Huge cache of weapons, steel bombs seized from BJP office in Kannur

coastaldigest.com news network
October 10, 2017

Kannur, Oct 10: The Kerala police have recovered a huge cache of weapons from the office of the Bharatiya Janata Party in Kannur district following a raid.

The police have seized steel bombs, swords, iron rods and other sharp weapons from the BJP office in Panoor area of Kannur. The raids were conducted after a tip-off from the local residents living in the area around the office.

The development comes in the wake of a recent attack on a CPM rally, allegedly by RSS-BJP activists. At least five CPM workers and four police personnel were injured when a procession of the Left party workers was attacked with country bombs in Kannur district in Kerala.

Only a few days ago, Amit Shah had slammed the Left government in Kerala over the political killings of BJP and RSS workers in the state. Senior CPM leader then hit back at the BJP, saying it was actually a case of "the pot calling the kettle black" and that the BJP had always resorted to clashes and violence to expand their presence in the country.   

The BJP recently launched the Jan Raksha Yatra, which was also attended by Uttar Pradesh CM Yogi Adityanath to protest against the killings of BJP and RSS cadres in Kerala.

Kannur, a politically volatile district in Kerala, has a history of clashes involving CPI(M) and BJP-RSS workers. Since May 2016, a total of eight political murders have taken place in Kannur - 3 CPM activists and 5 BJP activists.

According to statistics available with state crime bureau, 45 CPM activists, 44 BJP activists, 4 Muslim League activists and 15 Congress activist have been killed since 1991 in the district.

Comments

Althaf
 - 
Tuesday, 10 Oct 2017

So any plans to ban RSS??? 

Abu Muhammad
 - 
Tuesday, 10 Oct 2017

Hope NIA will prepare a dossier to BAN all those above parties involved in Terror Politics and murder. They have tangible proof in front of their eyes.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 26,2020

Udupi, Feb 26: Thirty senior folk artistes, one from each district across the state, and two folk experts will be presented the ''Karnataka Janapada Academy'' Awards for 2019-20.

Announcing the names of the award winners here on Wednesday, Academy Chairperson Manjamma Jogathi said that while the artistes will get a purse of Rs 25,000 and a citation, the folk experts will be awarded Rs 50,000 and a citation.

The awardees are M Gowramma (Folk singing – Bengaluru Urban), Lakshamma (Bengaluru Rural – Bhajan), Ankanahalli Shivanna (Ramnagaram –Pooja Kunitha), Angadi Venkatesheppa (Kolar-Tatvapada), Rangaiah (Thumkuru-Folk Singing), P G Parameshwarappa (Davangere-Veeragase), Tippanna (Chitradurga – Goravara Kunita), Munireddy (Chikkaballapura-Folk Song), G C Manjappa (Shivamogga – Dollu Kunitha), Mada Shetty (Mysore – Kamsale Kunita), Swami Gowda (Beesuva Padagalu – Mandya), Gowramma (Chamarajnagar –Sobane Pada), J K Ramu (Kodagu-Kodavara Kunitha), Kapini Gowda (Hassan – Kolata), Dr H C Eshwarnayaka (Chikkamagalur-Nati Vaidhya), Sadhu Panara (Udupi-Bhootha Kola), Rukmaiah Gowda (Dakshina Kannada – Siddavesha), Sankamma (Belagavi –Sampradaya Pada), Rukmini Mallappa Haranala (Bagalkote-Wedding folk Song), Mallaiah Rachaiah Thotagunte (Dharawad-Folk Song), Hanumanthappa Dharwad (Haveri –Bhajane Kolata), Nagaraj Jakkammanavar (Gadag – Gigi Pada), Nimbevva Kenchappa Gubbi (Vijayapura-Sobane Pada), Hussainabi Budensaab Siddi (Uttarkannada-Siddi Damami Dance), Gangadara Swami Aggi Mata (Kalburgi – Puruvanthike), Tulasi Rama Bhimarao Suthara (Bidar-Folk Song), Shanthavva Ganda Lachamappa Lamani (Koppal – Lamani Dance), Soogappa Nagappa (Raichur – Tatvapada), Veshagara Mothi Ramanna (Ballari-Hagalu Vesha), Shivamoorthy Thanikedara (Yadagir – Gigi Pada).

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 10,2020

Mangaluru, Jan 10: Two members of a notorious honey-trap gang that used to lure rich men using women and then extort money from them by staging fake police raid have been arrested by the Dakshina Kannada district police.

Lohith, a resident of Kushalnagara, and Sharif from Vittal, were arrested in connection with a honey-trap case registered in Uppinangady police station. Jamal, Jeevan and Naushad, who were also involved in the case, are absconding.

Police said they received information that a few people under the guise of being Kerala police, were planning to raid a resort near Uppinangady where two couples were staying.

They were informed that they would threaten and try to extort money from them. The police were tipped off about the same by their counterparts in Kerala.

Police said the accused are experts in setting honeytraps, and were involved in similar crimes since a long time. Their modus operandi was to use two women from Mangaluru to lure their intended targets.

Once they trap their target, the woman and victim are sent to resorts. They then raid the resort posing as police officials, and click pictures in compromising positions of the victim with the woman.

They threaten to release the pictures on social media or TV channels, if they fail to pay up.

Police said the accused demanded Rs 10 lakh from each victim, but they denied to pay up. Irked by this, the accused took away the victims’ belongings such as phone, money and car.

The victims who believed that the accused were police personnel, asked them to take them to the police station. Instead of taking them to the police, the accused took them to a secluded place, where they claimed that they were putting the victims under house arrest. Police have seized an SUV from the accused.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.