Blast triggers war of words ahead of Karnataka polls

[email protected] (Imran Khan, Tehelka)
April 21, 2013

Blast_triggersJUST A day after the Boston Marathon terror attack and less than a month after twin blasts rocked Hyderabad, 17 people were injured in a low-intensity blast near the Karnataka BJP's office in Bengaluru. Among the injured were 11 policemen who had been deployed there as it was the last day of filing nominations for the upcoming Assembly election on 5 May.

While the police are yet to ascertain who is behind the blast, suspicions are now being raised about the timing of the blast and who might possibly benefit from it.

“I was in my kitchen cooking, when I heard a deafening noise,” says Nanjamma, 43, who lives near the blast site. The explosion shattered the window panes of her house. “When I rushed outside, I saw cars engulfed in flames and bits of broken glass everywhere.”

Nine vehicles were damaged in the blast and the fire that followed. Police officials informed the media that the blast was caused by an IED (Improvised Explosive Device) mounted on a 100cc Yamaha motorcycle (chassis number: 1108F001-568/ registration number: TN-22R- 3769). The police, however, are yet to fathom whether the blast was triggered by a timer mounted on the vehicle or through a remote device.

A police van parked close to the blast site too was damaged. The explosion occurred in the Malleswaram residential area of north Bengaluru, about 100 metres from the newly inaugurated state BJP office, christened Jagannath Bhavan. “There were 20 of us on duty when the blast happened. Eight of us were in the van, but the rest were outside,” says Vishweshwaraiyya, 50, a head constable with the Karnataka State Reserve Police Force who was admitted at the KC General Hospital along with 10 of his colleagues.

Among the injured was Assistant Sub-Inspector BC Kunyappa, who received several cuts from shards of glass on the left side of the body, from neck to ankle. “I was reading the newspaper inside a police jeep when I heard a sound, like the bursting of crackers, followed by thick smoke,” he says. “I jumped out from the vehicle, otherwise I would have been dead.” Asked whether he saw anybody parking the bike, he says he has no idea.

Besides the policemen, six others, including three women, were also injured.

An unseemly blame game has broken out between the BJP and the Congress over the blast with both sides politicising the issue. Karnataka Home Minister R Ashok, who reached the spot immediately after the blast, declared it an act of terror intended to hurt the state BJP leaders. He even speculated that it might have been intended to “celebrate” the third anniversary of the Chinnaswamy Stadium blasts of 2010 as both of the incidents occurred on 17 April while the Indian Premier League season was on.

BJP state spokesperson S Prakash too said the bomb was definitely intended to hurt party workers and state BJP leaders as it was nomination day and activists of the party would be milling around the party office.

Opposition leaders, however, slammed the BJP for the remarks. Congress leader and Leader of the Opposition Siddaramaiah called the blasts a political gimmick and held the state government responsible for it. Raising suspicion about the timing of the blast, Congress MP H Vishwanath said the role of the Rashtriya Swayamsewak Sangh could not be ruled out and demanded an inquiry that should submit its findings before the Assembly election.

So was it an act of terror? “Though no shrapnel or splinters were found in the bodies of the injured, nothing conclusive has come out so far,” says Joint Commissioner of Police (Law & Order) Pranab Mohanty. The only fact that seems to support the Congress' view is that the bike was parked 100 metres away from the BJP office and seemed designed for minimum damage.

While all interpretations of the blast are premature, it's interesting to note that past experiences have shown that similar acts were used for a political purpose. In the thick of elections in May 2008, a low-intensity bomb exploded in the district court of Dharward, 429 km west of Bengaluru. Initially, the Students Islamic Movement of India was deemed to be behind the blasts but later investigations showed the hand of extremist Hindutva groups. However, given that there have been blasts elsewhere in the country that have involved Muslim extremists, the sanest course might be to rush to no conclusions.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 18,2020

Beijing, Jun 18:  Besides washing hands and wearing masks, it is also important to close the toilet lid before flushing to contain the spread of COVID-19, as per a new study.

According to a new study cited by The Washington Post, scientists who simulated toilet water and airflows, have found that flushing a toilet can generate a plume of virus-containing aerosol particles that is widespread and can linger in the air long enough to be inhaled by others. The novel coronavirus has been found in the faeces of COVID-19 patients, but it remains unknown whether such clouds could contain enough virus to infect a person.

"Flushing will lift the virus up from the toilet bowl," co-author Ji-Xiang Wang, who researches fluids at Yangzhou University in Yangzhou, China, said in an email. Wang stressed that bathroom users "need to close the lid first and then trigger the flushing process" and wash hands properly if the closure is not possible. As one flushes the toilet with the lids open, bits of faecal matter swish around so violently that they can be propelled into the air, become aerosolised and then settle on the surroundings.

