<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Nitish Bhushan</title>
	<atom:link href="https://nitishbhushan.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://nitishbhushan.com</link>
	<description>An Author</description>
	<lastBuildDate>Fri, 08 May 2026 07:46:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://nitishbhushan.com/wp-content/uploads/2025/08/cropped-IMG20250723081559-scaled-removebg-preview-32x32.png</url>
	<title>Nitish Bhushan</title>
	<link>https://nitishbhushan.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A Tale of Two Rapes: The Rise and Fall of “mamata”</title>
		<link>https://nitishbhushan.com/mamata-banerjee-rise-fall-dipali-basak-rg-kar-cas/</link>
					<comments>https://nitishbhushan.com/mamata-banerjee-rise-fall-dipali-basak-rg-kar-cas/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Fri, 08 May 2026 06:05:19 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3365</guid>

					<description><![CDATA[Between the Dipali Basak rape case in 1992, and the Abhaya rape-murder case in 2024 (R G Kar Medical College) lies the arc of “mamata”. I am careful here when I write “mamata” and not Mamata – the former being a profound state of emotion, the latter being just the name of the CM of [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Between the Dipali Basak rape case in 1992, and the Abhaya rape-murder case in 2024 (R G Kar Medical College) lies the arc of “mamata”. I am careful here when I write “mamata” and not Mamata – the former being a profound state of emotion, the latter being just the name of the CM of a state.</p>



<p>The emotion of “mamata” encompasses the feelings of unconditional love, sacrifice, care, and a deep nurturing affection. It is the essence of motherhood – the maternal instinct. It evokes an immediate, emotional response; the idea that someone will stand up when it matters most.</p>



<p>But what happens when that instinct is tested by power?</p>



<p>Two incidents in West Bengal, separated by over three decades, offer a way to examine that question.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>1993: The Dipali Basak Moment</strong></h2>



<p>The then 38-year-old Union Minister for HRD, Youth Affairs &amp; Sports, and Women &amp; Child Development in the PV Narasimha Rao government, Mamata Banerjee livid and horrified with how things turned out with Dipali, decided to take the matter right to the then CM Jyoti Basu.</p>



<p>Dipali, a deaf &amp; mute girl from Phulia (Nadia), West Bengal, was allegedly raped by a CPM worker.</p>



<p>On the 6<sup>th</sup> of January 1993, Mamata met Dipali and her mother Felani, and took an appointment from Jyoti Basu. The next day when she went to meet with Jyoti Basu, he refused to meet her &amp; Dipali. Mamata then staged a sit-in dharna. After about three hours of protest the police dragged her out, she was pulled by her hair, and her saree was torn.</p>



<p>Dipali, pregnant at that time was injured and rushed to Ramakrishna Seva Pratishthan, a charitable hospital run by the Ramakrishna Mission, whereas Mamata was taken to the Lalbazaar lock-up from where she was released later pressed by the gathering Youth Congress supporters.</p>



<p>On her way home in a police escort, she stopped at the Gandhi statute Mayo College Road. It is said that it is here that she made a vow to enter Writers Building next only as a CM and after dislodging CPM from power.</p>



<p>The protest at Writers’ Building during the Dipali Basak case became one of the defining moments of this image. She was seen not as a distant politician, but as someone willing to challenge power structures in real time.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>The Making of a Political Identity</strong></h2>



<p>Moments like 1993 do more than create headlines; they build reputations. Over time, Mamata Banerjee’s political persona came to be associated with accessibility, emotional immediacy, and a willingness to confront authority.</p>



<p>This identity played a significant role in her eventual rise to power. When she became Chief Minister of West Bengal on 20<sup>th</sup> May 2011, it was seen not just as a political victory, but as the arrival of a leader shaped by grassroots संघर्ष (struggle).</p>



<p>She created history by exiting CPM ending its 34-year rule in the state – the longest tenure for an elected communist government anywhere in the world.</p>



<p>Mamata Banerjee built her political identity not through institutional power, but through visible, emotionally charged public engagement. Long before she became Chief Minister of West Bengal, she was known for street-level politics – leading protests herself, sitting on dharnas, confronting authorities directly, and physically appearing beside victims, workers, and protestors.</p>



<p>Her persona also became associated with emotional immediacy because she communicated more through instinct and visible emotion than bureaucratic language. Her speeches often sounded personal rather than administrative. Combined with her simple public presentation, cotton sarees, slippers, modest lifestyle optics, and the widely used identity of “Didi,” she came to represent familiarity and accessibility rather than hierarchy. Supporters felt she reacted first as a human being and then as a politician. This perception deepened further during movements like Singur and Nandigram, where she positioned herself as the emotional face of public grievance ready to take on authority.</p>



<p>The emotional construct of “mamata” was all visible &amp; established amongst people’s conscience. She was the hero people feted. She was the hero they wanted to give their power to, through vote.</p>



<p>But power changes the nature of leadership. And with it, the expectations.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>2024: The RG Kar Medical College Case</strong></h2>



