a formal pronouncement or expression of opinion

Political

Speech from George R. Willy to President Rajapakse


George R. Willy

George R. Willy

Distinguished guests, Ladies and Gentlemen, welcome Your Excellency to this great city. If you can ignore the oak trees and the mockingbirds you could easily mistake this for Sri Lanka.

It is in Sri Lanka that I was born, and my mother and the parents of my wife Shanthi, our grand fathers and grand mothers are all buried under the sacred soil of my motherland. I grew up Your Excellency, in Jaffna and moved to Colombo when I was only 10 years old. My wife is from Badulla, grew up in Diyatalawa where her dad was a well a respected captain in the army.

I have smelt the sweetness of Magosa trees in Jaffna and taste of the Red Jumbu fruits that left red stains on my white shirt as I walked to school in Colombo. I know the allure of Jack fruits ripening on the trees as crows begin to break them open.

I have seen the bright colour of pandals during Wesak and shamelessly ate food at Dansala meant for the poor. And I have heard the chanting of Kovils and inhaled the smell of jasmine and Joss sticks. I’ve heard the bell of All Saint’s church as I assisted Father Herath during Mass.

But since I left Sri Lanka in 1975 there has been such pain, such sorrow and such agony. The mighty Mahaweli Ganga that usually brings its sacred waters to the paddy fields spat out blood. Both the Sinhalese and Tamils. From up here in the United States I have watched the land of my forefathers descend from paradise deep into hell. No one can say with certainty who is to blame but the time for blaming is long gone.

Your Excellency, your power be descended from Dutugemunu and my people from Elara. Remember how Dutugemunu fought Elara on his Elephant Kandula and killed Elara. Dutugemunu of course is still remembered for uniting Sri Lanka for the first time. But he is also remembered for something else. After defeating and killing Elara he built a monument for Elara out of respect for his worthy opponent. He ordered all the citizens of the land to stop, dismount and pay respect to Elara. In so doing he not only showed what a great noble man he was. But also proved to be a great politician. He knew that He had to rule the Tamil people too after the defeat of Elara.

Your Excellency, faith and fortune and your great political skills have placed you at a unique point in history.

Children years to come, will read in their history books, that a great leader, a great warrior by the name of Mahinda Rajapaksa finally defeated the rebellion after nearly 25 years when several before him failed. They may even say that you are Dutugamunu of the 21 century. But if you want to wear Gemunu’s mantle, Your Excellency, you will have to build a monument too. That monument does not have to be a Dagoba or a building. It will have to be new policy backed by laws with teeth to enforce.

Do not make the mistake that started 58 riots. Do not hold back Tamils who want to get into Universities. Do not make the Tamils feel like they are second class citizens. Respect their religion, and respect their language. There is something about the Tamil people you need to know Your Excellency. To them their language is God. There are only few cultures in the world which has such devotion to the language.

You were trained as a lawyer and in your early career you were a formidable defender of human rights.

Now you have the popularity, you have the power of a hero, like Julius Caeser, returning to Rome from his conquests. No one can deny what you ask. Ask the parliament to pass some entrenched clauses; you and I read in law school. Then we have had to study the Soulbury Constitution. If you need my help I will give it free like many in this audience would. The Tamil people are naked and hungry looking for you to assure them that there is a place for them.

Make sure they have one. You killed one Prabhakaran but do not let another grow. You cannot prevent another one with swords and guns. You can only do that with your heart and wisdom. Compassion, truth and justice, you learnt from Buddha are the only weapons you will need. According to Dhamma Pada, Buddha said that hatred does not cease by hatred at any time. Hatred cease by love. This is an old rule. That’s what the Buddha said.

Your Excellency, as you leave this fair city and return to Sri Lanka, promise me that a 10 year boy walking to school tomorrow in his white shirt will have no other red stain than from the Jumbu fruits. The morning crow will not open anything other than the jackfruit. That there will be nothing else hanging from the Magosa trees, than the fruits I smelt.

