Everyone's Blog Posts - Competitive Intelligence2024-03-19T06:09:38Zhttps://competitiveintelligence.ning.com/profiles/blog/feed?xn_auth=noEXECUTIVE CERTIFICATE IN CYBER SECURITY (ECCS V4.0) - [#ECCSv4.0]tag:competitiveintelligence.ning.com,2022-11-28:2036441:BlogPost:2236602022-11-28T07:19:16.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p class="reader-text-block__paragraph"><a href="https://storage.ning.com/topology/rest/1.0/file/get/10893273661?profile=original" rel="noopener" target="_blank"><img class="align-full" src="https://storage.ning.com/topology/rest/1.0/file/get/10893273661?profile=RESIZE_710x"></img></a></p>
<p class="reader-text-block__paragraph">EXECUTIVE CERTIFICATE IN CYBER SECURITY</p>
<h3 class="reader-text-block__heading2">INTRODUCTION:</h3>
<p class="reader-text-block__paragraph">The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on…</p>
<p class="reader-text-block__paragraph"><a href="https://storage.ning.com/topology/rest/1.0/file/get/10893273661?profile=original" target="_blank" rel="noopener"><img src="https://storage.ning.com/topology/rest/1.0/file/get/10893273661?profile=RESIZE_710x" class="align-full"/></a></p>
<p class="reader-text-block__paragraph">EXECUTIVE CERTIFICATE IN CYBER SECURITY</p>
<h3 class="reader-text-block__heading2">INTRODUCTION:</h3>
<p class="reader-text-block__paragraph">The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on countries. Information Technology is one of the most effective tools with rapid development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best branch or modern tools of Information Technology with respect to security concerns and risk management factors. Information technology is highly integrated into our everyday lives. As a society, we have gone digital. We play, learn, socialize, communicate, and do business online. While cyberspace brings significant benefits, our ever-increasing reliance on it, causing or creating new and significant vulnerabilities.</p>
<p class="reader-text-block__paragraph">Voice of Green Hat, brought an innovative research-based certificate in cyber security along with a number of other cutting-edge technological certifications. This research-based certificate is called #ECCS. Executive certificate in Cyber Security (ECCS) provides a number of research in special innovative skills, highly brainstorming strategy to tackle the problems and multidimensional techniques to countermeasure the cyber- attacks and hacking in the cyber space. Not only this, ECCS also covers intermediate skills for digital forensic investigation, risk management and competitive intelligence to understand the attacker’s approaches as well as having deep understanding with today’s Cyber War scenario. This certificate contains six modules of Cyber security & Law; Ethical Hacking & Countermeasure; Digital Forensic Investigation; Competitive Intelligence; Research & Development and Important Demanded Skills explained below:</p>
<div class="reader-image-block reader-image-block--full-width"><div class="ivm-image-view-model"><div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex"><img src="https://media-exp1.licdn.com/dms/image/D4D12AQFidAkveFt6-w/article-inline_image-shrink_1500_2232/0/1668586733738?e=1675296000&v=beta&t=v3rGR3z6_4kkxYqyImlCrXVatf1UWWY3n-rNE1HXuF0" alt="Green Hats Technologies founded by Ziaullah Mirza" id="ember3989" class="ivm-view-attr__img--centered reader-image-block__img lazy-image ember-view" name="ember3989"/></div>
</div>
Green Hats Technologies mentorship #GreenHatsCIR<br/></div>
<blockquote class="reader-text-block__quote">This course contains Technological mentorship from " Green Hats Technologies" </blockquote>
<h3 class="reader-text-block__heading2">CURRICULUM:</h3>
<h3 class="reader-text-block__heading2">Module ECCS 01: Cyber Security & Laws</h3>
<ul>
<li>A. Introduction to Cyber World, Cyber Security, Internet Security, Computer Security</li>
<li>B. Cyber Laws in Malaysia, Pakistan, USA, Japan, UK, Australia, EU, Singapore, Canada & New Zealand</li>
<li>C. Cyber Crimes, Law Sections and Penalties</li>
</ul>
<h3 class="reader-text-block__heading2">Module ECCS 02: Ethical Hacking & Countermeasures</h3>
<ul>
<li>A. Introduction to Ethical Hacking, Virtualizaion and Cloud Computing</li>
<li>B. Foot printing, Scanning, Enumeration</li>
<li>C. System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking D. Hacking Web Servers, Web Application Vulnerabilities, Web-based Password Cracking Techniques</li>
<li>D. SQL Injection, Hacking Wireless Networks, Virus and Worms</li>
<li>E. Physical Security</li>
<li>F. Linux Hacking, Evading IDS, Firewalls, and Honey pots, Buffer Overflows</li>
<li>G. Cryptography, Penetration Testing</li>
</ul>
<h3 class="reader-text-block__heading2">Module ECCS 03: Computer Forensic Investigation</h3>
<ul>
<li>A. Introduction to Computer Forensics Investigation</li>
<li>B. Data Recovery Software Tools</li>
<li>C. Password Recovery Tools Kits Software</li>
</ul>
<h3 class="reader-text-block__heading2">Module ECCS 04: Research & Development</h3>
<ul>
<li>A. Knowledge Management & Knowledge Work Force</li>
<li>B. Artificial Intelligence & Implementation</li>
<li>C. Industrial Revolution & Hands on Applications</li>
<li>D. Implementation of AR, VR, MR and Holo-Lenses</li>
<li>E. Flying & Traditional Robotics</li>
<li>F. Mind Computing & Research</li>
<li>G. Financial Technologies</li>
<li>H. Big Data & Implementation</li>
</ul>
<h3 class="reader-text-block__heading2">Module ECCS 05: Competitive Intelligence</h3>
<ul>
<li>A. Introduction to competitive Intelligence (CI)</li>
<li>B. Ethics of CI</li>
<li>C. Competitive Intelligence and Espionage Impacts</li>
</ul>
<h3 class="reader-text-block__heading2">Module ECCS 06: Important Market Demanded Skills</h3>
<ul>
<li>A. Skills of Web Programming/ Web Apps/ Mobile Apps</li>
<li>B. Skills of Networking for Windows/ Cisco/ ZTL etc.</li>
<li>C. Skills of Cloud Computing and Application, Digital Transformation etc.</li>
<li>D. Common Troubleshooting with Windows, Cisco and Linux etc.</li>
</ul>
<h3 class="reader-text-block__heading2">SPECIALIZATION:</h3>
<ul>
<li><em>Digital Transformation</em></li>
<li><em>Web & Apps Penetration Testing</em></li>
<li><em>Competitive Intelligence</em></li>
<li><em>Digital Forensic Intelligence</em></li>
<li><em>Digital Economy Vs 5th Gen War Cyber warfare</em></li>
<li><em>Disease-X Alert, Monitoring & Countermeasure</em></li>
<li><em>Industrial Revolution & Hands on Applications for IR4.0</em></li>
<li><em>Implementation of AR, VR, MR and Holo-Lenses</em></li>
<li><em>Flying & Traditional Robotics</em></li>
<li><em>Mind Computing & Research</em></li>
<li><em>Financial Technologies</em></li>
</ul>
<h3 class="reader-text-block__heading2">LEARNING OUTCOMES:</h3>
<ul>
<li>A. Student will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks, no real network is harmed.</li>
<li>B. Student then learns how intruders escalate privileges and what steps can be taken to secure a system.</li>
<li>C. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering,<span> </span><a href="https://www.linkedin.com/feed/hashtag/ddos">#DDoS</a><span> </span>Attacks,<span> </span><a href="https://www.linkedin.com/feed/hashtag/buffer">#Buffer</a><span> </span>Overflows and Virus Creation.</li>
<li>D. Student will learn how to investigate the threats, attack and compromised Data as how to provide risk management at the initial stages.</li>
<li>E. Student will have strong understanding of Competitive Intelligence and its utilization to eliminate competitive advantage rival organization or product at primary level.</li>
<li>F. Student will have practical knowledge on OS (<a href="https://www.linkedin.com/feed/hashtag/windows">#Windows</a><span> </span>10, Azure, Windows Server,<span> </span><a href="https://www.linkedin.com/feed/hashtag/redhat">#RedHat</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/kali">#Kali</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/backtrack">#Backtrack</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/android">#android</a><span> </span>Flavours etc.) Cloud Computing and social media along with a number of tools for countermeasure, defense, forensic and risk management.</li>
<li>G. Student will be able to create, analyses and publish the penetration report along with effect correct action and measure to resolve the problems</li>
<li>H. <em>Digital Transformation, Web & Apps Penetration Testing</em>, #<em>Digital Forensic Intelligence</em>, #<em>Digital Economy Vs 5th Gen War Cyber warfare,<span> </span></em><a href="https://www.linkedin.com/feed/hashtag/disease">#Disease</a>-X Alert & Countermeasure, Industrial Revolution & Hands on Applications,<span> </span><a href="https://www.linkedin.com/feed/hashtag/implementation">#Implementation</a><span> </span>of<span> </span><a href="https://www.linkedin.com/feed/hashtag/ar">#AR</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/vr">#VR</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/xr">#XR</a><span> </span>and Holo-Lenses, Flying & Traditional Robotics, Mind Computing & Research, and all type of currencies including<span> </span><a href="https://www.linkedin.com/feed/hashtag/crypto">#crypto</a><span> </span>etc.,</li>
</ul>
<h3 class="reader-text-block__heading2"> TARGET AUDIENCE:</h3>
<ul>
<li><strong>A. Security Officers, Security Professionals, Site Administrators, Security Network Administrator</strong></li>
<li><strong>B. Cyber Laws Auditors, Competitive Intelligence, Strategic Analysis, Market Research and Analysis</strong></li>
<li><strong>C. Financial Analysis, Business Development, Marketing, Document or Information Management</strong></li>
<li><strong>D. Strategic Planning</strong></li>
<li><strong>E. Corporate library</strong></li>
<li><strong>F. Human Resources</strong></li>
<li><strong>G. Recruiting Firms</strong></li>
</ul>
<h3 class="reader-text-block__heading2"> OPERATIONAL INFORMATION:</h3>
<ul>
<li><strong>A. </strong>Duration:<span> </span><strong>30 Hours</strong></li>
<li><strong>B. </strong>Vendor:<span> </span><strong>Voice of Green Hats</strong></li>
</ul>
<p class="reader-text-block__paragraph"><strong>C. </strong>Venue: #<strong>Pakistan,<span> </span></strong><a href="https://www.linkedin.com/feed/hashtag/malaysia">#Malaysia</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/uae">#UAE</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/canada">#Canada</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/australia">#Australia</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/newzealand">#NewZealand</a>, The<span> </span><a href="https://www.linkedin.com/feed/hashtag/netherlands">#Netherlands</a>,<span> </span><a href="https://www.linkedin.com/feed/hashtag/norway">#Norway</a></p>
<p class="reader-text-block__paragraph"><strong>For more information, please follow<span> </span></strong><a href="https://www.linkedin.com/in/ziaullahmirza?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAP9jPsByUtZK1GNamrCFVQowPTaswqfvwc" target="_blank" rel="noopener">Ziaullah Mirza</a> for more information <span> </span><a href="https://www.linkedin.com/feed/hashtag/greenhatscir">#GreenHatsCIR</a><span> </span><a href="https://www.linkedin.com/feed/hashtag/greenhatsiic">#GreenHatsIIC</a><span> </span><a href="https://www.linkedin.com/feed/hashtag/ziaullahmirza">#ZiaullahMirza</a><span> </span><a href="https://www.linkedin.com/feed/hashtag/eccs4">#ECCS4</a>.0</p>
<p class="reader-text-block__paragraph"></p>
<p class="reader-text-block__paragraph">Further you may check<a href="https://www.linkedin.com/pulse/executive-certificate-cyber-security-eccs-40-voiceogreenhats" target="_blank" rel="noopener">https://www.linkedin.com/pulse/executive-certificate-cyber-security-eccs-40-voiceogreenhats </a></p>Short Noted On Jamiat Ulema-e-Islam by Fazal-ur-Rehmantag:competitiveintelligence.ning.com,2022-03-13:2036441:BlogPost:2218352022-03-13T10:06:12.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p>Under the name of Islam, Fazaul Rehman and his organisation JUIF taken thousands of children and women from Afghan refugee's camps and sold them to Arab countries by doing illicit human trafficking in the era of federally ruling of political parties #PPP (Pakistan People Party) , #PMLN (Pakistan Muslim League Nawaz).</p>
<p><br></br>#AfghanTaliban are also have initialized investigations on the matters that how the Islamic centers run under JUIF, and how #PMLn and #PPP governments had been…</p>
<p>Under the name of Islam, Fazaul Rehman and his organisation JUIF taken thousands of children and women from Afghan refugee's camps and sold them to Arab countries by doing illicit human trafficking in the era of federally ruling of political parties #PPP (Pakistan People Party) , #PMLN (Pakistan Muslim League Nawaz).</p>
<p><br/>#AfghanTaliban are also have initialized investigations on the matters that how the Islamic centers run under JUIF, and how #PMLn and #PPP governments had been protected this evil work which also caused forcedly using the Afghan women and children for prostitution in centers run by JUIF fazaul rehman. In order to remove the evidence, later on false data was created by #PPP, #JUIF and #PMLn and information probably provided to #CIA directly or indirectly which caused massive causalities of children, women and innocent men as well of Pakistani nationalities as well as Afghan nationalities.<br/>It is very strange situation where information had been used to make money out of truth and killed massive innocent people for just political empowerment (unjustly) by political parties since last 2 decays.</p>
<p>Initially TTP and Lal Masjid Islamabad Network took full advantage of this fast money making method but later on funds distribution among them became a conflict and they could not carried on jointly.</p>Factor About Siege of Lal Masjid or Sympathetic Drama by Terroristtag:competitiveintelligence.ning.com,2022-01-23:2036441:BlogPost:2215722022-01-23T19:01:56.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p> </p>
<p><strong><em>Lal Majid Islamabad</em></strong> operations also called “<strong>Siege <em>of Lal Masjid</em></strong>". The story of this made up "Sympathetic Drama" started when Pakistani authorities attempted to raid the mosque in connection with their investigation into the 7 July 2005 London bombings, but the police were blocked by baton-wielding female students.</p>
<p> After the raid, authorities apologized for the behavior of the police and this sympathetic drama was…</p>
<p> </p>
