logo
#

Latest news with #GujaratATS

AI 171 tragedy: How seat 11A proved to be lucky for Air India crash survivor Viswashkumar Ramesh
AI 171 tragedy: How seat 11A proved to be lucky for Air India crash survivor Viswashkumar Ramesh

Time of India

time13-06-2025

  • General
  • Time of India

AI 171 tragedy: How seat 11A proved to be lucky for Air India crash survivor Viswashkumar Ramesh

Viswashkumar Ramesh miraculously survived the AI 171 Dreamliner crash near Ahmedabad, India's deadliest single-aircraft disaster. He recalls a violent jolt and the pilot's distress call before leaping from the disintegrating plane. NEW DELHI: Viswashkumar Ramesh doesn't remember much, just a loud noise, the pilot's voice shouting 'Mayday', and a rush of heat as the aircraft tore apart after crash. He jumped without thinking. When he opened his eyes, he was outside, covered in blood, shouting for help. His brother, seated across the aisle in 11J, didn't make it. Seat 11A turned out to be his lifeline on AI 171, the London-bound Dreamliner that crashed minutes after takeoff from Ahmedabad on Thursday, killing nearly everyone on board. Viswash, a 40-year-old UK-based businessman from Diu, is the only confirmed survivor. The British national now lies in bed 11 of ward B7 at Ahmedabad Civil Hospital — dazed, bruised, and asking the one question no one has answered: 'Where is my brother?' From behind a sealed ward, guarded by Gujarat ATS and the crime branch, Viswash's story is a haunting thread of survival from India's deadliest single-aircraft crash. He recalls only fragments: a violent jolt, the pilot's trembling voice, and a blind leap through smoke and wreckage. 'Nothing more,' he told his cousin. O by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Husägare betalar näst intill inget för solpaneler Greenmatch Få offert Undo utside, video clips captured him stumbling barefoot through twisted debris, shouting, 'Plane fatyo che! (The plane has exploded!).' Just hours earlier, the brothers from Diu had waved goodbye to family, bound for London, where they'd built a life over 15 years. India's deadliest single-aircraft crash claimed at least 245 lives, including Gujarat's former CM Vijay Rupani and dozens on the ground. The ill-fated Boeing 787-8 slammed into the residential quarters and mess hall of B J Medical College and Civil Hospital around 3km from the end of the runway, killing doctors, students, and passengers in seconds. Rescue teams retrieved over 290 body bags in what became India's first Dreamliner crash and the worst civil aviation tragedy since the 1996 Charkhi Dadri mid-air collision. Follow more information on Air India plane crash in Ahmedabad here . Get real-time live updates on rescue operations and check full list of passengers onboard AI 171 .

Gujarat Man Arrested For Sharing Sensitive Information With Pakistani Agent
Gujarat Man Arrested For Sharing Sensitive Information With Pakistani Agent

India.com

time24-05-2025

  • India.com

Gujarat Man Arrested For Sharing Sensitive Information With Pakistani Agent

The Gujarat Anti-Terrorism Squad (ATS) on Saturday arrested Sahdev Singh Gohil, a multipurpose health worker from Kachchh district, for allegedly sharing classified information related to the Border Security Force (BSF) and Indian Navy with a Pakistani agent via WhatsApp. Gohil was allegedly sharing sensitive photos and videos of BSF and Indian Navy sites with a woman named Aditi Bharadwaj, identified as a Pakistani agent, through WhatsApp. ANI quoted Gujarat ATS Superintendent of Police (SP) K. Siddharth as saying, "Gujarat ATS arrested Sahdev Singh Gohil, a multipurpose health worker from Kachchh. We had information that he had been sharing information related to BSF and Indian Navy with a Pakistani agent.' According to SP Siddharth, Gohil was initially contacted by Bharadwaj in 2023 and continued to share critical information until 2025, receiving financial compensation for his actions. 'The accused was called here for a preliminary investigation on May 1. It was revealed that during June-July 2023, Sahdev Singh Gohil had come in contact with a girl named Aditi Bharadwaj through WhatsApp. While speaking to her, he came to know that she was a Pakistani agent. She asked for photos and videos of the BSF and Indian Navy sites, which were under construction or newly constructed. He started sharing photos and videos through WhatsApp," Siddharth added. According to SP Siddharth, Forensic Science Laboratory analysis confirmed that the WhatsApp numbers linked to Bharadwaj were operated from Pakistan, highlighting the cross-border nature of the espionage. "At the beginning of 2025, he bought a SIM card on his Aadhaar Card and activated WhatsApp on that number for Aditi Bharadwaj with the help of OTP. After that, all photos and videos related to BSF and Indian Navy were shared on that number. He was also paid Rs 40,000 in cash by another man. His phone was sent to the FSL. The WhatsApp numbers under Aditi Bharadwaj's name were being operated from Pakistan," the Gujarat ATS SP stated. A case has been registered against Gohil and Bharadwaj under Sections 61 and 148 of the Bharatiya Nyaya Sanhita (BNS).