Experts call it the "toilet plume".Age-old studies have been made to understand the potential for airborne transmission of infectious disease via sewage, and the toilet plume's role. Scientists who have seeded toilet bowls with bacteria and viruses have found contamination of seats, flush handles, bathroom floors and nearby surfaces. This is one reason we are told to wash our hands after visiting the toilet. Public bathrooms are well known to contribute to the spread of viruses that transmit via ingestion, such as the noroviruses that haunt cruise ships. However, their role in the transmission of respiratory viruses has not been established, said Charles P Gerba, a microbiologist at the University of Arizona."The risk is not zero, but how great a risk it is, we do not know. The big unknown is how much virus is infectious in the toilet when you flush it ... and how much virus does it take to cause an infection," said Gerba, who has studied the intersection of toilets and infectious disease for 45 years.

A study published in March in the journal Gastroenterology found significant amounts of coronavirus in the stool of patients and determined that viral RNA lasted in faeces even after the virus cleared from the patients` respiratory tracts. While another study in the journal Lancet found coronavirus in faeces up to a month after the illness had passed.

Scientists around the world are now studying sewage to track the spread of the virus. According to the researchers, the presence of the virus in excrement and the gastrointestinal tract raises the prospect of transmission via toilets, because many COVID-19 patients experience diarrhoea or vomiting.

A study of air samples in two hospitals in Wuhan, China found that although coronavirus aerosols in isolation wards and ventilated patient rooms were very low, "it was higher in the toilet areas used by the patients".The Centers for Disease Control and Prevention (CDC) says it remains "unclear whether the virus found in faeces may be capable of causing COVID-19," and "there has not been any confirmed report of the virus spreading from faeces to a person".For now, the CDC characterises the risk as low based on observations from previous outbreaks of other coronaviruses such as severe acute respiratory syndrome (SARS) and the Middle East respiratory syndrome (MERS). Wang decided to use computer models to simulate toilet plumes while isolating at home, as per Chinese government orders and thinking about how a fluids researcher "could contribute to the global fight against the virus".

Published in the journal Physics of Fluids, the study found that flushing of both single-inlet toilets, which push water into the bowl from one port, and annular-inlet toilets, which pour water into the bowl from the rim's surrounding edge with even greater energy, results in "massive upward transport of virus".

Particles can reach heights of more than three feet and float in the air for more than a minute, it found. The paper recommends not just lid-closing and hand-washing, it urges manufacturers to produce toilets that close and self-clean automatically. It also suggests that toilet-users should wipe down the seat. Gerba, however, said seats should not be a major concern.

Research has found that public and household toilet seats are typically the cleanest surfaces in restrooms, he said, probably because so many people already wipe them off before using them. Also, he said of SARS-CoV-2, the virus that causes COVID-19, "I don't think it's butt-borne, so I don`t think you have to worry."Gerba, who has been studying coronavirus transmission for two decades to investigate the role of a toilet flushing in a SARS outbreak stresses "flush and run" when using a public toilet without a lid. Gerba also said that people should wash hands well post-flushing and use hand sanitiser after leaving the restroom. "Choose well-ventilated bathrooms if possible and do not hang around the restroom in any case," added Gerba.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 22,2020

Chennai, Jun 22: Commuting the death sentence to life imprisonment for five convicts, the Madras High Court on Monday set free Chinnasamy, the main convict, who had also been sentenced to death in the Udumalpet Shankar honour killing case.

A Division Bench comprising Justice M. Sathyanarayanan and Justice M. Nirmal Kumar also dismissed the appeal by the state police against the acquittal of three persons by a lower court.

The Bench ordered the five convicts sentenced for life to undergo a jail term of not less than 25 years.

In 2016, V. Shankar, who had married C. Kausalya, was killed by a gang in Udumalpet in Tamil Nadu. The gang also injured Kausalya in the attack.

It was alleged the parents of Kausalya -- Chinnasamy, Annalakshmi -- were against the marriage.

P. Pandidurai, the uncle of Kausalya at the behest of Chinnasamy and Annalakshmi had hired a gang to kill Shankar.

The gang killed Shankar in broad daylight in a public place and Kausalya too got injured in the attack as she tried to save her husband.

The Principal District and Sessions Court in Tiruppur had convicted and sentenced to death six accused persons -- Chinnasamy, P. Jagadeesan, P. Selvakumar, M. Manikandan, M. Mathan alias Michael and P. Kalaithamilvaanan.

The court also sentenced two other accused, K. Dhanraj for life and Manikandan to a five year jail term, while acquitting Annalakshmi, Pandidurai and Prasanna.

The convicts had filed an appeal against their sentence in the Madras High Court while the police filed an appeal against the acquittal of three persons.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.