<p>In August 2024, a young postgraduate trainee doctor, whom we know only as Abhaya, was found raped and murdered inside RG Kar Medical College and Hospital. The details were deeply unsettling – The crime occurred within a hospital campus, and the victim was part of the healthcare system itself. The setting challenged assumptions about safety in institutional spaces. The reaction was swift.</p>



<p>Doctors across India protested. Medical services were disrupted. Public discourse turned sharply toward questions of safety, accountability, and administrative response.</p>



<p>The investigation was eventually transferred to the Central Bureau of Investigation. But the core issue extended beyond the crime. It was about how the system responded in the immediate aftermath. Concerns were raised about initial handling of the case, communication from authorities &amp; the perceived tone of the state’s response.</p>



<p>At the centre of this response was Mamata Banerjee, not as a protester, but as the Chief Minister.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>From Instinct to Institution</strong></h2>



<p>The contrast between 1993 and 2024 is not simply political. It is structural. In 1993 Mamata Banerjee was structurally an outsider to state power. Even though she was a Union Minister, in West Bengal she functioned as an opposition leader confronting the ruling establishment. Her political role was to question the system, amplify the victim’s voice, and morally challenge authority. Her strength came from moral clarity and immediacy.</p>



<p>By 2024, the structure had completely reversed. She was no longer confronting the state – she <em>was</em> the state. Her role was to manage, respond, and ensure accountability. The police, the administration, the health system, and the political accountability mechanisms all operated under her government.</p>



<p>That changes the nature of leadership fundamentally. A protest leader derives legitimacy from moral clarity and emotional immediacy. A governing leader is judged through institutional response, administrative competence, and public trust in systems.</p>



<p>That is why the contrast in later years became so symbolically significant. The same leader who rose by appearing emotionally available during moments of injustice, eventually became the institution expected to manage crisis, process, and accountability. Therefore, much of the public conversation around cases like the RG Kar incident is shaped not only by governance questions, but by the memory of the earlier Mamata – the leader whose politics once seemed driven by instinctive empathy and immediacy.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>The Shift that People Noticed</strong></h2>



<p>The memory of 1993 is simple and enduring – a leader who refused to leave a victim unheard.</p>



<p>The perception in 2024, however, is more complicated – a system that moved slower, more measured, less empathetic, less sympathetic, and, to a vast majority, responsible for what had happened.</p>



<p>People understand that governance demands caution, verification, and process. But people’s perception often judges leadership not by the internal complexity of governance, but by how the response feels emotionally and morally. When response feels delayed or impersonal, it creates a gap. And that gap is where symbols begin to weaken.</p>



<p>People’s anger wasn’t just about the crime. It was about the response. Allegations of delayed or mishandled initial investigation surfaced. Public trust seemed fragile. The state appeared defensive, not empathetic.</p>



<p>And at the centre of it all was the same leader who once sat in protest – now the Chief Minister.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>Did Mamata Lose Because She Lost Her “mamata”?</strong></h2>



<p>This is not a question of political success or failure. It is a question of alignment. The rise of Mamata Banerjee was closely tied to the idea of “mamata” – the instinct to act, to stand beside, and to confront injustice without hesitation.</p>



<p>The challenge of leadership is to retain that instinct even when power demands restraint. If the public begins to feel that the instinct has faded, that response has become more administrative than empathetic, then the symbol starts to erode.</p>



<p>It is a gradual shift. And when that happens, political outcomes often follow perception. Leaders are not expected to react the same way in opposition and in power. But they are expected to feel the same way.</p>



<p>That emotional continuity, visible through action, is what sustains public trust over time.</p>



<p>“Mamata” means motherhood. It implies instinctive protection, a refusal to tolerate harm, an emotional immediacy.</p>



<p>In 1993, that instinct was visible – raw &amp; uncompromising. In 2024, it felt distant. Filtered through systems, politics, and control. It is the distance between who you were when you fought power and who you became when you held it.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>The Distance Between Two Moments</strong></h2>



<p>Two incidents. One state. Thirty years apart. The Dipali Basak case revealed a leader willing to challenge power in defence of a victim. The Abhaya / RG Kar case has tested whether that instinct survives within power.</p>



<p>The answer is not binary as to whether the leader retained her moral instinct, or completely lost it. But it leaves behind an important reflection that leadership perhaps, is not just about rising to power. It is about carrying forward the very instinct that made that rise possible.</p>



<p>Because in the end, “mamata” is not defined by a name or a position. It is defined by whether, in moments of crisis, the response still feels human.</p>



<p>In 1993, Mamata Banerjee challenged power.</p>



<p>In 2011, people vested in her, their power.</p>



<p>In 2024, she was the power being challenged.</p>



<p>In 2026, people divested her of that power.</p>



<p>And she may have lost power because she first lost the emotional trust that created it. In the end, “mamata” is not just a name, it is a responsibility.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>About Dipali and Abhaya</strong></h2>



<p>Dipali gave birth to a girl child. She died in March 2009 due to snakebite. As per Felani Basak (Dipali Basak’s mother), Mamata never visited them again. Dipali’s elder brother Nikhil said that Mamata never enquired about Dipali after the Writers Building incident. Felani died in March 2025 at the age of 91.&nbsp;</p>