<p><strong><em>Lal Majid Islamabad</em></strong> operations also called “<strong>Siege <em>of Lal Masjid</em></strong>". The story of this made up "Sympathetic Drama" started when Pakistani authorities attempted to raid the mosque in connection with their investigation into the 7 July 2005 London bombings, but the police were blocked by baton-wielding female students.</p>
<p> After the raid, authorities apologized for the behavior of the police and this sympathetic drama was intensified on 6 April, when Abdul Aziz Ghazi established a sharia court in parallel with Pakistan's federal judicial system and pledged thousands of suicide attacks if the government attempted to close it.</p>
<p>The sympathetic drama owned a view and that claims like this.</p>
<p> "During 2006 and the first half of 2007, students and mosque leaders continued to challenge the Pakistani government's authority by calling for Islamic law and to end co-operation with the United States. They launched an anti-vice campaign, kidnapping alleged prostitutes and burning films.</p>
<p>Students at the Red Mosque's two affiliated seminaries launched a campaign for Shari'a, occupying a nearby children's library and embarking on vigilante raids through the capital to stop what they called "un-Islamic activities," such as DVD vendors, barber shops and a Chinese-run massage parlor that they accused of being a brothel"</p>
<p> On 11 July 2007, officials reported that the Lal Masjid complex had been cleared of militants, and troops were combing the area for booby traps and explosives. The eight-day Lal Masjid operation was the longest ever conducted by the Special Service Group?</p>
<p>According to Inter-Services Public Relations, weapons were recovered from the bullet-riddled Lal Masjid and Jamia Hafsa complexes, including RPG rockets, anti-tank and anti-personnel landmines, suicide bombing belts, three to five .22-caliber rifles, RPD, RPK and RPK-74 light machine guns, Dragunov Sniper Rifles, SKS rifles, AK-47s, pistols, night vision equipment, and more than 50,000 rounds of various calibre ammunition.</p>
<p> Lesser sophisticated items and weaponry recovered from the complex included three crates of gasoline bombs prepared in green soft drink bottles, gas masks, recoilless rifles, two-way radios, large plastic buckets containing homemade bombs the size of tennis balls, as well as knives.</p>
<p>Intelligence agencies expressed shock at the highly sophisticated weapons that the militants in the Lal Masjid and Jamia Hafsa compound had, and began an investigation into where the equipment came from.</p>
<p> Pakistan Army spokesman Waheed Arshad said that a suicide bomber had detonated himself in the mosque located at the opposite side of the complex to the seminary. Arshad also said a second suicide bomber had detonated himself in the white-domed mosque.</p>
<p> In total, it took 36 hours to fully secure the complex and remove the booby traps</p>
<p>China backed Musharraf in his stand against Lal Masjid. The Chinese Minister of Public Security, Zhou Yongkang, referred explicitly to the Lal Masjid militants as terrorists and demanded that Pakistan act more forcefully to protect Chinese nationals working in the country.</p>
<p> The European Union President, José Manuel Barroso, issued a statement that it "supports the Government of Pakistan in the defense of the rule of law and the writ of the State against the threat posed by such armed radical groups in the context of the fight against extremism." The EU also praised the "restraint and moderation showed by the Pakistani authorities."</p>
<p> United States President George W. Bush gave his support to Musharraf as "a strong ally in the war against these extremists." State Department deputy spokesman Tom Casey noted that the militants had been given many warnings before the commandos moved on the Red Mosque. He said, "The government of Pakistan has proceeded in a responsible way. All governments have a responsibility to preserve order."</p>
<p> So conclusive story is:</p>
<p> Lal masjid was built to teach Islamic teachings especially for women but eventually the masjid become center for " none state or unlawful activities" as extremism thoughts.,</p>
<p>As extremism grew Abdul Aziz and Abdul Rashid both brothers became owners of "brothel" under the name of Islamic center.</p>
<p> Let’s see if the claims by “LAL MASJID “are real</p>
<p> </p>
<ol>
<li><strong>LAL MASJID ISLAMABAD CLAIMS THAT THEY WERE FIGHTING AGAINST BROTHEL/ PROSTITUTION!</strong></li>
</ol>
<p><strong>Answer:</strong> NO, this is totally wrong as the BROTHEL/ PROSTITUTION in Pakistan are since many centuries like <a href="https://en.wikipedia.org/wiki/Heera_Mandi" target="_blank" rel="noopener">Heera Mandi</a> and no one ever took notice on it and never voiced against the issue. This claim of Lal Masjid Islamabad is false</p>
<p> </p>
<ol start="2">
<li><strong>LAL MASJID ISLAMABAD CLAIMS that they were AGAINST the USA'S WAR ON TERROR</strong></li>
</ol>
<p><strong>Answer:</strong> This claim is false too, If Lal Masjid Islamabad was against the US War on Terror then why they were targeting chines and sometimes Iranians, both Chines and Iranians were not part of US WAR.</p>
<p> </p>
<ol start="3">
<li><strong>LAL MASJID ISLAMABAD CLAIMS THAT THEY WANTED JUSTICE SYSTEM SO THEY SPREAD NEW JUDICIAL SYSTEM OWNED BY THEM</strong></li>
</ol>
<p><strong>Answer:</strong> This claims Abdul Aziz Ghazi is false too, Since Lal masjid is situated in Pakistan’s capital Islamabad and it is centered very much with government and diplomatic offices but they never ever teach a single time against the corruption, there were no “fatwa and implementation “ anti-corruption ever. No activity to eradicate poverty. Masjid never welcomed all human beings but favors only specific people, sectarian, status co religious leaders. They system which allowed them to build masjid became unjustly for them. They never help to improve the system any way. They always supported and became allied with most corrupt political parties like “PML-N, PPP, PML-Q, JUI-F “to share the funds reserved for terrorism, corruption in the various department of government of Pakistan” . They just wanted to help political parties like PML-N, PPP, PML-Q, JUI-F to take power to have more corruption and dirty money, money laundering and funding from all over the world for their own greed. This also means Lal masjid Islamabad was the part of the plan to take control over the government from Pervaiz Mushraf and transfer the control to PML-N, PPP, PML-Q, JUI-F . So their activities were to build pressure on the army forces as well as keep becoming the center for global terrorists safe heaven</p>
<p> </p>
<ol start="4">
<li><strong>LAL MASJID ISLAMABAD CLAIMS THEY WERE SPREADING “PEACE “BY TEACHINGS</strong></li>
</ol>
<p><strong>Answer:</strong> This claim by Abdul Aziz Ghazi is false as well. They never worked for peace but they have been working for global terrorism organisations. they used women and innocent women to become member of terrorism organisation for the bodly needs and called them "nikah Mis-yar" where terrorists and religious leaders pay for short term marriage. and until Abdul Aziz Ghazi & his team members undressed and exchange the cloths with innocent girls and equiped weapons to them and at same Abdul Aziz Ghazi & his team members escaped from the lal masjid disguised as women and the innocent women die. This act Abdul Aziz Ghazi did very cleverly so that later they can blame army forces and take the advantage of the situation as the political parties including pervaiz mushraf's allied also had plan along with Abdul Aziz Ghazi to play this fatal game. On this situation, mis-communication were created purposely as per planed by Abdul Aziz Ghazi and bloodshed started to happen in throughout Pakistan which caused terrorism based killing of Innocents People more than 80,0000 and parties like PMLN, PPP, PML-Q, JUIF (In Venture with Indian Government) took full advantage of corruption, money laundering, enhance terrorism in the country but none were injured from PMLN, PPP, PML-Q, JUIF and until today they have been protecting terrorism and corruption in the country though various government department.</p>
<p> </p>
<p>Human trefficking, Terrorism, Money Laundering and injustice cannot be eliminated until Pakistanis are serious about eliminating the political parties those have been killing people, economy and peace., like Pakistan Muslim League (N) - PMLN, Pakistan Peoples Party- PPP, Pakistan Muslim League (Q) - PML-Q, Jamiat Ulema-e-Islam - JUIF</p>
<p>At the moment Terrorists are working hypocritically in throughout Pakistan, against Pakistan, People and PM Imran Khan. </p>
<p></p>
<p>URDU Version:</p>
<p>آئیے دیکھتے ہیں کہ کیا لال مسجد کے دعوے سچے ہیں؟</p>
<p>1. لال مسجد اسلام آباد کا دعویٰ ہے کہ وہ کوٹھے/ جسم فروشی کے خلاف لڑ رہے تھے!<br/>جواب: نہیں، یہ بالکل غلط ہے کیونکہ پاکستان میں کوٹھے/ جسم فروشی کئی صدیوں سے ہے جیسے ہیرا منڈی - وکی پیڈیا اور کسی نے اس پر کبھی نوٹس نہیں لیا اور نہ ہی کبھی اس مسئلے کے خلاف آواز اٹھائی۔ لال مسجد اسلام آباد کا یہ دعویٰ جھوٹا ہے۔</p>
<p>2. لال مسجد اسلام آباد کا دعویٰ ہے کہ وہ دہشت گردی کے خلاف امریکہ کی جنگ کے خلاف تھے۔<br/>جواب: یہ دعویٰ بھی جھوٹا ہے، اگر لال مسجد اسلام آباد امریکی جنگ کے خلاف تھی تو کبھی چینیوں کو اور کبھی ایرانیوں کو کیوں نشانہ بنا رہے تھے، چینی اور ایرانی دونوں امریکی جنگ کا حصہ نہیں تھے۔</p>
<p>3. لال مسجد اسلام آباد کا دعویٰ ہے کہ وہ انصاف کا نظام چاہتے تھے اس لیے انہوں نے اپنی ملکیت میں نئے عدالتی نظام کو پھیلایا<br/>جواب: عبدالعزیز غازی کا یہ دعویٰ بھی جھوٹا ہے، چونکہ لال مسجد پاکستان کے دارالحکومت اسلام آباد میں واقع ہے اور اس کا مرکز بہت زیادہ سرکاری اور سفارتی دفاتر ہے لیکن انہوں نے کبھی کرپشن کے خلاف ایک دفعہ بھی درس نہیں دیا، نہ کوئی فتویٰ اور عمل درآمد ہوا۔ "اینٹی کرپشن ہمیشہ۔ غربت کے خاتمے کے لیے کوئی سرگرمی نہیں۔ مسجد نے کبھی بھی تمام انسانوں کا خیرمقدم نہیں کیا بلکہ صرف مخصوص لوگوں، فرقہ پرستوں، حیثیت کے ساتھ مذہبی رہنماؤں کی حمایت کی۔ جس نظام نے انہیں مسجد بنانے کی اجازت دی وہ ان کے لیے ناانصافی بن گیا۔ وہ کبھی بھی نظام کو بہتر بنانے میں مدد نہیں کرتے۔ انہوں نے ہمیشہ حمایت کی اور سب سے زیادہ بدعنوان سیاسی جماعتوں جیسے "PML-N, PPP, PML-Q, JUI-F" کے ساتھ اتحاد کیا تاکہ حکومت پاکستان کے مختلف محکموں میں دہشت گردی، بدعنوانی کے لیے مختص فنڈز بانٹ سکیں۔ وہ صرف PML-N، PPP، PML-Q، JUI-F جیسی سیاسی جماعتوں کی مدد کرنا چاہتے تھے تاکہ وہ اپنے لالچ کے لیے دنیا بھر سے کرپشن اور گندا پیسہ، منی لانڈرنگ اور فنڈنگ کے ذریعے اقتدار حاصل کر سکیں۔ اس کا مطلب یہ بھی ہے کہ لال مسجد اسلام آباد کا حکومت پر کنٹرول پرویز مشرف سے چھین کر مسلم لیگ ن، پی پی پی، مسلم لیگ ق، جے یو آئی-ف کو منتقل کرنے کے منصوبے کا حصہ تھا۔ لہٰذا ان کی سرگرمیاں فوج پر دباؤ بڑھانے کے ساتھ ساتھ عالمی دہشت گردوں کی محفوظ جنت کا مرکز بنتے رہنا تھیں۔</p>
<p>4. لال مسجد اسلام آباد کا دعویٰ ہے کہ وہ تعلیمات سے "امن" پھیلا رہے تھے<br/>جواب: عبدالعزیز غازی کا یہ دعویٰ بھی جھوٹا ہے۔ انہوں نے کبھی امن کے لیے کام نہیں کیا بلکہ وہ عالمی دہشت گردی کی تنظیموں کے لیے کام کرتے رہے ہیں۔ انہوں نے خواتین اور معصوم خواتین کو جسمانی ضروریات کے لیے دہشت گرد تنظیم کا رکن بننے کے لیے استعمال کیا اور انہیں "نکاح مس یار" کہا جہاں دہشت گرد اور مذہبی رہنما مختصر مدت کی شادی کے لیے ادائیگی کرتے ہیں۔ اور جب تک کہ عبدالعزیز غازی اور ان کی ٹیم کے ارکان نے معصوم لڑکیوں کے کپڑے اتار کر ان کے ساتھ ہتھیاروں سے لیس کیا اور اسی طرح عبدالعزیز غازی اور ان کی ٹیم کے ارکان خواتین کے بھیس میں لال مسجد سے فرار ہو گئے اور معصوم خواتین مر گئیں۔ یہ حرکت عبدالعزیز غازی نے نہایت چالاکی سے کی تاکہ بعد میں وہ فوج پر الزام تراشی کر سکیں اور حالات کا فائدہ اٹھا سکیں کیونکہ پرویز مشرف کی اتحادی سیاسی جماعتوں نے بھی عبدالعزیز غازی کے ساتھ مل کر یہ مہلک کھیل کھیلنے کا منصوبہ بنایا تھا۔ اس صورتحال پر عبدالعزیز غازی کے منصوبے کے مطابق جان بوجھ کر غلط ابلاغی مہم چلائی گئی اور پورے پاکستان میں خونریزی شروع ہو گئی جس کی وجہ سے دہشت گردی کی بنیاد پر 80,000 سے زائد معصوم لوگ مارے گئے۔ اور PMLN، PPP، PML-Q، JUIF (بھارتی حکومت کے ساتھ مل کر) جیسی جماعتوں نے ملک میں بدعنوانی، منی لانڈرنگ، دہشت گردی کو بڑھانے کے لیے بھرپور مہم جوئی کی لیکن پاکستان مسلم لیگ (ن) - PMLN، پاکستان پیپلز پارٹی سے کوئی بھی زخمی نہیں ہوا۔ - پی پی پی، پاکستان مسلم لیگ (ق) - مسلم لیگ (ق)، جمعیت علمائے اسلام - جے یو آئی ایف۔ اور آج تک وہ مختلف سرکاری محکموں کے ذریعے ملک میں دہشت گردی اور کرپشن کو تحفظ دے رہے ہیں۔</p>
<p>دہشت گردی، منی لانڈرنگ اور ناانصافی کو اس وقت تک ختم نہیں کیا جا سکتا جب تک کہ پاکستانی ان سیاسی جماعتوں کو ختم کرنے کے لیے سنجیدہ نہیں ہیں جو عوام، معیشت اور امن کو مار رہی ہیں۔ ) - مسلم لیگ ق، جمعیت علمائے اسلام - جے یو آئی ایف</p>
<p>اس وقت دہشت گرد پورے پاکستان میں پاکستان، عوام اور وزیر اعظم عمران خان کے خلاف منافقت سے کام کر رہے ہیں۔</p>
<p></p>CI Fellows 2021 Summit: In Technology We Trust?!tag:competitiveintelligence.ning.com,2021-10-07:2036441:BlogPost:2205412021-10-07T14:37:02.000ZCraig S. Fleisherhttps://competitiveintelligence.ning.com/profile/CraigSFleisher
<p>This year's summit produced by the CI Fellows is sure to be of interest and value to members. You can find ou more about the content, speakers and topics to be covered here: <a href="https://www.cifellows.com/ci-fellows-events/the-ci-fellows-virtual-summit/" rel="noopener" target="_blank">CI Fellows 2021 Summit</a></p>
<p><span>I'm really excited about this, and especially to be having a fireside chat conversation with renowned public interest technologist and data governance guru Rohan…</span></p>
<p>This year's summit produced by the CI Fellows is sure to be of interest and value to members. You can find ou more about the content, speakers and topics to be covered here: <a href="https://www.cifellows.com/ci-fellows-events/the-ci-fellows-virtual-summit/" target="_blank" rel="noopener">CI Fellows 2021 Summit</a></p>
<p><span>I'm really excited about this, and especially to be having a fireside chat conversation with renowned public interest technologist and data governance guru Rohan Light toward the end of Day 2 of the Summit. Here's his blog to get a taste of his perspectives: </span><a href="https://www.ouroborus.me/">https://www.ouroborus.me</a><span>/. See what I mean about how interesting it will get to explore the policy-affecting intersections of technology, business, government, and society?</span></p>
<p><span>It is virtual. Sign up now...</span></p>#IoT beyond fun, is Security Risk If not addresstag:competitiveintelligence.ning.com,2020-07-27:2036441:BlogPost:1109462020-07-27T14:12:40.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p class="center"><strong>“Tiny IoT devices don’t have power to do really powerful security.”</strong><br></br>Even early 1980s grade 8-bit, 8MHz chips with only 2k of RAM can do elliptic curve cryptography with a 256-bit key-length and are effectively as strong as RSA crypto with 2,048-bit key length, which is strong enough for U.S. “Secret” level national security information. That crypto is done using such little battery power that signing or verifying data on the hour every hour for twenty…</p>
