Get subscribed to our newsletter
Get interesting updates to your email inbox.
Humanitarian workers and rights activists Join to underline need for humane treatment of prisoners in Indonesia
Palu, September 03, 2016: Indonesia has all but decimated the Eastern Indonesia Mujahideen (MIT), a band of militants once considered the nation’s most deadly domestic terror group.
But in the waning months of a massive security operation in Central Sulawesi where the MIT is based, humanitarian workers and rights activists are joining efforts to persuade 14 people still hiding in the jungles of Poso Regency to turn themselves in.
National Human Rights Commission (Komnas HAM) chief Imdadun Rahmat traveled to the provincial capital of Palu this week to underline the need for humane treatment of prisoners.
Please Follow NewsGram on Facebook To Get Latest Updates!
“We continue to support and encourage the government initiative to restore the losses suffered by the community following the conflict in Poso, and urge good treatment of those prisoners who were captured alive,” Imdadun told reporters here Wednesday.
Follow NewsGram on Twitter
“The main point is, no more blood in Poso. We are taking these steps together, prioritising a persuasive approach,” Central Sulawesi police chief Brig. Gen. Rudy Sufahriadi said as he repeated appeals for the remaining militants to give up.
Officials have approached relatives of remaining MIT members to assure them that those who surrender will not be deprived of their rights, he said.
“Certainly we will treat them well, whether they are captured or surrender during the operation,” Rudy said.
MIT holdouts include women
Estimated to have about 32 members in early 2016, the MIT is now less than half that size, officials said. Holdouts include two of the group’s leaders, Basri (alias Bagong) and Ali Kalora, and their wives.
Hundreds of security personnel have been on the ground in remote Poso regency since January 2015 in two operations code-named Camar Maleo and Tinombala.
Follow NewsGram on Facebook
Security forces killed 14 MIT members, including six ethnic Uyghurs, in 2016. Seven were killed in 2015, and another 31 captured.
In July of this year, Indonesia confirmed that its most wanted militant – MIT leader Santoso – had been shot dead.
Santoso, who had pledged allegiance to the extremist group Islamic State (IS), died in a shootout with security forces in Poso on July 18, police said.
Officials vowed to prolong a security operation aimed at capturing or killing the remnants of the MIT. That operation is scheduled to continue for two more months.
Local police and rights activists say they have received intelligence that the holdouts are willing to surrender, but they are afraid to do so.
Follow NewsGram on Twitter
After capture or surrender, MIT members will be put in de-radicalization programs, National Counterterrorism Agency (BNPT) chief Suhardi Alius said in Palu on Wednesday.
Community members will be involved in this process, not just religious scholars and government officials, he added.
He described it as an intensive program designed “so that it can really provide therapy for those who have been exposed to radicalization.”
Several other activists and public figures have come to the region to join the efforts and assist local communities traumatized by years of violence.
The group includes members of the medical charity Medical Emergency Rescue Committee (Mer-C). Team 13, as it has been dubbed, is already in Poso but unwilling to talk to the press.
Over the past two years, rights activists from the Central Sulawesi Institute for Legal Studies and Human Rights Advocacy (LPS-HAM Sulteng) often protested when security forces killed suspected militants instead of capturing them alive.
They also criticized security forces for failing to capture Santoso and the two other MIT leaders over 18 months.
After Santoso was killed, the chief of LPS-HAM Sulteng, Mohd Affandi, called for a halt to security sweeps.
“If the military operation stops, Team 13 can freely move on the field. Unfortunately the operation is still in progress, so the team will automatically get trouble,” Affandi told BenarNews.
Locals in the impoverished area have been trapped between armed militants and security forces.
“Farmers did not go to work because of they were worried if there is a clash between armed civilian groups and security forces,” Celebes Institute Director Adriany Badrah once said.
In September 2015, three farmers were decapitated in Central Sulawesi’s Parigi Moutong regency. Officials said Santoso’s group was likely behind the killings and urged farmers to suspend agricultural activities for the time being.
Prior to the rise of IS and its spread in the archipelago, MIT was seen as the most dangerous terror group on Indonesian soil, a remnant of Jemaah Islamiyah (JI), the network that carried out the 2002 and 2005 Bali bombings.
Hundreds of Indonesians have gone to Iraq and Syria to join IS, and an IS-claimed attack in Jakarta in Jan. 2015 left eight dead. (Benar News)
By- Laxman Balagani
Remote working has grown to be a dominant trend in the post-pandemic world. Gartner anticipates that 41% of employees will work at least some of the time remotely once the coronavirus is in the rear-view mirror. Such a lasting change in the workplace culture has had the biggest impact on cybersecurity.
Many businesses struggle with how to secure remote workers or if it's even worth trying at all due to fears about security risks for those who aren't physically present on-site at any given time. What they need is insightful, practical, and useful visibility across all communication vectors as they support vast, remote workforces. To obtain this level of visibility, organizations should reconsider their data and user protection techniques and strive to get meaningful insights into what's going on behind the scenes.
