BHarwana
MODERATOR
- Joined
- Sep 24, 2016
- Messages
- 24,827
- Reaction score
- 20
- Country
- Location
How India is using NSO Group spyware to facilitate Extra Judicial killings in Kashmir.
First event
The registration
The process of registering WhatsApp groups began in 2018 but lets take this Mar 2019 news as first record for Kashmir. All the Admins of WhatsApp group were registered by Indian security forces. These Admins were registered to launch NSO group Spyware.
Evidence of NSO Group Spyware.
This 9th Nov 2019 Article im @nytimes & many other news from this time period are evidence of India using the NSO Group Spyware.
The Lockdown of Kashmir 5th Aug 2019 India initiated the lock down of Kashmir. The day Red Iron Curtain came down on Kashmir valley & hid it from the world eyes. In the lock down. India launched Gestapo type operation. Internet was locked & all phone communication was monitored.
A system was set in place the term Coin Operation came to life. The Data which India had collected from NSO groups spyware was used to target the youth who had a wish for freedom. Under Coin Ops a Grid was established areas were divided & targets in these areas were recognized and divided into categories. The first category & second included youth and freelance journalist were assigned to Cyber police of disputed J&K. Under the charge of
@Tahir_A Tahir Ashraf SP, Incharge Cyber Police Kashmir a brutal crack down is running. Using data of phones calls retrieved by NSO Group spyware students and journalists were abducted and terrorized to give up voice of freedom. SP Tahir Ashraf terrorized many with torture and forced them to issue statements on their social media which will deter others to say the truth online.
This helped India hide its brutality in Kashmir. Images below show some brutalities of SP Tahir of J&K Cyber police. How he made people give up their freedom of expression. This is the most brutal confirmed evidence of oppression. A modern day Gestapo using NSO Groups spyware.
Amoumg all this is the famous case of Kashmiri Photo jourmilist Masrat Zahra #masratzahra who was arrested for posting a @GettyImages Image. The voice for Masrat Zahra was cried around the world but there are many unknown names waiting freedom from NSO powered Cyper police.
After the registering of WhatsApp groups Admins. The process of spreading NSO group Spyware began. WhatsApp groups Admins were asked to post infected links in their groups. J&K Cyber police officer was also added to those groups
NSO group Spyware infected most devices in disputed valley. It targeted everyone from students, politicians, doctors, teachers & even the Muslim serving in Indian security forces. This info was collected into a cloud servers of Indian Army lunched in 2018.
https://economictimes.indiatimes.co...my-launched/articleshow/49722666.cms?from=mdr
The responsibility of sorting & arranging this data was of Indian Defence Cyber Agency (DCA). DCA was established: 28 September 2018 & came online just before the lock down was initiated on Kashmir with the sole purpose of oppressing Kashmir.
Defence Cyber Agency DCA is a tri service agency. In Kashmir DCA collaborated with IAF & Indian Army. Duty of DCA was to identify targets and forward info to IAF & Indian Army to conduct Coin ops or Extra Judicial Operations.
How DCA identified targets. The Data collected from NSO Group Spyware was used to recognize targets from Indian National Register of Citizens using a facial recognition software. Evidence of India trying to build world's biggest facial recognition system
https://edition.cnn.com/2019/10/17/tech/india-facial-recognition-intl-hnk/index.html
First event
The registration
The process of registering WhatsApp groups began in 2018 but lets take this Mar 2019 news as first record for Kashmir. All the Admins of WhatsApp group were registered by Indian security forces. These Admins were registered to launch NSO group Spyware.
Evidence of NSO Group Spyware.
This 9th Nov 2019 Article im @nytimes & many other news from this time period are evidence of India using the NSO Group Spyware.
The Lockdown of Kashmir 5th Aug 2019 India initiated the lock down of Kashmir. The day Red Iron Curtain came down on Kashmir valley & hid it from the world eyes. In the lock down. India launched Gestapo type operation. Internet was locked & all phone communication was monitored.
A system was set in place the term Coin Operation came to life. The Data which India had collected from NSO groups spyware was used to target the youth who had a wish for freedom. Under Coin Ops a Grid was established areas were divided & targets in these areas were recognized and divided into categories. The first category & second included youth and freelance journalist were assigned to Cyber police of disputed J&K. Under the charge of
@Tahir_A Tahir Ashraf SP, Incharge Cyber Police Kashmir a brutal crack down is running. Using data of phones calls retrieved by NSO Group spyware students and journalists were abducted and terrorized to give up voice of freedom. SP Tahir Ashraf terrorized many with torture and forced them to issue statements on their social media which will deter others to say the truth online.
This helped India hide its brutality in Kashmir. Images below show some brutalities of SP Tahir of J&K Cyber police. How he made people give up their freedom of expression. This is the most brutal confirmed evidence of oppression. A modern day Gestapo using NSO Groups spyware.
Amoumg all this is the famous case of Kashmiri Photo jourmilist Masrat Zahra #masratzahra who was arrested for posting a @GettyImages Image. The voice for Masrat Zahra was cried around the world but there are many unknown names waiting freedom from NSO powered Cyper police.
After the registering of WhatsApp groups Admins. The process of spreading NSO group Spyware began. WhatsApp groups Admins were asked to post infected links in their groups. J&K Cyber police officer was also added to those groups
NSO group Spyware infected most devices in disputed valley. It targeted everyone from students, politicians, doctors, teachers & even the Muslim serving in Indian security forces. This info was collected into a cloud servers of Indian Army lunched in 2018.
https://economictimes.indiatimes.co...my-launched/articleshow/49722666.cms?from=mdr
The responsibility of sorting & arranging this data was of Indian Defence Cyber Agency (DCA). DCA was established: 28 September 2018 & came online just before the lock down was initiated on Kashmir with the sole purpose of oppressing Kashmir.
Defence Cyber Agency DCA is a tri service agency. In Kashmir DCA collaborated with IAF & Indian Army. Duty of DCA was to identify targets and forward info to IAF & Indian Army to conduct Coin ops or Extra Judicial Operations.
How DCA identified targets. The Data collected from NSO Group Spyware was used to recognize targets from Indian National Register of Citizens using a facial recognition software. Evidence of India trying to build world's biggest facial recognition system
https://edition.cnn.com/2019/10/17/tech/india-facial-recognition-intl-hnk/index.html