Will never let supreme sacrifice of braves at Galwan Valley go in vain, ready to counter any contingency at LAC: IAF Chief

News Network
June 20, 2020

Hyderabad, Jun 20: IAF Chief Air Chief Marshal RKS Bhadauria on Saturday said that the force is well prepared and suitably deployed to respond to any contingency and it will never let the sacrifice of the bravehearts of Galwan go in vain.

"It should be very clear that we are well prepared and suitably deployed to respond to any contingency. I assure the nation that we are determined to deliver and will never let the sacrifice of the braves of Galwan go in vain," IAF Chief Air Chief Marshal Bhadauria said here.

Bhadauria was speaking at the Combined Graduation Parade (CGP) at Air Force Academy in Hyderabad.

His remarks come days after 20 Indian soldiers lost their lives in the violent face-off on June 15-16 during an attempt by the Chinese troops to unilaterally change the status quo during the de-escalation in eastern Ladakh.

Speaking about the current border situation with China, he said: "We are aware of the situation, be it on LAC or beyond, be it their air deployments, their posture and kind of deployments. We've full analysis and we have taken necessary action that we need to take to handle any contingency that may come up."

"We are monitoring all the moments and we are aware of the full situation," he added.

He further said that in spite of the "unacceptable Chinese action" at Galwan Valley in eastern Ladakh, which claimed lives of 20 Indian Army personnel, efforts are underway to ensure that the current situation at the Line of Actual Control (LAC) is resolved peacefully.

He asserted that the IAF is determined to deliver and the development at the LAC in Ladakh is a small snapshot of what the force is required to handle at short notice.

The IAF Chief further appealed to people to join him in paying tribute Colonel Santosh Babu and his brave men who made the sacrifice while defending the LAC in Galwan valley.

"The gallant actions in a highly-challenging situation have demonstrated our resolve to protect India's sovereignty at any cost," the Indian Air Force (IAF) chief said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 7,2020

Srinagar, Mar 7: Two more accused, including a man who allegedly bought chemicals online for making improvised explosive device (IED) to be used in an attack on a convoy of the Central Reserve Police Force (CRPF) in Jammu and Kashmir's Pulwama last year, were arrested by the National Investigation Agency (NIA) on Friday, an official said.

The terror attack left 40 CRPF personnel dead in south Kashmir's Pulwama last year.

Waiz-ul-Islam, 19, from Srinagar and Mohammad Abbass Rather, 32, from Pulwama were arrested by the NIA, taking the number of those arrested in the case in the past week to five.

"During initial interrogation, Islam disclosed that he used his Amazon online shopping account to procure chemicals for making IEDs, batteries and other accessories on the directions of Pakistani Jaish-e-Mohammed (JeM) terrorists," the official said.

He said Islam personally delivered the items to the JeM terrorists after buying them online as a part of the conspiracy to carry out the attack.

"Rather is an old overground worker of the JeM. He has disclosed that he gave shelter at his home to Jaish terrorist and IED expert Mohd Umar after he came to Kashmir in April-May 2018," the official said.

Rather also sheltered other JeM terrorists - suicide bomber Adil Ahmad Dar, Sameer Ahmed Dar and Kamran, a Pakistani -- at his house before the Pulwama attack, the official said.

"He also facilitated safe shelter for the JeM terrorists, including Adil, at the house of accused Tariq Ahmed Shah and his daughter Insha Jan of Hakripora, who were arrested on March 3," the official said.

He said Islam and Rather will be produced before the NIA special court in Jammu on Saturday, while further investigation in the case continues. The NIA took over the case to probe the conspiracy behind the February 14, 2019, attack in Pulwama.

The last video of Adil, which was released by the JeM from Pakistan after the terror attack, was filmed at the home of Tariq Ahmed Shah. On February 28, the NIA achieved a major breakthrough in the case when it arrested 22-year-old Shakir Bashir Magrey, a furniture shop owner and resident of Pulwama.

Magrey had given shelter and other logistical assistance to suicide bomber Adil. He was introduced to Adil in mid-2018 by Pakistani terrorist Mohammad Umar Farooq and he became a full-time OGW of the JeM.

The explosives used in the attack were determined through forensic probe to be ammonium nitrate, nitro-glycerin and RDX. During investigation into the attack, the identity of the suicide bomber to be Adil Ahmad Dar was confirmed through DNA matching with that of his father.

The other key terrorists involved in the attack have been found to be JeM's south Kashmir divisional head Muddasir Ahmad Khan, killed in an operation by the security forces on March 11 last year; Pakistani terrorists Muhammad Umar Farooq and IED expert Kamran, both killed on March 29 last year; the owner of the car Sajjad Ahmad Bhat, a resident of Anantnag who was killed on June 16 last year, and Qari Yassir, JeM's commander for Kashmir who was killed on January 25 this year.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 4,2020

Kota, Jan 4: Following the death of an infant in the morning, the death toll in JK Lon Hospital here has risen to 107, officials said on Saturday.

A three-member state government committee of doctors, who was sent to investigate the matter on December 23 and 24, found that Kota's JK Lone Hospital is short of beds and it requires improvement.

However, the committee gave a clean chit to the doctors for any lapses over the recent death of infants admitted there.

A Central government team reached the hospital on Saturday to take stock of the situation.

As per the government report, at least 91 infants lost their lives at the government hospital in December last year.

Meanwhile, the National Human Rights Commission (NHRC) has issued a notice to Chief Secretary of Rajasthan to submit a detailed report within 4 weeks about the steps being taken to address the issue.

The Commission also asked the Chief Secretary to ensure that such deaths of the children do not recur in future due to lack of infrastructure and health facilities at the hospitals.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.