Your Excellency return us to paradise, return us to paradise. Thank You

Further Discussion at transcurrents


Code Breakers


‘They served in silence’

Prologue

“6 January, 1995. Manila, Philippine, local police were called on for an apartment fire.

Ramzi Ahamed Yousef

Ramzi Ahamed Yousef

At their arrival they have found few interesting objects. A Toshiba laptop, random batch of chemicals and some materials used in bomb making. An open file on the laptop revealed a plan forsimultaneously bomb twelve US airliners over the pacific.The police found several files from the laptop which were all encrypted. When they decrypt the files using special software, they have found out that the files contained important messages linking many terrorists, bomb making techniques and plans of mass destructions. All these evidence pointed towards a very important person. He was the world’s most wanted terrorist at the time. “Ramzi Ahamed Yousef”, one of the masterminds of the 1993World Trade Centre bombing. The plot was stopped and he was arrested at a Pakistani guest house by Pakistani Inter-Services Intelligence Directorate and Special Agents of the U.S. Diplomatic Security Service. He was sentenced to life in prison without parole. It was a major victory for international law enforcements and once again it revealed the importance of cryptography in the world of war.

World War II (1939-1945) was the golden era of cryptography. It was a very busy time for cryptologists all around the world. Under the command of specialised branches of U.S Army and Navy, the top notch cryptologists played a significant role in paving the paths for the front line all over the world by intercepting secret Nazi German and Japanese codes and breaking them, especially by eavesdropping enemy’s diplomatic communications.
In 1917 the army created a cipher bureau within the Military Intelligence Division. Combined with the Radio Intelligence Unit they carried out all the intelligence communication services in Europe during the World War I. The Army Signal Corp was introduced and they assumed the responsibilities in decoding enemy communications. These services provided by the intelligence services at that time initiated the idea of forming one unified body of intelligence in code making and code breaking. This later led to the initiation of the NSA (National Security Agency, USA).
A key point in making allied counter strategies during the World War II was breaking the Nazi Germany secret code generated by their own cipher machine called The Enigma.

The Enigma Machine

German soldiers using an Enigma machine during the second world war

German soldiers using an Enigma machine during the second world war

The Enigma machine is an advanced cipher machine developed by the Germans at the end of the World War I. It was used by the German military as their main device to secure wireless communications until the end of World War II. Main reason for the success of the enigma machine was that it used a set of rotors and a wired system which enabled to encrypt their secret messages uniquely and presumably in an unbreakable manner. The possible encryptions per letter on the machine were 2280. It’s simple operational functionality and the durability was another reason for this machine to be trusted among the Germans.
To send an encrypted message, the operator had to set the Enigma’s plug wirings and the rotor wheels to a predefined initial combination known to him and to the receiving operator. These combinations were kept in a registry and changed daily for extra security. Then the sending operator typed in the plain text message letter by letter to the enigma machine while it goes through the wiring and lights up a different letter on the upper panel of the enigma. The operator wrote down each of those lit up letters.

After typing in the whole message sender had the encrypted message which is a sequence of strings which means nothing. Then the encrypted message got transmitted through a standard Morse code radio transmission. Then the receiving operator wrote the received encrypted message, set his Enigma machine to the same pre-defined combination of rotor setting and then typed the message in to the machine. Then the Enigma lit up its original letter for each replacement letter.

The Bomb

The Bomb

The answer to the enigma machine by the allied forces was the ‘Bomb’. Conceptualised by the Poles, Designed by the British and built by the Americans, it was capable of figuring out all possible rotor combinations and to decrypt enemy’s Enigma codes one by one. Deciphered information given by the Bomb gave accurate detailed locations of German submarines in the Atlantics to the Allied Naval units.

Bletchley Park was the government’s intelligence communication headquarters at the time which facilitated about 10,000 code breakers. Situated 40 miles to the north of London, it was the central intelligence station that continuously had been eavesdropping Germany all through World War II until the D Day. The employees here were hired in an unorthodox manner where they were chosen from regular people, cross word fanatics, chess champions to 200 crypto analysts and mathematicians from various universities. Two of the outstanding characters among the Bletchley staff were Alan Turing and Gordon Welchman, Alan Turing, who is the father of the computer, developed the idea of the Bomb.

