Connect with us

GROpinion

God’s own people and some dirty little secrets

Published

on

In March 2018 while at the American Israel Public Affairs committee(AIPAC) event held in Washington, the Isreali Prime Minister Benjamin Netanyahu received what was described as a hero’s welcome. It was so inspiring hearing him speak glowingly about the progress made by the Jewish State.

For a country surrounded by very belligerent neighbours and only came into existence since 1948, the progress recorded is nothing short of phenomenal. He stated and rightly so that Israel is a nation punching way above her weight.

The speech was vintage Bibi, strong in delivery, compellingly persuasive and laced with a generous dose of arrogance. But who can blame a nation that was born to fail but has not only survived but grew to become the most advanced economy in the Middle East. A nation of about eight million people that turned an arid desert into an arable land practicing the most technologically innovative system of agriculture that is being copied around the world.

Am sure you are not unaware of the Isreali military might with the impregnable iron dome and how she has maintained a comfortable lead in the area of cyber security amongst world powers.

Isreali has produced more Nobel laureates than the whole continent of Africa and Latin America combined and her footprints could be seen in almost every scientific innovation in the twenty first century. And so Bibi is absolutely right.

If you a Christian faithfuls, you would argue that nothing less is expected. Afterall the Jews are God’s chosen people. It doesn’t matter that Judaism is a little different from Christianity and that the Jews haven’t always followed the footsteps of Christ.

Recently an Isreali company was in the news following the now infamous hacking of the phone of the world’s richest man by no less a person than the crown prince of Saudi Arabia, allegedly. The hack was made possible through the help of a technology developed by an Isreali cyber-security firm, NSO called Pegasus. Pegasus sends people what is referred to as “exploit link” which the malware uses surreptitiously to penetrate a phone’s security features and gets installed without the victim knowing.

Even when you ignore that as just one Israeli company gone rogue and working hard to line the pocket of her shareholders, you probably didn’t know half the history of the Israel nuclear program. Isreali is the only nuclear power in the Middle East, a charge that it has neither confirmed nor denied and yet she declined to sign the Teaty on the Non-Proliferation of Nuclear Weapon(NPT). Her reactors tucked between the sand dunes of the Negev desert remains one of the most closely guarded piece of real estate in the world.

The processed Uranium Ore referred to as yellowcake that helped give the isreali nuclear effort a boost was obtained through an infamous covert operation by Mossad agents in 1968. And yes, Operation Plumbat involved all kinds of criminal activities ranging from stealing to forgery and impersonation.

And so whether it’s counterfeiting multiple foreign passports or carrying out the most audacious dare-devil espionage activities around the world, Israel traffics in sophisticated thuggery. Mossad the elite intelligent agency takes no prisoners. The world has gotten familiar with those pretty faces in the Israeli Defence Force(IDF) elit unit slinging the lethal Uzi on their shoulders like fashion-forward Louis Vuitton bags. Totally bad ass!

As eye popping as those action are, they are not unique to the Jewish State. Covert measures are routinely employed by sovereign nations to stay a little ahead of both friends and foes. In fact almost all nation states have done same or will do so if the capabilities are available. The Jews just happen to be way ahead of the game.

The problem is this is hardly the virtuous path you expected from God’s own people.

Osmund Agbo MD, FCCP writes from Houston, Texas

Continue Reading

GROpinion

Insecurity In Zamfara – Hold Lawal Accountable, Not Matawalle

Writes Nasiru Aliyu, Media Advisor to the Hon. Minister

Published

on

Zamfara and Bandits

The recent protest organized by the All Progressives Congress (APC) Akida Forum raises significant questions about political motivations and accountability.

Led by Musa Mahmoud the APC AKIDA group staged a demonstration at the Abuja headquarters of the Department of State Services (DSS), demanding an investigation into the Minister of State for Defence, Dr. Bello Mohammed Matawalle, amid allegations linking him to banditry in the state.

The protest, predominantly featuring hired women and youths from Abuja, was framed as a response to escalating security concerns in Zamfara.

However, the underlying motives appear to be rooted in political rivalry rather than genuine concern for public safety.

The leader of the APC Akida Forum Tijjani Ramallan claims that Governor Dauda Lawal has accused Matawalle of collusion with bandits, suggesting that such ties have perpetuated the insecurity plaguing the region.

