Blast triggers war of words ahead of Karnataka polls

[email protected] (Imran Khan, Tehelka)
April 21, 2013

Blast_triggersJUST A day after the Boston Marathon terror attack and less than a month after twin blasts rocked Hyderabad, 17 people were injured in a low-intensity blast near the Karnataka BJP's office in Bengaluru. Among the injured were 11 policemen who had been deployed there as it was the last day of filing nominations for the upcoming Assembly election on 5 May.

While the police are yet to ascertain who is behind the blast, suspicions are now being raised about the timing of the blast and who might possibly benefit from it.

“I was in my kitchen cooking, when I heard a deafening noise,” says Nanjamma, 43, who lives near the blast site. The explosion shattered the window panes of her house. “When I rushed outside, I saw cars engulfed in flames and bits of broken glass everywhere.”

Nine vehicles were damaged in the blast and the fire that followed. Police officials informed the media that the blast was caused by an IED (Improvised Explosive Device) mounted on a 100cc Yamaha motorcycle (chassis number: 1108F001-568/ registration number: TN-22R- 3769). The police, however, are yet to fathom whether the blast was triggered by a timer mounted on the vehicle or through a remote device.

A police van parked close to the blast site too was damaged. The explosion occurred in the Malleswaram residential area of north Bengaluru, about 100 metres from the newly inaugurated state BJP office, christened Jagannath Bhavan. “There were 20 of us on duty when the blast happened. Eight of us were in the van, but the rest were outside,” says Vishweshwaraiyya, 50, a head constable with the Karnataka State Reserve Police Force who was admitted at the KC General Hospital along with 10 of his colleagues.

Among the injured was Assistant Sub-Inspector BC Kunyappa, who received several cuts from shards of glass on the left side of the body, from neck to ankle. “I was reading the newspaper inside a police jeep when I heard a sound, like the bursting of crackers, followed by thick smoke,” he says. “I jumped out from the vehicle, otherwise I would have been dead.” Asked whether he saw anybody parking the bike, he says he has no idea.

Besides the policemen, six others, including three women, were also injured.

An unseemly blame game has broken out between the BJP and the Congress over the blast with both sides politicising the issue. Karnataka Home Minister R Ashok, who reached the spot immediately after the blast, declared it an act of terror intended to hurt the state BJP leaders. He even speculated that it might have been intended to “celebrate” the third anniversary of the Chinnaswamy Stadium blasts of 2010 as both of the incidents occurred on 17 April while the Indian Premier League season was on.

BJP state spokesperson S Prakash too said the bomb was definitely intended to hurt party workers and state BJP leaders as it was nomination day and activists of the party would be milling around the party office.

Opposition leaders, however, slammed the BJP for the remarks. Congress leader and Leader of the Opposition Siddaramaiah called the blasts a political gimmick and held the state government responsible for it. Raising suspicion about the timing of the blast, Congress MP H Vishwanath said the role of the Rashtriya Swayamsewak Sangh could not be ruled out and demanded an inquiry that should submit its findings before the Assembly election.

So was it an act of terror? “Though no shrapnel or splinters were found in the bodies of the injured, nothing conclusive has come out so far,” says Joint Commissioner of Police (Law & Order) Pranab Mohanty. The only fact that seems to support the Congress' view is that the bike was parked 100 metres away from the BJP office and seemed designed for minimum damage.

While all interpretations of the blast are premature, it's interesting to note that past experiences have shown that similar acts were used for a political purpose. In the thick of elections in May 2008, a low-intensity bomb exploded in the district court of Dharward, 429 km west of Bengaluru. Initially, the Students Islamic Movement of India was deemed to be behind the blasts but later investigations showed the hand of extremist Hindutva groups. However, given that there have been blasts elsewhere in the country that have involved Muslim extremists, the sanest course might be to rush to no conclusions.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 12,2020

Thiruvananthapuram, Mar 12: In the wake of COVID-19 outbreak, Internet service providers in Kerala have agreed to step up the network capacity by 30 to 40 per cent of the present capacity to meet the demand, especially in view of the spurt in work-at-home mode.

"The decision was made at a meeting of representatives of various telecom service providers in Kerala circle and officials of the Telecommunication Department convened by the Secretary, Electronics and IT, following a direction by Chief Minister Pinarayi Vijayan to look into the issue," said a press release by the IT Department.

The decision will be beneficial for those working in IT institutions. The government has come out with a set of suggestions to avoid social gatherings at public places in view of coronavirus spread. Telecom service providers have assured the government that they are well equipped to face the current situation.

The major part of Internet consumption in Kerala is made available through local servers. Moreover, global Internet traffic is very low as compared to the overall consumption. So, increasing the capacity won't be difficult, service providers informed.

"Complaints regarding the low availability of the Internet due to the spurt in consumption of the Internet can be made to the service providers to their complaint redressal number or inform state government call centre (155300). But complaints regarding the insufficiency in the current network infrastructure should be strictly avoided," said the release.

The IT Department will also demand daily reports from various telecom service providers. By analysing these reports, steps for remedies will be taken after bringing the sudden increase in consumption to the service providers.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.