Bletchley Park, also known as Station X

Bletchley Park, also known as Station X

In his replication the Bomb’s rotors were wired in a similar way as the Enigma. All its rotors were connected and driven by a motor. Each rotor had 104 contacts (26*4) which were connected together. The Bomb was used in testing if the crib fits to the given message. The machine simply tried all 26*26*26 possible cases. If a possible key was found, the bomb stopped. The correctness of the key was tested on a normal Enigma manually. At least 200 of these machines were built and located all over Great Britain. Later high speed bombs for the naval Enigmas were built in USA. However, the existence of the Bomb was kept as a secret from the Germans. Although In 1996, the Americans published secret work by Turing on the Bomb, some details have remained unknown until today.

Alan Turing

Alan Turing

JN-25

During the war against the Japanese, the allied code breakers came across another complex numeric code called the JN-25. It was the most secure encryption cipher used in communication by the Imperial Japanese Navy (IJN). Unlike the Enigma, JN-25 could not be broken by machines and it was broken by shear efforts of cryptologists with their pencils and paper. Cryptologists had to find patterns by analysing all the intercepted messages in order to break JN-25. Armed with an important decoded JN-25 intercepted message, Admiral Chester Nimitz (Commander in Chief, United States Pacific Fleet) had a huge advantage against the Japanese fleets during the war. In May 1942, intercepts coded with JN-25 revealed a plan of a trap made by the Japanese on the US aircraft carriers near the island of Midway. By knowing the trap in advanced Nimitz made a trap of its own and surprised the Japanese strike force. For the Japanese this was the first defeat after 300 years.

A JN-25 Message

A JN-25 Message

Along with the smart devises such as The Bomb and top brains fuelling the cryptographic race there were still many short coming. The effectiveness of the intelligence services was undermined by the lack of uniformed rational unit. One example of this was the Pearl Harbour Attack by the Japanese on December 7, 1941. Several hours before the bombs fell on the Pearl Harbour, an U.S code breaker found out that a surprise attack by the Japs were imminent. Since there was no efficient methods of relaying this message it was too late when the message arrived one hour after the attack. The overall death toll reached 2,350, including 68 civilians, and 1,178 injured. This event literally changed the world.

After the final victory had been achieved in 1945, the American government and policy makers identified the importance and value of having one unified agency for intelligence communication. After seven years the president Harry Truman, distressed at the obvious weaknesses in the intelligence structure, ordered an analysis in 1951 and acted on the investigation in the following year. A new agency, the NSA (National Security Agency, USA) was created by a top secret executive directive on October 24, 1952. By freeing from its subordinations, it was to be directly accountable to the secretary of defence. A 1984 presidential directive assigned the NSA responsibility for computer security, and, in a 1988 directive, responsibility for its own operations security training. Through this career-oriented service, the agency conducts its own recruiting and employment programs to ensure a skilled and sophisticated work force. NSA even manufactures their own hardware such as special microchips which they integrate to their enciphering machine. They keep all their actions as top secret in order to keep the internal government communication safe from foreign code breakers. NSAs success is triumphed not only by their high tech machine power but also with their brain power as well. They were tested to their limits time after time during its service.

Cold War was another busy time for the NSA. Their main mission was to keep their eyes and ears peeled on continuing state of political conflict, military tension, proxy wars, and economic competition existed after World War II (1939–1945), primarily between the Soviet Union, its satellite states, and the powers of the Western world, particularly the United States. In the early 40s cryptologists were humbled by an undecipherable code used by the Soviets for their communication. Although the U.S listening posts worldwide were intercepting these messages, nobody could even begin to break them by the traditional deciphering techniques. These messages were protected by an intelligent double encryption system which means it had a code within a code. First layer is a substitution cipher. A worker will have a code book which would resemble something like dictionary which has numerical substitutions for each text. After the worker does this he would end up with a encrypted message which has numerical strings instead of its original plain text. Then a second layer of encryption is added. This has been done using a ‘One Time Pad’. A ‘onetime’ pad is a type of encryption, which has been proven to be impossible to crack if used correctly.