<p>Ratna Debnath, Abhaya’s mother won from the Panihati Assembly constituency in the 2026 West Bengal Assembly elections.</p>



<p>I am an ordinary people. My heart goes out to Dipali &amp; Abhaya and all others named and unnamed who suffered. God bless them all.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>Sources &amp; References:</strong></h2>



<h3 class="wp-block-heading has-medium-font-size"><strong>Dipali Basak Case / 1993 Protest</strong></h3>



<p>• <a href="https://www.ndtv.com/india-news/mamata-banerjee-thrown-out-writers-in-1993-a-vow-that-mamata-banerjee-kept-for-18-years-until-she-tore-down-left-rule-11337341" target="_blank" data-type="link" data-id="https://www.ndtv.com/india-news/mamata-banerjee-thrown-out-writers-in-1993-a-vow-that-mamata-banerjee-kept-for-18-years-until-she-tore-down-left-rule-11337341" rel="noreferrer noopener">Throwback 1993: Mamata Banerjee Made A Vow, Then Kept It For 18 Years</a></p>



<p>• <a href="https://www.telegraphindia.com/india/head-held-high-but-back-door-arrival/cid/391400" target="_blank" data-type="link" data-id="https://www.telegraphindia.com/india/head-held-high-but-back-door-arrival/cid/391400" rel="noreferrer noopener">Head held high but back-door arrival</a></p>



<p>• <a href="https://www.telegraphindia.com/west-bengal/forgotten-mother-s-justice-wish/cid/411004" target="_blank" data-type="link" data-id="https://www.telegraphindia.com/west-bengal/forgotten-mother-s-justice-wish/cid/411004#goog_rewarded" rel="noreferrer noopener">Forgotten mother&#8217;s justice wish</a></p>



<p>• <a href="https://timesofindia.indiatimes.com/city/kolkata/felani-whom-mamata-took-to-writers-seeking-justice-dies-aged-91/articleshow/128727616.cms" target="_blank" data-type="link" data-id="https://timesofindia.indiatimes.com/city/kolkata/felani-whom-mamata-took-to-writers-seeking-justice-dies-aged-91/articleshow/128727616.cms" rel="noreferrer noopener">Felani, whom Mamata took to Writers&#8217; seeking justice, dies aged 91</a></p>



<p>• <a href="https://timesofindia.indiatimes.com/assembly-elections-2011/west-bengal/turning-point-being-thrown-out-of-writers/articleshow/8310854.cms" target="_blank" data-type="link" data-id="https://timesofindia.indiatimes.com/assembly-elections-2011/west-bengal/turning-point-being-thrown-out-of-writers/articleshow/8310854.cms" rel="noreferrer noopener">Turning point: Being thrown out of Writers&#8217;</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/mamata-banerjee-rise-fall-dipali-basak-rg-kar-cas/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Some Cyberattacks Aim to Ruin Careers, Not Steal Data</title>
		<link>https://nitishbhushan.com/why-some-cyberattacks-aim-to-ruin-careers-not-steal-data/</link>
					<comments>https://nitishbhushan.com/why-some-cyberattacks-aim-to-ruin-careers-not-steal-data/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Sat, 07 Mar 2026 04:33:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3355</guid>

					<description><![CDATA[The no-loss attack An investigation was carried out. A senior professional stepped aside “pending enquiry”. The leadership role was quietly reassigned, and absence was explained as “internal reasons”. There were no copyrights or IP stolen. There was no customer or internal data leak. Neither a financial loss was announced, nor was there any public breach [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading" style="font-size:22px"><strong>The no-loss attack</strong></h2>



<p>An investigation was carried out. A senior professional stepped aside “pending enquiry”. The leadership role was quietly reassigned, and absence was explained as “internal reasons”.</p>



<p>There were no copyrights or IP stolen. There was no customer or internal data leak. Neither a financial loss was announced, nor was there any public breach notification.</p>



<p>Then there were whispers and rumours. This was followed by reputational ambiguity. An investigation was carried out. There was insult, and the career of the victim paused without a formal accusation. Finally, came the resignation – sure as night and day!</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>Nothing has to be lost for everything to feel compromised.</strong></h2>



<p>Loss is not just ‘financial’. It can be reputational. Reputational damage is invisible violence. It is hard to detect and even harder to contest – because at stake, is more than just the career. Not all cyberattacks are designed to extract value (ransom).</p>



<p>In some cases, “consequences” are the objective.&nbsp; The focus is not on taking something away, it is leaving something behind; a doubt that did not previously exist.</p>



<p>In others, there may be no missing money, no corrupted systems, and no clear victim metric. But if someone’s access gets reviewed, their responsibilities have been quietly reduced, and the tone of conversations with them undergoes a change, it is clear that suspicion has entered the system.</p>



<p>In such contexts, an attack need not leave behind evidence. It only needs to leave behind enough breadcrumbs to enable inference. There is no accusation, only a suggestion, and suggestions are often sufficient to reshape outcomes.</p>



