top of page

By:

Abhijit Mulye

21 August 2024 at 11:29:11 am

Gadchiroli SP declares Maoist menace ‘almost over’

Mumbai: In a resounding statement signalling a historic shift, Gadchiroli Superintendent of Police (SP) Neelotpal has declared the district, once the dark heart of the ‘Red Corridor,’ is on the verge of becoming completely free of the Naxal menace. The SP expressed absolute confidence in the complete eradication of the banned CPI (Maoist) presence, noting that the remaining cadres have dwindled to a mere handful. “There has been a sea change in the situation,” SP Neelotpal stated,...

Gadchiroli SP declares Maoist menace ‘almost over’

Mumbai: In a resounding statement signalling a historic shift, Gadchiroli Superintendent of Police (SP) Neelotpal has declared the district, once the dark heart of the ‘Red Corridor,’ is on the verge of becoming completely free of the Naxal menace. The SP expressed absolute confidence in the complete eradication of the banned CPI (Maoist) presence, noting that the remaining cadres have dwindled to a mere handful. “There has been a sea change in the situation,” SP Neelotpal stated, highlighting the dramatic turnaround. He revealed that from approximately 100 Maoist cadres on record in January 2024, the number has plummeted to barely 10 individuals whose movements are now confined to a very small pocket of the Bhamragad sub-division in South Gadchiroli, near the Chhattisgarh border. “North Gadchiroli is now free of Maoism. The Maoists have to surrender and join the mainstream or face police action... there is no other option.” The SP attributes this success to a meticulously executed multi-pronged strategy encompassing intensified anti-Maoist operations, a robust Civic Action Programme, and the effective utilisation of Maharashtra’s attractive surrender-cum-rehabilitation policy. The Gadchiroli Police, especially the elite C-60 commandos, have achieved significant operational milestones. In the last three years alone, they have neutralised 43 hardcore Maoists and achieved a 100 per cent success rate in operations without police casualties for nearly five years. SP Neelotpal highlighted that the security forces have aggressively moved to close the “security vacuum,” which was once an estimated 3,000 square kilometres of unpoliced territory used by Maoists for training and transit. The establishment of eight new police camps/Forward Operating Bases (FoBs) since January 2023, including in the remote Abujhmad foothills, has been crucial in securing these areas permanently. Winning Hearts, Minds The Civic Action Programme has been deemed a “game changer” by the SP. Through schemes like ‘Police Dadalora Khidaki’ and ‘Project Udaan’, the police have transformed remote outposts into service delivery centres, providing essential government services and employment opportunities. This sustained outreach has successfully countered Maoist propaganda and, most critically, resulted in zero Maoist recruitment from Gadchiroli for the last few years. Surrender Wave The state’s progressive rehabilitation policy has seen a massive influx of surrenders. “One sentiment is common among all the surrendered cadres: that the movement has ended, it has lost public support, and without public support, no movement can sustain,” the SP noted. The surrender of key figures, notably that of Mallojula Venugopal Rao alias ‘Bhupathi,’ a CPI (Maoist) Politburo member, and his wife Sangeeta, was a “landmark development” that triggered a surrender wave. Since June 2024, over 126 Maoists have surrendered. The rehabilitation program offers land, housing under the Pradhan Mantri Awas Yojana, and employment. Surrendered cadres are receiving skill training and are successfully transitioning into normal life, with around 70 already employed in the local Lloyds plant. A District Reborn The transformation of Gadchiroli is now moving beyond security concerns. With the decline of extremism, the district is rapidly moving towards development and normalcy. The implementation of development schemes, round-the-clock electricity, water supply, mobile towers, and new infrastructure like roads and bridges is being given top priority. He concludes that the police’s focus is now shifting from an anti-Maoist offensive to routine law-and-order policing, addressing new challenges like industrialisation, theft, and traffic management. With the Maoist movement in “complete disarray” and major strongholds like the Maharashtra-Madhya Pradesh-Chhattisgarh (MMC) Special Zone collapsing, the SP is highly optimistic. Gadchiroli is not just getting rid of the Naxal menace; it is embracing its future as a developing, peaceful district, well on track to meet the central government’s goal of eradicating Naxalism by March 31, 2026.

