8 men kill Samajwadi Party leader in his Greater Noida home

April 25, 2013

Samajwadi_PartyGreater Noida, Apr 25: Around eight armed men entered the Greater Noida home of a Samajwadi Party national executive member and shot him dead on Wednesday, a day when the politician's two security guards were on leave.

The victim, Chaman Bhati, was walking in his garden in Dabra village around 6pm when the attackers, who came in a Scorpio, scaled the wall and shot him five times, police said.

The property businessman-turned-politician died on the spot.

"The assailants came in a Scorpio car, scaled the residence walls and opened fire on him. They managed to flee with Bhati and his gunner's carbine and licenced pistols," said a senior police official. Tension erupted after the incident as angry locals did not allow the police to take his body for post mortem examination till late on Wednesday

IG (Meerut range) Bhavesh Kumar Singh said that police have lodged an FIR. "Gautambudh Nagar SSP has been deployed at the scene and case is being investigated," Singh said.

On hearing shots being fired, Bhati's family members and locals reached the scene and found him in a pool of blood. When Gautam Budh Nagar SP (rural) reached the spot, agitated locals demanded the immediate arrested of the culprits.

Police sources said several attempts were made on Bhati's life in the last 10 years. Family sources said 10 months ago, unidentified assailants had attacked him. "The criminals had then come to kill him but by mistake opened fire on his brother-in-law, Pankaj," an official said. In view of danger to his life,Bhati had been provided with two gunners. Both were on leave on Wednesday.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 7,2020

Srinagar, Mar 7: Two more accused, including a man who allegedly bought chemicals online for making improvised explosive device (IED) to be used in an attack on a convoy of the Central Reserve Police Force (CRPF) in Jammu and Kashmir's Pulwama last year, were arrested by the National Investigation Agency (NIA) on Friday, an official said.

The terror attack left 40 CRPF personnel dead in south Kashmir's Pulwama last year.

Waiz-ul-Islam, 19, from Srinagar and Mohammad Abbass Rather, 32, from Pulwama were arrested by the NIA, taking the number of those arrested in the case in the past week to five.

"During initial interrogation, Islam disclosed that he used his Amazon online shopping account to procure chemicals for making IEDs, batteries and other accessories on the directions of Pakistani Jaish-e-Mohammed (JeM) terrorists," the official said.

He said Islam personally delivered the items to the JeM terrorists after buying them online as a part of the conspiracy to carry out the attack.

"Rather is an old overground worker of the JeM. He has disclosed that he gave shelter at his home to Jaish terrorist and IED expert Mohd Umar after he came to Kashmir in April-May 2018," the official said.

Rather also sheltered other JeM terrorists - suicide bomber Adil Ahmad Dar, Sameer Ahmed Dar and Kamran, a Pakistani -- at his house before the Pulwama attack, the official said.

"He also facilitated safe shelter for the JeM terrorists, including Adil, at the house of accused Tariq Ahmed Shah and his daughter Insha Jan of Hakripora, who were arrested on March 3," the official said.

He said Islam and Rather will be produced before the NIA special court in Jammu on Saturday, while further investigation in the case continues. The NIA took over the case to probe the conspiracy behind the February 14, 2019, attack in Pulwama.

The last video of Adil, which was released by the JeM from Pakistan after the terror attack, was filmed at the home of Tariq Ahmed Shah. On February 28, the NIA achieved a major breakthrough in the case when it arrested 22-year-old Shakir Bashir Magrey, a furniture shop owner and resident of Pulwama.

Magrey had given shelter and other logistical assistance to suicide bomber Adil. He was introduced to Adil in mid-2018 by Pakistani terrorist Mohammad Umar Farooq and he became a full-time OGW of the JeM.

The explosives used in the attack were determined through forensic probe to be ammonium nitrate, nitro-glycerin and RDX. During investigation into the attack, the identity of the suicide bomber to be Adil Ahmad Dar was confirmed through DNA matching with that of his father.

The other key terrorists involved in the attack have been found to be JeM's south Kashmir divisional head Muddasir Ahmad Khan, killed in an operation by the security forces on March 11 last year; Pakistani terrorists Muhammad Umar Farooq and IED expert Kamran, both killed on March 29 last year; the owner of the car Sajjad Ahmad Bhat, a resident of Anantnag who was killed on June 16 last year, and Qari Yassir, JeM's commander for Kashmir who was killed on January 25 this year.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 26,2020

New Delhi, Mar 26: Ujjwala beneficiaries will get free gas cylinders (LPG cylinders) in the next three months, Finance Minister Nirmala Sitharaman announced on Thursday. Addressing a press briefing amid coronavirus pandemic, the finance minister said the announcement is set to benefit 8.3 crore BPL families. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 28,2020

Several India-based firms are spoofing the World Health Organisation (WHO) by creating fake Gmail accounts and luring business leaders in disguise of informing them of latest COVID-19 announcements and hack their personal and financial information, Google has warned.

These "hack-for-hire" firms, many based in India, have been creating Gmail accounts spoofing the WHO, largely targeting business leaders in financial services, consulting, and healthcare corporations within numerous countries including, the US, Slovenia, Canada, India, Bahrain, Cyprus, and the UK.

"The lures themselves encourage individuals to sign up for direct notifications from the WHO to stay informed of COVID-19 related announcements, and link to attacker-hosted websites that bear a strong resemblance to the official WHO website," security researchers from Google's Threat Analysis Group said on Wednesday.

The sites typically feature fake login pages that prompt potential victims to give up their Google account credentials, and occasionally encourage individuals to give up other personal information, such as their phone numbers.

On any given day, Google's Threat Analysis Group (TAG) said it is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.

Last month, it sent 1,755 warnings to users whose accounts were targets of government-backed attackers.

"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users," said the tech giant.

Google continues to see attacks from groups like Charming Kitten on medical and healthcare professionals, including WHO employees.

"We're seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers," said the company.

Government-backed or state-sponsored groups have different goals in carrying out their attacks: Some are looking to collect intelligence or steal intellectual property; others are targeting dissidents or activists, or attempting to engage in coordinated influence operations and disinformation campaigns.

Google said that since March, it has removed more than 1,000 YouTube channels that were part of a large campaign and behaving in a coordinated manner.

"These channels were mostly uploading spammy, non-political content, but a small subset posted primarily Chinese-language political content similar to the findings of a recent Graphika report," said the company.

Several cybersecurity firms have seen a spike in COVID-19 related scams and hacking attempts. Hackers are also creating scam sites similar to COVID-19 relief packages.

Researchers at Check Point Software Technologies revealed in mid-May that they have seen 192,000 coronavirus-related cyber-attacks per week over the past three weeks, a 30 % increase compared to previous weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.