A critical point overlooked by Mahmoud and his supporters is that Matawalle is no longer the executive governor of Zamfara.

The current governor, Dauda Lawal, now holds the title of the state’s chief security officer, and therefore, he bears the primary responsibility for addressing the security crisis.

Instead of engaging in a blame game, Lawal should focus on implementing effective strategies to combat the rampant insecurity and provide the dividends of democracy to the people of Zamfara state.

The animosity towards Matawalle seems to stem from his previous role as the Director General of Bola Ahmed Tinubu’s campaign in the Northwest, where he played a pivotal role in securing significant electoral support for the current president.

This success has reportedly fueled envy among some political figures like Tijjani Ramallan, including Musa Mahmoud and others who may feel threatened by Matawalle’s rising profile.

It is noteworthy that allegations against Matawalle have been investigated by the National Security Adviser’s office, which found no evidence to support claims of his involvement in banditry.

This investigation contributed to President Bola Ahmed Tinubu’s decision to retain Matawalle in his ministerial position, where he has reportedly managed security matters in the Northwest with professionalism.

Adding to the complexity of this situation, a Kano High Court recently issued a restraining order against Governor Lawal and others, prohibiting them from continuing their smear campaign against Matawalle. This legal development underscores the court’s recognition of the potential harm caused by unfounded allegations and the need for accountability in political discourse and the state government has found an ally in APC AKIDA led by Tijjani Ramallan.

Despite the court’s intervention, Governor Lawal continues to leverage media platforms to tarnish Matawalle’s reputation, linking him to banditry and corruption without substantiating evidence.

Such tactics appear to be desperate attempts to undermine Matawalle’s credibility, likely motivated by Lawal’s desire to solidify his political standing.

The ongoing campaign against Matawalle by Lawal and his associates raises serious concerns about the integrity of political discourse in Zamfara.

It is imperative for the public to remain vigilant against misleading narratives and to recognize the broader implications of such political maneuvers.

The Kano High Court’s ruling serves as a reminder of the importance of due process and the need for responsible governance.

In conclusion, the focus of accountability in Zamfara should shift towards Governor Dauda Lawal, who now holds the reins of security in the state.

Instead of casting blame on former officials, Lawal must take ownership of the security situation and work towards tangible solutions that prioritize the safety and well-being of the people of Zamfara.

Furthermore, since Matawalle operational visit to sokoto led to the elimination of Bandit leader Halilu Sububu who is alleged to have died with the treasure of the sponsors of banditry in zamfara state, the pain propelled them to further embark on campaign of calumny.

Continue Reading

GROpinion

Exposing the Malicious Sabotage of MoMo PSB Project in Enugu Ezike

By: Cyprian Nwodo

Published

on

MoMo Payment Service

The recent activities of some individuals with one Davids Iyida attempting to sabotage the MoMo Payment Service Bank project intended to benefit, especially  Enugu Ezike people, have raised significant concern and outrage within the community.

Davids Iyida
Davids Iyida

Such actions aimed at undermining a project with immense potential to uplift and empower the people of Enugu Ezike can only be described as malicious.

The MoMo PSB project is designed to bring financial services closer to the people of Enugu Ezike, facilitating easier access to banking and financial transactions.

This project is expected to create jobs, stimulate local businesses, and provide a much-needed boost to the local economy. In a region where such opportunities are rare, the MoMo PSB project represents a beacon of hope for many residents.

It is particularly baffling and disheartening to witness a member of the community collaborate with outsiders to hinder the progress of their own people.

The reasons behind such alliances remain unclear, but the impact of these actions is evident and deeply troubling. Working to obstruct the project is not only delaying progress but also actively working against the welfare and advancement of Enugu Ezike.

The efforts to destroy Kingsley Ifeanyi Adonu’s good intention, despite all the positive contributions he has made, are nothing short of wickedness.

Adonu, a visionary entrepreneur and the leading MTN Partner in the South East, has dedicated significant resources and efforts to bring the MoMo Payment Service Bank project to fruition.

His vision for the community includes economic growth, financial inclusion, and overall development. Attacking his vision is an attack on the progress and future of Enugu Ezike.

