top of page

By:

Akhilesh Sinha

25 June 2025 at 2:53:54 pm

Ideology, Illusion, and the Politics of Power

Leader of Opposition in the Lok Sabha Rahul Gandhi greets supporters during a roadshow ahead of the Kerala assembly polls, in Kozhikode district on Tuesday. | Pic: PTI New Delhi:  At a critical electoral juncture in Kerala, the political contest being waged in the name of ideology appears less about public welfare and more like a renewed struggle for the division of power. Kerala's electoral battle exposes contradictions between ideology and alliances, as BJP, Congress, and Left trade...

Ideology, Illusion, and the Politics of Power

Leader of Opposition in the Lok Sabha Rahul Gandhi greets supporters during a roadshow ahead of the Kerala assembly polls, in Kozhikode district on Tuesday. | Pic: PTI New Delhi:  At a critical electoral juncture in Kerala, the political contest being waged in the name of ideology appears less about public welfare and more like a renewed struggle for the division of power. Kerala's electoral battle exposes contradictions between ideology and alliances, as BJP, Congress, and Left trade accusations while prioritizing power, leaving voters questioning credibility, governance plans, and commitment to justice.   At the national level, the Congress and the Left position themselves as opponents of the Bharatiya Janata Party and Prime Minister Narendra Modi. Yet before the public, they often appear equally eager to undercut one another. In Parliament, they join hands to bring no-confidence motions and accuse the government of misusing investigative agencies. However, at the state level, this coordination is conspicuously absent. In Kerala, Congress leader Rahul Gandhi has alleged a nexus between the CPI(M) and the SDPI, even hinting at tacit understandings between the BJP and the Left. Meanwhile, LDF Chief Minister Pinarayi Vijayan has dismissed these claims as "entirely baseless."   This persistent friction reinforces the impression that ideology has become largely symbolic, while the real contest revolves around consolidating vote banks and securing seats. The Left, invoking the language of "pragmatic alliances," signals readiness to align with the Congress at the national level. Yet in Kerala, it faces accusations of straying from its foundational principles, even as it projects itself as the principal alternative to the BJP.   Conspiracy factor Congress leader Rahul Gandhi has repeatedly asserted in his campaign rallies that this election is a contest between two ideologies-the Left and the UDF. Yet, he claims, for the first time there is an "unprecedented partnership" emerging between the Left and the BJP. He alleges that the CPI(M) can be easily controlled by the BJP, whereas the Congress-led UDF would not play into its hands. Such assertions risk creating the impression that ideological confrontation has now given way to a politics of expedient compromises.   On the other hand, CM Pinarayi Vijayan firmly maintains that his party neither seeks support from the SDPI nor engages in any covert understanding with communal forces. He portrays the Left Democratic Front as a formation grounded in "clear ideological principles" and resolutely opposed to communal politics. The contradiction here is striking that just as the BJP accuses the Congress and the Left of collusion, the Congress and the Left, in turn, level similar charges of "compromise" against each other.   Confused Electorate In Kerala's electoral theatre, PM Modi has branded both the UDF and the LDF as "each other's B team," while projecting the BJP as the only genuine "A team." His argument rests on the claim that the state has, for decades, been trapped between two traditional power blocs, one corrupt and the other allegedly even more so. He contends that both alliances have deceived the public through vote-bank politics, whereas the BJP now promises to "expose" their corruption and deliver "justice."   The larger question remains, when the Left and the Congress join hands in Parliament to oppose the BJP, is their unity rooted in a principled stand against the ruling party BJP/NDA, or is it merely political theatre calibrated for electoral convenience? If both claim to be ideologically committed formations, what justifies their readiness to confront each other in the states and often aggressively over vote banks?   Real Issues At the national level, the Left often raises its voice on substantive constitutional and economic questions; corruption, public debt, privatization, and decentralization. Yet, in the heat of elections, these very debates are reduced to the arithmetic of vote banks and seat shares. The BJP, as the ruling party, seeks to anchor its campaign in development metrics, flagship projects like the Vizhinjam Port, and symbolic initiatives such as the Nari Shakti Vandan Act, presenting them as tangible achievements before the electorate. The opposition, in turn, attempts to recast these same initiatives as narratives of "debt" and "plunder."