Follow NewsGram on LinkedIn to know what's happening around the world.
There are cyber risk management solutions available today that can help ensure your business stays safe and productive without sacrificing flexibility for your employees.
To guarantee a safe and secure working environment, enterprises must rethink their approach to security and privacy when dealing with a dispersed workforce. This article explores how business leaders should approach cybersecurity risk management in the era of remote working.
A behavior-centric approach based on a human-centric viewpoint on cybersecurity
The growing usage of smartphones, cloud-based apps, and social media in both work and personal has made it clear that people are the new perimeter. To contain these changes, the new cybersecurity risk management strategy, which aims to protect people, places, and things, works on a behavior-centric approach.
This approach centers on understanding users' behaviors using critical data and intellectual property across worldwide IT systems. This strategy is designed to identify problematic employee behaviors and prevent them from escalating. It's a new way of defending against threats that complements the traditional cyber risk management approach of stopping the bad guys.
It has become essential for businesses to integrate edge security, cloud security, and network security into a single, cohesive format. Here are a few steps businesses can take to enhance cybersecurity when working remotely -
To guarantee a safe and secure working environment, enterprises must rethink their approach to security and privacy when dealing with a dispersed workforce.Unsplash
Providing cyber security training to employees who work remotely can help minimize cyber threats. Ideally, employees should be able to spot a cyber scam in action and know how to avoid it in the future so they stay one step ahead of cyber threats. Providing cyber security training through video modules or cyber security e-learning is a great way to help remote employees retain cyber threat prevention techniques, cyber-hygiene standards, and cyber safety procedures.
There is an absence of a true security perimeter in a remote workplace. Thus, organizations must adopt the mentality of zero trust. All systems must be properly secured and require verified access, whether internal or external. Adding a layer of multi-factor authentication is a crucial step that will protect data from unauthorized access.
Ironically, cloud-based security systems offer better cybersecurity risk management than on-premise servers. Cloud systems are built from the ground up to be safe even when exposed to the public internet. This gives them an edge over regular file servers, which are only lightly secured with sensitive data.
The use of collaboration tools and videoconferencing platforms to allow for business interactions while away has increased significantly. Most of these were quickly integrated, with resiliency taking precedence over any security concerns. The recent Zoom-bombing is the poster child for the risks that come with adopting technologies fast. Teams in the CXO suite need to get defensive and audit all tools and platforms for security flaws before integrating them.
We've already seen software-defined networks (SDNs) emerge to define and protect networks, allowing businesses to use a single, holistic approach for all edge computing. Now that remote networks have taken center stage, IT leaders must apply the same strategy across the network and into the cloud to ensure consistency, cohesion, and security.
Remote working makes it imperative to rely on digital connections, making it critical to ensure that they're secure, fast, scalable, and robust across all networks.
Some companies may not embrace working remotely as their modus operandi, while some organizations might cling to an outdated network model. Anyhow, businesses must consider the long-term impacts of technological disruption and look at them as opportunities. With a distributed workforce, organizations must reconsider how they secure and protect their data.
(Disclaimer: This article is sponsored and includes some commercial links.)
By- Devakinanda Ji!
ॐ त्रिकालसन्ध्यानुष्ठितभूम्यै नमः
(Ṫrikāla: Three periods of the day; Sandhya: Obeisance to Sun god; Anuṣthiṫa: Practice, performance)
The word sandhya refers to those times, when night passes into day and day passes into night. They are dawn and dusk. The ritual of one's obeisance to God during these periods is known as sandhyāvandanam. Doing the ritual thrice at dawn (prātah sandhyā), at midday when the sun is right above our head (madhyāhna sandhyā); and dusk (sāyantrah sandhyā) is known as trikāla.
A person who has undergone the upanayana ceremony, as also house-holders (except the working class), are expected to perform this sandhyā ritual three times a day, as a sacred duty. These three rituals have many steps in common. However, in practice, only the first and the last have survived. The scriptures have provided for this modification.
After taking a bath and wearing the traditional religious dress (dhoṫi and chadar or uttarīya) one should apply the religious marks on the forehead (like the vibhūti or the ūrdhva puṇḍra as per one's family traditions), and sit on the seat (kept aside and used only for such religious purposes). Though there are differences in the procedure and the various steps to be followed, the six steps common to all and the detailed procedure has to be learnt from the family priest or the elders in the family.
