top of page

By:

Abhijit Mulye

21 August 2024 at 11:29:11 am

Red flag to green steel

Ex-Maoists forge new destiny in Gadchiroli Gadchiroli: The rugged, forested terrain of Gadchiroli district, long synonymous with the violence and deep-rooted anti-establishment tenets of the ‘Red Ideology’, is now witnessing a remarkable social and industrial transformation. At the Lloyds Metals and Energy Ltd. (LMEL) plant in Konsari, once-feared Maoist operatives are shedding their past lives and embracing a new, respectable existence as skilled workers in a cutting-edge Direct Reduced Iron...

Red flag to green steel

Ex-Maoists forge new destiny in Gadchiroli Gadchiroli: The rugged, forested terrain of Gadchiroli district, long synonymous with the violence and deep-rooted anti-establishment tenets of the ‘Red Ideology’, is now witnessing a remarkable social and industrial transformation. At the Lloyds Metals and Energy Ltd. (LMEL) plant in Konsari, once-feared Maoist operatives are shedding their past lives and embracing a new, respectable existence as skilled workers in a cutting-edge Direct Reduced Iron (DRI) and pellet plant. This ‘green steel’ project, part of LMEL’s push for an integrated steel complex in the region, is functioning not just as an industrial unit but as a crucial pillar in the Maharashtra government’s surrender-cum-rehabilitation policy. So far, LMEL, in coordination with the state government and the Gadchiroli Police, has provided employment and training to 68 surrendered Maoists and 14 members of families affected by Naxal violence, a total of 82 individuals, offering them a definitive pathway back to the mainstream. The Shift The transformation begins at the company’s dedicated Lloyds Skill Development and Training Centre at Konsari. Recognizing that many former cadres had limited formal education, the company implements a structured, skill-based rehabilitation model. They are trained in essential technical and operational skills required for plant administration, civil construction, and mechanical operations. For individuals like Govinda Atala, a former deputy commander, the change is palpable. “After surrendering, I got the right to live a new life,” Atala said. “I am very happy to get this job. I am now living my life on my own; there is no pressure on me now.” Suresh Hichame, who spent over a decade in the movement before surrendering in 2009 too echoed the sentiments. He realized the path of violence offered neither him nor his family any benefit. Moreover, his self-respecct was hurt. He knew several languages and carried out several crucial tasks for the banned organization remaining constantly under the shadow of death. Today, he works in the plant, receiving a steady monthly salary that enables him to care for his family—a basic dignity the ‘Red Ideology’ could never provide. The monthly salaries of the rehabilitated workers, typically ranging from Rs 13,000 to Rs 20,000, are revolutionary in a region long characterized by poverty and lack of opportunities. Trust, Stability The employment of former Maoists is a brave and calculated risk for LMEL, an industry that historically faced stiff opposition and even violence from the left wing extremist groups. LMEL’s management, however, sees it as an investment in inclusive growth and long-term stability for the district. The LMEL has emphasized the company’s commitment to training and facilitating career growth for the local populace, including the surrendered cadres. This commitment to local workforce upskilling is proving to be a highly effective counter-insurgency strategy, chipping away at the foundation of the Maoist movement: the exploitation of local grievances and lack of economic options. The reintegration effort extends beyond the factory floor. By providing stable incomes and a sense of purpose, LMEL helps the former rebels navigate the social transition. They are now homeowners, taxpayers, and active members of the community, replacing the identity of an outlaw with that of a respected employee. This social acceptance, coupled with economic independence, is the true measure of rehabilitation. The successful employment of cadres, some of whom were once high-ranking commanders, also sends a powerful message to those still active in the jungle: the path to a peaceful and prosperous life is open and tangible. It transforms the promise of government rehabilitation into a concrete reality. The plant, with its production of iron ore and steel, is physically transforming the region into an emerging industrial hub, and in doing so, it is symbolically forging the nation’s progress out of the ashes of extremism. The coordinated effort between private industry, the state government, and the Gadchiroli police is establishing a new environment of trust, stability, and economic progress, marking Gadchiroli’s transition from a Maoist hotbed to a model of inclusive and sustainable development.

