Blast triggers war of words ahead of Karnataka polls

[email protected] (Imran Khan, Tehelka)
April 21, 2013

Blast_triggersJUST A day after the Boston Marathon terror attack and less than a month after twin blasts rocked Hyderabad, 17 people were injured in a low-intensity blast near the Karnataka BJP's office in Bengaluru. Among the injured were 11 policemen who had been deployed there as it was the last day of filing nominations for the upcoming Assembly election on 5 May.

While the police are yet to ascertain who is behind the blast, suspicions are now being raised about the timing of the blast and who might possibly benefit from it.

“I was in my kitchen cooking, when I heard a deafening noise,” says Nanjamma, 43, who lives near the blast site. The explosion shattered the window panes of her house. “When I rushed outside, I saw cars engulfed in flames and bits of broken glass everywhere.”

Nine vehicles were damaged in the blast and the fire that followed. Police officials informed the media that the blast was caused by an IED (Improvised Explosive Device) mounted on a 100cc Yamaha motorcycle (chassis number: 1108F001-568/ registration number: TN-22R- 3769). The police, however, are yet to fathom whether the blast was triggered by a timer mounted on the vehicle or through a remote device.

A police van parked close to the blast site too was damaged. The explosion occurred in the Malleswaram residential area of north Bengaluru, about 100 metres from the newly inaugurated state BJP office, christened Jagannath Bhavan. “There were 20 of us on duty when the blast happened. Eight of us were in the van, but the rest were outside,” says Vishweshwaraiyya, 50, a head constable with the Karnataka State Reserve Police Force who was admitted at the KC General Hospital along with 10 of his colleagues.

Among the injured was Assistant Sub-Inspector BC Kunyappa, who received several cuts from shards of glass on the left side of the body, from neck to ankle. “I was reading the newspaper inside a police jeep when I heard a sound, like the bursting of crackers, followed by thick smoke,” he says. “I jumped out from the vehicle, otherwise I would have been dead.” Asked whether he saw anybody parking the bike, he says he has no idea.

Besides the policemen, six others, including three women, were also injured.

An unseemly blame game has broken out between the BJP and the Congress over the blast with both sides politicising the issue. Karnataka Home Minister R Ashok, who reached the spot immediately after the blast, declared it an act of terror intended to hurt the state BJP leaders. He even speculated that it might have been intended to “celebrate” the third anniversary of the Chinnaswamy Stadium blasts of 2010 as both of the incidents occurred on 17 April while the Indian Premier League season was on.

BJP state spokesperson S Prakash too said the bomb was definitely intended to hurt party workers and state BJP leaders as it was nomination day and activists of the party would be milling around the party office.

Opposition leaders, however, slammed the BJP for the remarks. Congress leader and Leader of the Opposition Siddaramaiah called the blasts a political gimmick and held the state government responsible for it. Raising suspicion about the timing of the blast, Congress MP H Vishwanath said the role of the Rashtriya Swayamsewak Sangh could not be ruled out and demanded an inquiry that should submit its findings before the Assembly election.

So was it an act of terror? “Though no shrapnel or splinters were found in the bodies of the injured, nothing conclusive has come out so far,” says Joint Commissioner of Police (Law & Order) Pranab Mohanty. The only fact that seems to support the Congress' view is that the bike was parked 100 metres away from the BJP office and seemed designed for minimum damage.

While all interpretations of the blast are premature, it's interesting to note that past experiences have shown that similar acts were used for a political purpose. In the thick of elections in May 2008, a low-intensity bomb exploded in the district court of Dharward, 429 km west of Bengaluru. Initially, the Students Islamic Movement of India was deemed to be behind the blasts but later investigations showed the hand of extremist Hindutva groups. However, given that there have been blasts elsewhere in the country that have involved Muslim extremists, the sanest course might be to rush to no conclusions.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 17,2020

Bengaluru, Jan 17: India’s latest communication satellite GSAT-30 was successfully launched from the Spaceport in French Guiana during the early hours on Friday.

In a press release, ISRO, has stated that the launch vehicle 'Ariane-5 VA-251' was blasted off from Kourou Launch Base, French Ginana at 0230 hours, carrying India’s GSA-30 and EUTELSAT KONNECT for Eutelasat, as per schedule.

The Ariane 5 upper stage in an elliptical Geosynchronous Transfer Orbit.

With a lift-off mass of 3,357 kg, GSAT-30 will provide continuity to operational services on some of the in-orbit satellites.

GSAT-30 derives its heritage from ISRO’s earlier INSAT/GSAT satellite series and will replace INSAT-4A in orbit.