<p>In that sense, ruining credibility is more effective than stealing data.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>What makes these cyberattacks effective</strong></h2>



<p>The power of such attacks lies in the attacker’s knowledge of what institutions are forced to do next. It could be a timed leak, or a selective disclosure, or a contextless artefact. Anything that creates plausibility for an accusation. No system might have been fully compromised. No fabrication might have been done. If enough doubt is sowed, if enough suspicion arises, and an inference can be drawn, an internal investigation is most likely to follow.</p>



<p>These attacks exploit procedural response by creating “partial” or “false” truths. They operate in grey zones, not red flags.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>Reputational defence mechanisms can become reputational weapons</strong></h2>



<p>Organisations are risk-averse, procedurally-bound and reputation-sensitive. That is why when faced with the risk of loss of reputation, the board demands stability and the leadership prioritises containment. This can trigger all or any of these defensive responses within the organisation – internal silence, distancing from the event, or precautionary actions.</p>



<p>Silence is a risk containment strategy, not avoidance. It buys time to see if the issue escalates, or fizzles out. Organisations see distancing from the event as system protection, not judgement. It is done to prevent a contagion from the event. Simple precautionary actions like reviewing access, or reassign duties are an answer to ‘What did you do when you first noticed something?’.&nbsp; Once taken, precaution resembles guilt externally, even though internally it is framed as neutral.</p>



<p>Reputational attacks work because organisations respond rationally to uncertainty. And because uncertainty cannot be tolerated, even in the absence of guilt, career damage occurs.</p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>The inquiry may conclude but the pause rarely does</strong></h2>



<p>In many such cases, the investigation eventually ends. Files are closed, access logs reviewed, intent found to be ambiguous rather than malicious. But the pause that follows rarely lifts in the same way. Careers do not resume at the point they were interrupted; they restart, if at all, under a different light. A lot of times, the person changes jobs, which could also be a difficult switch, since the industry “gets to know”.</p>



<p>Modern organisations are designed to prevent risk, not to reverse suspicion. And the mechanisms that protect institutions often leave individuals carrying residual doubt – whether something was actually found against them. Such a damage is administrative rather than criminal, procedural rather than punitive. It requires no conviction, only a sequence of reasonable actions taken in response to uncertainty. In that sense, some contemporary attacks do not depend on theft or exposure at all.</p>



<p>They succeed when systems behave predictably, when caution outruns context, and when reputational harm becomes an outcome without a single illegal act ever needing to be proven.</p>



<p><em>Nitish Bhushan writes about technology, trust, and how behavioural vulnerabilities quietly reshape relationships and institutions.</em></p>



<p><em>Several of the themes explored here; insider vulnerability, reputational collapse, and quiet escalation, are examined through fiction in his novel </em><a href="https://nitishbhushan.com/novels/#shadow_play"><strong><em>Shadow Play: Love &amp; Blackmail</em></strong></a><em>.</em></p>



<p><em>This article was first published in The Print on the 13<sup>th</sup> of Feb 2026</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/why-some-cyberattacks-aim-to-ruin-careers-not-steal-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Most Cyber Incidents Begin as Social Events, Not Technical Ones</title>
		<link>https://nitishbhushan.com/most-cyber-incidents-begin-as-social-events-not-technical-ones/</link>
					<comments>https://nitishbhushan.com/most-cyber-incidents-begin-as-social-events-not-technical-ones/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 06:23:37 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3331</guid>

					<description><![CDATA[The innocent office email exchange It begins inconspicuously, like a normal last-minute adjustment to an earlier calendar invite. Along with it comes a document shared with a note that says, ‘Sharing a doc so we’re aligned.’ Small negotiations that keep the business moving. So far nothing unusual. The recipient responds because it feels reasonable to [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>The innocent office email exchange</strong></p>



<p>It begins inconspicuously, like a normal last-minute adjustment to an earlier calendar invite. Along with it comes a document shared with a note that says, <em>‘Sharing a doc so we’re aligned.’</em> Small negotiations that keep the business moving. So far nothing unusual.</p>



<p>The recipient responds because it feels reasonable to respond. A delay would look unhelpful because the sender appears legitimate, familiar, and the matter seems urgent. Nothing has gone wrong. There is no breach. No system failure. No red flag blinking on a dashboard. There is only work – happening at speed, under pressure, with the quiet assumption that cooperation is safer than caution.</p>



<p><strong>The incident begins socially, not technically</strong></p>



<p>Cyber incidents usually begin long before a system is touched. Smart hackers rely on coordination, cooperation, compliance, or, sheer courtesy, rather than begin with malicious code or sophisticated exploits. They make a request in good faith. A response follows because that is how work is expected to function. Risk enters the moment cooperation becomes automatic, not at the point of intrusion. When speed is rewarded, when responsiveness signals competence, and when questioning a request feels like friction rather than diligence, the conditions for failure are set.</p>



<p>By the time a system is accessed or data is exposed, the decisive step has often already occurred quietly, socially, and without resistance.</p>



<p><strong>What drives compliance is more often organisational psychology than technical ignorance</strong></p>



