top of page

By:

Asha Tripathi

14 April 2025 at 1:35:28 pm

Stop Comparing, Start Growing

Success does not grow in comparison; it grows in focus. Over the years, women have made significant strides in every sphere of life. From managing homes to leading organisations, from nurturing families to building successful careers, women have proved that strength and resilience are deeply rooted in their nature. Financial independence has become a significant milestone for many women today, bringing with it confidence, dignity, and the freedom to shape one’s own destiny. However, along...

Stop Comparing, Start Growing

Success does not grow in comparison; it grows in focus. Over the years, women have made significant strides in every sphere of life. From managing homes to leading organisations, from nurturing families to building successful careers, women have proved that strength and resilience are deeply rooted in their nature. Financial independence has become a significant milestone for many women today, bringing with it confidence, dignity, and the freedom to shape one’s own destiny. However, along with growth has come another silent challenge — the tendency to constantly observe, compare, and sometimes even compete with the journeys of others. But a crucial question arises: Is it necessary to track the growth of others in order to grow ourselves? From my personal experience of more than two decades as an entrepreneur, I have realised something very powerful — true growth begins the moment we stop looking sideways and start looking within. A Small Beginning I had a flourishing career of teaching abroad, but when I restarted my career after moving back to India, my beginning was extremely small. My very first assignment was a simple home tuition for a single student, and the amount I earned was meagre. There was nothing glamorous about it. No recognition, no large batches, no big earnings. Just one student and one opportunity. But instead of worrying about how others were doing, how many students they had, or how much they were earning, I made a conscious decision—my only focus would be on improving myself. I focused on teaching better, preparing better, and becoming more disciplined and consistent. And slowly, without even realising it, things began to grow. One student became two, two became a small group, and gradually, over the years, the work expanded beyond what I had initially imagined. Looking back today, I can confidently say that the growth did not happen because I competed with others. It happened because I competed with myself yesterday. Comparison Creates Noise When we keep watching others' journeys too closely, we unknowingly divert our own energy. Comparison creates unnecessary noise in our minds. It brings doubts, insecurities, and sometimes even negativity. Instead of walking our own path with clarity, we start questioning our speed, our direction, and our worth. True success grows through focus, not comparison. Every woman has her own story, her own pace, and her own struggles that others may never see. The path of one person can never be identical to another's. So comparing journeys is like comparing two different rivers flowing towards the same ocean — each with its own route, its own curves, and its own rhythm. As women, we already carry many responsibilities. We balance emotions, relationships, work, and society's expectations. In such a life, the last thing we need is the burden of comparison with one another. Instead, what we truly need is support for each other. When women encourage women, something extraordinary happens. Confidence grows. Opportunities multiply. Strength becomes collective rather than individual. There is enough space in the world for every woman to create her own identity. Each of us can build our own niche without stepping on someone else's path. Choose Encouragement Envy weakens us, but encouragement empowers us. Rather than questioning how someone else is progressing, we can ask a more meaningful question: "How can I grow a little better than I was yesterday?" Lift As You Rise Today, after twenty years of experience, the most valuable lesson I have learned is simple yet profound — focus on your own work with honesty and dedication, and success will quietly follow you. We, women, are capable, resilient, and creative. We do not need to pull each other down or compete in unhealthy ways. Instead, we can lift each other up while building our own dreams. Because when one woman rises, she does not rise alone. She inspires many others to believe that they can rise, too. And perhaps that is the most beautiful form of success. (The writer is a tutor based in Thane. Views personal.)

Growing Risks Of Cyber Warfare

Updated: Oct 21, 2024

In a shocking series of events, multiple coordinated explosions have rocked Lebanon and parts of Syria, killing dozens of people and injuring thousands. The blasts occurred after explosive devices, hidden inside pagers and other radio communication devices, were detonated. The targeted individuals were primarily members of Hezbollah, with the explosions taking place in densely populated areas, resulting in widespread injuries to civilians, including children.

