Mr. Modi, Muslims may join hands with you if

[email protected] (The Milli Gazette )
November 26, 2012

MODI

Open letter to Mr Narendra Modi, Chief Minister of Gujarat from Joint Committee of Muslim Organisations for Empowerment, Delhi

The Milli Gazette

Published Online: Nov 23, 2012

16 November, 2012

Mr. Narendra Modi

Chief Minister of Gujarat

Gandhi Nagar,

Gujarat

As the Assembly election approaches, every one has noticed special attention being given by you and your party to the Muslim voters of Gujarat.

 

The Muslims of Gujarat and outside Gujarat have not yet forgotten the 2002 Massacre. But during the last 10 years, the Muslims of Gujarat have rebuilt their lives with their own hands and limited resources as they have realized that they have nowhere else to go but to live in Gujarat, in the hope that they will receive equitable benefits in development and in public and private employment in Gujarat. Muslim voters see some signs of change in your attitude. However, they may join hands with you in rebuilding Gujarat only if you take the following steps:

 1. A public apology by you and expression of sorrow for the Massacre of 2002.

 2. Payment of compensation for the lives lost to the next-of-kin on par with the Delhi Riots, 1984.

 

 3. Reimbursement of expenditure incurred by the injured in private hospitals.


4. Rehabilitation of the displaced persons who are still living in make-shift camps and who have not yet been able to return to their villages/homes, in dignity and security and with restoration of their land and shops.

 

3. Suitable compensation for their houses demolished during the Massacre which have not yet been rebuilt.


4. Offer to rebuild over 300 Masjids and Dargahs and mausoleum which were destroyed/damaged during the atrocities, including boundaries of graveyards.

 

5. Government guarantee on bank loans to entrepreneurs whose business was affected and whose shops were destroyed or looted.

6. Unconditional release of those who were arrested and are still in prison on unproved allegations.

 

7. Clear instructions to state lawyers and  prosecutors not to side with those who were responsible for atrocities in various localities, so that the victims receive a fair trial.


Instead of repeatedly announcing your faith in Secularism and for making Gujarat a secular state, you should begin by offering at least 20 Assembly tickets to Muslims acceptable by the community in various constituencies where they constitute more than 20% of the electorate. This would give them representation according to the population in the state (10%). Token nomination of one or two Muslims, personally known to you, will not do.

 

Dear Modiji, if the above suggestions are implemented, they will no doubt have an impact on the Muslims of Gujarat if coupled with a promise to give them equitable share in the benefits of development at all levels, particularly in education and employment.

 

Alternatively the Muslim leadership will advise Muslims not to divide their votes & vote massively and unitedly for one candidate, irrespective of party or religion who is likely to defeat the BJP in their constituency, with the objective to make it difficult for you to form a government on your own.

 

Syed Shahabuddin

Convener (JCMOE)

JOINT COMMITTEE OF MUSLIM ORGANISATIONS FOR EMPOWERMENT

D-250, Abul Fazal Enclave, Jamia Nagar

New Delhi-110025 India Tel.: 011-26946780 Fax: 011-26947346

Email: [email protected]

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 3,2020

Mumbai, Jul 3: In yet another move to keep Chinese technologies companies at bay, the Centre has cancelled the 4G upgradation tender for BSNL as it has decided to come up with fresh specifications for the upgrade process, sources said.

The Department of Telecommunications (DoT) is likely to issue a fresh tender in the next two weeks.

People in the know said that the fresh tender may not allow Chinese companies to participate and that the new tenders that will be floated in the next two weeks will emphasise on Make in India.

As the border tussle with China escalated last month and around 20 soldiers lost their lives, the government had last month asked both BSNL and MTNL not to use equipment of Chinese makers in their upgrading process to 4G facilities.

Huawei and ZTE are the major Chinese telecom equipment makers working with Indian telecom companies and they would be the hardest hit by the decision.

The impact may be felt in terms of the much-awaited 5G trials in the country. After much deliberation, the Centre last December decided to allow Huawei to take part in the 5G trials.

The cancellation of tender for BSNL's 4G upgradation comes after the Centre on Monday banned 59 Chinese apps including TikTok, WeChat and UC Browser.

A statement by the Ministry of Electronics and IT said that the decision was taken since "there is credible information that these apps are engaged in activities which are prejudicial to sovereignty and integrity of India, defence of India, security of state and public order".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.