Gujarat Man Arrested For Spying For Pak, Shared Key Info On Air Force
Gujarat Man Arrested For Spying For Pak, Shared Key Info On Air Force

NDTV

time24-05-2025

  • NDTV

Gujarat Man Arrested For Spying For Pak, Shared Key Info On Air Force

New Delhi: A man in Gujarat has been arrested for allegedly sharing key information related to the Indian Air Force (IAF) and the Border Security Force (BSF) with a Pakistani agent, officials said on Saturday. The accused, Sahdev Singh Gohil, is a resident of Kachchh and worked as a health worker, senior Gujarat Anti-Terrorism Squad (ATS) officer K Siddharth told reporters. The 28-year-old came in contact with an agent, who identified herself as Aditi Bharadwaj, through WhatsApp in 2023. He sent her photos and videos of the IAF and the BSF sites that were newly constructed or were under construction, Mr Siddharth said. 'We had information that he had been sharing information related to the BSF and the IAF with a Pakistani agent,' he said. Gohil was then called for a preliminary investigation on May 1, during which the STF found out that the Pakistani agent had asked him for photos and videos of the IAF and the BSF sites. 'At the beginning of 2025, he bought a SIM card on his Aadhaar Card and activated WhatsApp on that number for Aditi Bharadwaj with the help of an OTP (one time password). After that, all photos and videos related to BSF and IAF were shared on that number,' the officer said. #WATCH | Ahmedabad | Gujarat ATS SP K. Siddharth says, "Gujarat ATS arrested Sahdev Singh Gohil, a multipurpose health worker from Kachchh... We had information that he had been sharing information related to BSF and IAF with a Pakistani agent... The accused was called here for a… — ANI (@ANI) May 24, 2025 Forensic analysis revealed that the numbers Gohil used to share the information were operated from Pakistan. Gohil was also paid Rs 40,000 in cash by an unidentified man, Mr Siddharth said. These arrests come amid tensions between India and Pakistan following the terror attack in Jammu and Kashmir's Pahalgam that left 26 people dead. Gohil is among over ten people, including a YouTuber, a businessman, and a security guard, who have been arrested on suspicion of espionage in recent weeks. The arrests come amid tensions between India and Pakistan following the April 22 terror attack in Jammu and Kashmir's Pahalgam that left 26 people dead.

Gujarat teen arrested for 50+ cyberattacks during 'Operation Sindoor'
Gujarat teen arrested for 50+ cyberattacks during 'Operation Sindoor'

Time of India

time21-05-2025

  • Politics
  • Time of India

Gujarat teen arrested for 50+ cyberattacks during 'Operation Sindoor'