<p class="center"><strong>“Tiny IoT devices don’t have power to do really powerful security.”</strong><br/>Even early 1980s grade 8-bit, 8MHz chips with only 2k of RAM can do elliptic curve cryptography with a 256-bit key-length and are effectively as strong as RSA crypto with 2,048-bit key length, which is strong enough for U.S. “Secret” level national security information. That crypto is done using such little battery power that signing or verifying data on the hour every hour for twenty years would only use a slice of an AA battery.<br/><br/><strong>“Security is too complicated, especially in IoT. You can never win</strong>.”<br/>It’s true that effective security never stems from any single silver bullet. Instead, just as most good houses need a few walls, a roof and a floor, effective IoT security can be composed from a short list of crucial ingredients:<br/> </p>
<blockquote>Good crypto to protect the authentication and potentially protect the confidentiality of data</blockquote>
<p class="center"><br/> Cryptographic verification of any and all code and configuration before permitting the code to run with any configuration.<br/> </p>
<blockquote>Third-party runtime security by security professionals to mitigate any vulnerabilities in the code</blockquote>
<p><br/>Over-the-air management capabilities, including update and software inventory management, telemetry and policy management for security agility<br/>Security analytics to find and fight sophisticated adversaries who don’t trip any alarms<br/>These ingredients are simple and strong enough to protect top brands against the best attackers.</p>
<p></p>
<p><a href="https://www.linkedin.com/pulse/iot-beyond-fun-security-risk-address-ziaullah-mirza-/" target="_blank" rel="noopener">click here to continue</a></p>Why would #TechTourism grow faster than other Tourism Industry?tag:competitiveintelligence.ning.com,2020-07-27:2036441:BlogPost:1110422020-07-27T13:55:20.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p>Hey! thanks for coming to this page and article, It will increase my page optimization. :) Got it? Never mind we come to the topic. " #TechTourism " . A number of people from various line of business asked me what is #TechTourism? with facts, If I am defining it then i call it " Technologies for Tourism " just like "Technologies for Finance " which is also #finTech (Financial Technology).</p>
<p>More or less #TechTourism is derived from various industries' combination like Technology or…</p>
<p>Hey! thanks for coming to this page and article, It will increase my page optimization. :) Got it? Never mind we come to the topic. " #TechTourism " . A number of people from various line of business asked me what is #TechTourism? with facts, If I am defining it then i call it " Technologies for Tourism " just like "Technologies for Finance " which is also #finTech (Financial Technology).</p>
<p>More or less #TechTourism is derived from various industries' combination like Technology or HiTech , Tourism and Tours. Well! Tech Tourism also attracts the tourists in especially tech background. A number of people around the world travel oversea to tour the places to understand the nature, to seen the places and beauty of the world and most probably it benefits to those who are researching, studying or practicing the same industries like medical, tourism business, plantation, nature, photography etc.</p>
<blockquote>But tech background people just travel through and find excitement, people in this era with multitasking nature in mind want to study and travel at the same expense and same time and same line of business or discipline. So now tech guys are called tech tourists., they want to gain knowledge , skill and share too meanwhile they travel for small period of time.</blockquote>
<p>There are a number of types you can find in it</p>
<p></p>
<p><a href="https://www.linkedin.com/pulse/why-would-techtourism-grow-faster-than-other-tourism-industry/" target="_blank" rel="noopener">click here to continue</a></p>
<p></p>
<p><a href="https://www.linkedin.com/pulse/why-would-techtourism-grow-faster-than-other-tourism-industry/">https://www.linkedin.com/pulse/why-would-techtourism-grow-faster-than-other-tourism-industry/</a></p>Deep Dive: A State of #Malaysia, #Penangtag:competitiveintelligence.ning.com,2020-07-27:2036441:BlogPost:1109372020-07-27T13:30:00.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p><strong>State Level Scanning: (Brief):<span> </span></strong>Island & Land area, good for shipping business, Tourism Business and Food Business as well construction business. Penang is less developed state as compared to the Selangor except electronic industries which is 80% equipped or ready for rev 4.0 [This is because Penang has been a hub for electric & electronic manufacturing industries and this provides strong basement for IOT industries toward 4.0] . Penang does have…</p>
<p><strong>State Level Scanning: (Brief):<span> </span></strong>Island & Land area, good for shipping business, Tourism Business and Food Business as well construction business. Penang is less developed state as compared to the Selangor except electronic industries which is 80% equipped or ready for rev 4.0 [This is because Penang has been a hub for electric & electronic manufacturing industries and this provides strong basement for IOT industries toward 4.0] . Penang does have sustainable factor even at the time of recession as compared to the rest of states in Malaysia. but it does not have a domestic territorial backup factor as per the State of Selangor does (Shah Alam, Kuala Lumpur, Putrajaya, Cyber Jaya). AND International territorial backup factor as per the State of Johor (Singapore). Education system is fine, but people prefer foreign and technical institution more widely. A good number of retired foreigners especially English speaking can contribute to education if some program to teach local should be started</p>
<p> <strong>Opportunities:</strong></p>
<ul>
<li>Food Integrity Product Manufacturing; (Halal, Halal-Veg, Kosher, Kosher-Veg)</li>
<li>Construction - Airport, Sea Port, Ship Yard (Building & Breaking) etc.;</li>
<li>Tourism (Inbound, Outbound, Religious, Historical & Tech)</li>
<li>Education is in demand on technical level, will increase if the state adopts industry 4.0</li>
<li>FDI environment is suitable and well facilitated</li>
<li>Renewable energy sector is also "investment attractive"</li>
<li>Health Tech businesses specially to facilitate “elderly people facilitation” are in demand/ required.</li>
<li>Clean-tech is also requirement because of industrial management for safety & environment</li>
</ul>
<p></p>
<p><a href="https://www.linkedin.com/pulse/deep-dive-state-malaysia-penang-ziaullah-mirza-/" target="_blank" rel="noopener">continue here</a></p>Online Homeland security: OSINT news - Russiatag:competitiveintelligence.ning.com,2018-12-06:2036441:BlogPost:1069592018-12-06T20:19:40.000ZViktor Voksanaevhttps://competitiveintelligence.ning.com/profile/ViktorVoksanaev
<p>Online Homeland security: OSINT news - Russia: what is happening? (november ... <a href="https://viktorvoksanaev.blogspot.com/2018/12/osint-news-russia-what-is-happening.html?spref=tw">https://viktorvoksanaev.blogspot.com/2018/12/osint-news-russia-what-is-happening.html?spref=tw</a></p>
<p>Online Homeland security: OSINT news - Russia: what is happening? (november ... <a href="https://viktorvoksanaev.blogspot.com/2018/12/osint-news-russia-what-is-happening.html?spref=tw">https://viktorvoksanaev.blogspot.com/2018/12/osint-news-russia-what-is-happening.html?spref=tw</a></p>ECCS Executive Certificate in Cyber Security - ECCS Malaysiatag:competitiveintelligence.ning.com,2018-10-07:2036441:BlogPost:1064762018-10-07T11:30:00.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p><strong>INTRODUCTION:</strong></p>
<p>The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on countries. Information Technology is one of the most effective tools with rapid development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best branch or modern tool of Information Technology with respect to security concerns and risk management factors. Information technology is…</p>
<p><strong>INTRODUCTION:</strong></p>
<p>The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on countries. Information Technology is one of the most effective tools with rapid development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best branch or modern tool of Information Technology with respect to security concerns and risk management factors. Information technology is highly integrated into our everyday lives. As a society, we have gone digital. We play, learn, socialize, communicate, and do business online. While cyberspace brings significant benefits, our ever increasing reliance on it, causing or creating new and significant vulnerabilities.</p>
<p></p>
<p>Voice of Green Hat, brought an innovative research based certificate in cyber security along with a number of other cutting edge certifications. This research based certificate is called ECCS. Executive certificate in Cyber Security provides a number of research based in skills, highly brained storm strategy to tackle the problems and multidimensional techniques to countermeasure the cyber-attacks and hacking in the cyber space. Not only this, ECCS also covers intermediate skills for digital forensic investigation, risk management and competitive intelligence to understand the attacker’s approaches as well as having deep understanding with today’s Cyber War scenario. This certificate contains five modules of Cyber security & Law; Ethical Hacking & Countermeasure; Digital Forensic Investigation; Competitive Intelligence and Important Demanded Skills.</p>
<p>This revised certificate also leads towards the specialization such as <strong>“Social Media”, “Cloud & Robotic Security”, “Competitive Intelligence”, "Digital Forensic Investigation" and “Web Applications Penetration Test Engineer.</strong></p>
<p><br/> <strong>CURRICULUM:</strong></p>
<p><strong><em>Module ECCS 01:Cyber Security & Laws</em></strong><br/> A. Introduction to Cyber World, Cyber Security, Internet Security, Computer Security<br/> B. Cyber Laws in Malaysia, Pakistan, USA, Japan, UK, Australia, Germany, Singapore<br/> C. Cyber Crimes, Law Sections and Penalties<br/></p>
<p><strong><em>Module ECCS 02:Ethical Hacking & Countermeasures</em></strong><br/> A. Introduction to Ethical Hacking, Virtualizaion and Cloud Computing<br/> B. Foot printing, Scanning, Enumeration<br/> C. System Hacking , Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking<br/> D. Hacking Web Servers , Web Application Vulnerabilities ,Web-based Password Cracking Techniques<br/> E. SQL Injection, Hacking Wireless Networks , Virus and Worms<br/> F. Physical Security<br/> G. Linux Hacking, Evading IDS, Firewalls, and Honey pots, Buffer Overflows<br/> H. Cryptography, Penetration Testing<br/></p>
<p><strong><em>Module ECCS 03: Computer Forensic Investigation</em></strong><br/> A. Introduction to Computer Forensics Investigation<br/> B. Data Recovery Software Tools<br/> C. Password Recovery Tools Kits Software<br/></p>
<p><strong><em>Module ECCS 04: Competitive Intelligence</em></strong><br/> A. Introduction to competitive Intelligence (CI)<br/> B. Ethics of CI<br/> C. Competitive Intelligence and Espionage<br/></p>
<p><strong><em>Module ECCS 05: Important Market Demanded Skills</em></strong><br/> A. Basic Skills of Web Programming<br/> B. Basic Skills of Networking for Windows/ Cisco<br/> C. Basic Skills of Cloud Computing and Application<br/> D. Troubleshooting with Windows, Cisco and Linux etc.</p>
<p></p>
<p><strong>Specialization: (On demand only)</strong></p>
<p>1- Social Media<br/> 2- Digital Forensic Investigation<br/> 3- Cloud & Robotics Security<br/> 4- Competitive Intelligence<br/> 5- Web Application Penetration Test Engineer</p>
<p>Student may request to enhance and test his/her knowledge in the specialized disciplines only in <em>Social Media, Cloud & Robotic Security, Digital Forensic Investigation, Competitive Intelligence and Webs Application Penetration Test Enginee</em>r only</p>
<p><br/> <strong>Learning Outcomes:</strong></p>
<ul>
<li>Student will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed.</li>
<li>Student then learns how intruders escalate privileges and what steps can be taken to secure a system.</li>
<li>Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.</li>
<li>Student will learn how to investigate the threats, attack and compromised Data as how to provide risk management at the initial stages.</li>
<li>Student will have strong understanding of Competitive Intelligence and its utilization to eliminate competitive advantage rival organization or product at primary level.</li>
<li>Student will have practical knowledge on OS (Windows XP, VISTA, 7, 8, 10, Azure, Intune; Windows Server 2003, 2008, 2008R2, 2012, 2012R2, RedHat, Kali, Backtrack, Android etc.) Cloud Computing and Social Media along with a number of tools for countermeasure, defence, forensic and risk management.</li>
<li>Student will be able to create, analyses and publish the penetration report along with effect correct action and measure to resolve the problems</li>
</ul>
<p><strong>Target Audience:</strong></p>
<ul>
<li>Security Officers, Security Professionals, Site Administrators, Security Network Administrator</li>
<li>Cyber Laws Auditors, Competitive Intelligence, Strategic Analysis, Market Research and Analysis</li>
<li>Financial Analysis, Business Development, Marketing, Document or Information Management</li>
<li>Strategic Planning</li>
<li>Corporate library</li>
<li>Human Resources</li>
<li>Recruiting Firms</li>
</ul>
<p><a href="http://storage.ning.com/topology/rest/1.0/file/get/2803916411?profile=original" target="_self">ECCS Executive Certificate in Cyber Security - ECCS Malaysia</a></p>
<p>You may also see these links for more information</p>
<p><a href="https://www.slideshare.net/ZiaullahMirza/eccs-student-admission-hand-book-103598620" target="_blank" rel="noopener">https://www.slideshare.net/ZiaullahMirza/eccs-student-admission-hand-book-103598620</a></p>
<p>OR</p>
