top of page

By:

Divyaa Advaani 

2 November 2024 at 3:28:38 am

When agreement kills growth

In the early stages of building a business, growth is often driven by clarity, speed, and conviction. Founders make decisions quickly, rely on their instincts, and push forward with a strong sense of belief in their methods. This decisiveness is not only necessary, it is often the very reason the business begins to grow. However, as businesses cross certain thresholds, particularly beyond the Rs 5 crore mark, the nature of growth begins to change. What once created momentum can quietly begin...

When agreement kills growth

In the early stages of building a business, growth is often driven by clarity, speed, and conviction. Founders make decisions quickly, rely on their instincts, and push forward with a strong sense of belief in their methods. This decisiveness is not only necessary, it is often the very reason the business begins to grow. However, as businesses cross certain thresholds, particularly beyond the Rs 5 crore mark, the nature of growth begins to change. What once created momentum can quietly begin to create limitations. In many professional environments, it is not uncommon to encounter business owners who are deeply convinced of their approach. Their methods have delivered results, their experience reinforces their judgment, and their confidence becomes a defining trait. Yet, in this very confidence lies a subtle risk that is often overlooked. When conviction turns into certainty without space for dialogue, conversations begin to narrow. Suggestions are heard, but not always considered. Perspectives are offered, but not always encouraged. Decisions are made, but not always explained. From the outside, this may still appear as strong leadership. Internally, however, a different dynamic begins to take shape. People start to agree more than they contribute. This is where many businesses unknowingly enter a critical phase. When teams, partners, or stakeholders begin to hold back their perspective, the quality of thinking around the business reduces. What appears as alignment is often silent disengagement. What looks like efficiency is sometimes the absence of challenge. Over time, this directly affects the decisions being made. At a Rs 5 crore level, this may not be immediately visible. Operations continue, revenue flows, and the business appears stable. But as the organisation attempts to grow further, this lack of diverse thinking begins to surface as a constraint. Growth slows, not because of lack of effort, but because of limited perspective. On the other side of this equation are individuals who consistently find themselves accommodating such dynamics. They recognise when their voice is not being fully heard, yet choose not to assert it. The intention is often to preserve relationships, avoid friction, or maintain a sense of professional ease. Initially, this approach appears collaborative. Over time, however, it begins to shape perception. When individuals do not express their perspective, they are gradually seen as agreeable rather than essential. Their presence is valued, but their input is not actively sought. In many cases, they become part of the process, but not part of the decision. This is where personal branding begins to influence business outcomes in ways that are not immediately obvious. A personal brand is not built only through visibility or achievement. It is built through how consistently one demonstrates clarity, confidence, and openness in moments that require it. It is shaped by whether people feel encouraged to think around you, or restricted in your presence. At higher levels of business, this distinction becomes critical. If people agree with you more than they challenge you, it may not be a sign of strong leadership. It may be an indication that your environment is no longer enabling better thinking. Similarly, if you find yourself constantly adjusting to others without expressing your own perspective, your contribution may be diminishing in ways that affect both your influence and your growth. Both situations carry a cost. They affect decision quality, limit innovation, and over time, restrict the scalability of the business itself. What makes this particularly challenging is that these patterns develop gradually, often going unnoticed until the impact becomes difficult to ignore. The most effective leaders recognise this early. They create space for dialogue without losing direction. They express conviction without dismissing perspective. They build environments where contribution is expected, not avoided. In doing so, they strengthen not only their business, but also their personal brand. For entrepreneurs operating at a stage where growth is no longer just about execution but about expanding thinking, this becomes an important point of reflection. If there is even a possibility that your current interactions are limiting the quality of thinking around you, it is worth addressing before it begins to affect outcomes. I work with a select group of founders and professionals to help them refine how they are perceived, communicate with greater impact, and build personal brands that support sustained growth. You may explore this further here: https://sprect.com/pro/divyaaadvaani In the long run, it is not only the decisions you make, but the thinking you allow around those decisions, that determines how far your business can truly grow. (The author is a personal branding expert. She has clients from 14+ countries. Views personal.)

Growing Risks Of Cyber Warfare

Updated: Oct 21, 2024

In a shocking series of events, multiple coordinated explosions have rocked Lebanon and parts of Syria, killing dozens of people and injuring thousands. The blasts occurred after explosive devices, hidden inside pagers and other radio communication devices, were detonated. The targeted individuals were primarily members of Hezbollah, with the explosions taking place in densely populated areas, resulting in widespread injuries to civilians, including children.