“GSAT-30 has a unique configuration of providing flexible frequency segments and flexible coverage. The satellite will provide communication services to Indian mainland and islands through Ku-band and wide coverage covering Gulf countries, a large number of Asian countries and Australia through C-band," ISRO Chairman Dr K Sivan said.

Dr Sivan also said that “GSAT-30 will provide DTH Television Services, connectivity to VSATs for ATM, Stock-exchange, Television uplinking and teleport Services, Digital Satellite News Gathering (DSNG) and e-governance applications. The satellite will also be used for bulk data transfer for a host of emerging telecommunication applications.”

ISRO’s Master Control Facility (MCF) at Hassan in Karnataka took over the command and control of GSAT-30 immediately after its separation from the launch vehicle. Preliminary health checks of the satellite revealed its normal health.

In the days ahead, orbit-raising maneuvers will be performed to place the satellite in Geostationary Orbit (36,000 km above the equator) by using its onboard propulsion system.

During the final stages of its orbit raising operations, the two solar arrays and the antenna reflectors of GSAT-30 will be deployed. Following this, the satellite will be put in its final orbital configuration.

The satellite will be operational after the successful completion of all in-orbit tests.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 17,2020

As millions of people get hooked to online dating platforms, their proliferation has led to online romance scams becoming a modern form of fraud that have spread in several societies along with the development of social media like Facebook Dating, warn researchers.

For example, extra-marital dating app Gleeden has crossed 10 lakh users in India in COVID-19 times while dating apps like Tinder and Bumble have gained immense popularity.

According to researchers from University of Siena and Scotte University Hospital led by Dr Andrea Pozza, via a fictitious Internet profile, the scammer develops a romantic relationship with the victim for 6-8 months, building a deep emotional bond to extort economic resources in a manipulative dynamic.

"There are two notable features: on the one hand, the double trauma of losing money and a relationship, on the other, the victim's shame upon discovery of the scam, an aspect that might lead to underestimation of the number of cases," the authors wrote in a paper published in the journal Clinical Practice & Epidemiology in Mental Health.

Around 1,400 dating sites/chats have been created over the last decade in North America alone. In the UK, 23 per cent of Internet users have met someone online with whom they had a romantic relationship for a certain period and even 6 per cent of married couples met through the web.

"The online dating industry has given rise to new forms of pathologies and crime, said the authors.

The results showed that 63 per cent of social media users and 3 per cent of the general population reported having been a victim at least once.

Women, middle-aged people, and individuals with higher tendencies to anxiety, romantic idealization of affective relations, impulsiveness and susceptibility to relational addiction are at higher risk of being victims of the scam.

Online romance scams are, in other words, relationships constructed through websites for the purpose of deceiving unsuspecting victims in order to extort money from them.

The scammer always acts empathetically and attempts to create the impression in the victim that the two are perfectly synced in their shared view of life.

"The declarations of the scammer become increasingly affectionate and according to some authors, a declaration of love is made within two weeks from initial contact," the study elaborated.

After this hookup phase, the scammer starts talking about the possibility of actually meeting up, which will be postponed several times due to apparently urgent problems or desperate situations such as accidents, deaths, surgeries or sudden hospitalizations for which the unwitting victim will be manipulated into sending money to cover the momentary emergency.

Using the strategy of "testing-the-water", the scammer asks the victim for small gifts, usually to ensure the continuance of the relationship, such as a webcam, which, if successful, leads to increasingly expensive gifts up to large sums of money.

When the money arrives from the victim, the scammer proposes a new encounter.

The request for money can also be made to cover the travel costs involved in the illusory meeting. In this phase, the victim may start having second thoughts or showing doubt about the intentions of the partner and gradually decide to break off the relationship.

"In other cases, the fraudulent relationship continues or even reinforces itself as the victim, under the influence of ambivalent emotions of ardor and fear of abandonment and deception, denies or rationalizes doubts to manage their feelings," said the study.

In some cases, the scammer may ask the victim to send intimate body photos that will be used as a sort of implicit blackmail to further bind the victim to the scammer.

Once the scam is discovered, the emotional reaction of the victim may go through various phases: feelings of shock, anger or shame, the perception of having been emotionally violated (a kind of emotional rape), loss of trust in people, a sensation of disgust towards oneself or the perpetrator of the crime and a feeling of mourning.

"Understanding the psychological characteristics of victims and scammers will allow at-risk personality profiles to be identified and prevention strategies to be developed," the authors suggested.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.