BJP worker Shabir Ahmad brutally murdered by militants in Kashmir

News Network
August 22, 2018

Srinagar, Aug 22: A worker of Bharatiya Janata Party (BJP), who was abducted by militants last evening, was found dead in Litter village of south Kashmir’s Pulwama district on Wednesday.

Police said Shabir Ahmad Bhat, who hails from Pathan village of Pulwama, was abducted by the militants when he was on way to home on Tuesday evening. His bullet-riddled body was recovered from Litter village on Wednesday morning.

The police have registered a case and started investigations into the killing. Bhat is the first political activist killed by the militants after Governor led state government announced municipal and panchayat elections in J&K last week.

Earlier on November 2, a 30-year-old BJP youth wing leader was killed by the militants in neighbouring Shopian district.  Throat slit body Gowhar Ahmad Bhat, BJP Youth President, was recovered from an apple orchard with visible torture marks.

In April this year, 61-year-old BJP politician, Ghulam Nabi Patel was killed by militants in Pulwama in broad daylight. The killing of political activists, especially in militancy hotbed of south Kashmir, is a grim reminder that Pakistan militant groups will continue to attack democratic process and politics in Kashmir.

For the last two years, Panchayat elections, due since July 2016 when the term of the previous elected village representatives ended, have been postponed indefinitely after militant groups issued threats of violence.

Panchayat elections for 4,130 sarpanch and 29,719 panch constituencies in Jammu and Kashmir were held in 2011 after more than three decades, and 80 percent of the people voted, despite unrest a year earlier. But a year later, the situation in Kashmir changed swiftly, and many panchayat members were targeted by the militants.

Since 2011, 16 panchayat members have been killed and 30 wounded in militant attacks in the Valley, according to the documents with Jammu and Kashmir Panchayat Conference.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 10,2020

Chennai, Jun 10: DMK MLA J Anbazhagan who had tested positive for coronavirus and was on ventilator support from June 3 passed away at a hospital in Chennai on Wednesday.

Coincidently, today is the 62nd birthday of the MLA.

"Anbazhagan J, who has been fighting for his life with severe COVID 19 pneumonia rapidly deteriorated early this morning. In spite of full medical support including mechanical ventilation at our COVID facility, he succumbed to his illness. He was declared dead at 08:05 hours on the 10th of June 2020," the hospital said in a statement.

In 2001, Anbazhagan was elected from T Nagar Assembly constituency. He served for five years.

Later in 2011, he was elected to Tamil Nadu Assembly from Chepauk-Thiruvallikeni seat. The DMK leader was re-elected from the same constituency in 2016.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
August 6,2020

The Indian Defence Ministry, which had in its document that China intruded into the Indian territory in eastern Ladakh in early May, on August 6 took down the page which it had uploaded on its website.

According to a report by news channel NDTV, the ministry, in its document, had said the Chinese aggression has been "increasing along the Line of Actual Control (LAC) and more particularly in Galwan valley since May 5."

"The Chinese side has transgressed in the areas of Kungrang Nala, Gogra and north bank of Pangong Tso Lake on May 17-18," the document, titled 'Chinese Aggression on LAC' stated.

The document revealed that "... a violent face-off incident took place between the two sides on June 15, resulting in casualties on both sides."

After the clash, a second corps commander level meeting took place on June 22 to discuss the modalities of de-escalation. "While engagement and dialogue at military and diplomatic level is continuing to arrive at mutually acceptable consensus, the present standoff is likely to be prolonged," it said.

A defence ministry spokesperson told the news channel that the document "did not go through him".

The opposition Congress, meanwhile, asked the government why the report was taken down with party leader Rahul Gandhi alleging that removal of the document from websites would not change facts.

"Forget standing up to China, India's PM lacks the courage even to name them. Denying China is in our territory and removing documents from websites won't change the facts," Gandhi tweeted.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.