Saturday, 27 January 2018

The Dark and Deep Web




The Dark Web is a part of the World Wide Web that requires special software to access. Once inside, web sites and other services can be accessed through a browser in much the same way as the normal web.
However, some sites are effectively “hidden”, in that they have not been indexed by a search engine and can only be accessed if you know the address of the site. Special markets also operate within the dark web called, “Darknet Markets”, which mainly sell illegal products like drugs and firearms, paid for in the crypto currency Bit coin.
There is even a crowd funded “Assassination Market”, where users can pay towards having someone assassinated because of the dark web’s almost total anonymity, it has been the place of choice for groups wanting to stay hidden online from governments and law enforcement agencies. On the one hand there have been whistle blowers using the dark web to communicate with journalists, but more frequently it has been used by pedophile groups, terrorists and criminals to keep their dealings secret.
There are a number of ways to access the dark web, including the use of Tor, Free net and I2P. Of these, the most popular is Tor (originally called The Onion Router), partly because it is one of the easiest software packages to use. Tor downloads as a bundle of software that includes a version of Firefox configured specifically to use Tor.
Tor provides secrecy and anonymity by passing messages through a network of connected Tor relays, which are specially configured computers. As the message hops from one node to another, it is encrypted in a way that each relay only knows about the machine that sent the message and the machine it is being sent to.
There are even special versions of search engines like Bing and Duck Go that will return onion addresses for Tor services.
It is a mistake to think that Tor is entirely anonymous. If a web site is accessed, it can still potentially find out information about whoever is accessing the site because of information that is shared, such as usernames and email addresses. Those wanting to stay completely anonymous have to use special anonymity services to hide their identity in these cases.
Services on the dark web would not have been as popular without a means of paying for them. This is something that Bit coin has made possible. A recent study by Carnegie Mellon researchers Kyle Soska and Nicolas Christin has calculated that drug sales on the dark net total US$100 million a year. Most, if not all, was paid for in Bit coin.
Bit coin is made even more difficult to track on the dark web through the use of “mixing services” like Bit coin Laundry, which enables Bit coin transactions to be effectively hidden completely.
The Questions raises that “How Dark Is The Dark Web”…?
The developers of Tor and organizations like the Electronic Frontier Foundation (EFF argue that the principal users of Tor are activists and people simply concerned with maintaining their privacy. Certainly, Tor has been used in the past for journalists to talk to whistleblowers and activists, including Edward Snowden).
However, even a cursory glance at the Hidden Wiki – the main index of dark websites – reveals that the majority of sites listed are concerned with illegal activities. Some of these sites are scams, and so it is not clear how easy it is to buy guns, fake passports and hire hackers from the services listed. But there are likely sites on the dark web where these things are entirely possible.
Although the dark web makes law enforcement agencies’ jobs much more difficult, they have had a great deal of success in bringing down sites and arresting their users and the people behind them. The most famous of these was the arrest of Ross Ulbricht, the person behind the most well known of the drug markets, Silk Road.
More recently, the FBI’s arrest of two users of a child abuse site on the dark web highlighted that they are now able to use a range of techniques to unmask Tor users’ real internet addresses.
The Conversation
Dark Net websites are accessible only through networks such as Tor ("The Onion Router") and I2P ("Invisible Internet Project"). Tor browser and Tor-accessible sites are widely used among the dark net users and can be identified by the domain ".onion". While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing anonymous hosting of websites. Identities and locations of dark net users stay anonymous and cannot be tracked due to the layered encryption system. The dark net encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer. Due to the high level of encryption, websites are not able to track geo location and IP of their users, and users are not able to get this information about the host. Thus, communication between dark net users is highly encrypted allowing users to talk, blog, and share files confidentially.
The dark net is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists. At the same time traditional websites have created alternative accessibility for the Tor browser in efforts to connect with their users. Pro Publica, for example, launched a new version of its website available exclusively to Tor users.