Who Took the Cookie Out of the Jar?

cookie

In today’s hyper-connected world, the word ‘cookie’ evokes more than just the buttery delights that accompany a cup of tea. Beyond the realm of nankhatai and chocolate chip confections lies another, far less appetizing variety: the digital cookie. These virtual snippets, invisible to the naked eye, are the linchpin of modern online functionality, facilitating everything from smoother website logins to tracking consumer habits. Yet, just as cookies crumble under a bite, so too can the veil of digital privacy when these data packets are misused.


The Good Cookies: Embedded in websites and stored on users’ devices, cookies were created to enhance online experiences. Their role in streamlining the digital journey is significant: session management, personalized browsing, and efficient data retention are just a few examples of how cookies can be beneficial.


Cookies: These ephemeral files exist only for the duration of a user’s visit. When a browser is closed, session cookies vanish. Their utility is most evident in maintaining a seamless experience. For instance, preserving login status or retaining items in a shopping cart.


Persistent Cookies: Unlike their transient counterparts, persistent cookies linger on devices for a predetermined time. They allow websites to remember user preferences, such as language settings or recurring login details.


First-Party Cookies: Cookies generated by visited sites enable core functions and basic analytics. When used responsibly, they enhance convenience and create a personalized digital experience. But as the saying goes, every rose has its thorn.


Not all cookies are benign. What starts as a simple text file can quickly become a tool for intrusion. The shift from convenience to compromise is seamless and often invisible to users.


While cookies aid data retention for targeted advertising, they also offer opportunities for cybercriminals. Browsing data can turn into exploitable digital dossiers, escalating tracking from ad personalization to security risks. This fuels a data brokerage industry where user data is compiled and sold, blurring the line between utility and intrusion. Cookies underpin this multi-billion-dollar market, often unbeknownst to users whose actions are part of a hidden auction.


One of the more insidious exploits, session hijacking, can be triggered through man-in-the-middle (MITM) attacks or Cross-Site Scripting (XSS). By stealing session cookies, cybercriminals can bypass login credentials and impersonate users. In cases of online banking or cryptocurrency platforms, the implications are severe. Reports from 2019 to 2020 highlighted a wave of incidents where session cookies were used to gain unauthorized access, leading to substantial financial thefts.


In sensitive sectors like banking, stolen session cookies let attackers impersonate users and access accounts without passwords, highlighting the need for strong security measures like encryption and multi-factor authentication. Persistent cookies are prime targets for phishing schemes, capturing data on fraudulent sites and enabling identity theft. Modern phishing campaigns use advanced techniques where cookies are key, embedding malicious code in legitimate-seeming emails or sites to deceive users into revealing data.


Persistent cookies also find their way into shadowy practices involving ‘supercookies’ and ‘zombie cookies’ - variations that can regenerate even after deletion. These are used to track user behaviour far more invasively, making it difficult for individuals to regain control over their data. Supercookies bypass conventional cookie management settings and, when combined with device fingerprinting, can build a uniquely identifiable profile of users that is nearly impossible to erase.


The banking sector, among others, has seen the risks of cookie exploitation play out in stark detail. In documented cases between 2019 and 2020, cybercriminals successfully stole session cookies to impersonate users, accessing accounts and draining funds. The response from the financial industry included ramped-up security protocols and increased user education—an acknowledgment that even the most innocuous digital elements can harbour latent threats.


Another high-profile incident involved a series of attacks on cryptocurrency platforms, where stolen session cookies were used to bypass two-factor authentication (2FA). This allowed attackers to infiltrate digital wallets and trading accounts, siphoning off significant sums and eroding trust in the security of such platforms.


To mitigate cookie risks, understanding their dual nature is essential. Users should clear cookies and browser history regularly, use tools to block third-party cookies, stay vigilant against phishing, and use HTTPS sites. Multi-factor authentication (MFA) adds a defence layer even if session cookies are compromised. Organizations need to educate users, update security protocols, use ‘HttpOnly’ and ‘Secure’ cookie attributes, and promote logging out when accounts are not in use to minimize risks.


Cookies, much like their edible namesakes, can bring comfort and delight or, in the wrong hands, create a mess. While they undoubtedly enrich the online experience when properly managed, their potential misuse calls for vigilance. Users must stay informed, and organizations must continuously bolster cybersecurity to ensure that digital crumbs do not invite unsavoury guests to the table.


(The writer is a cyber security expert and serves as a technical advisor to the Maharashtra government. Views personal.)

Comments


bottom of page