<p>Let us understand why this happens. There is an invisible social mechanics in play here that typically encourages people to not respond in a ‘no’. Especially if the request is from a customer, or someone in a position of authority.</p>



<p>Asking questions signals lack of alignment or slowness, or insecurity. Hesitation is often interpreted as inefficiency while compliance is read as professionalism. Declining a request disrupts momentum. It introduces friction, and requires justification.</p>



<p>The fear of appearing incompetent, and the perceived social cost of saying ‘no’ makes it way lot easier to say ‘yes’. Because the context creates legitimacy, social acceptance creates room for technical compromise.</p>



<p>Nobody behaves irrationally. Nobody thinks they are being careless. Every step feels explainable in isolation.</p>



<p><strong>The structure itself enables its destruction</strong></p>



<p>Organisations audit systems, not conversations. They discipline errors, not environments. They log actions, not pressures thus individualising failure, erasing context, and preserving the fiction that choice was free and unconstrained.</p>



<p>Most enterprise systems are designed to record what was done, who did it, when it was done, from where, and using which credentials. They are not designed to record why it felt necessary, what fear preceded it, what threat, ambiguity, or power imbalance was present, and what consequences the person was trying to avoid.</p>



<p>So the record shows: <em>Employee X accessed File Y at 11:42 pm. </em>It does not show: <em>Employee X had just been told their role was ‘under review’, was informally asked for data by a superior, and was afraid that refusal would be noted.</em></p>



<p>When something goes wrong, investigations move outwards from the log, not inwards from the human. An action is identified, a policy violation is cited, and a responsibility is assigned. The pressure gradient that made the action feel inevitable remains invisible.</p>



<p>This is why good employees, who complied earlier, appear reckless later. Mistakes look malicious in hindsight, thereby hardening ‘insider threat’ narratives.</p>



<p>This allows institutions to say that, ‘The system worked. The human failed.’ Even when the system quietly created the conditions for that failure.</p>



<p><strong>What we misunderstand about risk</strong></p>



<p>There is no checklist here, no definitive to-do list of what organisations must do next. But there is no denying that in fearing technical sophistication, we overlook social predictability.</p>



<p>Organisations tend to believe danger as something external and advanced: zero-day exploits, sophisticated malware, elite foreign hackers. This fear is comfortable because it externalises the threat, justifies expensive tools, and suggests that only specialists could have prevented it. So when incidents occur, organisations ask, ‘<em>Which vulnerability was exploited? Which system failed? Which tool did we lack?</em>’ The assumption is: damage requires brilliance.</p>



<p>But damage often comes from social predictability which we routinely overlook. Human behaviour is remarkably consistent under pressure. People comply with authority, rush under deadlines, avoid conflict, and fear reputational harm more than abstract policy.</p>



<p>Attackers don’t need genius. They need insight into incentives, fear points, organisational culture, and informal power structures. Once those are mapped, outcomes become almost deterministic. The attacker isn’t guessing. They’re triggering a known response.</p>



<p>The question, then, is not whether people behaved wrongly, but whether modern organisations have made it unreasonable to behave otherwise.</p>



<p>If risk increasingly emerges from predictable human responses, we may need to ask a harder question than how systems were breached: what kinds of behaviour do our institutions reward, and which do they quietly punish?</p>



<p><em>Nitish Bhushan writes about technology, trust, and how behavioural vulnerabilities quietly reshape relationships and institutions.</em></p>



<p><em>Several of the themes explored here; insider vulnerability, reputational collapse, and quiet escalation, are examined through fiction in his novel <a href="https://nitishbhushan.com/novels/#shadow_play"><strong>Shadow Play: Love &amp; Blackmail</strong>.</a></em></p>



<p><em>*This article was first published in The Print on the 31st of Jan 2026</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/most-cyber-incidents-begin-as-social-events-not-technical-ones/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chapters Apart, Stories Together: A Tale of Two Indian Thriller Readers – III</title>
		<link>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-iii/</link>
					<comments>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-iii/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Mon, 06 Oct 2025 04:30:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3083</guid>

					<description><![CDATA[A five-part micro story series that dives into the world of Indian suspense thriller novels. Through the eyes of two young midnight readers, it explores how suspense thriller Indian novels, top Indian thriller novels, and celebrated Indian thriller authors create unique thrills when the city sleeps. The Unexpected Disturbance There’s a fine line between what [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><em>A five-part micro story series that dives into the world of Indian suspense thriller novels. Through the eyes of two young midnight readers, it explores how suspense thriller Indian novels, top Indian thriller novels, and celebrated Indian thriller authors create unique thrills when the city sleeps.</em></p>



<h2 class="wp-block-heading" style="font-size:22px"><strong>The Unexpected Disturbance</strong></h2>



<p>There’s a fine line between what we read and what we feel, especially after midnight.</p>



<p>Raghav was halfway through one of the top Indian thriller novels, the kind that made your pulse match the turning of its pages. The hero on paper was chasing shadows; the reader in bed was running away from sleep.</p>



