Murdered boy's father opposes pre-arrest bail pleas of Ryan Group trustees

Agencies
September 13, 2017

Mumbai, Sep 13: The father of the seven-year-old boy murdered at the Ryan International School in Gurgaon today approached the Bombay High Court seeking to oppose the pre-arrest bail pleas of the trustees of Ryan International Group.

The group's CEO, Ryan Pinto, and his parents -- Augustine Pinto, the founding chairman of the group, and Grace Pinto, its managing director -- had earlier approached the high court seeking transit anticipatory bail apprehending arrest in the case.

The Pintos sought protection from arrest till they approach the court concerned in Haryana.

When the pleas came up for hearing before Justice Ajey Gadkari today, lawyer Sushil Tekriwal informed the court that Varun Thakur, the father of the Class 2 student Pradyuman who was killed in the school in Gurgaon, was filing an application seeking to intervene and oppose the bail pleas.

Tekriwal said the application will be filed in the high court registry, following which Justice Gadkari posted the hearing of the anticipatory bail pleas of the Pintos later this afternoon.

In the application, Thakur said he is the complainant in the case and the petition of the trustees is "opposed in strongest possible terms and words as the instant case being a rarest of the rare case where a brutal, diabolical, cold blooded, barbarous, demonic, unpardonable, unprovoked, hellish, cruel homicide has taken place on the campus of Ryan International School."

Pradyuman was found with his throat slit on the morning of September 8 in the toilet of Ryan International School in Gurgaon.

Police allege that 42-year-old bus conductor Ashok Kumar killed him with a knife after the boy resisted an attempt to sodomise him.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 30,2020

Mumbai, Jan 30: The Uttar Pradesh Special Task Force (STF) has arrested Dr Kafeel Khan from Mumbai airport for allegedly making inflammatory statements at AMU during protests against the Citizenship Amendments Act (CAA) last month, officials said.

Khan was arrested on Wednesday night with assistance from Mumbai Police at the airport when he arrived in the city to attend anti-CAA protests, an official said.

"Officials of the UP STF arrested Dr Kafeel Khan in a case which was registered at Civil Lines Police Station under section 153 A (promoting enmity between different groups) of IPC. Our police team helped our UP counterparts on their request," said an official from Mumbai Police.

He claimed that Khan had made inflammatory statements on December 12 last year during the protest near Bab e Syed Gate outside the Aligarh Muslim University in front of more than 600 students.

The official also alleged that the Gorakhpur doctor had made objectionable comments against Union Home Minister Amit Shah.

The FIR against Khan mentions that Swaraj India's president Yogendra Yadav was also present during the speech at AMU.

Following the arrest in the case, Khan was taken to the Sahar Police Station and after completing formalities he will be taken to UP on transit remand, the official said.

Khan, a paediatrician, had come to the limelight in 2017 when a controversy broke out after the death of over 60 children in less than a week at the BRD Medical College in Gorakhpur, UP.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 20,2020

Kolkata, Jul 20: As many as 13 migrant workers who came to their native village in West Bengal's Bankura district were denied entry at the quarantine centre by the locals.

As a result, the workers had to set up a tent accommodation at a nearby Beraban forest area and lived together in a single tent there, without adequate food, drinking water and basic facilities.

The migrant labourers came from Rajasthan after four months of COVID-19 lockdown which was imposed nationwide on March 25 to contain the spread of coronavirus.

When they arrived at Jagadalla village in the Bankura district and tried to put up at a village school building for two weeks self-quarantine, angry villagers vehemently protested against their entry fearing Covid infections in their village.

Sources said that local police and panchayat members also failed to make the villagers understand the fact that if the labourers strictly stayed in self-quarantine there would be no chance of any further infection.

"The school is located quite within our neighbourhood. If they stay there and tested positive, they might spread Covid infections in the village. We cannot allow them to stay in the school building," said Aniket Goswami, a villager.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.