Many hackers sell their services either individually or as a part of groups. Such groups include x Dedic, hack forum, Trojan forge, Maza faka, dark 0de and The Real Deal dark net market. Some have been known to track and extort apparent pedophiles. Cyber crimes and hacking services for financial institutions and banks have also been offered over the Dark web. Attempts to monitor this activity have been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal. Use of Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks has also been made through leveraging the Dark Web. Many hacking groups such as Code Green also recruit Hackers depending on their skills. There are many scam onion sites also present which end up giving tools for download that are infected with trojan horse or backdoor.
There is regular law enforcement action against sites distributing child pornography – often via compromising the site by distributing malware to the users. Other content includes sexualized torture and killing of animals and some kind revenge porn.
There are at least some real and fraudulent websites claiming to be used by ISIL (ISIS), including a fake one seized in Operation Onymous. In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac. The Rawti Shax Islamist group was found to be operating on the dark web at one time.
In the 2000s, use of the term child abuse images increased by both scholars and law enforcement personnel because the term "pornography" can carry the inaccurate implication of consent and create distance from the abusive nature of the material. A similar term, child sexual abuse material, is used by some official bodies and similar terms such as "child abuse material", "documented child sexual abuse", and "depicted child sexual abuse" are also used, as are the acronyms CAM and CAI. The term "child pornography" retains its legal definitions in various jurisdictions, along with related terms such as "indecent photographs of a child" and others. In 2008, the World Congress III against the Sexual Exploitation of Children and Adolescents stated in their formally adopted pact that "Increasingly the term 'child abuse images' is being used to refer to the sexual exploitation of children and adolescents in pornography. This is to reflect the seriousness of the phenomenon and to emphasize that pornographic images of children are in fact records of a crime being committed."
Interpol and policing institutions of various governments, including among others the United States Department of Justice, enforce child pornography laws internationally. Since 1999, the Interpol Standing Working Group on Offenses Against Minors has used the following definition:
Child pornography is the consequence of the exploitation or sexual abuse perpetrated against a child. It can be defined as any means of depicting or promoting sexual abuse of a child, including print and/or audio, centered on sex acts or the genital organs of children.
Children of all ages, including infants are abused in the production of pornography. The United States Department of Justice estimates that pornographers have recorded the abuse of more than one million children in the United States alone. There is an increasing trend towards younger victims and greater brutality; according to Flint Waters, an investigator with the federal Internet Crimes Against Children Task Force, "These guys are raping infants and toddlers. You can hear the child crying, pleading for help in the video. It is horrendous." According to the World Congress against Commercial Sexual Exploitation of Children, "While impossible to obtain accurate data, a perusal of the child pornography readily available on the international market indicates that a significant number of children are being sexually exploited through this medium.
Masha Allen was adopted at age 5 from the former Soviet Union by an American man who sexually abused her for five years and posted the pictures on the Internet. She testified before the United States Congress about the anguish she has suffered at the continuing circulation of the pictures of her abuse, to "put a face" on a "sad, abstract, and faceless statistic," and to help pass a law named for her. "Masha's Law," included in the Adam Walsh Child Protection and Safety Act passed in 2006, includes a provision which allows young people 18 and over to sue in civil court those who download pornographic images taken of them when they were children. "Downloading" includes viewing without actual download; many successful prosecutions are completed through using residual images left on the viewer's computer.
Terrorist and non-state actors have used different modes and mediums to spread their message and communicate with their comrades. The dawn of the Internet has also provided such groups with unparalleled opportunities to establish communications and operational links that were not possible before. Starting from websites, terrorist groups moved to more interactive mediums like chat rooms and forums. It was social media platforms, such as Facebook and Twitter that truly revolutionized how militants, terrorists and non-state actors communicated with each other, recruited sympathizers and supporters and disseminated their propaganda.
