Seraikela (Jharkhand), Jul 5: A court in Jharkhand's Seraikela-Kharswan district on Wednesday sentenced 10 people to 10 years of rigorous imprisonment in the Tabrez Ansari lynching case of 2019.
Accusing him of trying to steal a motorcycle, a mob beat up Ansari on June 17 of that year. A video showed that the 24-year-old man was purportedly made to chant 'Jai Shri Ram' and 'Jai Hanuman' in the Saraikela Kharsawan district of Jharkhand. He died five days later.
The incident had led to a political furore at the national level.
Additional District Judge-I Amit Shekhar had convicted the 10 and acquitted two other accused persons due to lack of evidence on June 27 last.
Pronouncing the quantum of punishment on Wednesday amid tight security through video conferencing, the court awarded 10 years of rigorous imprisonment to all the convicts under IPC Section 304 (culpable homicide not amounting to murder).
The judge also slapped a fine of Rs 15,000 on each of them.
The incident in Jharkhand, which was ruled by the BJP then, had triggered a political storm at the national level.
The opposition parties had raised the issue in Parliament and disrupted proceedings for a few days.
The then Congress president Rahul Gandhi on June 25 had described the lynching as a "blot on humanity" and said the "silence" of powerful voices in the BJP-ruled central and state governments over the incident is shocking.
The next day, Prime Minister Narendra Modi said in the Rajya Sabha that he was "pained" by the lynching and the guilty must be severely punished.
While the prime accused, Prakash Mandal alias Pappu Mandal, was already in jail, the other accused were taken into custody after they were convicted by the court last week.
One of the accused Kushal Mahali died in the course of trial.
Ansari had been working as a labourer in Pune and had come home to celebrate Eid. He was held by locals at Dhatkidih village on the night of June 17 over suspicion of trying to steal a motorcycle. The man was tied to a pole and beaten up with sticks through the night.
Besides Prakash Mandal, the other nine convicted people are Bhimsen Mandal, Kamal Mahato, Madan Nayak, Atul Mahali, Sunamo Pradhan, Vikram Mandal, Chamu Nayak, Prem Chand Mahali and Mahesh Mahali.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
Ottawa/New Delhi, Nov 2: Amid an ongoing diplomatic row, Canada has for the first time named India in a list of cyberthreat adversaries and suggested state-sponsored actors could be spying against it, an allegation that New Delhi slammed on Saturday terming it to be “another example” of Ottawa's strategy to “attack India.”
India is named fifth after China, Russia, Iran and North Korea in the National Cyber Threat Assessment 2025-2026 (NCTA 2025-2026) report.
“We assess that Indian state-sponsored cyber threat actors likely conduct cyber threat activity against Government of Canada networks for the purpose of espionage,” the report said.
India is also mentioned in the trend on 'Geopolitically inspired non-state actors are creating unpredictability' citing as example how a pro-India hacktivist group claimed to have defaced and conducted brief attack against Canadian websites after India was accused of involvement in the killing of a Canadian citizen.
The NCTA 2025-2026 that highlights the cyber threats facing individuals and organisations in Canada was released on October 30 by the Canadian Centre for Cyber Security (Cyber Centre), which is Canada’s technical authority on cyber security, and part of the Communications Security Establishment Canada (CSE). The assessment reports are released every two years.
While there was no mention of India in the National Cyber Threat Assessment reports of 2018, 2020 and 2023-24, the 2025-26 assessment mentions India – along with China, Russia, Iran and North Korea -- in the 'Cyber threat from state adversaries' section that introduces the state cyber threat ecosystem and discusses the cyber threats to Canada.
“India’s leadership almost certainly aspires to build a modernised cyber programme with domestic cyber capabilities. India very likely uses its cyber programme to advance its national security imperatives, including espionage, counter-terrorism, and the country’s efforts to promote its global status and counter narratives against India and the Indian government,” the assessment report said.
“We assess that India’s cyber programme likely leverages commercial cyber vendors to enhance its operations. We assess that Indian state-sponsored cyber threat actors likely conduct cyber threat activity against Government of Canada networks for the purpose of espionage,” it said further.
“We judge that official bilateral relations between Canada and India will very likely drive Indian state-sponsored cyber threat activity against Canada,” it claimed.
CSE and its partners in Canada and across the Five Eyes are attuned to the cyber threats to Canada from state and nonstate cyber threat actors and are tracking them as they evolve, the report said.
NCTA 2025-2026 provides the Canadian public with CSE’s current insights on the state and non-state cyber threat actors conducting malicious cyber threat activity against Canada and how we assess the cyber threat landscape will evolve in the next two years, it added.
Canada is confronting an expanding and more complex state cyber ecosystem, the report said, and talked about strategic adversaries, emerging cyber programmes and wider cyber ecosystem.
In the 'Emerging cyber programmes,' it said: “At the same time, countries that aspire to become new centres of power within the global system, such as India, are building cyber programmes that present varying levels of threat to Canada.”
“While emerging states focus their cyber efforts on domestic threats and regional rivals, they also use their cyber capabilities to track and surveil activists and dissidents living abroad,” it added.
The NCTA 2025-2026 also mentioned “Geopolitical conflicts and tensions are inspiring disruptive cyber threat activity from non-state groups, commonly referred to as hacktivists” and gave example of how geopolitically motivated hacktivists typically conduct attacks to gain attention, such as distributed denial-of-service (DDoS) attacks, website defacements, and data leaks from Russia and India.
“Diplomatic tensions are also inspiring hacktivist activity. After Canada accused India of involvement in the killing of a Canadian citizen, a pro-India hacktivist group claimed to have defaced and conducted brief DDoS attacks against websites in Canada, including the public-facing website of the Canadian Armed Forces,” the report said.
“This non-state ecosystem is dynamic and unpredictable,” it added.
The development comes as the bilateral relationship has gone south since Prime Minister Justin Trudeau said a year ago that Canada had credible evidence that agents of the Indian government were involved in the murder of Canadian Sikh activist Hardeep Singh Nijjar in British Columbia in June 2023, a charge dismissed as absurd by India.
Meanwhile, the Ministry of External Affairs (MEA) on trashed the report.
MEA spokesperson Randhir Jaiswal told reporters in New Delhi: “Another category, Canada has put India into. This categorisation is as per the cyber report that they have issued. It appears to be another example of a Canadian strategy to attack India.”
“As I mentioned earlier, their senior officials have openly confessed that they are seeking to manipulate global opinion against India, as on other occasions, imputations are made without any evidence,” Jaiswal added.
While rejecting India being bracketed in that category, the MEA spokesperson said the accusation being levelled against India is “absolutely not right.”
India has been maintaining that the main issue between the two countries is that of Canada giving space to pro-Khalistan elements operating from Canadian soil with impunity.
India last month expelled six Canadian diplomats and withdrawn its high commissioner Sanjay Verma and other “targeted” officials from Canada after strongly dismissing Ottawa's charges.