The devices, mainly pagers, walkie-talkies, and radios, had been in the possession of Hezbollah operatives, who had acquired them months prior, under the assumption they were secure. However, Hezbollah has accused Israel’s intelligence agency, Shin Bet, of tampering with the devices during transit.

According to security experts, Israel’s elite secret cyber warfare unit was behind the attack. This unit, known for its global cyber operations, is also linked to the creation of the STUXnet malware, which was responsible for the failure of Iran’s nuclear power plant. The pagers were rigged with explosive materials in place of a battery, and a relay switch was installed, allowing the explosions to be triggered remotely in a synchronized manner. The result was devastating injuries to the eyes, face, hands, and legs of those carrying the devices.

The incident occurred in Hezbollah-stronghold areas, including the Dahieh suburb of Beirut, southern Lebanon, and parts of the Beqaa Valley, with some explosions also reported across the border in Syria. The blasts overwhelmed hospitals, as hundreds of victims sought medical help for injuries ranging from severe burns to shattered limbs. The intensity of the explosions, far beyond that of ordinary battery malfunctions, indicates a highly sophisticated sabotage operation.

These explosions have not only deepened the crisis in Lebanon but have also raised critical questions about supply chain security, intelligence tactics, and the legality of using booby-trapped electronics in conflict zones.


What Are Pagers, and Why Are They Still Preferred?

Despite being old-school tele communication technology, pagers or beepers are still used in many countries, particularly in critical sectors and organizations. Pagers primarily facilitate one-way communication, pager uses higher frequencies than car radios i.e. 400 MHz band frequency. It also used a very basic type of VHF spectrum. These devices operate in restricted areas to transfer messages, alerts, and information. These devices are considered more secure and harder to trace or track compared to mobile phones, as they only receive messages, similar to a car radio that receives signals without revealing the listener’s identity or location. Additionally, pagers lack features like Bluetooth or GPS, making them more difficult to hack or compromise.

Among their many advantages, pagers are known for their long battery life and durability, making them ideal for continuous use in specific industries. There are an estimated two million active pager users worldwide. Hezbollah began using pagers after Israel successfully assassinated a high-ranking Hezbollah target by hacking his cellphone and precisely targeting him with a missile. Since then, many Hezbollah members have switched to more primitive communication devices, like pagers, to avoid being tracked via the internet.


Are Mobile Phones and Smartphones Similarly Vulnerable?

American and European security agencies suggest that, theoretically, it is possible to alter mobile phones and other smart devices to turn them into explosive devices. However, practically, it is more difficult due to the advanced security systems in modern smartphones. A hacked smartphone may exhibit various signs, such as abnormal temperature changes, slower system performance, unexpected reboots, odd sounds during calls, hung applications, or irrelevant messages and pop-ups, all of which could indicate tampering. These security systems make it more challenging to modify smartphones in the same manner as simpler devices like pagers.


New Security Challenges

The Hezbollah pager explosion serves as a wake-up call for sectors involving critical infrastructure and aviation. In an era where smartphones are network-connected and can be charged wirelessly, the possibility of tampering with batteries or embedding explosives, like HMX, PETN and other type of plastic explosives pose significant risks. During flights, even a minor explosion could result in catastrophic consequences. On the ground, the threat extends to damaging nearby aircraft, equipment, and infrastructure. Airport security may soon impose stricter regulations, potentially banning pagers, walkie-talkies, and radios, much like power banks, which are now restricted on flights. In the future, mobile phones may only be allowed in switched-off modes, placed in lithium-safe bags during flights. Suspicious devices could be handled separately in Faraday-sheet bags to block any network or signal connections.

This incident highlights the growing risks of cyber warfare and the dangers posed by everyday communication devices being exploited for sabotage. It is an alarming call for a nation’s security as the treat of such critical infrastructure being handled by terrorist organisations can compromise the use of day-to-day electronics for malicious activities. As technology advances, so must the protocols for ensuring public safety, particularly in high-risk environments where even the smallest vulnerability could lead to devastating consequences.

(The writer is an eminent cyber and explosives forensic expert. Views personal.)

Comments


bottom of page