Wing Commander Abhinandan Varthaman undergoes 'cooling down' process

Agencies
March 2, 2019

New Delhi, Mar 2: Wing Commander Abhinandan Varthaman, who was brought to Delhi after Pakistan released him through the Attari-Wagah border late Friday night, underwent a series of medical tests as part of a "cooling down" process, officials said.

Early Saturday morning, Varthaman met his immediate family members as well as several top officials of the Indian Air Force, they said.

Varthaman arrived in the national capital around 11.45pm on Friday and soon after he was taken to the Air Force Central Medical Establishment (AFCME), a compact and specialised medical evaluation centre for aircrew of all the three services.

He was captured by Pakistani authorities on February 27 after his MiG-21 Bison went down during a dogfight with Pakistani jets. But before his plane was hit, Varthaman shot down an F-16 of Pakistan air force.

Wing Commander Varthaman is undergoing a series of medical tests as part of the "cooling down" process and it is expected to continue till Sunday. Once the health check-up phase is over, debriefing sessions will be arranged for him, the officials said.

When he crossed over to India on Friday night, his right eye above his handlebar moustache appeared swollen.

After he was captured, Varthaman showed courage and grace in the most difficult circumstances for which he was praised by politicians, strategic affairs experts, ex-servicemen, celebrities and others.

A video circulating on social media showed how he was badly beaten up by a group of people after being rescued by Pakistani security personnel.

Prime Minister Narendra Modi welcomed the return of Varthaman, saying the nation is proud of his exemplary courage.

"Welcome Home Wing Commander Abhinandan! The nation is proud of your exemplary courage. Our armed forces are an inspiration for 130 crore Indians," tweeted Modi on Friday night.

Tensions between the two countries escalated after Indian fighters bombed terror group Jaish-e-Mohammed's biggest training camp near Balakot deep inside Pakistan early Tuesday.

Pakistan retaliated by attempting to target Indian military installations on Wednesday. However, the IAF thwarted their plans.

The Indian strike on the JeM camp came 12 days after the terror group claimed responsibility for a suicide attack on a CRPF convoy in Kashmir, which left 40 soldiers dead.

Comments

WellWisher
 - 
Sunday, 3 Mar 2019

A brave Soldier , whole world witness his courage . 

 

Salute to Abdhinandan Varthaman.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
March 24,2020

Gautam Buddh Nagar, Mar 24: As many as 96 First Information Reports (FIRs) were registered and more than 2000 challans issued in Noida yesterday for violation of lockdown rules, police said. The lockdown was imposed in a bid to contain the spread of coronavirus, which has taken more than 14000 lives across the globe.

The FIRs were registered against people for allegedly flouting Section 144 and not adhering to the orders of the state government for staying indoors.
Chief Minister Yogi Adityanath on Monday stated that all borders adjoining Uttar Pradesh should be completely sealed.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 3,2020

Kashmir, Mar 3: Four days after the National Investigation Agency made a major breakthrough in the Pulwama terror attack case over a year after the bombing, arresting one person who had sheltered the suicide bomber Adil Ahmad Dar, the NIA on Tuesday arrested two more people in the case - a father-daughter duo - who had also provided shelter to the bomber, officials said.

The NIA also claimed that the video of the suicide bomber was also recorded at their residence and released by the Jaish-e-Mohammad (JeM) terror group from Pakistan after the attack. An NIA spokesperson in Delhi said: "Two more persons have been arrested by the agency in the Pulwama terror attack case and they have been identified as Insha Jan, 23, and her father Tariq Ahmed Shah, 50, who works as a tipper driver."

The official said that the father-daughter duo have been arrested from Hakripora area in Pulwama for their involvement in the attack. The two were arrested on early Tuesday morning after senior officials of the NIA raided their house on Monday night.

A senior NIA official related to the probe told IANS: "The video of Dar, who attacked the CRPF convoy, was recorded at the home of the duo. And the same video was released soon after the Pulwama terror attack by the JeM terrorists from a Pakistani IP address."

He said, "The video was shared by them to their handlers in Pakistan."

The spokesperson further claimed that during the probe Tariq Ahmed Shah disclosed that his house in Hakripora area was used by Dar, Mohammad Umar Farooq, a Pakistani terrorist and IED maker, Kamran - another Pakistani terrorist (both were later killed in encounters with security forces), Sameer Ahmed Dar, a Jaish-e-Mohammad terrorist from Pulwama and Mohammad Ismail aka Ibrahim, a Pakistani terrorist.

The spokesperson said that Shah facilitated all the terrorists at his house for sheltering and for planning of the heinous attack on the CRPF convoy. He said Jan, daughter of Shah, facilitated the terrorists at their home and provided food and other logistics during their stay on more than 15 occasions for two to four days each time, in their house during the year 2018-2019.

"Initial interrogation has revealed that Jan was in constant touch with Farooq and was in communication with him over telephone and other social media applications," the spokesperson said. The fresh arrests of the two accused brings the total number of arrests in the case to three.

The arrests were made on the revelations of Shakir Bashir Magrey, who was arrested by the anti-terror probe agency on February 28. According to senior NIA officials, more arrests will be made in the coming days. Magrey, a resident of Hajibal, Kakapora in Pulwama district of Jammu & Kashmir, is an overground worker (OGW) of the Pakistan-based Jaish-e-Mohammad (JeM).

According to agency sources, Magrey allegedly provided shelter and other logistical assistance to the Pulwama suicide bomber. He was sent to 15 days' NIA custody by a special NIA court in Jammu & Kashmir on Friday. During interrogation, Magrey revealed that he had harboured Dar and Pakistan-based terrorist Mohammad Umar Farooq in his house from late 2018 till the attack in February 2019 and assisted them in the preparation of the Improvised Explosive Device (IED). His shop is located near Lethpora bridge, and as advised by Mohammad Umar, he started conducting reconnaissance of the movement of CRPF convoys on Jammu-Srinagar Highway in January 2019, and informed Mohammad Umar and Adil Ahmad Dar about it.

Magrey was also involved in modifying the Maruti Eeco car and fitting the IED into it in early February, 2019 and was introduced to Adil Ahmad Dar in mid-2018 by Mohammad Umar and he became a full-time OGW of JeM.

"During his initial interrogation, he disclosed that on several occasions, he collected and delivered arms, ammunition, cash and explosive material to JeM terrorists, including those involved in the Pulwama attack," the agency had said on February 28.

"During investigation, the make, model and number of the car used in the attack was quickly ascertained by NIA to be a Maruti Eeco through forensic examination of the tiny remnants of the car which were found at the spot during extended searches," the agency stated.

"This has been corroborated by accused Shakir Bashir Magrey. The explosives used in the attack were determined to be ammonium nitrate, nitro-glycerin and RDX, through forensic investigation," it said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.