Kedarnath: Prime Minister Narendra Modi Sunday thanked the Election Commission for granting him permission to visit the Kedarnath shrine at a time when the model code of conduct is in force.
Modi, who spent around 17 hours at a holy cave near the shrine, offered prayers and performed puja at the temple.
He told reporters he did not ask for anything while praying as it is not his nature. "God has given us capacity to give and not demand," he said.
He said may the almighty bless not only India but the whole humankind with happiness, prosperity and welfare.
"I am fortunate to visit the temple on multiple occasions," he said while thanking the media for taking out time to visit Kedarnath at a time when the poll process is underway.
The media's presence, he said, will send a message that the town has been developed well.
Referring to the ongoing development works at the temple town, Modi said development should be a mission in which nature, environment and tourism should not be affected.
He said he has been reviewing the work through video-conferencing.
Modi reached the temple town Saturday. Dressed in a grey traditional pahari attire, he offered prayers for about 30 minutes and undertook a circumambulation of the Kedarnath shrine situated at a height of 11,755 feet near the Mandakini river.
The prime minister then went inside a cave near the shrine to meditate. Draped in a saffron shawl, Modi was seen meditating at the holy cave.
The prime minister also took stock of development work in the temple town. Later in the day, he is expected to be in Badrinath, another temple in Uttarakhand's 'char dham' religious circuit.
This is Modi's fourth visit to the temple dedicated to Lord Shiva in the last two years. The portals of Kedarnath and Badrinath shrines reopened for devotees earlier this month after the winter break.
The Election Commission gave its nod to the visit while "reminding" the Prime Minister's Office that the model code of conduct is still in force.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
Bengaluru (PTI): An FIR has been registered against unknown people for allegedly sending fraudulent messages in the name of an e-commerce platform with promises of cash rewards, further disrupting its operations, police said on Wednesday.
The offence is said to have taken place between April 23 and April 27, they said.
A representative of city-based technology company Hiveloop Technology Pvt Ltd (HTPL), part of the Udaan group (eB2B platform), has lodged a complaint alleging a large-scale SMS spoofing fraud following which a detailed investigation has been initiated into the matter, a senior police officer said.
According to the FIR, HTPL is a registered entity on the TRAI-mandated DLT platform, which permits only pre-approved SMS templates and whitelisted URLs to be sent through authorised sender IDs.
The issue came to light on April 23, when HTPL received alerts from buyers about fraudulent SMS messages appearing to originate from the company's sender ID "UDAANN". The messages reportedly contained Bitly links and falsely claimed a credit of Rs 10,001, urging recipients to withdraw money, it said.
On April 27, at around 12:49 pm, the DLT platform blacklisted HTPL's SMS templates, citing their alleged use in sending fraudulent messages. Within minutes, the company's sender ID was also blacklisted. Airtel's DLT system subsequently confirmed the action and shared details of the fraudulent messages that were circulated in HTPL's name without its knowledge or consent, the FIR stated.
Following this, the company's messaging operations were affected, and even legitimate communications such as one-time passwords to buyers began failing. Later, the DLT operator suspended HTPL's entire account following complaints raised on TRAI's Chakshu platform, bringing all SMS services of the company to a halt, it further stated.
HTPL has stated that neither it nor its authorised vendors sent the fraudulent messages. The links embedded in the messages reportedly redirected users to an online betting website, the FIR stated.
The company has claimed that the incident has resulted in a complete breakdown of SMS-based services, including buyer authentication, order updates and promotional communication, leading to significant financial losses.
At least 13 victims have been identified so far, with the possibility of more affected users. Victims were allegedly directed to an online betting platform, raising concerns of potential financial fraud, the FIR added.