The Gujarat Anti-Terrorism Squad (ATS) on Monday apprehended an 18-year-old named Jasim Shahnawaz Ansari from Nadiad for his suspected involvement in cyber terrorism activities. According to ATS officials, Ansari escalated his cyber attacks following the launch of India's Operation Sindoor , which was a response to the Pahalgam terror attack. Investigations revealed that between April and May 2025, Ansari and a group of juveniles allegedly carried out cyberattacks on over 50 Indian government websites , targeting sectors such as defense, finance, aviation, urban development, and various state departments. The arrest was made based on intelligence gathered during surveillance by the Gujarat ATS. Authorities discovered that Ansari and his associates operated a Telegram group called "AnonSec" where they planned and executed DDoS (Distributed Denial of Service) attacks designed to crash websites by flooding them with traffic. Ansari reportedly taught himself Python programming through YouTube and downloaded hacking tools from GitHub. These tools were used via mobile apps like Termux and Pydroid to carry out the attacks. He would verify their success through platforms like and then share screenshots in the AnonSec group, often accompanied by anti-India messages such as 'Hi, India, we just took down your shield and servers.' The group, made up of like-minded youth, frequently changed its name and shared posts promoting anti-national sentiments. On May 7, 2025, a coordinated attack targeted 20 Indian government websites, during which the group posted statements like 'India may have started it, but we will be the ones to finish it.' Live Events Authorities also disclosed that Ansari recently failed his Class 12 science exams, while one of his juvenile associates is still in Class 12. ATS is now probing whether the suspects were operating independently or were influenced by foreign elements. Investigators are examining their digital tools, software, and online footprints. The Gujarat ATS has filed an FIR under Sections 43 and 66F of the Information Technology Act, which pertain to cyber terrorism. [With TOI inputs]

Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor

Hindustan Times

time20-05-2025

  • Politics
  • Hindustan Times

Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor

Ahmedabad: The Gujarat Anti-Terrorism Squad (ATS) has arrested 18-year-old Jasim Shahnawaz Ansari from Nadiad who, along with other juvenile accomplices, orchestrated multiple cyberattacks against several Indian government websites, especially amid Operation Sindoor, India's military response following the Pahalgam terror attack. 'The accused, a 12th-grade dropout, gained expertise in various programming languages, but his case exemplifies knowledge gone astray, driven not by financial motives but by radicalised ideology. The accused attempted to bring down at least 20 government websites on May 7, the day when Operation Sindoor was launched. Ansari also shared provocative anti-India messages on Telegram, including statements like, 'India may have initiated it, but we will conclude it,'' Virjit Parmar, deputy superintendent of police, Gujarat ATS told HT. Parmar said that a case had been registered against the accused on May 19 at ATS Police Station under sections 66(F) and 43 of the Information Technology Act, 2000. Section 66(F) deals with cyberterrorism, criminalising acts that threaten India's security or disrupt essential services through computer resources, while Section 43 covers unauthorised access to or damage of computer systems. This arrest comes amid heightened vigilance by Indian security agencies following directives from both central and state governments to monitor anti-national activities across internet platforms including the dark web following Operation Sindoor, said a second official. The group led by accused Ansari has allegedly targeted more than 50 central and state government websites so far. Investigation by Gujarat ATS showed that Ansari and other juvenile offenders had created a Telegram group called 'Anonsec' and were attempting to bring down various Indian websites through Distributed Denial-of-Service (DDoS) attacks. They are used to overwhelm servers with malicious traffic making them inaccessible to legitimate users. Such attacks can disrupt online services, cause financial damage, and harm an organisation's reputation. The investigation revealed that the group specifically targeted websites in critical sectors including defence, finance, aviation, urban development institutions and state government portals. They took screenshots of these attacks and posted them on the Telegram group along with anti-India inflammatory content. While Ansari has been arrested, the ATS has not disclosed the exact number of juvenile accomplices involved in the cyber terror campaign. These juveniles will be processed according to the Juvenile Justice Act, officials said. 'The suspects learned Python programming language and used tools like Pydroid and Termux to execute their attacks. They cloned DDoS attack tools from GitHub and modified them to target specific websites,' said an official. The ATS investigation showed that the accused learned hacking skills from YouTube and used tools downloaded from GitHub. They deployed TERMUX and PYDROID3 applications to execute DDoS attacks, which overwhelm servers with malicious traffic making them inaccessible to legitimate users. These attacks can disrupt online services, cause financial damage, and harm an organisation's reputation. After disrupting government websites, the perpetrators posted screenshots on their Telegram channel with anti-India messages such as 'Several Government sites of India has been touch by AnonSec..!' and 'Hi, India we just took down your financial shield and servers.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store