top of page

By:

Amey Chitale

28 October 2024 at 5:29:02 am

Bumrah: Turning Pressure Into Poetry

The victorious strategist wins first and then goes to battle Mumbai: Two years ago in Barbados, the scars of India’s crushing ODI World Cup final defeat still lingered and the drought of ICC titles weighed heavily. India had seized control in the middle overs, only to see it slip under Heinrich Klaasen’s fierce assault. With South Africa needing 30 off 30 balls and their in-form batter at the crease, momentum appeared lost. That was when he stepped in to halt the Proteas’ surge. His spells...

Bumrah: Turning Pressure Into Poetry

The victorious strategist wins first and then goes to battle Mumbai: Two years ago in Barbados, the scars of India’s crushing ODI World Cup final defeat still lingered and the drought of ICC titles weighed heavily. India had seized control in the middle overs, only to see it slip under Heinrich Klaasen’s fierce assault. With South Africa needing 30 off 30 balls and their in-form batter at the crease, momentum appeared lost. That was when he stepped in to halt the Proteas’ surge. His spells in the 16th and 18th overs slowed the chase and turned the tide. While Suryakumar Yadav’s spectacular boundary catch grabbed the headlines, his economy of 4.5 and two crucial wickets quietly shifted the balance. India’s fightback was shaped not just at the boundary but through the calm precision of his bowling. Two years later, India were defending a towering 255 at the Wankhede Stadium. Yet, as often happens with big totals, complacency crept in and the game began to slip away. Bethell’s ferocious hitting had nearly turned the contest in England’s favour. Once again, the captain turned to his trusted lieutenant—Mr Reliable. Summoned in the 16th and 18th overs, he delivered with precision. With the asking rate nearing 14, he conceded just 14 runs. Brutal yorkers speared at the batter’s legs, leaving little room to manoeuvre. It was a masterclass in control under pressure, steadying India’s grip on the game. He stayed cool under pressure, handling the storm without surrendering psychologically. While Sanju Samson’s brilliance and Axar Patel’s composure grabbed the headlines, it was again his quiet mastery that helped India regain momentum. Over the years, he has embodied consistency and resilience, thriving when others faltered. Fame and glamour were never his pursuit, yet his presence has often proved decisive—felt in every crunch moment and crucial spell. He is not just a match-winner but a craftsman of control, a bowler who bends the game’s rhythm to his will. Among Greatest Indeed, Jasprit Bumrah ranks among cricket’s greatest fast bowlers—the unsung hero of Barbados and Wankhede, turning pressure into poetry with the ball. His spells are more than memorable moments; they are calculated interventions delivered at the precise juncture where pressure, timing and psychology shape the contest. Not merely a frontline warrior, he is a tactical commander, orchestrating the battle with precision and authority. Sun Tzu, in The Art of War , reminds us: “In the midst of chaos, there is also opportunity.” The finest generals do not merely attack soldiers; they dismantle strategy. Jasprit Bumrah does exactly that—targeting the batter’s confidence, disrupting the innings’ rhythm and shrinking the time for the chase. At crucial moments, he punctures momentum with precision. Sun Tzu wrote that supreme excellence lies in winning without prolonged battle. Bumrah’s spells are not about dramatic collapses but strategic strangulation. Sustained pressure erodes decision-making and forces errors. His bowling values control over spectacle.   Shivaji Maharaj’s military brilliance lay in using limited resources with strategic precision. His campaigns relied on small, decisive strikes delivered at unexpected moments. With only four overs at his disposal, Jasprit Bumrah turns risk into opportunity—his very presence carrying the aura that, once deployed, the battle will shift. Turning Risks Just as Shivaji Maharaj’s triumphs relied on trusted commanders, India’s victories here hinged on Bumrah’s quiet precision. He was not merely a bowler in the lineup but the commander whose interventions reshaped the contest. A deeper lesson lies in these performances. In an age that glorifies speed and instant success, Bumrah’s craft reminds us that true mastery rests on preparation, clarity and composure under pressure. Success—whether in sport or life—is rarely one dramatic act but the result of discipline and the courage to step forward when the moment matters most. Sun Tzu wrote, “The victorious strategist wins first and then goes to battle.” Bumrah’s spells reflect that philosophy. His impact lies not in sudden collapses but in calculated control, where each delivery serves a larger plan. Cricket fields and historic battlefields may seem worlds apart, yet their strategies often mirror each other. Batters’ blazing strokes may dominate highlight reels, but the quiet control of bowlers like Bumrah often decides a match. He does not simply bowl; he reshapes the battlefield.