<p></p>
<p>Contact at</p>
<p><a href="https://www.linkedin.com/in/ziaullahmirza/" target="_blank" rel="noopener">https://www.linkedin.com/in/ziaullahmirza/</a></p>#CPTPP Comprehensive and Progressive Agreement for Trans-Pacific Partnershiptag:competitiveintelligence.ning.com,2018-10-06:2036441:BlogPost:1061692018-10-06T15:00:00.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<h2 class="mrgn-tp-0 mrgn-bttm-md">What is the CPTPP?</h2>
<p>The CPTPP is a new free trade agreement between Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore and Vietnam. Once the CPTPP enters into force, it will be one of the largest free trade agreements in the world and will provide enhanced market access to key Asian markets. .....more see below</p>
<p></p>
<p>Some related topics for <strong>#CPTTP…</strong></p>
<p></p>
<h2 class="mrgn-tp-0 mrgn-bttm-md">What is the CPTPP?</h2>
<p>The CPTPP is a new free trade agreement between Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore and Vietnam. Once the CPTPP enters into force, it will be one of the largest free trade agreements in the world and will provide enhanced market access to key Asian markets. .....more see below</p>
<p></p>
<p>Some related topics for <strong>#CPTTP</strong></p>
<p><a href="https://en.wikipedia.org/wiki/Comprehensive_and_Progressive_Agreement_for_Trans-Pacific_Partnership" target="_blank" rel="noopener">Comprehensive and Progressive Agreement for Trans-Pacific Partnership</a></p>
<p><a href="https://international.gc.ca/trade-commerce/trade-agreements-accords-commerciaux/agr-acc/cptpp-ptpgp/index.aspx?lang=eng" target="_blank" rel="noopener">Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP)</a></p>
<p><a href="http://www.internationaltradecomplianceupdate.com/2018/03/09/cpttp-signed-in-chile-by-11-countries/" target="_blank" rel="noopener">CPTTP signed in Chile by 11 countries</a></p>
<p><a href="https://www.express.co.uk/news/world/908221/Donald-Trump-Tokyo-pact-Comprehensive-and-Progressive-Agreement-for-Trans-Pacific-Partners" target="_blank" rel="noopener">Talks resume to try to restart trade deal dumped by Donald Trump</a></p>
<p><a href="http://www.thesundaily.my/news/2018/10/04/3-cptpp-members-hope-malaysia-will-jump-bandwagon" target="_blank" rel="noopener">3 CPTPP members hope Malaysia will jump on bandwagon</a></p>
<p><a href="http://fta.miti.gov.my/index.php/pages/view/71" target="_blank" rel="noopener">Trans-Pacific Partnership Agreement (TPP) & Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP)</a></p>
<p></p>
<blockquote class="twitter-tweet"><p dir="ltr" xml:lang="en" lang="en">Canadian businesses benefit from increased <a href="https://twitter.com/hashtag/trade?src=hash&ref_src=twsrc%5Etfw">#trade</a>. Under the <a href="https://twitter.com/hashtag/CPTPP?src=hash&ref_src=twsrc%5Etfw">#CPTPP</a>, <a href="https://twitter.com/hashtag/Canada?src=hash&ref_src=twsrc%5Etfw">#Canada</a> will have access to a trading bloc of 11 countries and half a billion consumers. Learn more: <a href="https://t.co/sZ5KNtql2I">https://t.co/sZ5KNtql2I</a> <a href="https://twitter.com/hashtag/TimetoDiversify?src=hash&ref_src=twsrc%5Etfw">#TimetoDiversify</a> <a href="https://t.co/fAlcrRnj58">pic.twitter.com/fAlcrRnj58</a></p>
— Canada Trade (@CanadaTrade) <a href="https://twitter.com/CanadaTrade/status/1048282960133283842?ref_src=twsrc%5Etfw">October 5, 2018</a></blockquote>
<p>Recently activity in Malaysia</p>
<blockquote class="twitter-tweet"><p dir="ltr" xml:lang="en" lang="en">Inspiring to see interest among KL business audience in <a href="https://twitter.com/hashtag/CPTPP?src=hash&ref_src=twsrc%5Etfw">#CPTPP</a> & honoured to speak on panel with <a href="https://twitter.com/hashtag/Japan?src=hash&ref_src=twsrc%5Etfw">#Japan</a> Ambassador & <a href="https://twitter.com/hashtag/Australian?src=hash&ref_src=twsrc%5Etfw">#Australian</a> DHOM. Good to see <a href="https://twitter.com/hashtag/canadian?src=hash&ref_src=twsrc%5Etfw">#canadian</a> legislation advance to 3rd reading in Parliament. <a href="https://twitter.com/MCBC1989?ref_src=twsrc%5Etfw">@MCBC1989</a>, <a href="https://twitter.com/hashtag/MABC?src=hash&ref_src=twsrc%5Etfw">#MABC</a>, <a href="https://twitter.com/hashtag/JACTIM?src=hash&ref_src=twsrc%5Etfw">#JACTIM</a>. <a href="https://twitter.com/CanadaTrade?ref_src=twsrc%5Etfw">@CanadaTrade</a> <a href="https://twitter.com/MITIMalaysia?ref_src=twsrc%5Etfw">@MITIMalaysia</a> <a href="https://twitter.com/hashtag/TimeToDiversify?src=hash&ref_src=twsrc%5Etfw">#TimeToDiversify</a> <a href="https://t.co/pB3mOyYDLK">pic.twitter.com/pB3mOyYDLK</a></p>
— Julia G. Bentley (@JuliaGBentley) <a href="https://twitter.com/JuliaGBentley/status/1048192327888433154?ref_src=twsrc%5Etfw">October 5, 2018</a></blockquote>Online Homeland security: Are Drones the Future of Terror?tag:competitiveintelligence.ning.com,2018-07-21:2036441:BlogPost:1064272018-07-21T22:22:07.000ZViktor Voksanaevhttps://competitiveintelligence.ning.com/profile/ViktorVoksanaev
<p>Online Homeland security: Are Drones the Future of Terror? <a href="http://viktorvoksanaev.blogspot.com/2018/07/are-drones-future-of-terror.html?spref=tw">http://viktorvoksanaev.blogspot.com/2018/07/are-drones-future-of-terror.html?spref=tw</a></p>
<p>Online Homeland security: Are Drones the Future of Terror? <a href="http://viktorvoksanaev.blogspot.com/2018/07/are-drones-future-of-terror.html?spref=tw">http://viktorvoksanaev.blogspot.com/2018/07/are-drones-future-of-terror.html?spref=tw</a></p>Online Homeland security: Troops in Afghanistan: July 2018 updatetag:competitiveintelligence.ning.com,2018-07-21:2036441:BlogPost:1061332018-07-21T22:13:52.000ZViktor Voksanaevhttps://competitiveintelligence.ning.com/profile/ViktorVoksanaev
<p>Online Homeland security: Troops in Afghanistan: July 2018 update <a href="http://viktorvoksanaev.blogspot.com/2018/07/troops-in-afghanistan-july-2018-update.html?spref=tw">http://viktorvoksanaev.blogspot.com/2018/07/troops-in-afghanistan-july-2018-update.html?spref=tw</a></p>
<p>Online Homeland security: Troops in Afghanistan: July 2018 update <a href="http://viktorvoksanaev.blogspot.com/2018/07/troops-in-afghanistan-july-2018-update.html?spref=tw">http://viktorvoksanaev.blogspot.com/2018/07/troops-in-afghanistan-july-2018-update.html?spref=tw</a></p>OSINT news - Terrorist threat in the EU remains high despite the decline of IS in Iraq and Syriatag:competitiveintelligence.ning.com,2018-07-19:2036441:BlogPost:1061312018-07-19T23:11:31.000ZViktor Voksanaevhttps://competitiveintelligence.ning.com/profile/ViktorVoksanaev
<p><strong>EUROSINT FORUM</strong></p>
<p>OSINT news - Terrorist threat in the EU remains high despite the decline of IS in Iraq and Syria</p>
<p><a href="http://viktorvoksanaev.blogspot.com/" rel="nofollow">http://viktorvoksanaev.blogspot.com</a></p>
<p></p>
<p><strong>EUROSINT FORUM</strong></p>
<p>OSINT news - Terrorist threat in the EU remains high despite the decline of IS in Iraq and Syria</p>
<p><a href="http://viktorvoksanaev.blogspot.com/" rel="nofollow">http://viktorvoksanaev.blogspot.com</a></p>
<p></p>Early Warning - Predicting the next high profile, mass casualty terrorist attackstag:competitiveintelligence.ning.com,2018-03-22:2036441:BlogPost:1056492018-03-22T18:05:53.000ZVivek Raghuvanshihttps://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
<p>Matrix to predict the next high profile, mass casualty terrorist attacks:-</p>
<p>On 10/12 ie October 12th 2002 I created this Matrix to predict the next high profile, mass casualty terrorist attacks.</p>
<p></p>
<div class="_1dwg _1w_m _q7o"><div><div class="_5pbx userContent _22jv _3576" id="js_q"><div class="text_exposed_root text_exposed" id="id_5ab3eec87ecf16d82584274"><p>US<span class="text_exposed_show">A-September 11, 2001--------------------------9/11…</span></p>
</div>
</div>
</div>
</div>
<p>Matrix to predict the next high profile, mass casualty terrorist attacks:-</p>
<p>On 10/12 ie October 12th 2002 I created this Matrix to predict the next high profile, mass casualty terrorist attacks.</p>
<p></p>
<div class="_1dwg _1w_m _q7o"><div><div class="_5pbx userContent _22jv _3576" id="js_q"><div id="id_5ab3eec87ecf16d82584274" class="text_exposed_root text_exposed"><p>US<span class="text_exposed_show">A-September 11, 2001--------------------------9/11</span></p>
<div class="text_exposed_show"><p>Bali, Indonesia October 12, 2002 ----------------10/12</p>
<p></p>
<p>According to my Matrix the high profile, mass casualty terrorist attacks took place as predicted by my Matrix :-</p>
<p>Madrid, Spain-March 11, 2004---------------------3/11</p>
<p>Paris, France, November 13, 2015 ---------------11/13</p>
<p></p>
<p>The next high profile, mass casualty terrorist attacks will happen on these dates :-</p>
<p></p>
<p>12/14 - December 14th<br/> 1/3 - January 3rd<br/> 2/4 - February 4th<br/> 3/5 - March 5th<br/> 4/6 - April 6th<br/> 5/7 - May 7th<br/> 6/8 - June 8th<br/> 7/9 - July 9th<br/> 8/10 - August 10th</p>
<p>12/11 - December 11th<br/> 6/11 - June 11th<br/> 7/11 - July 11th</p>
<p>1/15 - January 15th<br/> 2/16 - February 16th<br/> 3/17 - March 17th<br/> 4/18 - April 18th<br/> 5/19 - May 19th<br/> 6/20 - June 20th<br/> 7/21 - July 21st<br/> 8/22 - August 22nd</p>
</div>
</div>
</div>
<div class="_3x-2"></div>
</div>
</div>Antifragility (Antifragile)tag:competitiveintelligence.ning.com,2018-02-20:2036441:BlogPost:1056342018-02-20T04:00:00.000ZVivek Raghuvanshihttps://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
<p>#Antifragility #NassimNicholasTaleb #antifragile</p>
<p></p>
<p><strong>"Antifragility is beyond resilience or robustness. The resilient resists shocks and stays the same; the antifragile gets better"</strong></p>
<p>Perfect stage in Human Evolution according to me :</p>
<p></p>
<p><strong>SCENARIO 1:- For me Antifragility means the next stage in evolution of mankind where instead of Cyborgs we develop Paranormal yogic superpowers aka Siddhis like:-</strong></p>
<p></p>
<p>Ashta Siddhis…</p>
<p>#Antifragility #NassimNicholasTaleb #antifragile</p>
<p></p>
<p><strong>"Antifragility is beyond resilience or robustness. The resilient resists shocks and stays the same; the antifragile gets better"</strong></p>
<p>Perfect stage in Human Evolution according to me :</p>
<p></p>
<p><strong>SCENARIO 1:- For me Antifragility means the next stage in evolution of mankind where instead of Cyborgs we develop Paranormal yogic superpowers aka Siddhis like:-</strong></p>
<p></p>
<p>Ashta Siddhis are:</p>
<p>1. Aṇimā:</p>
<p>Ability to reduce the size of the body, sometimes even to the size of the atoms. ('Becoming smaller than the smallest' as described in Srimad Bhagavatam by Lord Krishna)</p>
<p>Example: Hanuman had reduced the size of his body while he was searching for Sita in Lanka.</p>
<p>2. Mahima:</p>
<p>Ability to assume a gigantic form ('Becoming larger than the largest' as described in Srimad Bhagavatam by Lord Krishna)</p>
<p>Example:</p>
<p>Hanuman assumed a huge form to burn Lanka, he also assumed big form to fight Kumbha Karna.</p>
<p>In Vaamana avatar Lord Vishnu increased his form which was so gigantic that it only took him three steps to cover all three worlds</p>
<p>3. Garima</p>
<p>Ability to become very heavy in weight by will</p>
<p>Example: Lord Hanuman made his tail very heavy that even Bhima couldn't life it (Bhima who was climbing the GandhaMadana mountains to get Saugandhika flowers for Draupadi was stopped by a monkey whose tail was on the way, Bhima orders the monkey to take the tail off the road, monkey being old tells him to move it himself, but Bhima couldn't even lift the monkey's tail)</p>
<p>4. Laghima</p>
<p>Laghima comes from the word laghu, which means small or light. Laghima is the ability to make the body very light ('Becoming lighter than the lightest'). Levitation and flying in the air are its subsidiary powers</p>
<p>5. Prāpti</p>
<p>Word praapti means 'to obtain', 'having obtained', 'to have got'. Thus praapti is the ability to acquire anything anywhere.</p>
<p>6. Prākāmya</p>
<p>The ability to obtain anything desired, ability to have realized the dreams</p>
<p>7. Iṣiṭva</p>
<p>Iṣa=lord; isitva=lordship; The power of absolute lordship over entire creation</p>
<p>8. Vaśitva</p>
<p>The ability to have everything under control, especially the physical manifestation made up of 5 elements</p>
<p></p>
<p><strong>SCENARIO 2:- Imagine Cyborgs in future having Paranormal yogic superpowers aka Siddhis like:-</strong></p>
<p></p>
<p>Ashta Siddhis are:</p>
<p>1. Aṇimā:</p>
<p>Ability to reduce the size of the body, sometimes even to the size of the atoms. ('Becoming smaller than the smallest' as described in Srimad Bhagavatam by Lord Krishna)</p>
<p>Example: Hanuman had reduced the size of his body while he was searching for Sita in Lanka.</p>
<p>2. Mahima:</p>
<p>Ability to assume a gigantic form ('Becoming larger than the largest' as described in Srimad Bhagavatam by Lord Krishna)</p>
<p>Example:</p>
<p>Hanuman assumed a huge form to burn Lanka, he also assumed big form to fight Kumbha Karna.</p>
<p>In Vaamana avatar Lord Vishnu increased his form which was so gigantic that it only took him three steps to cover all three worlds</p>
<p>3. Garima</p>
<p>Ability to become very heavy in weight by will</p>
<p>Example: Lord Hanuman made his tail very heavy that even Bhima couldn't life it (Bhima who was climbing the GandhaMadana mountains to get Saugandhika flowers for Draupadi was stopped by a monkey whose tail was on the way, Bhima orders the monkey to take the tail off the road, monkey being old tells him to move it himself, but Bhima couldn't even lift the monkey's tail)</p>
<p>4. Laghima</p>
<p>Laghima comes from the word laghu, which means small or light. Laghima is the ability to make the body very light ('Becoming lighter than the lightest'). Levitation and flying in the air are its subsidiary powers</p>
<p>5. Prāpti</p>
<p>Word praapti means 'to obtain', 'having obtained', 'to have got'. Thus praapti is the ability to acquire anything anywhere.</p>
<p>6. Prākāmya</p>
<p>The ability to obtain anything desired, ability to have realized the dreams</p>
<p>7. Iṣiṭva</p>
<p>Iṣa=lord; isitva=lordship; The power of absolute lordship over entire creation</p>
<p>8. Vaśitva</p>
<p>The ability to have everything under control, especially the physical manifestation made up of 5 elements</p>
<p></p>
<p></p>SUFISM - Antidote to Radical Islam (How to stabilize markets in Middle East & Africa & Asia)tag:competitiveintelligence.ning.com,2017-02-10:2036441:BlogPost:1018362017-02-10T06:00:00.000ZVivek Raghuvanshihttps://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