The question that lingers in the minds of many is: Why sabotaging our own benefits? In a time when unity and collective effort are paramount for the community’s advancement, such actions of sabotage are counterproductive and harmful. The community needs all hands on deck to drive development and improve the quality of life for its residents. Internal conflicts and malicious actions only serve to set back these efforts.

Despite the challenges and the malicious attempts to derail the project, it is important to reaffirm that S Mobile Group vision for establishing a MoMo Payment Service Bank in Enugu Ezike will prevail.

The community stands behind this vision, recognizing the immense benefits it promises to bring. Efforts to hinder progress will ultimately fail in the face of collective determination and support.

The actions of these ungrateful individuals, aimed at sabotaging the MoMo PSB project, are grave disservice to the community of Enugu Ezike.

In a time when progress and development are desperately needed, such malicious activities are deeply regrettable.

However, the vision and determination of Kingsley Ifeanyi Adonu and the community’s support ensure that the project will succeed, bringing much-needed growth and prosperity to Enugu Ezike.

Let it be known that no amount of sabotage can dim the light of progress and unity.

Nwodo, a public commentator writes from Enugu State

Continue Reading

Columnists

Cybersecurity in 2024: Towards Ever Greater Sophistication of Tactics

Published

on

Chester Wisniewski, Director Global Field CTO

Writer: CHESTER WISNIEWSKI, Director Global Field CTO, Sophos

With 2024 fast approaching, what are the results for 2023 and what are the developments in the threat landscape for this new year?

The year 2023 was marked by persistence in the tactics of cybercriminals, with the predominance of ransomware, the exploitation of vulnerabilities, theft of credentials and even attacks targeting the supply chain. The common point in all his attacks is their formidable effectiveness.

It is therefore essential to ask what trends will persist in 2024 and what strategies businesses should adopt to deal with these future cyber threats.

Between persistent trends and evolving cybercrime tactics

In 2024, the threat landscape is not expected to change radically, particularly with regard to attack typologies and criminal tactics and procedures.

Criminal groups still primarily focus their attention on financial gains and ransomware remains their weapon of choice. These cybercriminals tend to take the easy way out by opportunistically attacking unpatched security vulnerabilities.

The recent Citrix Bleed attack demonstrated the agility of cybercriminals when it comes to quickly and effectively exploiting these new vulnerabilities.
However, once patches are applied to these vulnerabilities, cyberattackers tend to revert to more common strategies of stealing credentials or, failing that, cookies or session cookies, which, while slightly slower, constitute always a proven means that allows them to penetrate within a system.

In 2024, however, we should expect increased sophistication in defense evasion tactics, particularly due to the generalization of certain technologies such as multi-factor authentication. These attacks will combine malicious proxy servers, social engineering techniques and repeated authentication request attacks or “fatigue attacks”.

AI and regulations will continue to shape cybersecurity

In 2024, the development of AI will have a positive impact on the efficiency of IT teams and security teams by enabling them to strengthen defenses and work more efficiently, including through the processing of vast volumes of data in the aim of detecting anomalies. It should make it possible to respond more quickly in the event of an incident.

Indeed, analysis of attacks in 2023 showed a shortening of the time between network penetration and the triggering of a final attack – using malware or ransomware. The need for rapid detection and response tools to prevent costly incidents is therefore essential.

Finally, regulatory developments could have a major influence on measures taken against ransomware. The need to take more substantial measures could push some states to penalize the payment of ransoms, which would represent a brake on malicious actors and change the perspective of companies in the event of an attack.

Other stricter legislation, such as the implementation of the European NIS2 Directive, is also expected to force companies to take additional measures, particularly regarding their abilities to collect data sets.

To protect themselves against increasingly rapid, effective and costly attacks, companies will need to strengthen their defenses by equipping themselves with tools that allow them to detect and respond to incidents more quickly.

The worsening cybersecurity talent shortage does not appear to be as serious as some studies claim. On the contrary, companies have implemented more lax hiring criteria and more open-mindedness in the recruitment process.

From this perspective, to guarantee their survival in a constantly evolving threat landscape, companies have every interest in establishing partnerships with cybersecurity experts whose main mission is to make the hyperconnected world safer, to advise and assist them. in setting up effective defenses.

Continue Reading

Trending