No wasted effort: When Railways retrieved gold chain from poop

Agencies
July 30, 2017

New Delhi, Jul 30: During his two-decade-long career with the Indian Railways, station master Anil Kumar Shukla has helped passengers in multiple ways. He has now added retrieving a gold chain from poop to his list of accomplishments.

Shukla, currently posted at the Yeola station - about 35 kilometres from Shirdi and 260 kilometres northeast of Mumbai - got a call on July 16, informing him that a passenger had dropped a gold chain in the toilet of a train passing through his station.

"It was an unusual call, no doubt about that," laughed Shukla when contacted by news agency. "I rushed out when a passenger stopped the train and said he had dropped his gold chain into the toilet and wanted us to find it," said Shukla.

The gold chain weighed 50 grams, said its owner, Dr Chavan Patil, an orthopaedic surgeon, and was worth Rs 1.5 lakh.

"It is a lot of money to flush down the drain," said Patil, who was travelling from Nonand to Manmad in Maharashtra by the Maharashtra Express on July 16 and dropped his chain while changing his shirt at the Yeola station, which falls on the Ahmednagar-Manmad rail route.

The doctor sought help from the officials and his expectations weren't misplaced. The Railways, after all, had in recent times taken a slew of measures to meet passenger needs - from delivering medicines, wheelchairs, food and blankets to retrieving phones and laptops left behind.

However, this time, the Railways' helping hand could literally stink from the effort.

"After I pulled the chain to stop the train, the guard and station master came to help me out. However, they said they couldn't do much because the toilet was bio-tech and could be opened only by the cleaning crew at Kolhapur. They asked me to go to Kolhapur and make enquiries," Patil said.

Patil, however, went home to Phaltan, around six hours from Yeola -- and then his tech-savy daughter took over.

On July 18, she posted a tweet, urging Rail Minister Suresh Prabhu to intervene in the matter.

The minister replied in 10 minutes.

"I have given orders to concerned department to do the needful," he tweeted.In half an hour, Patil got a call from the Pune Railway station chief, asking him about the lost chain.

"He asked me to go to Kolhapur the next day. I did, and learnt the toilet was not bio-tech but the usual one," he said.

So, the chain, they realised, had fallen through the hole in the Indian style toilet at Yeola station.

It was then that station master Shukla received his second "unusual call" in as many days.

Informed that the chain was somewhere on the tracks of his station, Shukla, along with his staff, scoured an area of around two kilometres. To compound matters, it was also raining heavily that day. And then he spotted something jutting out of the pebbles.

"We used a wire to pull it out. Yes, it was dirty and covered in filth, but nothing a good wash couldn't get rid of," he said.

A heavy-duty wash under a tap at the station later, the chain finally made it to the hands of its very persistent owner, three days after it went down a black hole.

It is, however, not clear if Patil wore the chain immediately on its return! But what's known is that the effort that went into locating the chain wasn't quite a waste.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 22,2020

New Delhi, Jan 22: "Don't get into a trap. Your security is in your hands," the Border Security Force (BSF) has said issuing its social media rules for its officers and men. It has directed them not to use 42 mobile applications and show caution while using Facebook, Twitter and WhatsApp.

"Be cautious while using social media," said the BSF in a circular issued recently.

"Before using WhatsApp, Facebook, Twitter and other social media platforms, one needs to keep in mind that you are border guarding force and Central Civil Services (Conduct) Rules rule duly are applicable," it said.

It further pointed out that by commenting/writing about or forwarding unverified reports and rumours one violates laws of land.

"Several times unverified reports would be presented in way that they are absolutely true and start believing it. Seeing such post always use your commonsense and never get into the trap (sic.)," it state adding that the anti-national elements uses social media to propagate their agenda to cause unrest in India.

A picture clicked by Border Security Force personnel and posted on a social media platform remains there for always. Therefore, one should use officially approved pictures about any incident or untoward incidents related to Border Security Force, stated the circular. It pointed that unauthorised persons should not engage into taking pictures of the incidents.

It also highlighted how through social media, a few BSF personnel have fallen into trap of espionage racket carried out by enemy countries.

"Our security and respect is in our hands. Always think twice whether you are doing correct by accepting friendship requests from unknown persons, especially women and girls," it cautioned the troopers and officers.

It also highlighted that while going on leave and joining back the force, always follow the rules and regulations laid out for safety and security. "This is for your own safety," it stressed in the end.

The BSF has also issued a list of 42 mobile applications that needs to be completely avoided by serving BSF officers and jawans.

They are MI store, Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautyplus, NewsDog, Viva Video - QU video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - HI Security Lab, CM browser, MI Community, DU recorder, Vault Hide - No mobile Security, Youcam Makeup, Cachecleaner DU Apps Studio, DU battery saver, DU privacy, 360 security, DU Browser,Clean master - Cheeta Mobile, Baidu Translate, Wonder Camera - Bindu Inc, ES Ifle Explorer, Photo Wonder, QQ international , QQ music, QQ Mail, AA player, QQ News Feed, Wesync, QQ security Center, Selfie City, Mail Master, Mi Video Call -Xaomi and QQ launcher.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 14,2020

New Delhi, Mar 14: Excise duty on petrol and diesel was on Saturday hiked by ₹3 per litre as the government looked to mop up gains arising from fall in international oil prices.

Special excise duty on petrol was hiked by ₹2 to ₹8 per litre incase of petrol and to Rs 4 incase of diesel, an official notification said.

Additionally, road cess on petrol was raised by ₹1 per litre each on petrol and diesel to ₹10.

The increase in excise duty would in normal course result in a hike in petrol and diesel prices but most of it would be adjusted against the fall in rates that would have necessitated because of slump in international oil prices.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.