<p>And then, as if like a conspiracy, darkness.</p>



<p>The power went out. The hum of the ceiling fan died mid-spin. He could hear the slow, deliberate footsteps approaching. His mind, trained by pages of crime and suspense, filled in the gaps faster than logic could. The thrill of the story bled into the air around him. When the lights flickered back, his pulse still hadn’t slowed.</p>



<p>Across the city, she was wide awake too; deep inside the same thriller novel that promised “an ending you’ll never see coming.”</p>



<div aria-hidden="true" class="wp-block-spacer"></div>



<p>At 2:00 a.m., her doorbell rang.</p>



<p>Once. Then again.</p>



<p>She hesitated. Her neighbourhood was usually asleep by then. She peered through the peephole. All she could see was no one and a flickering tube light.</p>



<p>For a second, she thought she saw movement. A shadow, maybe, or her own fear dancing on the wall. She stood for a moment, and then dashed back.</p>



<p>When she returned to her reading chair, the story felt changed. So did the night. The fiction had reached out and touched her reality.</p>



<p>For both Raghav and Ananya, the interruption wasn’t a break. It was an extension of their thrill. The books had spilled into life, and they liked it that way. They both realised, unaware of each other’s existence that in the world of top Indian thriller novels, fear isn’t always on the page; it sometimes stands right outside your door.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-iii/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chapters Apart, Stories Together: A Tale of Two Indian Thriller Readers – I</title>
		<link>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-i/</link>
					<comments>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-i/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Mon, 29 Sep 2025 05:10:32 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3073</guid>

					<description><![CDATA[A five-part micro story series that dives into the world of Indian suspense thriller novels. Through the eyes of two young midnight readers, it explores how suspense thriller Indian novels, top Indian thriller novels, and celebrated Indian thriller authors create unique thrills when the city sleeps. Parallel Introductions At 1 a.m., two different windows of [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><em>A five-part micro story series that dives into the world of Indian suspense thriller novels. Through the eyes of two young midnight readers, it explores how suspense thriller Indian novels, top Indian thriller novels, and celebrated Indian thriller authors create unique thrills when the city sleeps.</em></p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<h2 class="wp-block-heading"><a>Parallel Introductions</a></h2>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>At 1 a.m., two different windows of the city glowed faintly against the dark.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>In a cramped hostel room, Raghav balanced a torchlight against a stack of books. The hostel had finally gone quiet – snoring roommates, buzzing fans, an occasional thud from someone turning in their bunk. That was when he came alive. He reached for his latest obsession: <strong>an Indian suspense thriller novel</strong>. To him, the silence wasn’t empty; it was charged. Every rustle of a page felt like a warning, every creak in the corridor like a plot twist. The chaos of the day melted away, replaced by the thrill of conspiracies and cliffhangers.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Across the city, in a high-rise apartment twenty floors above the streetlights, Ananya poured herself a cup of masala chai. She worked in marketing, her days crammed with deadlines and client calls. But midnight was hers alone. She curled up by the balcony window with her current read – <strong>an Indian mystery thriller</strong> she had been saving for the quiet hours. For her, solitude wasn’t loneliness. It was suspense amplified: the hum of the refrigerator became a heartbeat in the dark, the honk of a late taxi a distant clue in the story.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Neither Raghav nor Ananya knew of the other. But in their separate worlds, they shared the same ritual – unlocking the night’s stillness through the sharp edge of a thriller’s page.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>For both, midnight wasn’t just an hour. It was an atmosphere. A stage where fiction and life blurred, where thrillers novels written by Indian authors became more than entertainment – they became lifelines.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>And so began their journeys, chapters apart, yet stories together. #KahaniHaiNaAmazing?</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Do you also find your thrill past midnight?</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-i/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chapters Apart, Stories Together: A Tale of Two Indian Thriller Readers – II</title>
		<link>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-ii/</link>
					<comments>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-ii/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Thu, 02 Oct 2025 08:04:42 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3078</guid>

					<description><![CDATA[A five-part micro story series that dives into the world of Indian suspense thriller novels. Through the eyes of two young midnight readers, it explores how suspense thriller Indian novels, top Indian thriller novels, and celebrated Indian thriller authors create unique thrills when the city sleeps. The Sounds in the Backdrop The city never truly [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><em>A five-part micro story series that dives into the world of Indian suspense thriller novels. Through the eyes of two young midnight readers, it explores how suspense thriller Indian novels, top Indian thriller novels, and celebrated Indian thriller authors create unique thrills when the city sleeps.</em></p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<h2 class="wp-block-heading">The Sounds in the Backdrop</h2>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>The city never truly sleeps; it just changes its soundtrack.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>It was the daily late-night cacophony for Raghav. The sporadic bursts of laughter, the sound of students climbing up and down the stairs, chatting in the stairwell, the swearing, the arguments, walking past his room talking to each other, sometimes talking over each other, the spirited discussion around the tuck shop not far from his hostel building. It remained open till 2:00 AM. At times he could even hear the faint clang of steel plate in the mess. Finally, these voices would become too low to be of any significance.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>That was his cue. He opened one of his favorite suspense thriller Indian novels, the kind that didn’t just tell a story but pulled him into it. Every faint sound, a creak in the corridor, a door closing two rooms away, felt like part of the plot. The book’s tension seemed to sync with the hostel’s heart rate.</p>



