logo
Fresh encounter begins in J&K's Kishtwar; Kulgam gunfight enters 10th day

Fresh encounter begins in J&K's Kishtwar; Kulgam gunfight enters 10th day

Time of India6 days ago
A fresh encounter started in Kishtwar district of Jammu on Sunday, even as the ongoing encounter in Kulgam district of southern Kashmir entered its 10th day.
Army officials said they had launched a search operation in Dool area of Kishtwar following specific information on the presence of infiltrators. They said the infiltrators in the forest area opened fire at the forces which triggered an exchange which continued intermittently till evening. "Alert troops, while carrying out an intelligence-based operation, have established contact with terrorists in the early hours of 10 August 2025. Gunfire was exchanged. Operation under progress," Jammu-based White Knight Corps of the Indian Army informed.
Productivity Tool
Zero to Hero in Microsoft Excel: Complete Excel guide
By Metla Sudha Sekhar
View Program
Finance
Introduction to Technical Analysis & Candlestick Theory
By Dinesh Nagpal
View Program
Finance
Financial Literacy i e Lets Crack the Billionaire Code
By CA Rahul Gupta
View Program
Digital Marketing
Digital Marketing Masterclass by Neil Patel
By Neil Patel
View Program
Finance
Technical Analysis Demystified- A Complete Guide to Trading
By Kunal Patel
View Program
Productivity Tool
Excel Essentials to Expert: Your Complete Guide
By Study at home
View Program
Artificial Intelligence
AI For Business Professionals Batch 2
By Ansh Mehra
View Program
On April 12, three foreign infiltrators were killed in Chatroo area of Kishtwar and the army informed that an AK rifle, an M4 Rifle and other equipment were recovered from the spot. The officials claimed that a top JeM commander was killed in that encounter. The Army since then has engaged elite para commandos, drones, helicopters and sniffer dogs to trace the movement of infiltrators in the forest area of Kishtwar.
by Taboola
by Taboola
Sponsored Links
Sponsored Links
Promoted Links
Promoted Links
You May Like
Join new Free to Play WWII MMO War Thunder
War Thunder
Play Now
Undo
In Akhal area of Kulgam in southern Kashmir, the ongoing operation entered its 10th day on Sunday and, till now, two Army men and two militants have been killed while nine Army men have been injured since the operation which started on August 1.
This is one of the longest operations in the Kashmir Valley in recent years. The officials had informed that "one of the two terrorists killed in the encounter was a local, while the body of the other terrorist was spotted but not recovered yet."
Live Events
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Medical professional lured through ‘sex chat' blackmailed; loses Rs 94 lakh
Medical professional lured through ‘sex chat' blackmailed; loses Rs 94 lakh

Indian Express

time4 minutes ago

  • Indian Express

Medical professional lured through ‘sex chat' blackmailed; loses Rs 94 lakh

A 35-year-old medical professional from the city was duped of Rs 94 lakh after he fell prey to cyber fraudsters who posed as a woman and contacted him on social media platforms. Later, the fraudsters threatened the doctor that they would share his intimate images on social media platforms and kept demanding money from him. Eventually, the victim approached the police following which an FIR was registered against unidentified persons. The doctor in his complaint said that in February this year, he met a woman who identified herself as Somya Awasthi on a social media platform. The woman said that she was pursuing her MBBS from Chandigarh and her parents were residing in Delhi. He said they exchanged numbers and the woman would say she was feeling lonely. Over a period, she would ask for gifts and he would transfer money to a bank account provided by her. She never showed him the bills for the articles she purchased. He said that eventually they got close and would have 'sex chats'. He said she started sending her nude photographs to him and asked him to share his intimate photographs which he did. Later in May, she said she was coming to Mumbai and he paid for her business class tickets. However later when he checked there was no such flight coming on that day. On May 2, the woman sent him a one view photograph which claimed that some Thailand-based hacker had got access to their photographs and chats demanding 3.10 bitcoin (Rs 2.5 crore approximately) failing which he would make their chats viral. The woman claimed that she had sold off her gold jewellery to pay him. She then said that if he did not make the payment, she would send their intimate clips to his work place and medical association. Fearing this, he took loans from several banks and over a period sent her nearly Rs 94 lakh. When he transferred the money however, the account name mentioned Jasmeen Kaur. He became suspicious and went through her social media profile and checked with the college she claimed to be doing MBBS from. There he found that a person named Somya Aswasthi had done Arts. Realising that he had been defrauded, he approached the cyber police station where an FIR was registered on Friday. An officer said that they have some technical leads and teams have been sent to nab the accused.

Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info
Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info

Time of India

time12 minutes ago

  • Time of India

Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info

ICE leak exposes major security flaw in manhunt communications - The ICE leak is more than a bureaucratic slip-up—it's a flashing red warning light about how America's enforcement agencies handle sensitive operations. By relying on unsecured MMS group texts to coordinate a live manhunt, officials not only exposed private data but also undermined their own mission. A single mistaken phone number gave a civilian a front-row seat to a federal pursuit, complete with Social Security numbers and surveillance details that should never have left encrypted channels. In a moment when public trust in government data handling is already strained, this error shows that the real vulnerability isn't always hackers or foreign adversaries—it's the everyday shortcuts taken inside the system. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Undo A routine mistake turns into a national security embarrassment On August 14, 2025, U.S. Immigration and Customs Enforcement (ICE) made a blunder that reads like a cybersecurity case study: officials accidentally added a private citizen to a sensitive group chat used during an active manhunt. The messages, sent through unencrypted MMS , contained information that should never have left secure law enforcement channels—Social Security numbers, DMV records, license plate reader hits, and even an internal ICE 'Field Operations Worksheet.' Live Events The civilian, who had no ties to law enforcement, initially assumed the texts were spam. That illusion shattered when an official document landed in their inbox. By then, the damage was done: private investigative details had been broadcast in real time to an unintended observer. Why ICE was using the wrong tools Perhaps the most troubling detail is not the mistaken addition itself, but the platform. Instead of secure, agency-approved systems, ICE and its partners used a 'Mass Text' group chat via MMS —a technology widely regarded as insecure and outdated. Unlike encrypted platforms such as Signal or WhatsApp, MMS leaves data vulnerable to interception and, as this case shows, accidental exposure. This wasn't an isolated misstep. A 2023 Department of Homeland Security inspector general report flagged repeated use of 'informal digital workarounds' by federal officers, warning that reliance on consumer-grade messaging apps could lead to data breaches. The report predicted exactly this kind of incident. Lessons from 'Signalgate' and repeated communication lapses This mishap echoes the so-called 'Signalgate' scandal from March 2025, when a journalist was mistakenly added to a classified Signal chat involving national security officials. That breach revealed sensitive planning discussions, and congressional hearings soon followed. Both cases highlight a troubling pattern: even elite agencies often default to tools of convenience, not security. Former NSA cybersecurity analyst Susan Hennessey told The Daily Beast that these repeated lapses 'erode operational security and public trust in equal measure.' The real-world stakes: more than embarrassment It's easy to dismiss the ICE group chat error as human clumsiness, but the implications are serious. A wrong recipient in a group chat can mean: Compromised investigations – revealing manhunt details risks tipping off suspects. Data privacy violations – exposing Social Security numbers and DMV records violates federal data handling laws. Operational safety risks – even field agents could be endangered if details about tactics leak. When government agencies mishandle data, the public doesn't just see incompetence—it questions whether other investigations are equally vulnerable. What this means for citizens and oversight For ordinary Americans, the incident raises a pressing question: If ICE can't safeguard its own communications, how secure is the personal data it collects from millions of immigrants and residents each year? ICE oversees vast databases of biometric and identity information. A slip in protocols, as this case proves, can expose sensitive records to unintended parties instantly. Legally, ICE may now face scrutiny under the Federal Information Security Management Act (FISMA) , which mandates strict controls over government data. Lawmakers, already critical of ICE's surveillance practices, are expected to push for hearings. The unanswered questions So far, ICE and the U.S. Marshals Service have declined public comment. Internally, sources say reviews are underway, but there's no indication of disciplinary action or whether the civilian recipient of the messages will be asked to testify. The central issue remains: why, in 2025, is one of America's most powerful enforcement agencies still leaning on unsecured group texts to coordinate manhunts? Until that is answered, every American has reason to wonder how many other 'wrong numbers' have already gone unnoticed. For now, a civilian with no security clearance has seen more of ICE's operational playbook than Congress itself—a sobering reminder that the weakest link in national security is often the simplest human mistake. FAQs: Q1: What happened in the ICE group chat leak ? ICE accidentally added a civilian to a sensitive manhunt group chat, exposing private data. Q2: Why is the ICE leak considered a major security flaw? Because sensitive information was shared over unsecured MMS instead of encrypted platforms.

