Skip to main content

Pakistan cannot weaken India, forces will get free hand to deal with terrorists: Modi

Pakistan cannot weaken India, forces will get free hand to deal with terrorists:Modi


HIGHLIGHTS

  • I want to tell the terror outfits and those aiding and abetting them that they have made a big mistake: PM
  • Let me assure the nation that the perpetrators of this attack will be punished: PM
  • All efforts would be made to isolate Pakistan, finance minister Arun Jaitley said
NEW DELHI: Pakistan cannot weaken India by orchestrating attacks and those responsible will pay a "very heavy price", Prime Minister 
Narendra Modi
 warned on Friday as echoes from the 
Pulwama
 terror strike rang across the country with families awaiting the bodies of their loved ones in coffins wrapped in the tricolour.

Security forces will be given a 
free hand
 to deal with terrorists, the Prime Minister said, a day after 40 CRPF soldiers were killed when a suicide bomber rammed a vehicle laden with explosives into their bus in 
Jammu and Kashmir
's Pulwama district.

The Pakistan-based terror group 
Jaish-e-Mohammed
 has claimed responsibility for the attack on the convoy of 78 vehicles that was on its way from Jammu to Srinagar.

"I want to tell the terror outfits and those aiding and abetting them that they have made a big mistake. They will have to pay a very heavy price for their actions. Let me assure the nation that those behind this attack, the perpetrators of this attack will be punished,” Modi said at a function to flag off the Vande Bharat Express, India's fastest train from Delhi to Varanasi.

All efforts would be made to isolate Pakistan, finance minister Arun Jaitley said.

Foreign secretary Vijay Gokhale summoned Pakistan high commissioner to India Sohail Mahmood and lodged India's strong protest, official sources said.

Making it clear that India means business, the Cabinet Committee on Security, which met on Friday morning, decided to withdraw 
Most Favoured Nation
 status to Pakistan.

It would enable India to increase customs duty on goods coming from the neighbouring country.

India granted MFN status to Pakistan way back in 1996, but it has not yet reciprocated.

In his hard-hitting speech here, Modi said the "blood of the people is boiling" and forces behind the act of 
terrorism
 will definitely be punished.

"Security forces have been given complete freedom, the blood of the people is boiling ... Our neighbouring country, which has been isolated internationally, thinks such terror attacks can destabilise us, but their plans will not materialise," Modi said.

Addressing a public meeting in Jhansi later in the day, the Prime Minister again did not name Pakistan but said the attack was an outcome of its desperation as it is in a bad shape and has been forced to go to different countries with a "begging bowl" to meet even its daily expenses.

Asserting that the sacrifices of CRPF soldiers will "not go in vain", he said, "Security forces have been given permission to take decisions about the timing, place and nature of their response ... This is an India of new convention and policy."

Briefing reporters after the CCS meeting, which is unusual, Jaitley said all efforts will be made to ensure that perpetrators of the attack are brought to book.

Jaitley said the ministry of external affairs will launch an all out effort to isolate Pakistan and all diplomatic efforts will be launched in this regard.

Describing the terror assault as an attack on India's soul, Congress president Rahul Gandhi said his party as well as the entire opposition was fully supportive of the government and the security forces.

"I want to make it very clear that the aim of terrorism is to divide this country and we are not going to be divided for even one second, no matter how hard people try," he told reporters.

As the government and politicians reacted to the attack and the families of those killed came to grips with the enormity of the tragedy, Union home minister Rajnath Singh travelled to Srinagar and laid a wreath on the mortal remains of the troops.

The remains of the 40 CRPF personnel, many of whom were returning from leave to rejoin work in the Valley, were kept in coffins, draped in the tricolour, ready to make their final journey home.


Governor 
, home secretary Rajiv Gauba, CRPF director general R R Bhatnagar, Jammu and Kashmir DGP Dilbagh Singh besides others attended the wreath laying ceremony.

"The nation will not forget the supreme sacrifice of our brave CRPF jawans," Singh said.

As if in echo, the younger brother of V V Vasanth Kumar, who had left his home in Kerala's Wayanad district on February 8 and was one of those killed, said his sacrifice would never be forgotten.

"My elder brother died for the country and we are proud of his sacrifice," Sajeevan told PTI.

Vasanth Kumar's mother Shanta and wife Sheena are inconsolable and his two young children have not yet been informed.

Their grief found resonance in 39 other homes across the country.