<p>How stabilize markets in Middle East & Africa & Asia </p>
<p>I have basically simplified the esoteric practices of Sufis ie Tasawwuf or Sufism which is the inner or esoteric dimension of Islam. Whereas Radical Islam uses outward or exoteric practices of Islam, such as Sharia,</p>
<p>Mystical ecstasy is the only closely guarded secret of nature and needs dedication, sacrifice and labour far greater than what is required to unravel the mysteries of the visible universe. Nobody can sell…</p>
<p>How stabilize markets in Middle East & Africa & Asia </p>
<p>I have basically simplified the esoteric practices of Sufis ie Tasawwuf or Sufism which is the inner or esoteric dimension of Islam. Whereas Radical Islam uses outward or exoteric practices of Islam, such as Sharia,</p>
<p>Mystical ecstasy is the only closely guarded secret of nature and needs dedication, sacrifice and labour far greater than what is required to unravel the mysteries of the visible universe. Nobody can sell the magic formula or manipulate society by offering a short cut.</p>
<p>Khwaja says :</p>
<p>“They met the Sultan’s brandished steel The crocodile’s gnashing teeth</p>
<p>They bowed their necks, the death to feel Who follows in their train</p>
<p>They climbed the steep ascent of super consciousness Through peril, toil and pain</p>
<p>Oh God, to us may grace be given To follow in their train”</p>
<p>That which intoxicates the consciousness without drinking, smoking and eating, ‘that which makes our consciousness experience the climax of ecstasy of far greater magnitude than the sensual pleasures, that because of which we experience weightlessness and suspended animation of the physical body, it is nothing else then the mystic’s wine, some call her Kundalini and some Ganga, some call her vidyut lata and some beloved.</p>
<p>The charlatans prostitute her as a cool breeze in the palm of hand and a tingling sensation at the back of the spine. Any misguided effort or attempt to invoke Kundalini destroys the aspirant, as when trillions of megawatts of energy is unleashed, it can result in one of the most painful deaths known to humanity.</p>
<p>Murshid Omar Khayyam said that</p>
<p>“Up from the earth’s centre through the seventh gate, I rose,</p>
<p>And on the throne sate, and many knots urravelled by the road,</p>
<p>But not the knot of human death and fate”</p>
<p>“While the rose blows along the river brink, With old Khayyam the Ruby vintage drink, And when the angel with his darker draught Draws up to thee, Take that and do not shrink”</p>
<p>The esoteric practice of Ashgal is the key to Wehdat (final merger with the Divine beloved). Through relentless spiritual conditioning of the consciousness, magical powers to know the past , present and future and the ability to understand the language of all creatures, to become invisible at will, to leave one’s body and enter other bodies at will, to levitate, to become lighter than a proton and heavier than a black hole, are some of the para normal powers which the immortal God Realised Saints developed. The final goal of Ashgal practices is Wehdat (merger with the All Pervading Divine).</p>
<p>Murshid Gurdial before his death sang sang :</p>
<p>“Is a ray ever separate from the sun,</p>
<p>Will a drop exist separate from the ocean, The light merges with the light,</p>
<p>The union is complete now, What a holy communion”</p>
<p>Murshid Shah Abdul Latif said :</p>
<p>“Unlock yourself and see HIM”</p>
<p>The six esoteric astral centres of the Sufi’s are :</p>
<p>Akhfa</p>
<p>Khafi</p>
<p>Siri</p>
<p>Qalbi</p>
<p>Rohi</p>
<p>Nafsi</p>
<p>The seven esoteric astral chakra of the Hindus</p>
<p>Sahasrara Chakra</p>
<p>Ajna Chakra</p>
<p>Visuddhi Chakra</p>
<p>Anhata Chakra</p>
<p>Manipura Chakra</p>
<p>Svadhistana Chakra</p>
<p>Muladhara Chakra</p>
<p></p>
<p>Khwaja says that through perfect Fikr (concentration on the Divine) and Perfect Ashgal ( Meditation on the Divine ) that Marifat (Union with the Divine Beloved ) is attained.</p>
<p>Kundalini’s descent from the Ahkfa to Khafi is an staggering encounter revealing the All Pervading Divine Light, thus making the All Pervading eternal Unmanifest God, manifested through the Khafi (Ajna Chakra). The illuminating glory surrounding the vision of God as seen by the disciples of Prophet Christ, the Noor I Allah as seen by the disciples of Prophet Mohammad, the Circling Light of the Taoists and the blazing radiance of a million suns as described in the Holy Gita, bear testimony to the sayings of All God Realised saints who have left their foot prints in the sands of time to follow and realign our goals.</p>
<p>Khwaja says :</p>
<p>“They who know God, know God, None else knows”</p>
<p>“God Alone exists Rest is a dream”</p>
<p>“Wherever you turn, there is the face of God”</p>
<p>Tasawwuf or the Sufi way has been described as the creed of love, the dogma of heart and religion of spirit. Sufi dynamics revolves around Muhabbat. Here Muhabbat should not be misunderstood for any thing less than love for the All Pervading Divine. Muhabbat is Muhabbat , it can only be comprehended during Marifat (union with the Cosmic Divine), before that it would be difficult to understand it with the yardstick of human love.</p>
<p>Khwaja has stressed that yearning for the All Pervading Divine has to be cultivated through relentless practice of moral injunctions and fixed observances with perfection in Fikr (concentration on the Divine) and Zikr (remembrance on the Divine) with Muraqaba (contemplation on the Divine) which would result in illumination of the self. It is through Marifat that Muhabbat is felt permeating our entire being. Divine love is an ecstasy permeating our consciousness, not even the joys of our love to our spouses or to our children is as selfless as the Divine love.</p>
<p>Wehdat, should be then our only goal in life. For a human being who has developed the urge for the Divine would understand the wonders of love permeating the entire universe. Only on attainment of Marifat that Wahdat ul wajud (oneness of being) is perceived, before that we are indulging in intellectual delusion by using the terms such as brotherhood of man etc. The key to God Realisation is Muhabbat. It is this intensity of the urge that decides whether an aspirant will remain an amalgamation of chemicals or realise that the aspirant is a drop of consciousness in the Universal All Pervading Super Consciousness of the Unity understood as the Divine Light. Sometimes the aspirant finds that when they have developed the urge for the Divine, the Unmanifest All Pervading does not manifest itself, this could be for a variety of reasons including our lack of consistency or pre spiritual puberty level. We must understand that spiritual pleasures can be felt only when we have stilled the desire for gratification of the senses.</p>
<p>Spiritual conditioning through practice of instructions of the Murshid (Spiritual mentor) with renunciation of our wants which do not serve any purpose other that gratification of the physical body would aid our efforts in seeking the nectar of Immortality. The tendencies such as Haivania – carnal desires, Ammarah – desires enhancing our greed, Mulhama – the inspired motivated self, all these make up a human personality. We are forever bound by the cause effect of these desires unless we make a serious effort to improve our evolutionary positioning in the universal ladder of perfection. When an aspirant ventures for this transition, they should only make an effort under the guidance of the Murshid (spiritual mentor) for without the able guidance of the Murshid it would be very difficult for us to attain freedom from the slavery of senses. The subtle difference between Mind, Ego and Intelligence collectively making our consciousness cannot be understood by mere book knowledge. Experience is one of the gates to teachers and without experiencing it ourselves it would be difficult for us to even comprehend the realm of esoteric science and its hidden treasures. If we accidentally mistake the imagination of our thought processes or the voice of ego as the voice of the soul, we must immediately seek spiritual help for attunement otherwise we would start speaking to ourselves and be termed as a loony. It is very important to understand that without the able guidance of the Murshid (Spiritual mentor) it is next to impossible to identify the voice of the soul in the haystack of ego and intelligence lying with each other to categorise thoughts emerging in our brain.</p>
<p>Khwaja once said that :</p>
<p>“Only when the foundation is strong that a legend stands”</p>
<p>Marifat, the spiritual ecstasy, climax of paranormal communion cannot be possesed of as non existent for the God Realised Saints of all the religions of the world bear testimony to its Truth. Attainment of Mutminnah – tranquil self is a platform from which we can dive deep into the esoteric realm of superconsciousness. When we activate the tranquil self through relentless practice that we enter the esoteric dimensions of the hidden siddhis, unavailable to the ordinary human being in the life span of 125 years. How is this purity attained and what are we to understand by the nexus of Muhabbat and Purity. We should appreciate that the efforts of the God Realised Saints was to free us from the misery of human bondage which no amount of material comfort can justify. Are we nct scared to die and knowing that tomorrow it may be our turn, we still justify our greed as savings for the rainy day. Very true indeed, the rainy day is the day of the death of our physical bodies but unfortunately we would not be able to carry any wee bit of our accumulations. No amount of coaxing by the saints can ever make us understand the truth behind renunciation of desires. With the goal of Marifat (Union with the Divine) as our only purpose in life would enable us to have a very successful innings of 125 years if not more. The aspirant under the influence of Haivania, Ammarah and Mulhama, ensnared by the gratification urges is a slave to the desires binding the consciousness to the physical body. Therefore when we dry the juice of sense gratification that we enable our consciousness to attune with the cosmic properties of the soul,</p>
<p>That which is beyond the reach of the most powerful microscope and that which is beyond the realm of inter galaxy travel can be attained by the grace of the Murshid.</p>
<p>I was asleep in a slumber of ignorance, the jogi woke me up;</p>
<p>He cleansed my mind of the dirt and showed me the essence</p>
<p>Mystical ecstasy is the only closely guarded secret of nature and needs dedication, sacrifice and labour far greater than what is required to unravel the mysteries of the visible universe. Nobody can sell the magic formula or manipulate society by offering a short cut.</p>
<p>Khwaja says :</p>
<p>“They met the Sultan’s brandished steel The crocodile’s gnashing teeth</p>
<p>They bowed their necks, the death to feel Who follows in their train</p>
<p>They climbed the steep ascent of super consciousness Through peril, toil and pain</p>
<p>Oh God, to us may grace be given To follow in their train”</p>
<p>That which intoxicates the consciousness without drinking, smoking and eating, ‘that which makes our consciousness experience the climax of ecstasy of far greater magnitude than the sensual pleasures, that because of which we experience weightlessness and suspended animation of the physical body, it is nothing else then the mystic’s wine, some call her Kundalini and some Ganga, some call her vidyut lata and some beloved.</p>
<p>The charlatans prostitute her as a cool breeze in the palm of hand and a tingling sensation at the back of the spine. Any misguided effort or attempt to invoke Kundalini destroys the aspirant, as when trillions of megawatts of energy is unleashed, it can result in one of the most painful deaths known to humanity.</p>
<p>Murshid Omar Khayyam said that</p>
<p>“Up from the earth’s centre through the seventh gate, I rose,</p>
<p>And on the throne sate, and many knots unravelled by the road,</p>
<p>But not the knot of human death and fate”</p>
<p>“While the rose blows along the river brink, With old Khayyam the Ruby vintage drink, And when the angel with his darker draught Draws up to thee, Take that and do not shrink”</p>
<p>The esoteric practice of Ashgal is the key to Wehdat (final merger with the Divine beloved). Through relentless spiritual conditioning of the consciousness, magical powers to know the past , present and future and the ability to understand the language of all creatures, to become invisible at will, to leave one’s body and enter other bodies at will, to levitate, to become lighter than a proton and heavier than a black hole, are some of the para normal powers which the immortal God Realised Saints developed. The final goal of Ashgal practices is Wehdat (merger with the All Pervading Divine).</p>
<p>Murshid Gurdial before his death sang sang :</p>
<p>“Is a ray ever separate from the sun,</p>
<p>Will a drop exist separate from the ocean, The light merges with the light,</p>
<p>The union is complete now, What a holy communion”</p>
<p>Murshid Shah Abdul Latif said :</p>
<p>“Unlock yourself and see HIM”</p>
<p>The six esoteric astral centres of the Sufi’s are :</p>
<p>———————————————————</p>
<p>Akhfa</p>
<p>Khafi</p>
<p>Siri</p>
<p>Qalbi</p>
<p>Rohi</p>
<p>Nafsi</p>
<p></p>
<p>Esoteric Chakras in Hinduism:</p>
<p>————————————</p>
<p>Sahasrara Chakra</p>
<p>Ajna Chakra</p>
<p>Visuddhi Chakra</p>
<p>Anhata Chakra</p>
<p>Manipura Chakra</p>
<p>Svadhistana Chakra</p>
<p>Muladhara Chakra</p>
<p>Khwaja says that through perfect Fikr (concentration on the Divine) and Perfect Ashgal ( Meditation on the Divine ) that Marifat (Union with the Divine Beloved ) is attained.</p>
<p>Kundalini’s descent from the Ahkfa to Khafi is an staggering encounter revealing the All Pervading Divine Light, thus making the All Pervading eternal Unmanifest God, manifested through the Khafi (Ajna Chakra). The illuminating glory surrounding the vision of God as seen by the disciples of Prophet Christ, the Noor I Allah as seen by the disciples of Prophet Mohammad, the Circling Light of the Taoists and the blazing radiance of a million suns as described in the Holy Gita, bear testimony to the sayings of All God Realised saints who have left their foot prints in the sands of time to follow and realign our goals.</p>
<p>Khwaja says :</p>