One time pad

One time pad encryption is a multi layered process that uses random numbers to encrypt plain text into ciphered code. The simplicity and the robustness of this technique is remarkable and still believed to be unbreakable with today’s supercomputers if used correctly. However human error coursed by a soviet code clerk helped the allied cryptologists to break the code. There are multiple methods to apply the one time pad and below is one of such applications used by the Soviets during the beginning of the cold war. Assumed that the plain text to be encrypted is “Retreat at dawn”. First step of the encryption is the “Code Book”. A Code Book has words, listed alphabetically along with corresponding numbers that represent each word. According to the Soviets code book the words were replaced by a four digit number. Both the sender and the recipient were given two copies of the Code Book. One copy is used by the sender and another copy which is formatted differently is used by the receiver. After the Code Book conversion the plain text would be replaced by a number of four digit values.

E.g.: Retreat at dawn >> 0441 0412 2123 9000

9000 represents the end of the sentence. Then rearrange the 4-digit numbers into 5-digit numbers by moving the left-most digit from the number group to the right, over to the adjacent number group on the left. Since there is a shift of some digits one digit to the left, you will find that you run out of digits for the last numbers, so simply add zeros until the last number has 5 digits

E.g.: 04410 41221 23900 00000

Next step is done using another code book called the One Time Pad Book. It is a book which has rows of randomly generated five digit numbers. There will be only two copies of the same One Time Pad and one will be given to the sender and the other to the receiver. These random five digit numbers will be added to the earlier (04410 41221 23900 00000) message using a special arithmetic addition (Chinese). Any digit carried over is not used in the addition. This adds to the complexity of this encryption.

04410 41221 23900 00000 (The plain text message replaced with 5-digit numbers from Code Book)).

+

23402 89524 94742 00425 (random numbers copied from the One-Time Pad book).

______________________
27812 20745 17642 00425 (the encrypted message.)

The message is now ready to be transmitted. The person at the receiving end of the transmission must decrypt the message in reverse order. In order to do this, both he and the sender must have duplicate one-time pad books. The recipient also destroys the one-time pad page(s) that he had used to decode the message.
As the NSA continued their investigations lead by the information reviled through broken Soviet Multi layered messages, it was told that close to 60 people were brought to justice under the ”Venona” project.
The NSA continued their course throughout the Cold War by contributing immensely to the game of inelegance. They have been upgrading their own league of intelligence communication as the 21st century brought the world itself to an information age. NSA now deals with a new breed of challenges. Many research and experiments have been undertaken at NSA’s secret laboratories in developing new innovative methods and technologies to face the new era of cyber warfare.

Data Encryption Slandered (DES)

Data Encryption Slandered (DES)

NSA has been involved in public policy making, both directly and indirectly to other departments. NSA was a major player in the debates of the 1990s regarding the export of cryptography. Another involvement of NSA is the development of the “DataEncryption Slandered” also known as the DES developed by the IBM. DES was selected as the official Federal Information Processing Standard (FIPS) by the National Bureau of Standards in 1976. DES is a block cipher based on a symmetric key algorithm that uses a 56 bit key to each 64-bit block of data.

NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key. There were various criticisms from various parties stating that the NSA made two changes to DES. It tweaked the algorithm, and it cut the key size by more than half making it less secure. After two decades later, academics discovered that the tweaks made by the NSA made the DES more secure. This meant that the NSA was two decades ahead with their state of the art technology among the rest.

During the middle of 1990s, DES was broken by using a brute force attack. After that a newer version of the DES with the same mathematics but a longer key, called triple-DES was introduced.