<p><br>Across the city, Ananya’s high-rise offered a different symphony. The distant faint wail of a siren, the occasional bark of dogs protecting their turf, a high-speed vehicle passing by. Each sound sharpened her awareness as she read, heightening every twist of her <em>Indian thriller novel</em>. Sometimes she paused, not sure if what she heard belonged to her book or the night itself.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Both felt the strange collaboration between fiction and environment. The city didn’t just frame their stories; it deepened them. It gave their thrillers an echo, their imaginations a rhythm.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>For Raghav and Ananya, midnight wasn’t silence; it was suspense rendered in surround sound. Every noise outside their window became a clue, every silence a warning.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Different addresses. Same pulse. The city whispered, and their stories replied.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/chapters-apart-stories-together-a-tale-of-two-indian-thriller-readers-ii/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chai, Chatori and Indian Thrillers at Gomti Book Festival 2025</title>
		<link>https://nitishbhushan.com/chai-chatori-and-indian-thrillers-at-gomti-book-festival-2025/</link>
					<comments>https://nitishbhushan.com/chai-chatori-and-indian-thrillers-at-gomti-book-festival-2025/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Thu, 25 Sep 2025 08:12:40 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3070</guid>

					<description><![CDATA[When distances are measured not in kilometers, but in cups of chai, you know you are in UP. Now how many chais will it take you to finish exploring all the stalls at Gomti Book Festival 2025? I dare not guess. While you think about that, “Tashreef rakhiye,” says the city, as the book festival [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>When distances are measured not in kilometers, but in cups of chai, you know you are in UP.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Now how many chais will it take you to finish exploring all the stalls at Gomti Book Festival 2025? I dare not guess.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>While you think about that, “Tashreef rakhiye,” says the city, as the book festival turns the Lucknow University grounds into a wonderland for readers. Stalls brimming with stories, chai brewing in corners, and the rustle of pages that make you forget the world outside.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>There’s joy in every lane; from the poetry corner to the shelves overflowing with books by Indian authors in GBF 2025. It’s like the city is saying, “Muskuraiye, aap Lucknow mein hain.”</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>With mythology and nationalism pulling the crowds, in one quiet aisle, a different kind of thrill is waiting. It is suspenseful, it is mysterious, it is gripping.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Among the familiar and the fantastical, sits the Indian mystery thriller – <em>Love Swipe Blackmail</em>. Not about gods or demons, but about the monsters we carry in our pockets; our phones, our secrets, our digital double lives. “Shanti banaye rakhiye, yeh Charbagh station nahin hai,” the stall owner teases, handing over a copy to a reader whose eyes already gleam with suspense.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>So, whether you pick up poetry, history, or the pulse-racing twists of a thriller, one thing is certain – Gomti Book Fest reminds us that good stories never go out of fashion.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>And for those who say, “Zyada hoshiyari mat dikhaiye… chacha vidhayak hain hamare!” I say this, that the real power in Lucknow this week belongs to the stories. </p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>#KahaniHaiNaAmazing</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/chai-chatori-and-indian-thrillers-at-gomti-book-festival-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>When Raindrops Plot Thrillers</title>
		<link>https://nitishbhushan.com/when-raindrops-plot-thrillers/</link>
					<comments>https://nitishbhushan.com/when-raindrops-plot-thrillers/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 07:31:55 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3066</guid>

					<description><![CDATA[“Someone seems to be lost,” Rhea remarked, balancing her chai carefully as she joined Ananya by the window. “Because,” Ananya said, holding her cup, “this is peak existence. Rain outside, chai inside, and zero guilt about doing absolutely nothing.” Rhea raised an eyebrow. “You are doing something. You’ve been staring at those raindrops like they’re [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>“Someone seems to be lost,” Rhea remarked, balancing her chai carefully as she joined Ananya by the window.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>“Because,” Ananya said, holding her cup, “this is peak existence. Rain outside, chai inside, and zero guilt about doing absolutely nothing.”</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Rhea raised an eyebrow. “You are doing something. You’ve been staring at those raindrops like they’re about to reveal the plot of a thriller.”</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>“Maybe they will,” Ananya replied. “Each drop is basically a cosmic ping from the universe saying: pause, breathe, and appreciate the suspense – just like the best Indian thriller novels.”</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Rhea laughed, nearly spilling her tea. “Or maybe the universe just wants you to finally finish that book by one of the brilliant Indian thriller authors. It’s been lying there since morning.”</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Ananya glanced at the untouched novel. “Books can wait. Thunder, however, does not take appointments.” The two fell into silence, the rain composing its orchestra outside, their chai cups steaming like supporting cast members.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Sometimes, they agreed, the best suspense wasn’t even in a book but in a rainy day where the only plot twist was deciding whether to nap now or after the next cup of chai – a quiet reminder of why stories by Indian thriller authors always keep you coming back.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>#KahaniHaiNaAmazing<br></p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/when-raindrops-plot-thrillers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Soviet Spy Tech Hacked American Typewriters: The Untold Story Behind Embassy Espionage in Moscow</title>
		<link>https://nitishbhushan.com/how-soviet-spy-tech-hacked-american-typewriters-the-untold-story-behind-embassy-espionage-in-moscow/</link>
					<comments>https://nitishbhushan.com/how-soviet-spy-tech-hacked-american-typewriters-the-untold-story-behind-embassy-espionage-in-moscow/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 08:28:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3056</guid>