These six steps are: 1) Āchamanam- is the ceremonial sipping of water from the right hand cupped in the shape of the ear of a cow (gokarṇam) to the appropriate mantras. This āchamanam is a general purification act that precedes every religious undertaking. 2) Prāṇāyāmam- is the control of the prāṇic energy through the regulation of the breathing process as detailed in the works of yoga. Prāṇayāmam helps in the control of the mind also. 3) Mārjanam- is literally means cleansing or purifying. It consists of sprinkling water on specified parts of the body with a mantra. This process will make the body ceremonially pure and fit the ritualistic act. 4) Arghyapradāna-is the offering of water taken in the two hands cupped together, by repeating the Gāyatrī mantra and addressing the Sun-god. This is just to show our gratitude to the Sun-god who is our primary life-support. 5) Gāyatrī japa-is for the goddess Gāyatrī within the orb of the sun. 6) Sūryopasṭhāna- is repeating the prayer addressed to the deity Gāyatrī in the standing posture, facing the sun. This is the last rite of bidding farewell to the goddess after having invoked her and satiated her through japa.
Hence, our land which worships the Sun-god who is our primary life-support, three times a day is known to be 'Trikālasandhyāvandānuṣthiṫa Bhūmi'.
By- Leby Sport
Parimatch bookmaker has managed to establish itself well all over the world, including India. Sophisticated software and extensive functionality make life easier for players and give an unforgettable betting experience. There is also a huge number of sports events, both regional and global. In particular, Indians can make predictions on horse racing, soccer, virtual sports and so on. Learn more useful information from our Parimatch review.
Follow NewsGram on Facebook to stay updated.
Advantages of betting at Parimatch
Let us highlight the key advantages of this betting site:
- The company works honestly and legally, which is confirmed by a Curacao license.
- Almost all sports disciplines are available for predictions, many of which are popular in India.
- There is a lucrative welcome bonus and loyalty program.
- The user interface is user-friendly and has many features.
- Availability of live streaming for important events.
- Several ways to access the platform: web client, mobile version, apps for iOS/Android.
- High odds and the ability to cancel bets before the start of events.
- A lot of payment methods and fast payouts.
- Operational work of the support team.
Parimatch Official site in India is a really high-quality and modern betting platform, which allows not only to play, but also to win. The main thing to remember is that in order to play successfully, you need to carefully analyze sporting events, treat betting in a cold-blooded manner and without emotions, as well as react calmly to losses, not trying to win back money immediately and without preparation.
Parimatch registration and verification
Parimatch step by step instructions
It won't take you long to create a personal account. The main thing is to follow clearly the step-by-step instruction and enter true data:
- Visit the official website of the bookmaker and click on the yellow button in the right corner of the screen - "Register".
- Enter a valid phone number and come up with a strong password.
- Read the Terms and Conditions and confirm your age of majority.
- Complete the registration.
Now you can login and make bets. But we strongly recommend you to pass the verification right after registration, which is a mandatory step if you wish to withdraw your winnings. It should be noted that the availability of account verification positively characterizes the bookmaker, because they care about the maximum protection of customers from the actions of fraudsters.
To verify your profile, find the "Personal information" on the website and select "Account verification". For verification, you can use one of your identity documents: military ID, ID card, passport and so on.
You also need to verify your email. Specify the actual e-mail address and wait for the letter from Parimatch for the confirmation. You will be able to use the services of the bookmaker without restrictions only after your personal and payment details will be checked and approved.
Note also that you can use three methods of authorization on Parimatch India in the future. You can choose from a phone number, a gaming account number and an email address.
Parimatch User Interface
Players from India can choose the best deposit method from a wide list. Here are just some of the suitable options:
- Astropay Card.
The choice of a financial instrument is influenced by the preferences of a particular user. Those who prefer maximum anonymity often choose Crypto, and security lovers prefer UPI. For instant deposits, Paytm is popular.
But in any case you can deposit money to your account in the local currency, which is very convenient. Often the minimum deposit amount is 300 rupees, although sometimes the minimum deposit is influenced by the conditions of a particular sporting event.
Withdrawal at Parimatch
The good news: the platform allows you to withdraw winnings in rupees, using the same financial tools that are available for deposits. No conversions and overpayments, as well as a high degree of security are all about Parimatch.
But the conditions for cashout are very different depending on the selected payment method. For example, if you use Skrill, you can cash out from 700 rupees and it takes no more than 24 hours. A wire transfer, on the other hand, requires you to wait up to two days for a cashout and the minimum amount is 1,000 rupees. Remember, you can't cash out your winnings without prior verification.
Our Parimatch review India couldn't do without a review of the support team. Players often turn to the company with questions about registration, bonuses, financial tools. That's why the bookmaker offers several ways of communication at once for uninterrupted support of its customers:
- Email. If you don't have any urgent questions, but, for example, want to get an in-depth consultation or make a suggestion on how to upgrade the platform, send an email to email@example.com.
- Live Chat. An ideal solution for urgent questions and consultations. You can find the chat window on the site. To start a dialog, fill out the request form and wait for an employee of the bookie to get in touch.
- Phone number. If you prefer live communication rather than correspondence, contact the Parimatch representatives on this number: +38-050-806-22-04.
You can also get advice via popular instant messengers. Use the number +38-068-551-83-24 for communication on WhatsApp. If you want to "chat" via Telegram, find this bot: @ParimatchINDIA_bot.
(Disclaimer: This article is sponsored and includes some commercial links.)