In July 1990 the NSA showed their interest in a new encryption method called RSA. Much earlier during early 1980s NSA has opposed the adoption of the RSA technology by the Department of Commerce. NSA opposed RSA’s system precisely because it was so effective; its codes were virtually untraceable. Agency feared the chance of this technology getting into enemies hands which may put the national security into a vulnerable position. NSA and FBI claimed RSA’s encryption techniques made it possible for spies and criminals to plan and act without fear of detection by intelligence or law enforcement agencies.

RSA

Its name comes from combining the first letters of names of the inventors (Rivest, Shamir and Adleman) of this system. RSA Data Security developed and marketed the technology which enables its users to communicate and transfer data in a highly secure manner. The technology was using a public key encryption methodology which stood far ahead from previous encryption technologies. RSA is being implemented largely in e commerce protocols and many more sectors where maximum data security is essential.
RSA Cryptosystem involves a Public key and a private key where the public key can be known by everyone but the private key can be only known by the decoder of the message. Public key will be used for the encryption of the message and the private key will be used for the decryption.
First step of the RSA system is the “Key Generation” for the algorithm. It is being done as below.

  • Randomly chose two distinct prime numbers (q, p) of similar bit length.
  • Computer the “modulus” (n) where n = pq.
  • Compute φ(pq) = (p − 1)(q − 1).
  • Choose an integer (e)
    • 1 < e < φ(pq),
    • e and φ(pq) share no divisors other than 1 (i.e., e and φ(pq) are co prime).
    • e will be the public key exponent.
  • Determine d using modular arithmetic where

    • d will be the private key exponent

    Next is the encryption;

    • Let the message be M the receiver will transmit his/her public key (n, e).
    • Receiver will keep the private key a secret.
    • Sender will then turn the message M in to integer m (0
    • Computes the cipher text c where;
      • c = me mod n
    • c get transmitted to the receiver.

    Decryption;
    The receiver will recover m from c

    • m = cd mod n

    Then, by using the padding schema again m can be transferred to be M (Original Plain Text Message)
    In 1993 the NSA countered the issues they had with the RSA cryptosystem with the introduction of their own “Cipher Chip”. The Cipher chip was a form of a “Big Brother” which was embedded in to the cryptosystem as a backdoor in order for the NSA to eavesdrop on RSA communications. It was a third key, which gave NSA access to any encrypted information and this was secretly kept only with the NSA. RSA organized a conference to unify the US computer industry against the government’s effort to impose its system. At this conference held in January 1994 many leading hardware and telecommunication industry representatives defended their arguments against the government’s efforts on large scale violation of privacy. They jointly rejected the Cipher Chip.

    Tuesday, March 28, 2006
    U.S. Department of Defence Agency Selects RSA Security Encryption Software

    RSA BSAFE® Crypto-C Micro Edition Meets National Security Agency’s Suite B Cryptography Requirements
    Bedford, MA— RSA Security Inc. (Nasdaq: RSAS) today announced that the National Security Agency selected RSA® BSAFE® Crypto-C Micro Edition (ME) encryption software for use in a classified communications project.
    http://www.rsa.com/press_release.aspx?id=6677

    In 1998 RSA announced a contest with prize money of $10,000 to whoever was able to break a code encrypted in the DES (Data Encryption Standard) which was the government standard at the time.
    This contest was won by a two man team, a computer privacy activist and a hacker who broke the code in 56 hours. This contest further proved the weaknesses of the outdated standards the government was using at the time.
    The International Data Encryption Algorithm (IDEA) developed by X. Lai and J. Massey in 1991 was the encryption system which was introduced to replace the DES standard. It is also a symmetric block cipher, operating on 8 bytes at a time, just like DES, but with a key of 128 bits.
    Almost all of the NSA’s work and involvement in development of encryption systems was unpublished and kept as secrets because of national security. Some of those work has been kept as classified to date.

