Skip to main content

Security breach at Parliament

New Delhi: Following a significant security breach at Parliament yesterday, four individuals have been taken into police custody for seven days for thorough questioning. Sagar Sharma and D Manoranjan, apprehended within the Lok Sabha, along with Neelam Devi and Amol Shinde, arrested outside Parliament, are now subjects of detailed inquiries by the Delhi Police.


The security breach unfolded yesterday afternoon, leading to the arrest of five individuals, two of whom infiltrated the Lok Sabha and discharged dense yellow smoke using concealed canisters. Sagar Sharma from Lucknow and D Manoranjan from Mysuru had illicitly brought in smoke bombs, causing a brief panic within the Parliament. MPs and parliamentary Watch and Ward staff promptly subdued and overpowered the trespassers.





The remaining two individuals, lacking visitors' passes, resorted to raising slogans outside Parliament while carrying the smoke bombs.

All four individuals have been charged under the stringent anti-terror law UAPA and various sections of the Indian Penal Code.


Their associate Vishal Sharma and his wife, with whom they stayed in Gurugram before heading to Parliament, were initially detained but have since been released. Meanwhile, Lalit Jha, purportedly the mastermind, remains at large. The police disclosed that Jha, unable to secure a visitor's pass, had documented the 'protest' by Neelam and Amol Shinde outside Parliament, uploading the footage online before making his escape. Authorities report his last sighting in Rajasthan's Neemrana.


During court proceedings today, the police emphasized that the entire operation bore resemblance to a terror attack, prompting scrutiny into the motives behind the incident. "Was the purpose of the incident solely expressive or intended to execute a major event? Investigations must ascertain whether any terrorist organization is implicated in this entire matter," they asserted before the court.


The court was informed that the accused likely concealed the smoke canisters within their shoes, having purchased two pairs from Lucknow. The canisters themselves were procured from Mumbai. Additionally, the accused were found in possession of pamphlets evidently intended for Prime Minister Narendra Modi.


Presenting the accused before Special Judge Hardeep Kaur, the police initially sought 15 days' custody, citing the necessity to conduct further investigations in Mumbai and Lucknow. However, the judge granted a week's time for custody.


As the details of the incident continue to emerge, it is crucial to dissect the sequence of events that transpired during the security breach at Parliament. The audacious act unfolded with two individuals, Sagar Sharma and D Manoranjan, managing to infiltrate the highly secured Lok Sabha. Carrying concealed smoke bombs, the duo unleashed thick yellow smoke, causing momentary chaos and panic among parliamentarians and staff.


Sagar Sharma, hailing from Lucknow, and D Manoranjan, a resident of Mysuru, were swiftly apprehended by alert MPs and parliamentary Watch and Ward staff. Their attempt to disrupt the proceedings was thwarted as they were subdued and overpowered before any further harm could be done. Simultaneously, outside Parliament, Neelam Devi and Amol Shinde, unable to secure visitors' passes, resorted to vocal protests while brandishing similar smoke-emitting devices.


All four individuals now face charges under the Unlawful Activities (Prevention) Act (UAPA) and various sections of the Indian Penal Code, reflecting the gravity of their actions. The deliberate nature of the security breach has prompted authorities to treat the incident as more than a mere disruption. The involvement of UAPA suggests a deeper investigation into potential links with terror-related activities.


Further complicating matters is the role of Vishal Sharma and his wife, with whom the individuals stayed prior to their Parliament intrusion. Although initially detained, they have since been released, raising questions about their involvement in or knowledge of the planned breach. Lalit Jha, identified as a key conspirator and the alleged mastermind behind the incident, remains elusive, with reports suggesting his last sighting in Rajasthan's Neemrana.


The investigative focus has also shifted to the motive behind the security breach. In court today, the police raised critical questions about whether the incident was solely an expressive act or if it was part of a larger, potentially sinister plan. The resemblance to a terror attack prompts authorities to delve into the possibility of connections with organized terror groups.


