Maulana Abul Kalam Azad: 'The Great Akbar' of Independence struggle

[email protected] (Mushirul Hasan,The Hindu)
November 8, 2013

Maulana-abul-kalamNov 8: Height about 5' 5''; exceptionally thin; noticeably fair; age about 33 years; has practically no hair on his face though he does not shave; long sharp face with prominent nose. This is the “official” description of Maulana Abul Kalam Azad, the golden boy of the Independence struggle. With his confidence, charm and sincerity, Azad impressed people of his age group with his sharp and swift mind. Later in years, he especially cultivated a look of venerable age to give a suitable background to his learning. His genius and method were too individual to found a school, but his writings and lectures exerted a profound influence owing to the breadth of view and patient learning. Rajaji described him as 'The Great Akbar of Today'.

Unease with conformity

The study of Azad's early life is, however, hampered by a deficiency of data. But there is ample evidence to indicate his discomfort with the traditional order of things. This was enough to rouse his scorn. So is his unease with taqlid or conformity. Is Islamic doctrine so rigid and dogmatic that it leaves no room for intellectual creativity? With this bent of mind, he broke off the shackles of fossilised theology, and critiqued all those elements in theology that inhibited the progress of empirical science and the unlimited process of their utilisation. His views on the spread of a materialistic way of life and the stagnation and retardation of religious life became well-known, but this phase in his life — when he “saw in religion only ignorance” — proved to be momentary. Once he regained his faith, he worked out a synthesis between the reformist and orthodox philosophies. He did not go too far in this journey, but went far enough to disturb the status quo.

The awakening at Aligarh's M.A.O. College fostered ideas on reforms, interpretation, and innovation among the Muslim intelligentsia. Syed Ahmad Khan moulded young Azad's thinking. He did his very best to read his writings and admired them. He also admired Shibli Nomani, founder of the Nadwat al-ulama in Lucknow. And when the Nadwa alim turned pan-Islamist after the European intervention in the Balkan States, Azad too stressed that the bonding with the Turks was unique insofar as they were a part of the Islamic community as well as its last political centre.

One has only to cast a glance at some of Azad's early writings to realise that he entered the valley of doubts and uncertainties to demolish the suppositions that had guided theologians. He opposed the 'scripturalists' or the 'literalists,' because they advocated rigid adherence to the fundamentals of Islam, as literally interpreted from the Koran and the Sunna. His interest in the externals of religion, too, diminished. At the same time, he was consistent in his authentic inward piety. Just as he was ready to comprehend the whole Koran within the verses of the first Surah, so he conceived and pursued the politics of Islam within the Koran's dimension of piety.

The Muslim communities were divided by geographical situation, by differences of dialect and custom and, in some cases, by the deeper chasm of sectarianism, but pan-Islamism inflamed their passions, a feeling that, although they had been ground down under the wheels of history, they thought of themselves as a mighty society spread worldwide. Azad, for one, was attached to the common inheritance of Islamic culture and explored the treasures of thought and emotion which belonged to the umma. He proceeded naturally from the conviction that education, liberalism and faith in progress were requisites for Muslim empowerment.

Setting a great example of moral leadership during World War I, Azad became the soul of the Congress party. He opposed Partition heart and soul, while a great body of his compatriots clamoured for a Muslim nation. He could not conceal the contempt that he felt for them, and at no stage in his public career did he stoop to compromise. The spectacle of Indians working out a new way of life and boldly defying the accumulated prejudices and animus of the past was one which aroused his interest and curiosity. Without looking around to find a mirror that might reflect radical faces, he identified pluralism to be the weapon of the strong and the weak against the British. He preferred the conviction of Dara Shikoh, the eldest Mughal prince and a victim of Aurangzeb's conspiracy, that in the search for the ultimate Truth, mosques as well as temples validly mediate the one candle's light.

Harmonious and creative Islam

Azad's greatest gift was to postulate an equation between Islam and Indian nationalism on the one hand, and between Islam and the universal principles, on the other. He did so to enlarge our conception of what is possible, enrich our intellectual imagination, and diminish dogmatism which closes the mind to ijtehad. With his belief in an integrated, harmonious and creative Islam, he adumbrated the outlook of a religious humanist, very much in the line of the humanism embodied in the classical Persian Sufi poetical tradition. He envisaged an Islam not of sectarian belligerence but of confident partnership in a cultural and spiritual diversity where a strident divisiveness would be its betrayal.

Maulana Abul Kalam Azad, Minister of Education in free India and sponsor of an 'official' history of the 1857 Rebellion, referred to the two communities standing 'shoulder to shoulder' to liberate themselves from the British yoke. Why did Azad and others think that it was worth their while to make this point? Probably, to record the regret that “the British swept away and rooted out the late Mughals' pluralistic and philosophically composite nationalism,” and to bemoan that they ensured that common action by Hindus and Muslims would in future not be accomplished easily.

Shakespeare's view of life in one of his plays is that, “round the lonely great ones of this earth there is inevitably a conspiracy of envy and hatred, hatched by the base and common sort.” On December 30, 1941, the gates of Naini prison outside Allahabad opened for Azad; on August 9, 1942, the new gate of the old Ahmednagar Fort prison closed behind him.

Earlier, its mention would invariably bring to his mind several forgotten footprints of time and presented, page after page, six centuries of history. And yet, “in this world of thousand caprices and moods, so many doors are opened to be closed and so many are closed to be later thrown open.” Hence, between July 15 and August 5, 1942, he went around the country for consultation with the Congress leaders.

Azad spent a total of 10 years in jail. Thrown into a new world whose geography did not extend beyond a hundred yards and where the population was no more than 15 faces, he was overwhelmed by the morning sunlight and the evening darkness. Like Antonio Gramsci, Azad conceived of writing something that might absorb him and give a focus to his inner life. For this, he read a great deal. He drew the guidance and motivation from the reading of Scriptures. It is important to realise — and important particularly for the full knowledge and comprehension of times past — that internment kindled Azad's Islam into warmth and fervour. Like Aurobindo Ghose who found God as a result of the wrath of the government, he felt comforted and serene. And like the future sage of Pondicherry, he found it impossible to explain the love of motherland or sacrifice to the thick-skinned Britons in India.

Independence came with Nehru's 'tryst with destiny' speech, but Partition plunged Azad's spirits into depression. “There is no more certain test of statesmanship,” wrote H.A.L. Fisher in his History of Europe, “than the capacity to resist the political intoxication of victory.” Though hurt and wounded by a colossal tragedy, the otherwise distraught Azad carried his tribulations with a stoical dignity and pursued his active role through stresses of inner disquiet. Ultimately, he suffered for the sake of truth. He had noted in one of his many elegant passages that, “the flowering trees whose offspring once represented beauty and grace were now lying in a heap in a corner, like burnt out bushes and trampled up grass.” The story which opened with the bright colours of the Al-Hilal and Al-Balagh closed in deep shadow.

Like the Urdu poet, Mir Taqi Mir, Azad could only voice affirmation of the historical process or protest against the iniquities of time and the suffering it caused to the sensitive mind and soul. He had indeed no small talk, and no time for it, or for little human foibles, but in his famous speech after independence at the Red Fort in Delhi, he lambasted those Muslims who threw themselves more and more deeply into the communal vortex. At the same time it must be said to his credit that, in the turmoil raging around the Muslim communities, Azad secured them the comfort of peace and security. Lesser men found conflict in the rich variety of life, but Azad was big enough not only to see the essential unity behind all that diversity but also to realise that only in this unity can there be hope for India as a whole and for those great and varied currents of national life.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.