    Modern-day war on terrorism is keeping the NSA’s eyes and ears wide open for new threats and challenges in ways the world have never witnessed. NSA is carrying out modern day counter attacks to prevent such threats. It is debated to what extend the NSA’s arms and eyes reach. Some instances there has been reports of extreme actions taken by the intelligence agencies such as the NSA have seriously violated privacy of our own day to day life.

    http://www.justice.gov/opa/documents/nsa_myth_v_reality.pdf

    Above is a rationale by the U.S. Department of Justice to such allegations. It discusses the myths surrounding NSA’s eavesdropping programs and their legality.
    Today NSA is responsible of more than 80% of both national and international intelligence activities with their roots reaching seven times further than CIA or any other service in America. It is been told that the NSA and CIA are monitoring all communications in America whether they are Internet, cellular telephone, regular telephone, books, newspapers, television, or any kind of communication broadcasts. The FBI has the Carnivore program to monitor and listen in on all Internet communications. These actions may prevent criminals and other terrorist sources attacking critical U.S. system and sabotaging day to day lives of American citizens. Such attacks may course destruction of a level same as 9/11 or a Pearl Harbor in today’s world. Such potential targets could be Share Markets, Public Transport Systems, Airports, banks and etc. If such an attack happens the country will fall in to anarchy while its transportation grid locks, its communications disrupted and its economy ruined. To prevent such electronic “Pearl Harbour attacks” NSA is developing defensive measures which are kept as well guarded secrets.
    NSA is developing defensive measures which are kept as well guarded secrets and will continue to listen for trouble, like a doctor with a giant stethoscope pressed to the world.

    References:

    RSA (2010). – 6.2.2 What is the NSA? – Retrieved on 15th of May 2010 from

    http://www.rsa.com/rsalabs/node.asp?id=2316

    RSA Press Releases (Tuesday, March 28, 2006) on U.S. Department of Defense Agency Selects RSA Security Encryption Software – RSA BSAFE® Crypto-C Micro Edition Meets National Security Agency’s Suite B Cryptography Requirements – Retrieved on 20th of May 2010 from http://www.rsa.com/press_release.aspx?id=6677

    Office of Public Affairs U.S. Department of Justice Washington, DC 20530 ( January 27, 2006) –

    THE NSA PROGRAM TO DETECT AND PREVENT TERRORIST ATTACKS

    MYTH V. REALITY – Retrieved on 05th of May 2010 from

    http://www.justice.gov/opa/documents/nsa_myth_v_reality.pdf

    Martin Oberzalek (April 4, 2000) – Breaking the Enigma – Retrieved on 10th of May 2010 from http://www.mlb.co.jp/linux/science/genigma/enigma-referat/node6.html

    http://en.wikipedia.org


    Sri Lanka Celebrates


    n528918209_2556930_1372722

    Living miles away from my motherland never kept my heart away from its glory and beauty. Being physically away from it is hard. But still I, like many other sri lankans here, stay in touch with it whenever we can however we can. Like many of us I kept my self up to date with the situation in Sri Lanka. especially with the war and the issues thats been rising around it.

    On 18th May 2009 we came to know from many news feeds, that the fight against the extremist militant group LTTE,  finally has come to an end. The government forces claimed that they have destroyed the whole LTTE.  This is obviously one of the highlighted events in Sri Lanka’s history. Especially after spending a my whole life in a “state of war”.

    We made Kiribath that night and had a gathering with few of our friends, some were celebrating, and some, for the wrong reason. I hear them say worst things that could come out from a Sri Lankans mouth at this moment. Which made me to think about what we are and we should be celebrating.

    Celebration over the military Victory

    Celebration over the military Victory

    And I don’t think we shouldn’t be celebrating this situation for the reasons we are thinking of. If we think about it, we have been in this stupid situation for our whole life time. We have been through horror that no other country has been, we have been under constant fear. Death was just too casual for us. Blocked roads literary blocked a brighter future. It is a shame that we have made bad decisions and chose wrong paths in the past. Being a country especially with a Buddhist background and a rich culture we could have acted more rationally and sensibly.

    We should recall the reasons why we were in this situation at the first place. Must come to the senses at least now and understand that this was not just an issue with the LTTE or Prabhakaran. Prabhakaran and LTTE is just one face of the devil. We may have destroyed it. But the real devil or the cancer has not been treated yet. People who talk are the people have never walked that talk.