<p>“They who know God, know God, None else knows”</p>
<p>“God Alone exists Rest is a dream”</p>
<p>“Wherever you turn, there is the face of God”</p>
<p>Tasawwuf or the Sufi way has been described as the creed of love, the dogma of heart and religion of spirit. Sufi dynamics revolves around Muhabbat. Here Muhabbat should not be misunderstood for any thing less than love for the All Pervading Divine. Muhabbat is Muhabbat , it can only be comprehended during Marifat (union with the Cosmic Divine), before that it would be difficult to understand it with the yardstick of human love.</p>
<p>Khwaja has stressed that</p>
<p>yearning for the All Pervading Divine has to be cultivated through relentless practice of moral injunctions and fixed observances with perfection in Fikr (concentration on the Divine) and Zikr (remembrance on the Divine) with Muraqaba (contemplation on the Divine) which would result in illumination of the self. It is through Marifat that Muhabbat is felt permeating our entire being. Divine love is an ecstasy permeating our consciousness, not even the joys of our love to our spouses or to our children is as selfless as the Divine love.</p>
<p>Wehdat, should be then our only goal in life. For a human being who has developed the urge for the Divine would understand the wonders of love permeating the entire universe. Only on attainment of Marifat that Wahdat ul wajud (oneness of being) is perceived, before that we are indulging in intellectual delusion by using the terms such as brotherhood of man etc. The key to God Realisation is Muhabbat. It is this intensity of the urge that decides whether an aspirant will remain an amalgamation of chemicals or realise that the aspirant is a drop of consciousness in the Universal All Pervading Super Consciousness of the Unity understood as the Divine Light. Sometimes the aspirant finds that when they have developed the urge for the Divine, the Unmanifest All Pervading does not manifest itself, this could be for a variety of reasons including our lack of consistency or pre spiritual puberty level. We must understand that spiritual pleasures can be felt only when we have stilled the desire for gratification of the senses.</p>
<p>Spiritual conditioning through practice of instructions of the Murshid (Spiritual mentor) with renunciation of our wants which do not serve any purpose other that gratification of the physical body would aid our efforts in seeking the nectar of Immortality. The tendencies such as Haivania – carnal desires, Ammarah – desires enhancing our greed, Mulhama – the inspired motivated self, all these make up a human personality. We are forever bound by the cause effect of these desires unless we make a serious effort to improve our evolutionary positioning in the universal ladder of perfection. When an aspirant ventures for this transition, they should only make an effort under the guidance of the Murshid (spiritual mentor) for without the able guidance of the Murshid it would be very difficult for us to attain freedom from the slavery of senses. The subtle difference between Mind, Ego and Intelligence collectively making our consciousness cannot be understood by mere book knowledge. Experience is one of the gates to teachers and without experiencing it ourselves it would be difficult for us to even comprehend the realm of esoteric science and its hidden treasures. If we accidentally mistake the imagination of our thought processes or the voice of ego as the voice of the soul, we must immediately seek spiritual help for attunement otherwise we would start speaking to ourselves and be termed as a loony. It is very important to understand that without the able guidance of the Murshid (Spiritual mentor) it is next to impossible to identify the voice of the soul in the haystack of ego and intelligence lying with each other to categorise thoughts emerging in our brain.</p>
<p>Khwaja once said that :</p>
<p>“Only when the foundation is strong that a legend stands”</p>
<p>Marifat, the spiritual ecstasy, climax of paranormal communion cannot be possessed of as non existent for the God Realised Saints of all the religions of the world bear testimony to its Truth. Attainment of Mutminnah – tranquil self is a platform from which we can dive deep into the esoteric realm of super-consciousness. When we activate the tranquil self through relentless practice that we enter the esoteric dimensions of the hidden siddhis, unavailable to the ordinary human being in the life span of 125 years. How is this purity attained and what are we to understand by the nexus of Muhabbat and Purity. We should appreciate that the efforts of the God Realised Saints was to free us from the misery of human bondage which no amount of material comfort can justify. Are we not scared to die and knowing that tomorrow it may be our turn, we still justify our greed as savings for the rainy day. Very true indeed, the rainy day is the day of the death of our physical bodies but unfortunately we would not be able to carry any wee bit of our accumulations. No amount of coaxing by the saints can ever make us understand the truth behind renunciation of desires. With the goal of Marifat (Union with the Divine) as our only purpose in life would enable us to have a very successful innings of 125 years if not more. The aspirant under the influence of Haivania, Ammarah and Mulhama, ensnared by the gratification urges is a slave to the desires binding the consciousness to the physical body. Therefore when we dry the juice of sense gratification that we enable our consciousness to attune with the cosmic properties of the soul,</p>
<p>That which is beyond the reach of the most powerful microscope and that which is beyond the realm of inter galaxy travel can be attained by the grace of the Murshid.</p>
<p>I was asleep in a slumber of ignorance, the jogi woke me up;</p>
<p>He cleansed my mind of the dirt and showed me the essence</p>
<p>What this means that the American Government needs to create a psyops team which consists of the right people whose subject matter expertise is more than the Muslims regarding the the inner or esoteric dimension of Islam and outward or exoteric practices of Islam. Then once you have the right experts who know more than Muslims then you need to work on multiple campaigns to deradicalise radical Islam. But this time you cannot hire / recruit experts like your American allies aka ISI Pakistan who created the monster Taliban. So this time American Govt needs to take a call whether the experts on inner or esoteric dimension of Islam and outward or exoteric practices of Islam reside in a Muslim country or American Muslim Advisors or is the American Govt willing to recruit the right experts of inner or esoteric dimension of Islam and outward or exoteric practices of Islam. </p>
<p>Then once we have the right experts on inner or esoteric dimension of Islam and outward or exoteric practices of Islam inside the State Department or in Washington then a few good men can work on deradicalisation ops. But this time you cannot make the mistake of recruiting your Muslim allies as your experts. So once with the right guys consisting of experts on inner or esoteric dimension of Islam and outward or exoteric practices of Islam then it is possible to actually work on the perfect psyops campains. Remember that the key to success lies in the subject matter expertise of Non Muslims in the psyops team whose expertise on on inner or esoteric dimension of Islam and outward or exoteric practices of Islam is more than the Muslim scholars and clerics.</p>
<p>Why the Arab Spring failed horribly because the American experts did not understand the simple fundamentals of :- Political Ideology + Religious Ideology + Individual Ideology </p>
<p>State Department and its allies in Europe simply worked on Political Ideology remember. The experts decided to topple the Political Ideology in Middle East ie Dictatorship with Democracy. Forgetting in the process that a human being is a sum of Political Ideology + Religious Ideology + Individual Ideology </p>
<p>So when Arab Spring took place you simply removed the Political Ideology ie Dictatorship and tried to replace it with Democracy but you forgot that when you replaced the Political Ideology you discounted the Religious Ideology. The blowback of toppling the Dictatorship (Political Ideology) with Democracy (Political Ideology) created a vacuum for Radical Islam (Religious ideology) to seize the opportunity to create Theocracy (Political Ideology).</p>
<p>Now to control Radical Islam (Religious Ideology) in an environment of Theocracy (Political Ideology) ie purpose of Radical Islam is to create Theocracy ie Islamic Caliphate (Political Ideology) American Govt needs to deradicalise Radical Islam (Religious Ideology) so that instead of Islamic Caliphate (Political Ideology) we can have Democracy (Political Ideology) in the Middle East and Africa etc .,</p>
<p>It was easier for Democracy (Political Ideology) to come to Russia as they had Communism (Political Ideology) and USA has Democracy (Political Ideology) BUT the Religious Ideology in Russia is Christianity and Religious Ideology in USA is Christianity for example. </p>
<p>Now Chinese are very clever and this is why they gobbled up Tibet. Tibet has Religious Ideology ie Buddhism. So for Democracy (Political Ideology) to come to China and replace Communism (Political Ideology) you need to put sanctions on China so that Religious Ideology in China can be Buddhism </p>
<p>Similarly to establish Democracy (Political Ideology) in Middle East and Africa which is infested with Dictatorship (Political Ideology) and Theocracy (Political Ideology) you need to control Radical Islam (Religious Ideology) and replace it with Psyops. Hence the need to deradicalise Religious Ideology (Radical Islam) whose sole purpose is to create Theocracy aka Islamic Calipate (Political Ideology)</p>The Countries with The Most Terrorist attackstag:competitiveintelligence.ning.com,2016-06-20:2036441:BlogPost:1004532016-06-20T07:30:00.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p><a href="https://www.statista.com/chart/4969/the-countries-with-the-most-terrorist-attacks/" title="Infographic: The Countries With The Most Terrorist Attacks | Statista"><img alt="Infographic: The Countries With The Most Terrorist Attacks | Statista" height="auto" src="https://d28wbuch0jlv7v.cloudfront.net/images/infografik/normal/chartoftheday_4969_the_countries_with_the_most_terrorist_attacks_n.jpg" style="width: 100%; height: auto !important; max-width: 960px; -ms-interpolation-mode: bicubic;" width="100%"></img></a> <br></br> You will find more statistics at…</p>
<p><a href="https://www.statista.com/chart/4969/the-countries-with-the-most-terrorist-attacks/" title="Infographic: The Countries With The Most Terrorist Attacks | Statista"><img src="https://d28wbuch0jlv7v.cloudfront.net/images/infografik/normal/chartoftheday_4969_the_countries_with_the_most_terrorist_attacks_n.jpg" alt="Infographic: The Countries With The Most Terrorist Attacks | Statista" style="width: 100%; height: auto !important; max-width: 960px; -ms-interpolation-mode: bicubic;" height="auto" width="100%"/></a><br/> You will find more statistics at <a href="http://www.statista.com/">Statista</a></p>Competitive Articles on #AfghaWARtag:competitiveintelligence.ning.com,2016-06-15:2036441:BlogPost:1003662016-06-15T02:22:43.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p><span style="font-family: impact,chicago;"><span class="font-size-5">Two different articles those may have connection or relevancy :</span></span></p>
<p><span class="font-size-4" style="color: #000080;"><strong>1- #Pakistan, The United States & #Afghanistan</strong></span></p>
<blockquote><p>Pakistan has played an important role in war on terror, and its military has destroyed infrastructure and networks of militant groups in North Waziristan, South Waziristan and other agencies in…</p>
</blockquote>
<p><span style="font-family: impact,chicago;"><span class="font-size-5">Two different articles those may have connection or relevancy :</span></span></p>
<p><span class="font-size-4" style="color: #000080;"><strong>1- #Pakistan, The United States & #Afghanistan</strong></span></p>
<blockquote><p>Pakistan has played an important role in war on terror, and its military has destroyed infrastructure and networks of militant groups in North Waziristan, South Waziristan and other agencies in FATA. The the process, Pakistan has suffered in men and treasures, as more than 55000 people were martyred including more than 5000 army personnel. And economic losses are more than 70 billion dollars. Pakistan has deployed 100,000 army personnel in FATA near Pak-Afghan border to stop movements of militants, and that they do not use Pakistani soil for attacks in Afghanistan. Before presidential and provincial council election in Afghanistan, Pakistan taken measures so that elections are held in a safe environment. The result was that elections went through quite remarkably and the turnout of 58 percent was indeed impressive. By every definition, it was spiritedly-fought and widely participated contest. It is pertinent to point out how Pakistan was sucked into the war on terror. continue......link below for full story</p>
</blockquote>
<p><a href="https://www.facebook.com/notes/your-cyber-news-updates/pakistan-the-united-states-afghanistan/1741686802768462" target="_blank">https://www.facebook.com/notes/your-cyber-news-updates/pakistan-the-united-states-afghanistan/1741686802768462</a></p>
<p><span class="font-size-4"><strong><span style="color: #000080;">2- How Can America End the War in Afghanistan?</span></strong></span></p>
<blockquote><p>In the days immediately following the 9/11 attacks, the U.S. House and Senate took votes on whether to authorize war. Out of more than 500 lawmakers, <a href="https://www.govtrack.us/congress/votes/107-2001/h342" target="_blank">only one</a> voted against the authorization. Congresswoman Barbara Lee (D-Calif.) remains in the House to this day, and she continues to oppose the operation in Afghanistan, which has become the longest war in American history. continue.....link below for full story</p>
</blockquote>