The self-proclaimed Islamic State (IS) perfected the use of social media, which became the preferred source for the so-called ‘jihadists’ or ‘soldiers of the Caliphate’. In response, tech companies have been compelled to take down Facebook and Twitter accounts affiliated with IS. The unintended cost of this policy is that supporters, sympathizers and members of jihadist groups have moved into the deep web and the dark net.
"In Computer Science, we often got bored and decked around. One day we ran into the deep web. The most disturbing site we found was a comprehensive guide for cooking women. We're not talking about a short joke here. This page had information on what body types to use for specific cuts, how to prepare these cuts, and how to cook the girl so she lives as long as possible. It horrifies me that people way worse than the freaks on Criminal Minds exist.”
So security concerns for SMBs re: "Deep Web" would be as follows:
1. User's navigating the "Deep Web" is infected much in the same way that users on the "Surface Web" are (by browsing and general internet activities)
2. Malware that utilizes Tor for data exfiltration and/or command and control
Start by rejecting inbound and outbound traffic on port 9001, this is the default port for Tor. This will not prevent the user or malicious actor from using the service (as this can be configured for commonly permitted ports such as 80) but is a good start if there is no legitimate business need for port 9001.
Configure your Antivirus product to prevent common tor executable from running on company resources (Tor, Privoxy, Tor Browser), these executables can also be renamed to work around this, however this is a good first line of defense.
If your firewall supports it (and a fair amount of modern UTMs do) configure your firewall to inspect for Tor traffic and block the traffic from passing, this is going to depend on your firewall so consult the manufacturer's documentation. Some APT software also has provisions for rejecting this traffic and/or the associated executables from leaving the host or running, so you may also want to consult the documentation for your APT/Malware/Antivirus software to see if this can be leveraged.
If you're most concerned with user activity a software white listing application would reject unapproved software from running, in concert with APT defenses this could also be an appealing way to address these risks associated with malware/malicious actors.
The above should give you a head start and provide you with a reasonable level of confidence that traffic leaving or entering the network is not leveraging Tor.
Simply, white list applications allowed to be used on your environment, don't allow any browsers such as TOR, I2P etc.
But you still need other/network access controls for those laptops, phones, gaming systems, internet toasters and other IoT connected B.S. that you can't impose a policy on.
My combination of DNS filtering, no IP in a URL restriction, good firewall rules preventing just as much OUTBOUND traffic as in, and leaving all ports in a dead VLAN by default, have all served me well so far - and I'm not paying for any "subscription" products to do it.
The Dark Web sounds scary, right? You've probably heard of it, maybe in connection to online drug markets or rumors of terrorist plotting.
A sweeping survey of over 24,000 people worldwide by a Canadian think tank shows that 71% of internet users believe the Dark Web "should be shut down."
The Dark Net, or Deep Web or a dozen other names, isn't a single set of sites so much as a network of sites that you need special protocols or software in order to find.
Shutting down the network would mean shutting down every site and relay. In the case of the private web browser Tor, this means simultaneously shutting down over 7,000 secret nodes worldwide. The combined governments of various countries have enough trouble keeping the Pirate Bay from operating right on the open web, never mind trying to shut down an entire network of sites with encrypted communications and hidden IP addresses hosted worldwide.
There isn't even a single Deep Web. Most people who refer to the Deep Web are referring to the Tor Network, a network with a special browser that allows you to set up and view websites anonymously. There are other networks as well, like Free Net or I2P.
But maybe the biggest barrier to shutting down the Dark Web is that not everything happening there is illegal, which means there are no real grounds for shutting it down. The government has successfully shuttered illegal services, but many people are using the Deep Web for honest means, like setting up support networks for survivors of abuse, or just running a literary magazine.
So for the pearl-clutchers afraid of the Dark Web: Embrace it. It's not all bad, and either way, it's here to stay.
The NSA and other intelligence agencies could "benefit from analyzing customer web data to look for connections to non-standard domains," Chertoff wrote. In other words, he's suggesting that if security agencies can tell people are going somewhere on the dark web, they can make inferences from it. "This can be done without intruding on users' privacy as only the destinations of the web requests need to be monitored and not who is connecting to them" he wrote, which seems like wishful thinking.