    Everybody thinks that they know everything about the war, especially the once who has never been at one. We should regret loses of our fellow brothers and sisters. As for me I even regret loses of young men and women of the LTTE, and the millions of Sinhalese, Tamils, Muslims and all Sri Lankans, because we all have been affected by this in some way.

    Our country is strong, especially now. Since we have a “king“. It’s good to see after a long time (May be for the first time in our life time) we have gathered together with our Sri Lankan flagsCricket or Susi. But still the I feel an extra weight on my Sri Lankan shirt, as I know that we have a greater responsibility to overcome what we have been through, rise like one and build our nation to be one country to its very meaning, a place where all ethnic groups treat each other fairly and respect each other. We have been in this kind of a situation after the tsunami and we made the whole world to see what we are capable of. And now we have a greater challenge to win. on for a reason other than

    We have now reached one of the most critical junctions of our country’s path. The whole country, (at least the majority of Sinhalese are) is on one side having one thought in their minds. And I believe that has a great power. We must use that power to change our mind sets and understand the true meanings of our lives and true meanings of our country’s history. And we shall overcome. We shall change. All our minds were corrupted with WAR, by force or by choice. But now, it’s over. Now is the time for us to hit our breaks and think what we should do now. We are left with hundreds of thousands of displaced innocent Tamils. And may be millions of extremist Tamils really pissed and may do anything to get back us. If we go back to eighties and act like those idiots & maniacs back then another war is not so much of a fiction.

    We are blessed to have such a leadership to bring one country back together. Now he is faced with a much

    Over half a million refugees needs attention

    Over half a million refugees needs attention

    larger responsibility, to heal a broken nation. The final political solution and the ideology that would define such act will define the future of our country as well. This is the best time to do such. If we make the mistake of putting a plaster on it again we may lose the greatest opportunity of our life time and will face the consequences of it tragically. We all must act wise. Especially the majority Sinhalese.

    “WAR, NEVER AGAIN!!!. Celebrate not the war but the end, the peace that it brought us. Celebrate the bravery of our fellow brothers and sisters. Salute the courage and unity of our people. Regret the losses of all beings. Hope for this light to brighten the future and to set our sights on a land with Love, Peace, Respect and Unity among all Sri Lankans.

    Furthermore, This should be a Sri Lanka’s Victory and a Sri Lanka’s Celebration. not just Sinhalese. If you have seen or read about such wars and their history and their aftermath, its a fact that people who were caught in cross fires and even the solders will be left with personal, emotional and social trauma. The sights that they have witness will scar them for the rest of their lives. It is very important at this stage to focus on those IDPs and and prepare for a well planed rehabilitation process. This is important for many reasons.

    1. Because they are Sri Lankans

    2. Because we need to show them that we are still not their enemies.

    3. propaganda to wash off any scars madeon us by outside.

    4 .Start to change our own mindsets.

    For the next couple of days, months and may be years we will face with lots of trust issues. from both sides. Tamils, even the innocents will fear to face any Sinhalese because they are still haunted by the black July.

    So we will have to compromise and reach out for those who need. help them out. It is said that the way to mans heart and mind is through the stomach. JVP, Hela-Urumaya and other Extrema fractions, now have a responsibility to show the people of their real ideologies. We should stop making all this a numbers game as well. what done is done.

    PA, UNP and all the other political wings have a responsibility to open their forums and start discussions with minor representations (real once) about the “Political Solution”. It must be a democratic one which will define equality and harmony among all races, religions, ethnicitys in side one Nation.

    “WAR, Never Again!!!!”

    ~JayaSri~

    by Hirunda




    Article 19


    “The right to freedom of speech is recognized as a human right under Article 19 of the Universal Declaration of Human Rights and recognized in international human rights law in the International Covenant on Civil and Political Rights (ICCPR). The ICCPR recognizes the right to freedom of speech as “the right to hold opinions without interference. Everyone shall have the right to freedom of expression”.