Palestinian HRDs Endure Israeli Military Assault on Land Day
The Israeli military is nearly 24 hours into a violent assault on tens of thousands of Palestinian civilians and human rights defenders demanding the return of their land in Gaza. Twenty-four hours or 70 years, depending on how you're counting.
Niober had been planning and looking forward to this trip for months. It took him almost two days to reach Havana international airport from his town in Guantanamo, Cuba, but he still arrived well before his flight. He'd budgeted in plenty of time, knowing security is tight and checkpoints are common across the island. At the airport, just before the final security line, an officer from the Ministry of Interior quietly took him to a side. The officer told Niober he could not board the plane.
Well-being is apparently dangerous in Turkey. When my friend Ozlem Dalkiran attended a training workshop on holistic security she was asked to draw something which represented what she was worried about. It is the sort of well meaning flipchart & post-it note psycho-babble which messes with my stress levels, but Ozlem gamely drew a map of Turkey with icons representing people fleeing war in Iraq & Syria in the East and friends in prison in Istanbul.
In September 2016, the man who had ruled Uzbekistan for 27 years died. As often happens when authoritarians pass on, Islam Karimov’s death after so many years in power left questions as to who would fill the vacuum, and whether the country’s new ruler would ease the repressive practices of the past regime. When Shvakat Mirziyoyev quickly emerged as the successor to Karimov, many in the international community believed that there would be some form of liberalisation.
On 7 March, Wikileaks published a trove of documents showing the United States Central Intelligence Agency’s (CIA) capabilities to remotely hack devices running Android, iOS, Windows, Mac OS X and others. These leaks demonstrate how the CIA and, very likely, other intelligence services, are able to exploit software and operating systems’ vulnerabilities.