#Credit: MIC Networks

Wednesday, 17 January 2018

Deepening Split In Rebels


TTP Offshoot JuA’s Rebel Commanders Launch HuA. A splinter group of the Tehreek-i-Taliban Pakistan (TTP), Jamaat-ul-Ahrar (JuA) has been further splinted into two groups in what appears to be a serious blow to JuA terrorists operating against Pakistan.
A video statement released on 11 November 2017 confirmed a belligerent revolt against JuA resulting in formation of new group, the Hizb-ul-Ahrar (HuA) in Nangarhar province of Afghanistan. Mukarram Khan, a senior Ahrar leader was named chief of HuA. Mukarram who had earlier served as an important commander for JuA, left parent group along with many commanders over serious internal clashes and policy differences with its leadership including attacks against innocent minority Christians, killing civilians, extortion, kidnapping for ransom and other acts he deemed un-Islamic. However, Dr Aziz Yousafzai is appointed as the group’spokesman.
Mukarram Khan, who belongs to Mohmand Agency, was serving at key positions as head of the group’s intelligence unit and was the main character behind the JuA’s terrorist activities. He was JuA’s spokesperson and member of the group’s central ‘shura’ or council until last month. HuA under Mukarram followed the same pursuit of JuA which their key leadership announced at the time of its split from TTP. During August 2014, JuA announced Umer Khalid Khurasani as the chief of new group and Ehsanullah Ehsan as its spokesperson on the same grounds which HuA is now claiming to justify its disintegration.
The cracks surfaced in the ranks of the group recently after some of Khorasani’s supporters allegedly shot and injured Mukarram, the close confidants of the JuA chief Omar Khalid Khorasani. This was actually one of the basic reasons of Mukarram’s parted ways with the group as commanders of his faction appeared in a video last month and told their supporters that a “plot of Khorasani’s group to kill Mukarram has been failed”. Some commanders delivered brief speeches but Mukarram did not appear in the video, as he has been receiving treatment of injuries he had received in the attack by his JuA militants”. The meeting of HuA commanders to announce independent group in a video message was held in Afghanistan’s eastern Kunar province, adjacent to JuA hideouts in Nangarhar’s Lalpura area.
In an audio message to the dissident commanders, Mukarram accused Khorasani-led group of involvement in the killing of innocent people. He referred several major attacks, including the deadliest attack on a town in Wagah border, in 2014, which killed nearly 60 people and injured more than 100 others. He also mentioned the suicide attack on innocent Christians in a public park of Lahore in March 2016, in which 73 people were died and more than 350 were injured. He said Christians had not been in war with them, and the attack on the innocent non-Muslims “cannot be justified”. Mukarram also mentioned the bombing in December 2015 on the National Database and Registration Authority (Nadra) in Mardan, KPK which claimed the lives of at least 26 people and injured 50 others.
The group seems to be in trouble with swift escalation of serious internal rifts. HuA chief accused JuA of involving in extortion of money; links with Indian intelligence RAW, Afghan intelligence NDS and fighting with other militant groups. Rebel commander Mukarram along with other members tried numerous times to convince the leadership for change in such policies but failed. According to some militant sources, nearly 40 percent of the JuA commanders support the new splinter group at present and more could join them in view of reservations over the policies of JuA leadership after Khorasani. In February 2107, the Islamabad Lal Masjid condemned JuA for exploiting the name of its deputy imam Ghazi Abdul Rasheed, who was killed in July 2007 when the security forces raided the mosque. Lal Masjid had also described the JuA as an anti-Islam and anti-state group for attacks on civilians.
It is tradition in TTP to rebel against its leadership. In September 2014, differences within TTP deepened which resulted in formation of new splinter group JuA after the expulsion of a commander from parent outfit. TTP leadership removed Commander Abdulwaki, alias Omar Khalid Khorasani from the position of chief of Mohmand agency unity and also cancelled his basic membership. Differences in Taliban ranks deepened at a time when they were under attack by the security forces in their sanctuary of Kunar Afghanistan. Differences always remain in the Taliban ranks but their brand of Sharia always failed to resolve them, even instead their disputes declared varieties of Sharia under different TTP factions. If it is all about Sharia than resolution of any dispute in TTP is very simple but it is rather clash about the distribution of their foreign masters’ funds that always remain bone of contention. Additionally, the long charge sheets against TTP leadership caused frequent splits as they are frequently being accused of serving their personal and foreign interests.
It was JuA un-Islamic policies and relation with secret agencies hostile to Pakistan that disappointed many leaders who additionally had been frustrated from assault of Pak Army under operation Radd ul Fasaad (RUF). All these factors collectively forced the group’s senior leader and spokesperson Ehsanullah Ehsan to surrender in front of the security forces in April 2014. It was considered a serious blow to the terrorist outfit as he issued a charge sheet in a video as well as in an interview to a private TV channel against JuA and TTP leaders, particularly both groups’ links with regional intelligence networks. Similarly, in April 2017 eight other important members of the JuA had laid down their weapons and surrendered before the Army in Mohmand Agency. Operation RUF is continued successfully while these terrorist organizations are frequently been being exposed. The Pakistan Army with the support of entire nation is determined to take operation RUF to its logical conclusion as operation Khyber-4. The losses and splits in terror organizations under operation RUF can be clearly seen in continuation of the earlier operations with the support of the people and the institutions.
Pakistan Army dislodged the facilitators and abettors of militants and broken their connection with their leadership sitting across the border. The writ of the state was being restored and no power could fight the state as Pakistan has made a lot of progress, but more work need to be done. The only development in terrorist circles is that while sitting in sanctuaries of Afghan safe heavens, they are further splinting over policies and tactics after failure in executing any harm to Pakistan. Border management mechanism and active surveillance on the borders has ruined cross border operation of TTP, its factions and other terrorist organizations. The army along with FC would build 338 check posts by 2019 to strengthen border with Afghanistan, besides fencing it along KPK and FATA. 42 forts had already been built; while 63 more would be built along the Pak-Afghan border.
There is lack of leadership quality in TTP that they had been involved in bloody internal clashes that has even taken lives of their known members. Ehsan Ullah Ehsan in a statement prior surrender said that the leadership of TTP had no policy to deal with this situation and disclosed that nearly 200 Taliban from Mehsud tribe have lost lives as the result of internal fighting. Taliban had killed the TTP Rawalpindi chief Commander Nadeem Abbas alias Enteqami but his killers have not yet been brought to justice by TTP leadership. It is still a mystery as to who has killed the members of central council Asmatullah Shaheen Bitani and Tairq Afridi. These fasadis terrorist organizations are constantly splinting and further weakened as all Pakistanis stand united with its Army against 'fasaad and fasadis' together.
#Pakistan Cyber Force (PCF)