Growing Risks Of Cyber Warfare

Updated: Oct 21, 2024

In a shocking series of events, multiple coordinated explosions have rocked Lebanon and parts of Syria, killing dozens of people and injuring thousands. The blasts occurred after explosive devices, hidden inside pagers and other radio communication devices, were detonated. The targeted individuals were primarily members of Hezbollah, with the explosions taking place in densely populated areas, resulting in widespread injuries to civilians, including children.

The devices, mainly pagers, walkie-talkies, and radios, had been in the possession of Hezbollah operatives, who had acquired them months prior, under the assumption they were secure. However, Hezbollah has accused Israel’s intelligence agency, Shin Bet, of tampering with the devices during transit.

According to security experts, Israel’s elite secret cyber warfare unit was behind the attack. This unit, known for its global cyber operations, is also linked to the creation of the STUXnet malware, which was responsible for the failure of Iran’s nuclear power plant. The pagers were rigged with explosive materials in place of a battery, and a relay switch was installed, allowing the explosions to be triggered remotely in a synchronized manner. The result was devastating injuries to the eyes, face, hands, and legs of those carrying the devices.

The incident occurred in Hezbollah-stronghold areas, including the Dahieh suburb of Beirut, southern Lebanon, and parts of the Beqaa Valley, with some explosions also reported across the border in Syria. The blasts overwhelmed hospitals, as hundreds of victims sought medical help for injuries ranging from severe burns to shattered limbs. The intensity of the explosions, far beyond that of ordinary battery malfunctions, indicates a highly sophisticated sabotage operation.

These explosions have not only deepened the crisis in Lebanon but have also raised critical questions about supply chain security, intelligence tactics, and the legality of using booby-trapped electronics in conflict zones.


What Are Pagers, and Why Are They Still Preferred?

Despite being old-school tele communication technology, pagers or beepers are still used in many countries, particularly in critical sectors and organizations. Pagers primarily facilitate one-way communication, pager uses higher frequencies than car radios i.e. 400 MHz band frequency. It also used a very basic type of VHF spectrum. These devices operate in restricted areas to transfer messages, alerts, and information. These devices are considered more secure and harder to trace or track compared to mobile phones, as they only receive messages, similar to a car radio that receives signals without revealing the listener’s identity or location. Additionally, pagers lack features like Bluetooth or GPS, making them more difficult to hack or compromise.

Among their many advantages, pagers are known for their long battery life and durability, making them ideal for continuous use in specific industries. There are an estimated two million active pager users worldwide. Hezbollah began using pagers after Israel successfully assassinated a high-ranking Hezbollah target by hacking his cellphone and precisely targeting him with a missile. Since then, many Hezbollah members have switched to more primitive communication devices, like pagers, to avoid being tracked via the internet.


Are Mobile Phones and Smartphones Similarly Vulnerable?

American and European security agencies suggest that, theoretically, it is possible to alter mobile phones and other smart devices to turn them into explosive devices. However, practically, it is more difficult due to the advanced security systems in modern smartphones. A hacked smartphone may exhibit various signs, such as abnormal temperature changes, slower system performance, unexpected reboots, odd sounds during calls, hung applications, or irrelevant messages and pop-ups, all of which could indicate tampering. These security systems make it more challenging to modify smartphones in the same manner as simpler devices like pagers.


New Security Challenges

The Hezbollah pager explosion serves as a wake-up call for sectors involving critical infrastructure and aviation. In an era where smartphones are network-connected and can be charged wirelessly, the possibility of tampering with batteries or embedding explosives, like HMX, PETN and other type of plastic explosives pose significant risks. During flights, even a minor explosion could result in catastrophic consequences. On the ground, the threat extends to damaging nearby aircraft, equipment, and infrastructure. Airport security may soon impose stricter regulations, potentially banning pagers, walkie-talkies, and radios, much like power banks, which are now restricted on flights. In the future, mobile phones may only be allowed in switched-off modes, placed in lithium-safe bags during flights. Suspicious devices could be handled separately in Faraday-sheet bags to block any network or signal connections.

This incident highlights the growing risks of cyber warfare and the dangers posed by everyday communication devices being exploited for sabotage. It is an alarming call for a nation’s security as the treat of such critical infrastructure being handled by terrorist organisations can compromise the use of day-to-day electronics for malicious activities. As technology advances, so must the protocols for ensuring public safety, particularly in high-risk environments where even the smallest vulnerability could lead to devastating consequences.

(The writer is an eminent cyber and explosives forensic expert. Views personal.)

Comments


bottom of page