The devices, mainly pagers, walkie-talkies, and radios, had been in the possession of Hezbollah operatives, who had acquired them months prior, under the assumption they were secure. However, Hezbollah has accused Israel’s intelligence agency, Shin Bet, of tampering with the devices during transit.

According to security experts, Israel’s elite secret cyber warfare unit was behind the attack. This unit, known for its global cyber operations, is also linked to the creation of the STUXnet malware, which was responsible for the failure of Iran’s nuclear power plant. The pagers were rigged with explosive materials in place of a battery, and a relay switch was installed, allowing the explosions to be triggered remotely in a synchronized manner. The result was devastating injuries to the eyes, face, hands, and legs of those carrying the devices.

The incident occurred in Hezbollah-stronghold areas, including the Dahieh suburb of Beirut, southern Lebanon, and parts of the Beqaa Valley, with some explosions also reported across the border in Syria. The blasts overwhelmed hospitals, as hundreds of victims sought medical help for injuries ranging from severe burns to shattered limbs. The intensity of the explosions, far beyond that of ordinary battery malfunctions, indicates a highly sophisticated sabotage operation.

These explosions have not only deepened the crisis in Lebanon but have also raised critical questions about supply chain security, intelligence tactics, and the legality of using booby-trapped electronics in conflict zones.


What Are Pagers, and Why Are They Still Preferred?

Despite being old-school tele communication technology, pagers or beepers are still used in many countries, particularly in critical sectors and organizations. Pagers primarily facilitate one-way communication, pager uses higher frequencies than car radios i.e. 400 MHz band frequency. It also used a very basic type of VHF spectrum. These devices operate in restricted areas to transfer messages, alerts, and information. These devices are considered more secure and harder to trace or track compared to mobile phones, as they only receive messages, similar to a car radio that receives signals without revealing the listener’s identity or location. Additionally, pagers lack features like Bluetooth or GPS, making them more difficult to hack or compromise.

Among their many advantages, pagers are known for their long battery life and durability, making them ideal for continuous use in specific industries. There are an estimated two million active pager users worldwide. Hezbollah began using pagers after Israel successfully assassinated a high-ranking Hezbollah target by hacking his cellphone and precisely targeting him with a missile. Since then, many Hezbollah members have switched to more primitive communication devices, like pagers, to avoid being tracked via the internet.


Are Mobile Phones and Smartphones Similarly Vulnerable?

American and European security agencies suggest that, theoretically, it is possible to alter mobile phones and other smart devices to turn them into explosive devices. However, practically, it is more difficult due to the advanced security systems in modern smartphones. A hacked smartphone may exhibit various signs, such as abnormal temperature changes, slower system performance, unexpected reboots, odd sounds during calls, hung applications, or irrelevant messages and pop-ups, all of which could indicate tampering. These security systems make it more challenging to modify smartphones in the same manner as simpler devices like pagers.


New Security Challenges

The Hezbollah pager explosion serves as a wake-up call for sectors involving critical infrastructure and aviation. In an era where smartphones are network-connected and can be charged wirelessly, the possibility of tampering with batteries or embedding explosives, like HMX, PETN and other type of plastic explosives pose significant risks. During flights, even a minor explosion could result in catastrophic consequences. On the ground, the threat extends to damaging nearby aircraft, equipment, and infrastructure. Airport security may soon impose stricter regulations, potentially banning pagers, walkie-talkies, and radios, much like power banks, which are now restricted on flights. In the future, mobile phones may only be allowed in switched-off modes, placed in lithium-safe bags during flights. Suspicious devices could be handled separately in Faraday-sheet bags to block any network or signal connections.

This incident highlights the growing risks of cyber warfare and the dangers posed by everyday communication devices being exploited for sabotage. It is an alarming call for a nation’s security as the treat of such critical infrastructure being handled by terrorist organisations can compromise the use of day-to-day electronics for malicious activities. As technology advances, so must the protocols for ensuring public safety, particularly in high-risk environments where even the smallest vulnerability could lead to devastating consequences.

(The writer is an eminent cyber and explosives forensic expert. Views personal.)

Comments


bottom of page