Sunday, 10 December 2017

Captain Naveed Khan Wazir Shaheed 117 L/C





He belonged to the Wazir tribe from North Waziristan. Currently, his family lives in Wah Cantonment, but they often visit North Waziristan, where Captain Naveed Khan Wazir is buried.
In his childhood, he was not like most other children of his times. He was a polite and solemn boy with a habit of deep thinking. As a responsible child of his parents, he took care of his mother and younger siblings, and voluntarily performed the household chores. He had not many outdoor activities. Having few friends, he mostly used to stay at home and reading was his only hobby, sometimes accompanied with watching TV. He was never seen in a temper. He kept his patience and composure and had a firm hold over his temper, often at times when others would find it difficult.
His sister, describing his loving personality, said, “He was a loving brother and a loving son. I remember that one particular day, he was lovingly looking at mother’s face. He continued to look at her until he was asked why he was constantly looking at her face. He replied that he had read that looking at the parents with love is equal to an accepted Hajj, so he was trying to get this reward.
He wanted to become a doctor by profession, because his father did not wanted him to join Pakistan Army, since most parents wish their children to join a profession with no risk to life; so his plans were very different initially.
He had proved himself a hard working, passionate student – passionate to do something that has not been done before. His sleepless nights and his negligence of his own health and diet gave a glimpse of the fire that was ablaze in his heart and was meant to illuminate all around him. He did not speak much and was naturally quiet, which was perhaps a result of the realisation that life was not a mere enjoyment but a responsibility.
At the age of 19, after completing his intermediate education, he appeared in the ISSB test and was selected to serve his land and to be among the fortunate defenders of this land. His duty was decided and his fate was destined, so he joined the 67 Punjab Regiment whose slogan is ‘Fakhr-e-Sehra’. At the age of 21, he started his duty from Bahawalpur, and then, he was transferred to Quetta where he stayed for some time. Now he was 25, and he had to spend two years in hard areas; but his courage was harder than these areas. He had completed almost two years of duty in hard areas; and when he embraced martyrdom, he was only a month short of completing two years; and a month later, his unit shifted from the area.
After joining the Army, another change appeared in his personality. Now he was more patriotic, more concerned with the matters of his beloved country, more desirous to do something to prove his love for it – the overwhelming love which was evident from most of his conversations with his family and friends. His sister narrated that he described to her the war Pakistan is facing from an undisclosed enemy, the involvement of foreign handlers in this game and that most of the terrorists they come across are neither Muslims nor locals; all these expressions showing his keen observation and resolute in the eradication of terrorism from Pakistan.
He passed most of his time in the Tirah valley of Khyber agency where he and most of his colleagues embraced martyrdom. Tirah valley, as indicated by its name, is a valley, where the top positions were already occupied by the terrorists, so when the Army proceeded with its troops, they had to face huge damage due to the firing from the terrorists holding the positions at the top.
Captain Naveed Khan Wazir had another innate quality – his bravery. He was an extraordinarily brave son of the soil. His sister, quoting him as he used to say most of the time, said, “Always remember one thing in your life; some people die before death, while there are others who never die, not even after their death. Never be one of those who die before death due to fear or lack of hope or courage. Never lose your will and your courage.” And he proved it at the time when he was chosen to be a martyr, when the people witnessed his bravery, courage and his iron nerves. He was shot in his head on the evening of Thursday, March 13. Two bullets were enough to take his life from him, but he kept smiling to boost the morale of his comrades who were getting impatient to see him in pain while bad weather prevented from shifting him to Peshawar. He had to spend one day and one night without any medical assistance, with his head bleeding, while his very desire of martyrdom was about to be fulfilled, which kept him steadfast and patient. All the time that that he was conscious, he insisted that he was doing fine, that there was nothing to worry about and that everything would be alright. His NCB said that he bled continuously through the night that he spent at Tirah valley, but he did not lose his courage or patience, he instead kept his calm and insisted that he was alright and that there was nothing to worry about. On the next morning, i.e., Friday, March 14, he was shifted to Peshawar by a helicopter, but by then, he had bled so much that it caused him to embrace martyrdom.