Who Took the Cookie Out of the Jar?

cookie

In today’s hyper-connected world, the word ‘cookie’ evokes more than just the buttery delights that accompany a cup of tea. Beyond the realm of nankhatai and chocolate chip confections lies another, far less appetizing variety: the digital cookie. These virtual snippets, invisible to the naked eye, are the linchpin of modern online functionality, facilitating everything from smoother website logins to tracking consumer habits. Yet, just as cookies crumble under a bite, so too can the veil of digital privacy when these data packets are misused.


The Good Cookies: Embedded in websites and stored on users’ devices, cookies were created to enhance online experiences. Their role in streamlining the digital journey is significant: session management, personalized browsing, and efficient data retention are just a few examples of how cookies can be beneficial.


Cookies: These ephemeral files exist only for the duration of a user’s visit. When a browser is closed, session cookies vanish. Their utility is most evident in maintaining a seamless experience. For instance, preserving login status or retaining items in a shopping cart.


Persistent Cookies: Unlike their transient counterparts, persistent cookies linger on devices for a predetermined time. They allow websites to remember user preferences, such as language settings or recurring login details.


First-Party Cookies: Cookies generated by visited sites enable core functions and basic analytics. When used responsibly, they enhance convenience and create a personalized digital experience. But as the saying goes, every rose has its thorn.


Not all cookies are benign. What starts as a simple text file can quickly become a tool for intrusion. The shift from convenience to compromise is seamless and often invisible to users.


While cookies aid data retention for targeted advertising, they also offer opportunities for cybercriminals. Browsing data can turn into exploitable digital dossiers, escalating tracking from ad personalization to security risks. This fuels a data brokerage industry where user data is compiled and sold, blurring the line between utility and intrusion. Cookies underpin this multi-billion-dollar market, often unbeknownst to users whose actions are part of a hidden auction.


One of the more insidious exploits, session hijacking, can be triggered through man-in-the-middle (MITM) attacks or Cross-Site Scripting (XSS). By stealing session cookies, cybercriminals can bypass login credentials and impersonate users. In cases of online banking or cryptocurrency platforms, the implications are severe. Reports from 2019 to 2020 highlighted a wave of incidents where session cookies were used to gain unauthorized access, leading to substantial financial thefts.


In sensitive sectors like banking, stolen session cookies let attackers impersonate users and access accounts without passwords, highlighting the need for strong security measures like encryption and multi-factor authentication. Persistent cookies are prime targets for phishing schemes, capturing data on fraudulent sites and enabling identity theft. Modern phishing campaigns use advanced techniques where cookies are key, embedding malicious code in legitimate-seeming emails or sites to deceive users into revealing data.


Persistent cookies also find their way into shadowy practices involving ‘supercookies’ and ‘zombie cookies’ - variations that can regenerate even after deletion. These are used to track user behaviour far more invasively, making it difficult for individuals to regain control over their data. Supercookies bypass conventional cookie management settings and, when combined with device fingerprinting, can build a uniquely identifiable profile of users that is nearly impossible to erase.


The banking sector, among others, has seen the risks of cookie exploitation play out in stark detail. In documented cases between 2019 and 2020, cybercriminals successfully stole session cookies to impersonate users, accessing accounts and draining funds. The response from the financial industry included ramped-up security protocols and increased user education—an acknowledgment that even the most innocuous digital elements can harbour latent threats.


Another high-profile incident involved a series of attacks on cryptocurrency platforms, where stolen session cookies were used to bypass two-factor authentication (2FA). This allowed attackers to infiltrate digital wallets and trading accounts, siphoning off significant sums and eroding trust in the security of such platforms.


To mitigate cookie risks, understanding their dual nature is essential. Users should clear cookies and browser history regularly, use tools to block third-party cookies, stay vigilant against phishing, and use HTTPS sites. Multi-factor authentication (MFA) adds a defence layer even if session cookies are compromised. Organizations need to educate users, update security protocols, use ‘HttpOnly’ and ‘Secure’ cookie attributes, and promote logging out when accounts are not in use to minimize risks.


Cookies, much like their edible namesakes, can bring comfort and delight or, in the wrong hands, create a mess. While they undoubtedly enrich the online experience when properly managed, their potential misuse calls for vigilance. Users must stay informed, and organizations must continuously bolster cybersecurity to ensure that digital crumbs do not invite unsavoury guests to the table.


(The writer is a cyber security expert and serves as a technical advisor to the Maharashtra government. Views personal.)

Comments


bottom of page