A notable aspect of the incident is the method employed by the perpetrators to smuggle in the smoke canisters. The court was informed that the accused likely concealed the devices within their shoes, having purchased two pairs for this specific purpose from Lucknow. The procurement of the canisters themselves took place in Mumbai, highlighting a degree of premeditation and coordination.


In addition to the smoke canisters, the accused were found in possession of pamphlets intended for Prime Minister Narendra Modi. This discovery raises questions about the intended message or motive behind the breach. While investigations are ongoing, the content of the pamphlets may provide insights into the individuals' objectives.

As the police sought custody for further investigation, including trips to Mumbai and Lucknow, the court granted a week's time. The need for extensive questioning and the urgency of examining potential links to other locations underscore the gravity of the situation.

The incident at Parliament serves as a stark reminder of the challenges posed by evolving security threats. The deliberate and coordinated nature of the breach, coupled with the use of smoke-emitting devices, raises concerns about the vulnerability of highly secure locations. The involvement of the anti-terror law reflects the seriousness with which authorities are approaching this breach, signaling a comprehensive effort to uncover the motives and potential network behind the incident.

As investigations progress, the nation awaits further revelations about the individuals involved, the motivations that fueled this audacious act, and any potential connections to broader security threats. The aftermath of this incident may also prompt a reevaluation of security protocols at key institutions, as authorities work to ensure the safety and integrity of these vital spaces. 

Comments

Popular posts from this blog

The Attack Of 9/11

Once upon a time, in the early hours of a September morning in 2001, the city of New York buzzed with life, unaware that darkness was about to descend upon its skies. Four airplanes, carrying innocent passengers and dreams, embarked on routine journeys that would be forever altered by a sinister plan. High above, in the cockpit of American Airlines Flight 11, sat Mohamed Atta, a pawn in the hands of a man named Khalid Sheikh Mohammed. Little did the passengers know that this flight, and another, United Airlines Flight 175, were instruments in a plot conceived by Khalid Sheikh Mohammed, the mastermind behind the impending tragedy. At 8:46 a.m., the city's skyline was shattered as Flight 11 crashed into the North Tower of the World Trade Center. Panic gripped the streets, but before the shock could settle, another blow struck at 9:03 a.m. - Flight 175 crashed into the South Tower. The Twin Towers, symbols of prosperity, crumbled before the eyes of a horrified nation. Meanwhile, in Wa

Web Based Technologies and Multimedia Applications || NPTEL WEEK 1 ASSIGNMENT SOLUTIONS

1.) The following are different ways of sharing information through Internet   Posting to Social Network   Uploading to cloud storage such as Google Drive   Sending through a mailing list   All of the above Answer: All of the above  2.) The following is a website where entries are written as commentary or news on a particular subject such as food, politics, or local news   Blog   Twitter   Instagram   None of the above Answer: Blog 3.) FTP stands for   Food Transfer Programme   File Transfer Protocol   File Transfer Programming   Facebook To Python Answer: File Transfer Protocol 4.) The following enables access to computing resources remotely   FTP   VPN   Blog   Twitter Answer: VPN 5.) The following allows an Internet host Computer to become a terminal of another host on the Internet   TELNET   Google Groups   Microsoft OneDrive   None of the above Answer: TELNET 6.) To which protocol(s) are all hosts on the ARPANET were switched over from the older ARPANET protocols   UNIX   TCP/IP  

Can Chat GPT Predict About Stock Market

Can ChatGPT predict the stock market? To answer this question, it's crucial to understand how ChatGPT operates. Developed by OpenAI, ChatGPT is an advanced artificial intelligence language model capable of comprehending and responding to natural language input. It engages in human-like conversations with users, having been trained on extensive text data using a deep neural network. Primarily used for applications like chatbots, virtual assistants, and customer service interactions, ChatGPT's versatility allows it to understand and respond to a wide array of topics. The model employs a deep learning architecture known as a transformer model, trained on a substantial corpus of text data. This training enables the model to grasp natural language intricacies and the connections between words and phrases. When a user inputs text, ChatGPT processes it through the transformer model, generating a response based on its understanding of the input text. Techniques such as attention mechan