When he embraced martyrdom, he had been in the Pakistan Army for five years. He was a captain, and only two days ago, he had appeared in an exam for the post of a major; when he returned to his unit, he was called for the operation in Tirah valley.
The last time that he visited home, he seemed to be having the feeling that it was his last visit perhaps. He advised his mother to observe patience if he comes back a martyr, and he told her of his strong desire to attain the status of a martyr and serve his country with his life. He had been worried about the ongoing situation and the terrorism in Pakistan. He asked his mother to pray for him that his sacrifice would not go in vain if he could sacrifice his life for his country.
He was shot on March 13, and he was admitted to CMH Peshawar on March 14. He survived the first operation, but after the second one, he did not regain his consciousness and embraced martyrdom on April 8. His strongest desire was fulfilled. The news was a great shock for his parents and family who were unable to accept the reality, that they had seen their brave son for the last time. His sister, expressing the feelings of those moments, said:
“Initially, we were unable to believe the news. The doctors operating on him had already informed my father that there were very few chances of his survival, but my mother was not able to accept the fact until she got the news. She was feeling sure that her son would soon be standing with his smiling face before her eyes. But when Allah blesses someone with a grade, He first makes him capable of it. We were broken with pain, but there was also a pride that our brother has been raised to the highest status a believer can hope for, it was a pride for us that we are the family of a shaheed, and that we have sacrificed the most precious thing in the way of Allah and for this beloved motherland.
Captain Naveed Khan Wazir embraced martyrdom at the age of 25, and he was not married or engaged at the time. He was not only his father’s son but his right hand. He was like a friend for his father; and his father, who had lost the hope of his life, was standing calm, with pride on his face, while receiving the body of his brave son. His sister said that her father had not a single tear in his eyes, and till date, she never saw her father crying before anyone.
To a question about her feelings when people say something negative against Pakistan Army or its operation against its own people, his sister replied:
“When someone has sacrificed all the assets of his/her life, and despite this, he/she sees no acknowledgement from the people they sacrificed it for, it really hurts, and it hurts a lot. People raise questions today  whether the Pakistan Army personnel giving their lives for the country are shaheed or not. I believe that reality and the truth is the one that your heart acknowledges, and my heart says that my brother is a shaheed because he laid his life in the way of Allah while protecting the land known as the Islamic Republic of Pakistan, with the slogan of ‘la ilaha illa-Allah, Muhammad-ur-rasool-Allah’. How can he not be a shaheed when he gave his life for such a sacred land?”
“This sacrifice is not the sacrifice of a single person. It is the sacrifice of the whole family; all the people directly related to the person sacrifice with him. Do not consider it the sacrifice of a single person; an elder son is the supporter of his family, the right hand of his father. In old age, parents need the support of their strong sons, they need to hand over their responsibilities to them; they need financial, emotional and social support. All these are sacrificed along with that person; but people do not value or acknowledge this sacrifice, instead, they debate whether it is a shahadat or not.” Her voice trembled; it made my heart swell and tears of heartfelt respect rolled down my eyes. My questions were over, but the love and respect – respect for Pakistan Army and the families that sacrifice their sons and their future for the homeland, for peace, for the protection of our lives and for the future of our coming generations – was overwhelmingly increased. Yes, these sacrifices are worth being acknowledged by everybody with their heart and soul. May Allah bless Pakistan.

The Dark and Deep Web

The Dark Web is a part of the World Wide Web that requires special software to access. Once inside, web sites and other services c...