Protests against Pakistan broke out in several parts, including in Jammu city where curfew was imposed.
Click here to watch the video

Comments

Title

Link

https://amzn.to/3isoLUX https://www.amazon.in/gp/product/B082PFY9S7?smid=AT95IG9ONZD7S&psc=1&linkCode=sl1&tag=mywebsit0749e-21&linkId=5108a27204271760a5ba4d6108af7893&language=en_IN&ref_=as_li_ss_tl https://amzn.to/3ist5DR https://amzn.to/3s5ZcMQ

Information security policy

Information security policy To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An employee who uses the company workstations or systems to conduct business operations must:  Ensure that all equipment use is for business/professional reasons. Access only information that is needed to perform their jobs or assist others in doing so as part of the valid scope of their duties. Be responsible for the content of all data, including text, audio, and images they share internally or externally. All communications should have the employee’s name attached. Be responsible for all actions/transactions performed with their accounts. Use passwords and screen locks on company-owned systems or devices, or those

How to cloud-enable Enpass Password Manager

How to cloud-enable Enpass Password Manager Learn how to combine Enpass and Dropbox into a perfect, cloud-ready password manager. 0:00 Fullscreen We've reached a point in time where very strong (non-memorizable) passwords should no longer be considered an option. Because of this, I tell everyone I advise to use a password manager that includes a random password generator so that the chances of someone hacking into one or more of their accounts are lessened exponentially. One of the password managers that ticks off nearly all of my boxes is  Enpass . It's cross-platform (available for Linux, Android, iOS, macOS, and Windows), has a great password generator, and (best of all) can be made cloud-ready. Must-Read Cloud Google Cloud Platform: An insider’s guide (free PDF) It's that last option that really seals the deal for me. Because of this, I can link every instance of Enpass I

New Amazon class certifies cloud pros in securing data on AWS

New Amazon class certifies cloud pros in securing data on AWS The AWS Certified Security - Specialty Exam could help tech professionals broaden their skills on the AWS platform. 0:00 Fullscreen Building a slide deck, pitch, or presentation? Here are the big takeaways: A new class from Amazon, the AWS Certified Security - Specialty Exam, will validate a cloud pro's ability to secure the AWS platform. Cloud skills are in high demand, but added security expertise could help set job seekers apart. A new professional exam from Amazon Web Services (AWS) will help cloud experts validate their ability to secure data on the platform, according to a  Monday blog post . The  AWS Certified Security - Specialty Exam  is now available to those who hold either an Associate or Cloud Practitioner certification from AWS. As noted in the post, AWS recommends that those taking the exam have at least five years

Some Hot New Technologies That Will Change Everything

Some Hot New Technologies That Will Change Everything Illustration: Randy Lyhus The Next Big thing? The  memristor , a microscopic component that can "remember" electrical states even when turned off. It's expected to be far cheaper and faster than flash storage. A theoretical concept since 1971, it has now been built in labs and is already starting to revolutionize everything we know about computing, possibly making flash memory, RAM, and even hard drives obsolete within a decade. The memristor is just one of the incredible technological advances sending shock waves through the world of computing. Other innovations in the works are more down-to-earth, but they also carry watershed significance. From the technologies that finally make  paperless offices  a reality to those that deliver  wireless power , these advances should make your humble PC a far different beast come the turn of the decade. In the following sec

Network security policy

Network security policy This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy  Summary Every company’s network is made up of devices that transmit and store information. This can include internal and external systems, either company-owned or leased/rented/subscribed to. To protect company data and reputation, it is essential to ensure that the network is secured from unauthorized access, data loss, malware infestations, and security breaches. This must be done via systematic end-to-end controls. Policy details The IT department will be responsible for implementing, adhering to, and maintaining these controls. For the purposes of this document, “all devices” refers to workstations, laptops, servers, switches, routers, firewalls, mobile devices, and wireless access points. Where possible, these guidelines will app

Top Java Interview Questions You Must Prepare In 2019(java interview questions and answers for freshers)

Top Java Interview Questions  You Must Prepare In 2019(java interview questions and answers for freshers) Java is today the most trusted language across the global developer community. With nearly all of the Fortune 1000 companies running applications on the Java Virtual Machine (JVM), Java has become a legendary language. Even while new languages and technology closely related to Java are popping up every now and then, they leverage capabilities of the JVM in some way. It is almost certain that Java will never go out of fashion. A career in Java will open up multiple opportunities in a wide range of job roles. We have curated a list of definitive Java questions that will help you breeze through your interview. In case you have attended Java interviews yourself or have any questions that you want us to answer for you, do feel free to add them as comments below. 1. What are the principle concepts of OOPS? Principle Concepts of OOPs Concept Description Abstraction Abstra

Google I/O 2019 schedule includes sessions on Stadia, dark mode, lots of Assistant, but no Wear OS

Google I/O 2019 schedule includes sessions on Stadia, dark mode, lots of Assistant, but no Wear OS Google I/O is one of the most exciting times of the year for us tech nerds, and as we near the 2019 event,  the schedule is now up for all to see . This isn't the full complement of sessions — many smaller talks and workshops will be added in due course — but it does give us a good idea of which areas Google is likely to focus on most this year. It all kicks off on May 7 at 10am with the Google Keynote at the Shoreline Amphitheatre where Sundar will talk us through some of Google's key goals for the year ahead, followed by a more developer focussed keynote. The rest of the first day is packed with sessions on gaming, Material Design, self-driving cars, Android, and a number on Assistant. The  3pm deep dive into the streaming tech behind Stadia  could be particularly interesting. There's also  a talk about building apps for foldable displays . Day two starts wit