<p><a href="http://parallax.news/how-can-america-end-the-war-in-afghanistan/" target="_blank">http://parallax.news/how-can-america-end-the-war-in-afghanistan/</a></p>Malaysia Australia Business Council (MABC)tag:competitiveintelligence.ning.com,2016-05-31:2036441:BlogPost:1002632016-05-31T21:00:00.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p><span class="font-size-3" style="color: #000000;"><font style="font-size: 16px;"><font><strong><a href="https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-xfp1/v/t1.0-9/12742383_673192149487882_3340951383102091281_n.jpg?oh=ba3ab81f06faa76f157f2f5442cf2a73&oe=57C86E0C&__gda__=1473787781_f5f9deba964a07b79701b03cc5e2e820" target="_blank"><font color="#333333"><font color="#004B80" style="font-size: 24px;"><img class="align-left" height="422" src="https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-xfp1/v/t1.0-9/12742383_673192149487882_3340951383102091281_n.jpg?oh=ba3ab81f06faa76f157f2f5442cf2a73&oe=57C86E0C&__gda__=1473787781_f5f9deba964a07b79701b03cc5e2e820" width="422"></img></font></font></a></strong></font></font></span></p>
<p></p>
<p><span class="font-size-3" style="color: #000000;"><font style="font-size: 16px;"><font><strong><a target="_blank" href="https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-xfp1/v/t1.0-9/12742383_673192149487882_3340951383102091281_n.jpg?oh=ba3ab81f06faa76f157f2f5442cf2a73&oe=57C86E0C&__gda__=1473787781_f5f9deba964a07b79701b03cc5e2e820"><font color="#333333"><font style="font-size: 24px;" color="#004B80"><img class="align-left" src="https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-xfp1/v/t1.0-9/12742383_673192149487882_3340951383102091281_n.jpg?oh=ba3ab81f06faa76f157f2f5442cf2a73&oe=57C86E0C&__gda__=1473787781_f5f9deba964a07b79701b03cc5e2e820" height="422" width="422"/></font></font></a></strong></font></font></span></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px;"><font><strong><font color="#333333"><font style="font-size: 24px;" color="#004B80">MABC</font></font></strong></font></font></span></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px;"><font>The Malaysia Australia Business Council (MABC) has been the leading voice of Malaysian and Australian businesses. The MABC was established in 1986 as a private non-profit organisation providing a range of services to its members based in both Malaysia and Australia.</font></font></span></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;">Supported by its co-patrons, The Malaysian Minister of International Trade and Industry and the Australian High Commissioner to Malaysia, the MABC is the most effective body to support your business interests. Through a full programmes of events and regular communication, the MABC provides a comprehensive platform for both companies and individuals to successfully do business in Malaysia and Australia.</span></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><strong><font color="#333333"><font style="font-size: 24px;" color="#004B80">MABC Objectives</font></font></strong></span></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;">To provide mutual understanding, goodwill, harmony and fraternity amongst the Malaysian and Australian business communities;</font></span></p>
<p></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;">To provide a forum to exchange ideas, experience and information, develop contacts and facilitate interaction with people interested in enhancing trade and investment in Malaysia and Australia;</font></span></p>
<p></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;">To identify and inform members (and other interested parties) of appropriate sources of information relating to trade and investment opportunities, practices and regulations in Malaysia and Australia;</font></span></p>
<p></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;">To support business interest in both Malaysia and Australia, by providing information, advice and where necessary a vehicle for representations/ submissions to appropriate bodies;</font></span></p>
<p></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;">To co-operate with other organisations in Malaysia and Australia with aims similar to that of the Council</font></span></p>
<p></p>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;"><font color="#333333"><font style="font-size: 24px;" color="#004B80">Key Activities</font></font></font></span></p>
<div id="id_eOs6JMK" class="WaGadget WaGadgetContent gadgetStyleNone"><div class="gadgetStyleBody gadgetContentEditableArea" style="padding: 20px;"><ul>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><strong><font style="font-size: 16px;" color="#000000">Business Links and Trade Missions</font></strong></span></li>
</ul>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px;" color="#000000">The MABC facilitates interaction with delegations from Australian businesses and Government bodies. MABC organises events and seminars in conjunction with trade missions between Malaysia, Australia and ASEAN.</font></span></p>
<ul>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><strong><font style="font-size: 16px;" color="#000000">Government Access</font></strong></span></li>
</ul>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px;" color="#000000">The MABC provides high level representation and access to the Malaysian and Australian Governments and their respective Ministers on key issues. MABC assists members with issues affecting their businesses.</font></span></p>
<ul>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><strong><font style="font-size: 16px;" color="#000000">Information Resources<br/></font></strong></span></li>
</ul>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px;" color="#000000">The MABC is a key resources for members seeking information on the latest updates affecting businesses and investments. MABC’s strong affiliation with its counterpart, Australia Malaysia Business Council (AMBC), at the national level and its chapters, provide a broad network of linkages between the two countries. Both MABC and AMBC act as facilitators and disseminate information relating to trade and investment opportunities, practices and regulations in Malaysia and Australia.</font></span></p>
<ul>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><strong><font style="font-size: 16px;" color="#000000">Media and Communication<br/></font></strong></span></li>
</ul>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px;" color="#000000">The MABC produces the Byline, a periodic publication on trade and business developments and events. MABC disseminates information and represent member’s views via our extensive media linkages in Malaysia.</font></span></p>
<ul>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><strong><font style="font-size: 16px;" color="#000000">Networking and Business Events<br/></font></strong></span></li>
</ul>
<p><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px;" color="#000000">The MABC organises a number of business and social functions to cater to the wider interests of the Council’s membership which include:</font></span></p>
<div><ol>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;" color="#000000">Networking events with high profile speakers from both the private and government sectors<br/></font></span></li>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;" color="#000000">Annual Dinner<br/></font></span></li>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;" color="#000000">Trade missions<br/></font></span></li>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;" color="#000000">Topical seminars<br/></font></span></li>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font style="font-size: 16px; font-weight: 300;" color="#000000">Industry briefings<br/></font></span></li>
<li><span class="font-size-3" style="color: #000000; font-family: tahoma,arial,helvetica,sans-serif;"><font color="#000000"><font style="font-size: 16px; font-weight: 300;">Social/ cultural events</font></font></span></li>
</ol>
</div>
</div>
</div>
<p></p>The Last Three Wishes of Alexander-The Greattag:competitiveintelligence.ning.com,2016-05-31:2036441:BlogPost:1005532016-05-31T20:06:01.000ZAlex Ziaullah Mirzahttps://competitiveintelligence.ning.com/profile/AlexZiaullahMirza
<p>Alexander-The Great was the disciple of Aristotle and a conqueror of vast territories of land that stretched from West to East that entailed millions of subjects. The success and glory that he was able to attain at such a young age was truly awe-inspiring. He was the commander of a massive army which involved multiple extremely talented and experienced generals – all of whom served and obeyed their leader to the greatest extent.</p>
<p>His death occurred at the age of 32 and there are…</p>
<p>Alexander-The Great was the disciple of Aristotle and a conqueror of vast territories of land that stretched from West to East that entailed millions of subjects. The success and glory that he was able to attain at such a young age was truly awe-inspiring. He was the commander of a massive army which involved multiple extremely talented and experienced generals – all of whom served and obeyed their leader to the greatest extent.</p>
<p>His death occurred at the age of 32 and there are various causes linked to it. However, legend has it that the final three wishes that Alexander made on his deathbed in the presence of his generals were utmost peculiar as they certainly left the men present by his side during his final hours in a state of bewilderment.</p>
<p>On his deathbed, Alexander-The Great summoned his top generals and disclosed his three final wishes. He told them that:</p>
<ol>
<li><strong>His coffin shall be carried by the best of doctors.</strong></li>
<li><strong>Whatever monetary gains he made in life, be it coins, gold, gems etc., shall be scattered along the entire path from where his coffin will pass on its way to the cemetery.</strong></li>
<li><strong>And finally, his hands will be left outside the coffin, untied, so that everyone sees them</strong>.</li>
</ol>
<p>Puzzled by the leader’s extremely odd series of final requests, the generals pleaded Alexander to be informed of the reasons behind making such bizarre demands. Alexander responded by giving clarification over each of his three wishes:</p>
<ol>
<li><strong>The reason behind doctors carrying the coffin is to tell everyone that when death is certain, not even the best of healers can find any cure; they fail miserably before death.</strong></li>
<li><strong>Money or gold that he earned during his lifetime shall be spread on the roads to give the idea that whatever is earned whilst living above the surface of earth, stays above the surface of earth.</strong></li>
<li><strong>Lastly, the intention behind leaving his hands outside the coffin, untied, is to show that man comes to earth empty-handed and he leaves it in a similar state after spending his life; man takes no worldly gains with him beneath the earth as they are of no use there.</strong></li>
</ol>
<p>Regardless of whatever one’s beliefs are (and whether this story is any bit true or not), there still is a pretty important message given here: live life to its fullest but always be prepared to face your certain demise as there is no escaping that.</p>INVEST IN INDIA - MAKE IN INDIAtag:competitiveintelligence.ning.com,2016-02-12:2036441:BlogPost:990322016-02-12T08:00:00.000ZVivek Raghuvanshihttps://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
<p><span>Mr Narendra Modi's initiative to make India a Manufacturing Hub: </span><br></br> <span>We Facilitate foreign companies set up manufacturing units in India:-</span><br></br> <br></br> <span>1. Incorporating a company</span><br></br> <span>2. Registration/ IEM/ Industrial license</span><br></br> <span>3. Finding a suitable site for setting up the unit</span><br></br> <span>4. Procurement (Purchasing/ leasing) of land</span><br></br> <span>5. Getting necessary clearances</span><br></br> <span>6. Building construction…</span></p>
<p><span>Mr Narendra Modi's initiative to make India a Manufacturing Hub: </span><br/> <span>We Facilitate foreign companies set up manufacturing units in India:-</span><br/> <br/> <span>1. Incorporating a company</span><br/> <span>2. Registration/ IEM/ Industrial license</span><br/> <span>3. Finding a suitable site for setting up the unit</span><br/> <span>4. Procurement (Purchasing/ leasing) of land</span><br/> <span>5. Getting necessary clearances</span><br/> <span>6. Building construction and approval</span><br/> <span>7. Commencement of operations</span><br/> <br/> <span>I facilitate a foreign company at each and every step. My primary mandate is to provide all desired information to both foreign and domestic investors about the government policies/incentives/industry information. I am also responsible for providing hand-holding services through the pre-investment phase, execution and after-care support. </span><br/> <br/> <span>Some of my responsibilities include:</span><br/> <br/> <span>1. Providing the relevant information/data to investors across key industry sectors to support investment decisions</span><br/> <span>2. Following up for information/approvals from all departments/agencies of government on behalf of the investors and the investing community</span><br/> <span>3. Receiving investors and providing them facilitation, handholding escort service from the point-of-arrival to point-of-departure</span><br/> <span>4. Interacting with all states in an hub & spoke model, and informing the investors with the state policies relating to land/ labour/ capital and investment</span><br/> <span>5. Fixing meetings/appointments of the investors with different departments and agencies of the government</span><br/> <span>6. Escalating the grievances/disputes of investors with government department/agencies to appropriate authorities</span><br/> <span>7. Promoting India as a global manufacturing destination in select events/forums</span><br/> <span>8. Spreading awareness about important initiatives of the central and state government, focused at helping investors and business communities in India</span><br/> <br/> <span>Vivek Raghuvanshi </span><br/> <span>Mobile +91-9810825355</span><br/> <span>Email: riskindia@hotmail.com</span><a href="http://storage.ning.com/topology/rest/1.0/file/get/2803917606?profile=original" target="_self"><img src="http://storage.ning.com/topology/rest/1.0/file/get/2803917606?profile=original" width="747" class="align-full"/></a></p>University Students: Apply for the 2015 Jim Mathews Award & Fellowshiptag:competitiveintelligence.ning.com,2015-01-15:2036441:BlogPost:969342015-01-15T14:56:02.000ZCraig S. Fleisherhttps://competitiveintelligence.ning.com/profile/CraigSFleisher
<p>University students:</p>