Man shot dead during Facebook livestream as horrified family watched - here's what happened
Man shot dead during Facebook livestream as horrified family watched - here's what happened

Time of India

time33 minutes ago

  • Time of India

Man shot dead during Facebook livestream as horrified family watched - here's what happened

A father of one was shot and killed in Chicago while streaming live to his friends and family on Facebook. Kevin Watson, 42, was talking about a fight he had had recently when a man with a gun suddenly came up to him. Millions of people have seen the disturbing video that shows his last moments. His family is heartbroken and is now asking for justice while the police look for the suspect. Watson was in his car when he started a Facebook livestream. He had no idea that it would show his last moments in front of horrified viewers, including family members. The shooting happened at about 6:14 p.m. on the 5000 block of West Madison Street, which is close to a police station. Kevin had been to his cousin's job before starting his livestream, where he talked about a recent fight over parking, as per a report by The US Sun. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Undo ALSO READ : Orca attack mystery: What really happened to marine trainer Jessica Radcliffe What went on during the Facebook live stream? Live Events Kevin is seen talking casually on the livestream before a car pulls up next to his. A few moments later, a man with a gun came up to his car. Kevin threw his arms up in surprise and yelled, "What's up, bro?" before running out of the car in a panic. A gunshot rang out a few seconds later. Kevin's voice shakes as he screams in shock and then falls down. You can hear him off camera. Witnesses rushed to help right away, putting pressure on his chest wound while they waited for paramedics, as per a report by The US Sun. ALSO READ : Apple iPhone 17 Air and Pro get surprise release date change — here's the new timeline Police say that Watson had been shot in the chest once. He was quickly taken to Mount Sinai Hospital, where doctors said he was dead. Did Kevin know the person who killed him? Police think Kevin might have known the person who shot him. Witness Alvin Jackson told reporters that Kevin seemed to be having a hard time with the man before the deadly shot was fired, as per a report by The US Sun. Jackson said, "He was talking to a guy and going to his car when the guy followed him." "He was trying to get the gun away from him, and it went off." Kevin's tragic attempt to disarm the suspect ended in his death, leaving family and friends shocked and sad. What has his family said? Kevin's cousin, Jacquez Smith, talked about how sad it was to see her relative gasping for breath after being shot. "He was having trouble breathing. "He was trying to fight for breath," she said, remembering how horrible it was. Family members remembered Kevin as a kind man who always helped others. He had a son who was six years old and was about to celebrate his birthday. His cousin said, "He was a good man." He helped people no matter what he did. He helped me get this job here,' as per a report by The US Sun. The deadly livestream, which has now been watched more than two million times, has shocked the community and made people want answers even more. Investigation is still going on There have been no arrests yet. The police are looking for the shooter and are actively looking into the incident. The fact that the murder happened on a busy street and was broadcast to thousands of people online has made people in Chicago very angry. Kevin's family is in so much pain that it can't be measured. FAQs Who was Kevin Watson? Kevin Watson, a 42-year-old father of one from Chicago, was shot and killed while he was live-streaming on Facebook. Have any arrests been made? So far, no one has been arrested, but the police are still looking into the shooting.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store