the company.

Several cybersecurity firms have seen a spike in COVID-19 related scams and hacking attempts. Hackers are also creating scam sites similar to COVID-19 relief packages.

Researchers at Check Point Software Technologies revealed in mid-May that they have seen 192,000 coronavirus-related cyber-attacks per week over the past three weeks, a 30 % increase compared to previous weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.