<p>You still have time to apply for this year's Jim Mathews Award and Fellowship. They are due to me on 6 Feb, 2015.</p>
<p>More information about the process can be found here: <a href="http://www.slideshare.net/IntelCollab/aurora-wdcv-jim-mathews-award-2015-instructions-and-application">http://www.slideshare.net/IntelCollab/aurora-wdcv-jim-mathews-award-2015-instructions-and-application</a></p>
<p>University students:</p>
<p>You still have time to apply for this year's Jim Mathews Award and Fellowship. They are due to me on 6 Feb, 2015.</p>
<p>More information about the process can be found here: <a href="http://www.slideshare.net/IntelCollab/aurora-wdcv-jim-mathews-award-2015-instructions-and-application">http://www.slideshare.net/IntelCollab/aurora-wdcv-jim-mathews-award-2015-instructions-and-application</a></p>JISIB Vol 4, No 2 (2014): Journal of Intelligence Studiestag:competitiveintelligence.ning.com,2014-11-29:2036441:BlogPost:967712014-11-29T17:16:50.000ZViktor Voksanaevhttps://competitiveintelligence.ning.com/profile/ViktorVoksanaev
<p>Online Homeland security: JISIB Vol 4, No 2 (2014): Journal of Intelligence Studies... <a href="http://viktorvoksanaev.blogspot.com">http://viktorvoksanaev.blogspot.com</a></p>
<p>Online Homeland security: JISIB Vol 4, No 2 (2014): Journal of Intelligence Studies... <a href="http://viktorvoksanaev.blogspot.com">http://viktorvoksanaev.blogspot.com</a></p>6 mantras for choosing the right offshore business research partnertag:competitiveintelligence.ning.com,2014-11-17:2036441:BlogPost:965882014-11-17T09:56:58.000ZVarsha Chitalehttps://competitiveintelligence.ning.com/profile/VarshaChitale
<p>There are a large number of companies offering business research services across offshore destinations like India (which is the most favoured one), Malaysia, Philippines and several others. How can you ensure that you select the right <a href="http://www.valuenotes.biz/7-business-research-offshoring-myths/" target="_blank" title="7 Business Research Off-shoring Myths">offshore research</a> partner?</p>
<p></p>
<p><strong>Do they have relevant expertise and experience?…</strong></p>
<p><br></br></p>
<p>There are a large number of companies offering business research services across offshore destinations like India (which is the most favoured one), Malaysia, Philippines and several others. How can you ensure that you select the right <a title="7 Business Research Off-shoring Myths" href="http://www.valuenotes.biz/7-business-research-offshoring-myths/" target="_blank">offshore research</a> partner?</p>
<p></p>
<p><strong>Do they have relevant expertise and experience?</strong></p>
<p><br/> To start eliminating from the long list of contenders, you can check for the ones that offer the service you are looking for. Most service providers have fairly comprehensive portfolios published on their websites; but they probably have depth in only some of the services listed. So be sure to ask how much experience they have in the services you are interested in and figure out their real USPs.</p>
<p>Migration teams play a critical role in the success of an offshore partnership, so check if they have processes and teams for migration in your service area.</p>
<p>Also, don’t forget to <a title="Why do companies offshore business research?" href="http://www.valuenotes.biz/companies-offshore-business-research/" target="_blank">take a long<em>-</em>term view on the relationship</a> from the outset. So assuming that the relationship will be successful, are the potential partners capable of moving up the value chain and taking on more complex research services and processes?</p>
<p></p>
<p><a href="http://www.valuenotes.biz/6-mantras-choosing-offshore-business-research-partner/" target="_blank">Read more...</a></p>Is your offshore research partnership in good hands?tag:competitiveintelligence.ning.com,2014-10-20:2036441:BlogPost:966472014-10-20T12:51:26.000ZVarsha Chitalehttps://competitiveintelligence.ning.com/profile/VarshaChitale
<p>It is people who create effective relationships…or destroy them. And this certainly holds true for research <a href="http://www.valuenotes.biz/7-business-research-offshoring-myths/http://" target="_blank" title="7 Business Research Off-shoring Myths">offshoring partnerships</a>. No doubt research offshoring relationships need to have robust institutional and process frameworks at their base. You need a comprehensive contract, service level agreements (SLAs), a defined workflow, processes for…</p>
<p>It is people who create effective relationships…or destroy them. And this certainly holds true for research <a title="7 Business Research Off-shoring Myths" href="http://www.valuenotes.biz/7-business-research-offshoring-myths/http://" target="_blank">offshoring partnerships</a>. No doubt research offshoring relationships need to have robust institutional and process frameworks at their base. You need a comprehensive contract, service level agreements (SLAs), a defined workflow, processes for feedback and escalation, guidelines for communication, and so on.</p>
<p>Additionally, the people managing the partnerships need to be committed to it and must have the requisite competencies to manage them. Without the “right” people, even the best laid out partnerships can fail.</p>
<p></p>
<p><a href="http://www.valuenotes.biz/offshore-research-partnership-good-hands/" target="_blank">Read more...</a></p>Why do companies offshore business research?tag:competitiveintelligence.ning.com,2014-09-24:2036441:BlogPost:964582014-09-24T12:59:00.000ZVarsha Chitalehttps://competitiveintelligence.ning.com/profile/VarshaChitale
<p><strong>Duh! Isn’t it all about cost?</strong></p>
<p>Perhaps… perhaps not. When one talks about off-shoring, the first thought that pops up is cost arbitrage. Indeed, cost arbitrage between developed countries and most offshore destinations is significant. But this is not the only reason, or in some cases it is not even the most important reason for…</p>
<p><strong>Duh! Isn’t it all about cost?</strong></p>
<p>Perhaps… perhaps not. When one talks about off-shoring, the first thought that pops up is cost arbitrage. Indeed, cost arbitrage between developed countries and most offshore destinations is significant. But this is not the only reason, or in some cases it is not even the most important reason for <a title="7 Business Research Offshoring Myths" href="http://www.valuenotes.biz/7-business-research-offshoring-myths/" target="_blank">off-shoring</a>.</p>
<p>Despite a sharp rise in salaries in many off-shoring destinations like India and the Philippines, the average salary of an analyst in the US is over 10 times the salary of an analyst in say India. All of this is not realised in an offshore partnership, as there are several overheads to be considered.</p>
<p><a href="http://www.valuenotes.biz/companies-offshore-business-research/" target="_blank">Read more...</a></p>7 Business Research Off-shoring Mythstag:competitiveintelligence.ning.com,2014-09-16:2036441:BlogPost:962262014-09-16T05:16:50.000ZVarsha Chitalehttps://competitiveintelligence.ning.com/profile/VarshaChitale
<p>Confused about off-shoring business research? There is so much hype among both, the proponents and opponents of off-shoring that it is hard to distinguish fact from fiction.</p>
<p>Here are a few myths I have encountered in the last more-than-a-decade I have been associated with offshore business research.</p>
<p><strong>1. Off-shoring research is a new phenomenon</strong></p>
<p>I mentioned that I have been connected with business research off-shoring for more than a decade and the practice…</p>
<p>Confused about off-shoring business research? There is so much hype among both, the proponents and opponents of off-shoring that it is hard to distinguish fact from fiction.</p>
<p>Here are a few myths I have encountered in the last more-than-a-decade I have been associated with offshore business research.</p>
<p><strong>1. Off-shoring research is a new phenomenon</strong></p>
<p>I mentioned that I have been connected with business research off-shoring for more than a decade and the practice is actually much older than even that. Some large corporations and database providers started offshore market intelligence operations as early as mid-nineties. Some well-known names include Mellon, Merck, GE, Oracle, Reuters, GM, IBM, Neilsen, Cisco, among others. While data on research off-shoring is scarce, estimates put the growth at over 70% in the 2003 – 2010 period. In recent years, medium and small companies have also jumped into the fray. Traditional market research firms have been outsourcing (onshore as well as offshore) fieldwork, panels, SPSS analysis, etc. to subcontractors for the longest time. So this is a fairly established best practice among corporates, though it is not very easy to find good case studies on it.</p>
<p><a href="http://www.valuenotes.biz/7-business-research-offshoring-myths/" target="_blank">Read more....</a></p>Would you like to benchmark your market intelligence activities against your peers?tag:competitiveintelligence.ning.com,2014-08-07:2036441:BlogPost:962602014-08-07T06:00:00.000ZVarsha Chitalehttps://competitiveintelligence.ning.com/profile/VarshaChitale
<p>The world is shrinking, but the business environment of an organization is expanding due to globalization on the one hand and convergence in technologies on the other. How are organizations structuring their market intelligence functions to meet this challenge?</p>
<p>ValueNotes is conducting a short survey to understand the current trends in how organizations manage their market intelligence activities.</p>
<p>We will appreciate your participation in this survey, and request 10-15 minutes…</p>
<p>The world is shrinking, but the business environment of an organization is expanding due to globalization on the one hand and convergence in technologies on the other. How are organizations structuring their market intelligence functions to meet this challenge?</p>
<p>ValueNotes is conducting a short survey to understand the current trends in how organizations manage their market intelligence activities.</p>
<p>We will appreciate your participation in this survey, and request 10-15 minutes of your time to complete the same.</p>
<p>Please follow this link to take the survey: <a href="https://www.surveymonkey.com/s/VNCI">https://www.surveymonkey.com/s/VNCI</a></p>
<p>We assure you that all information provided by you will be kept strictly confidential and will not be shared with any external entity.</p>
<p><span style="text-decoration: underline;">All respondents will receive our report with a summary of the key survey findings.</span></p>
<p>(Please note that this survey is not addressed to competitive intelligence professionals working with research service providers and market research companies. It is addressed to competitive intelligence practitioners working in corporations.)</p>Overcoming indecision – using a rating methodologytag:competitiveintelligence.ning.com,2014-07-29:2036441:BlogPost:962442014-07-29T06:36:05.000ZVarsha Chitalehttps://competitiveintelligence.ning.com/profile/VarshaChitale
<p></p>
<p>Recently my friend was looking to move his office. He finally zeroed in on two places and was simply not able to choose between them. Place A was closer to home, but B was larger and had better ambience. But then A was also cheaper and quieter. But B was a longer commute for the other employees. But…. The pros and cons went on. He was tying himself in knots trying to figure out what he should do.</p>
<p></p>
<p>Finally we decided to apply a little…</p>
<p></p>
<p>Recently my friend was looking to move his office. He finally zeroed in on two places and was simply not able to choose between them. Place A was closer to home, but B was larger and had better ambience. But then A was also cheaper and quieter. But B was a longer commute for the other employees. But…. The pros and cons went on. He was tying himself in knots trying to figure out what he should do.</p>
<p></p>
<p>Finally we decided to apply a little <strong><a title="Research services" href="http://www.valuenotes.biz/research-services/custom-research/" target="_blank">research</a> methodology</strong> to his conundrum. We listed all the key factors that were relevant to his decision – size, price, location, proximity to employees’ residences, ambience, availability of broadband, and a couple of others. My friend defined the relative importance of each of the factors and we assigned weights to the factors accordingly. Then we rated each office on these factors on a scale of one to five. We could then calculate the weighted rating for each property - and voila! the decision was clear. He signed on the dotted line and slept peacefully that night!</p>
<p>Sounds simple? Well it is actually not….</p>
<p><a href="http://www.valuenotes.biz/overcoming-indecision-rating-methodology/" target="_blank">Read why...</a></p>Social Networking Sites and Employeestag:competitiveintelligence.ning.com,2014-04-05:2036441:BlogPost:953932014-04-05T22:44:10.000ZTony Steelehttps://competitiveintelligence.ning.com/profile/TonySteele
<p>Yahoo just published an article that I wrote about Soldiers and the use of Social Networking Sites. The article can be viewed here:</p>
<p></p>
<p><a href="http://voices.yahoo.com/us-soldiers-social-networking-sites-more-than-12591417.html" id="yui_3_13_0_1_1396736552591_1920" name="yui_3_13_0_1_1396736552591_1920" rel="nofollow" target="_blank">http://voices.yahoo.com/us-soldiers-social-networking-sites-more-than-12591417.html</a></p>
<p></p>
<p>Since Soldiers are notorious for…</p>
<p>Yahoo just published an article that I wrote about Soldiers and the use of Social Networking Sites. The article can be viewed here:</p>
<p></p>
<p><a id="yui_3_13_0_1_1396736552591_1920" rel="nofollow" target="_blank" href="http://voices.yahoo.com/us-soldiers-social-networking-sites-more-than-12591417.html" name="yui_3_13_0_1_1396736552591_1920">http://voices.yahoo.com/us-soldiers-social-networking-sites-more-than-12591417.html</a></p>
<p></p>
<p>Since Soldiers are notorious for inadvertently posting sensitive data on Social Media - the high usage of SNS by Soldiers poses a problem for Intelligence Officers (such as myself), who are often dual-hatted as the unit Security Managers. I'm curious as to what methods you, my civilian counterparts, have found to be effective in preventing the spillage of information on sites such as Facebook WITHOUT invading personal privacy too much.</p>
<p></p>
<p>-Tony</p>