15-year-old Gujarat boy shot dead in US

October 18, 2016

Vadodara, Oct 18: A 15-year-old boy having his family roots in Anand district's Demol village was shot dead by an armed robber in Cleveland Heights in Ohio, US.

shotVictim Sunny Patel's relatives said that the robber barged into Mr Hero restaurant owned by his uncle on South Taylor Road and shot him in the head on Friday night. The robber then stole cash from the register and fled.

Sunny's father Ravi Kantibhai Patel had moved to the US from Demol over a decade ago. "Sunny was Ravi's only child and the family is a deep shock," said Suresh Patel, a distant relative of the family.

"The boy was born in the United States. In fact, Ravi's father was a philanthropist who had donated a good amount to erect an entrance gate at Demol village," said another relative Hasmukh Patel.

On Sunday night, the Cleveland Heights police arrested a suspect who was caught in CCTV footage. He was seen wearing grey sweatpants, a black sweatshirt and a white bandana on his face. The police has, however, not identified the person nor have they filed any charges against him.

Sunny's death has added to the spate of fatal at tacks on the diaspora in the last one year.

Last year, there were at least 12 incidents where NRGs fell prey to either fatal shootings or police brutality on foreign shores mainly in the US, South Africa, Germany and the UK.

Earlier this year, Mitesh Patel, a 23-year-old NRI having roots in Umreth town was shot dead in Los Angeles when he was about to step out of his liquor store. Before Mitesh, 55-year-old Harshad Patel from Bochasan village near Borsad had died of a gunshot fired byChesterfield County police at a convenience store at The Marketplace on Walmsley Boulevard.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 1,2020

Washington, Mar 1: The US Federal Communications Commission (FCC) has proposed a fine of over $200 million for all major US mobile carriers for selling the location data of customers to some agencies.

The Federal Communications Commission today proposed fines against the nation's four largest wireless carriers for apparently selling access to their customers' location information without taking reasonable measures to protect against unauthorised access to that information. As a result, T-Mobile faces a proposed fine of more than $91 million, AT&T faces a proposed fine of more than $57 million, Verizon faces a proposed fine of more than $48 million, and Sprint faces a proposed fine of more than $12 million, the FCC said in a statement on Friday.

The Enforcement Bureau of FCC opened this investigation after reports surfaced that a Missouri Sheriff, Cory Hutcheson, used a "location-finding service" operated by Securus, a provider of communications services to correctional facilities, to access the location information of the wireless carriers' customers without their consent between 2014 and 2017.

"American consumers take their wireless phones with them wherever they go. And information about a wireless customer's location is highly personal and sensitive. The FCC has long had clear rules on the books requiring all phone companies to protect their customers' personal information. And since 2007, these companies have been on notice that they must take reasonable precautions to safeguard this data and that the FCC will take strong enforcement action if they don't. Today, we do just that," said FCC Chairman Ajit Pai.

"This FCC will not tolerate phone companies putting Americans' privacy at risk."

The FCC also admonished these carriers for apparently disclosing their customers' location information, without their authorisation, to a third party

The four major US carriers mentioned sold access to their customers' location information to "aggregators," who then resold access to such information to third-party location-based service providers (like Securus).

Although their exact practices varied, each carrier relied heavily on contract-based assurances that the location-based services providers (acting on the carriers' behalf) would obtain consent from the wireless carrier's customer before accessing that customer's location information.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 6,2020

Tokyo, April 6: Japan Prime Minister Shinzo Abe is planning to declare a state of emergency in view of the surging cases of coronavirus in the country, especially in Tokyo and other large cities, government sources said on Monday.

Pressure had been mounting on Abe to make the declaration amid a spurt in COVID-19 cases recently, with calls for the move from Tokyo Governor Yuriko Koike and the Japan Medical Association intensifying, Xinhua news agency reported.

The Tokyo metropolitan government, along with healthcare specialists, said that the number of hospital beds available for coronavirus patients will soon reach capacity, with the health ministry rapidly trying to secure more beds.

Adding to pressure on the government to demonstrably bolster its preventive and countermeasures to the spread of the virus, a panel of government experts warned recently that the country's healthcare system could collapse if coronavirus cases continue to spike.

The healthcare system in Tokyo and four other prefectures are under increased strain and "drastic countermeasures need to be taken as quickly as possible," the experts said.

As of Sunday, 143 new cases of COVID-19 were recorded in Tokyo, a record daily high for the capital, bringing the total to 1,034, with Japan's health ministry and local governments adding that nationwide cases rose to 3,531 as of Sunday afternoon.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.