Ph.D. holder jobless after eight years in prison

[email protected] (Meena Menon for The Hindu )
May 1, 2013

DR__ANWAR_ALIThere have been some famous prison memoirs, but Dr. Anwar Ali Javed Ali Khan's took an educational tack. His book “Learn Urdu in 30 days,” now into its third edition, is quite popular and he gets requests from as far as the U.S. for this primer of sorts. If Dr. Khan didn't pour out grim reminiscences of his eight years in prison after his arrest on terror charges, that's because he's the man he is. He completed his PhD while in jail by getting a court order to give his viva at the University of Pune under police escort and helped fellow under-trials draft their bail and other applications.

“I helped so many people with my drafting skills and they were released on bail,” says Dr. Khan, 47, a former lecturer in Urdu at the National Defence Academy (NDA), which terminated his services a day after his arrest on May 11, 2003, for his suspected involvement in the Mulund bomb blast in March in Mumbai. He was later charged with the Ghatkopar and Vile Parle blasts too.

He was discharged, along with eight others, from the Ghatkopar case on March 4, 2004, by the special judge to try cases under the Prevention of Terrorism Act (POTA) for want of sufficient grounds to proceed against them. The prosecutor submitted that they “could not be connected with sufficient material so as to furnish sufficient ground to prosecute them.”

However, Dr. Khan says as soon as he was released from jail, he was re-arrested for the Mulund and Vile Parle bomb blasts case which has been dragging on. He managed to secure bail only in February 28, 2011, after eight bail applications which he drafted himself. “I knew my case, it was so easy to prove how baseless it was,” he points out.

Despite an unforgettable stay in prison, he still has faith in the judiciary, but his chances of getting a job are dim. He was denied one as an Urdu lecturer due to his “terror” connections and he has little hope now that he will ever be employed. He and his family, including three children and his mother, subsist on proceeds from his bestselling book, tuitions and odd jobs. “Teaching is a passion for me; even in jail I missed it so much. I like to teach in a classroom environment,” he says.

He was appointed as a lecturer in Urdu in the NDA in 1996, but on a temporary basis. All was well till 2003. “Some policemen came to my house and left a message asking me report to Mumbai — I went on May 9 and they questioned me for many hours. They asked my advocate to leave and formally arrested me on May 11,” he says. Dr. Khan and another suspect Saqib Nachen, who was released after 10 years in jail, had decided to form a legal aid cell — the Muslim Legal Aid and Welfare Foundation in 2002 and it was in the initial stages of planning. “We wanted a board of patrons and had three meetings. During the initial questioning, the police wanted to know about the meetings. I told them we didn't plan any bomb blast,” Dr. Khan says. Obviously the police thought otherwise.

Dr. Khan says the police accused him under the Arms Act as well because they recovered “a pistol from his flat in Pune.”

“That flat was locked for over a year and they took the keys from my mother who was living with me after my father died. They claim the pistol was in the kitchen,” he says.

After writing his book, he got permission from the court to get it published in 2009. His PhD thesis, a critical analysis of Allama Mehvi Siddiqui — a poet from Lucknow — was ready in 2002. “I was only waiting for the viva and that was a struggle too. The University of Pune refused to conduct it till I wrote to the Minority Commission. They didn't give me bail — finally I went with police escort,” he says.

It was in 2007 that he was awarded his doctorate and he was permitted to attend the convocation. “Lord Meghnad Desai was the chief guest,” he recalls. While the police say the three meetings of the Foundation were linked to the blasts, they haven't been able to produce evidence as yet to link Dr. Khan to the conspiracy.

He says the NDA terminated his services for absenteeism. “I didn't have an opportunity to explain,” he adds.

When he went to jail, Dr. Khan remembers that no one believed the police and people were very supportive. “In fact, one policeman told me that since I had a lot of respect in Pune, I should be paraded on the streets with handcuffs,” he says.

“I wasn't expecting to be arrested and arraigned. It took time for me to adjust and I tried to mentally prepare myself for the ordeal. Jail is a life of deprivation. I missed everything — my family, teaching…” he says. But the one thing he did catch up on was reading fiction. They were allowed newspapers and he would mark the top fiction books and ask his wife to bring them. His favourite author is Dan Brown and now he reads thrillers when he gets time. He still has to report to the local police station every 15 days but for one and a half years, he used to mark daily attendance.

After his release on bail, Dr. Khan and others filed for Rs. five lakh compensation each, but the POTA judge told them to approach the State government. He has to get around to doing that. The NDA has not yet responded to emailed questions seeking clarification on the issue.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 26,2020

New Delhi, Jan 26: Google on Sunday marked India's 71st Republic Day by dedicating a doodle illustrating the country's rich cultural heritage that permeates and unites the diverse nation.

From its world-famous landmarks like the Taj Mahal and India Gate, to the wide array of fauna such as its national bird (the Indian peafowl), to classical arts, textiles, and dances, the doodle, designed by Singapore-based artist Meroo Seth, brings together the rich cultural heritage of the country.

Republic Day marks the completion of India's transition towards becoming an independent republic after its constitution came into effect. The governing document had taken nearly three years of careful deliberation to finalise, and its eventual enactment was joyfully celebrated across the country.

While the Constitution was adopted by the Indian Constituent Assembly on 26 November 1949, it came into effect on January 26 -- a day when Declaration of Indian Independence (Purna Swaraj) was proclaimed by the Indian National Congress back in 1929, as opposed to the Dominion status offered by the British Regime.

Festivities embody the essence of diversity found in one of the world's most populous nations, celebrated over a three-day period with cultural events displaying national pride.

Last year's doodle on Republic Day, designed by artist Reshidev RK, had featured Rashtrapati Bhavan in the background along with a display of the country's iconic monuments and heritage.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.