Growing Risks Of Cyber Warfare

Updated: Oct 21, 2024

In a shocking series of events, multiple coordinated explosions have rocked Lebanon and parts of Syria, killing dozens of people and injuring thousands. The blasts occurred after explosive devices, hidden inside pagers and other radio communication devices, were detonated. The targeted individuals were primarily members of Hezbollah, with the explosions taking place in densely populated areas, resulting in widespread injuries to civilians, including children.

The devices, mainly pagers, walkie-talkies, and radios, had been in the possession of Hezbollah operatives, who had acquired them months prior, under the assumption they were secure. However, Hezbollah has accused Israel’s intelligence agency, Shin Bet, of tampering with the devices during transit.

According to security experts, Israel’s elite secret cyber warfare unit was behind the attack. This unit, known for its global cyber operations, is also linked to the creation of the STUXnet malware, which was responsible for the failure of Iran’s nuclear power plant. The pagers were rigged with explosive materials in place of a battery, and a relay switch was installed, allowing the explosions to be triggered remotely in a synchronized manner. The result was devastating injuries to the eyes, face, hands, and legs of those carrying the devices.

The incident occurred in Hezbollah-stronghold areas, including the Dahieh suburb of Beirut, southern Lebanon, and parts of the Beqaa Valley, with some explosions also reported across the border in Syria. The blasts overwhelmed hospitals, as hundreds of victims sought medical help for injuries ranging from severe burns to shattered limbs. The intensity of the explosions, far beyond that of ordinary battery malfunctions, indicates a highly sophisticated sabotage operation.

These explosions have not only deepened the crisis in Lebanon but have also raised critical questions about supply chain security, intelligence tactics, and the legality of using booby-trapped electronics in conflict zones.


What Are Pagers, and Why Are They Still Preferred?

Despite being old-school tele communication technology, pagers or beepers are still used in many countries, particularly in critical sectors and organizations. Pagers primarily facilitate one-way communication, pager uses higher frequencies than car radios i.e. 400 MHz band frequency. It also used a very basic type of VHF spectrum. These devices operate in restricted areas to transfer messages, alerts, and information. These devices are considered more secure and harder to trace or track compared to mobile phones, as they only receive messages, similar to a car radio that receives signals without revealing the listener’s identity or location. Additionally, pagers lack features like Bluetooth or GPS, making them more difficult to hack or compromise.

Among their many advantages, pagers are known for their long battery life and durability, making them ideal for continuous use in specific industries. There are an estimated two million active pager users worldwide. Hezbollah began using pagers after Israel successfully assassinated a high-ranking Hezbollah target by hacking his cellphone and precisely targeting him with a missile. Since then, many Hezbollah members have switched to more primitive communication devices, like pagers, to avoid being tracked via the internet.


Are Mobile Phones and Smartphones Similarly Vulnerable?

American and European security agencies suggest that, theoretically, it is possible to alter mobile phones and other smart devices to turn them into explosive devices. However, practically, it is more difficult due to the advanced security systems in modern smartphones. A hacked smartphone may exhibit various signs, such as abnormal temperature changes, slower system performance, unexpected reboots, odd sounds during calls, hung applications, or irrelevant messages and pop-ups, all of which could indicate tampering. These security systems make it more challenging to modify smartphones in the same manner as simpler devices like pagers.


New Security Challenges

The Hezbollah pager explosion serves as a wake-up call for sectors involving critical infrastructure and aviation. In an era where smartphones are network-connected and can be charged wirelessly, the possibility of tampering with batteries or embedding explosives, like HMX, PETN and other type of plastic explosives pose significant risks. During flights, even a minor explosion could result in catastrophic consequences. On the ground, the threat extends to damaging nearby aircraft, equipment, and infrastructure. Airport security may soon impose stricter regulations, potentially banning pagers, walkie-talkies, and radios, much like power banks, which are now restricted on flights. In the future, mobile phones may only be allowed in switched-off modes, placed in lithium-safe bags during flights. Suspicious devices could be handled separately in Faraday-sheet bags to block any network or signal connections.

This incident highlights the growing risks of cyber warfare and the dangers posed by everyday communication devices being exploited for sabotage. It is an alarming call for a nation’s security as the treat of such critical infrastructure being handled by terrorist organisations can compromise the use of day-to-day electronics for malicious activities. As technology advances, so must the protocols for ensuring public safety, particularly in high-risk environments where even the smallest vulnerability could lead to devastating consequences.

(The writer is an eminent cyber and explosives forensic expert. Views personal.)

Comments


bottom of page