					<description><![CDATA[I write techno-thrillers in the Indian context. Fiction. Now I know that fact is stranger than fiction. Who knows how many fictions have been inspired by facts. Let me talk about a fact here – the story of a Soviet hack that spied on every keystroke in the American embassy in Moscow. Something that can [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>I write <em>techno-thrillers in the Indian</em> context. Fiction. Now I know that fact is stranger than fiction. Who knows how many fictions have been inspired by facts. Let me talk about a fact here – the story of a Soviet hack that spied on every keystroke in the American embassy in Moscow. Something that can give many an idea to the writers of my ilk, me included. If there ever was an era of before and after cyberwar, then in the ‘before’ era this story would be the crowning glory of how Soviet tech turned American typewriters into bugs. Such a great hack of the cold war era it was, that it let the KGB listen to every word America typed.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>In the shadowy world of espionage, technology often advances in ways few could imagine. While we tend to think of hacking as a modern-day digital threat, the roots of sophisticated spycraft reach deep into the analogue past. Long before cyberattacks grabbed headlines, international intelligence agencies were engaged in an invisible war for secrets – one that played out not only in encrypted messages but in the very machines we trusted to keep our communications private. This forgotten chapter of Cold War stealth is as much a lesson in ingenuity as it is in the relentless pursuit of an upper hand.</p>



<p><em>Thriller authors</em> like me hunt for stories like this. Think of this article as a very short novel written descriptively. And I shall pepper it with my commentary about its utility to writing a <em>mystery thriller</em>.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>The Discovery of Listening Devices: Embassies Under Surveillance</strong></p>



<p>The year was 1983. Tensions simmered between world powers, but the battle for sensitive information was relentless and creative. It started when the French and Italian embassies in Moscow discovered listening bugs hidden in their teleprinters and promptly warned the Americans to inspect their own embassy for similar threats.</p>



<p>I know what you are thinking. That this sounds like the perfect opening chapter of a <em>suspense thriller</em> where <em>mystery</em> is seeded in plain sight. And I would not blame you for thinking like it. When I first read about it, my views were the same.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>A History of Espionage: Microphones Hidden in the American Embassy</strong></p>



<p>Now the Americans knew all too well about being bugged. A routine sweep in 1945 in their embassy helped them discover more than a hundred microphones embedded in the furniture and wall plaster. Then, in 1952, they discovered covert bugs embedded in a seemingly innocent gift – a wooden seal, carved and gifted by school-children to the ambassador in 1945. The seal was right at the ambassador&#8217;s residence. Imagine the breadth and depth of the conversations that the Soviets had listened to undetected for seven years.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>New Threats Emerge: Building the Moscow Embassy</strong></p>



<p>Back in 1983, the Americans were constructing a new embassy. They discovered listening devices in concrete, no less. But these were the devices they could find. What they could not find then, and found later, shook them to their core. It was a hack job so sophisticated, standard setting, and I daresay, beautiful, that it became the guiding light for all hack-jobs in the digital world that we know today.</p>



<p>The ingenuity of this moment is what makes it irresistible to any <em>thriller writer</em>, mining history for inspiration.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>Principles of Hacking: Breaking, Weakening, or Bypassing Encryption</strong></p>



<p>Hacking isn’t bound by circuit boards or lines of code; it’s a mindset. Over the decades, three basic strategies have dominated the field:</p>



<ol start="1" class="wp-block-list">
<li><strong>Break the encryption:</strong> If you can solve the cipher, all secrets are revealed.</li>



<li><strong>Weaken the encryption:</strong> Create flaws or install backdoors so eventually the code yields.</li>



<li><strong>Work around the encryption:</strong> Sidestep security entirely, intercepting information before it’s encrypted.</li>
</ol>



<p>That last tactic is especially cunning. Why wrestle with complex locks when you can simply catch the secrets before they’re locked up? If you are an author who dabbles in writing <em>techno-thrillers laced with mystery, </em>youwould recognise the brilliance of that narrative twist shortly, as I showcase, what the Soviets did.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>Securing Secrets: Extreme Countermeasures Taken by Americans</strong></p>



<p>The Americans knew that everything they ever typed was reaching the Soviets, but how. Did the Soviets hack their encryption? The Americans never got the evidence of it. Those were the days of electromechanical typewriters. They decided to pull back all the equipment and spy proof it. For that, first they had to send the replacement equipment. Then, they had to ensure that the replacement typewriters were not tampered with before they reached the American embassy in Moscow.</p>



<p>The Americans used the IBM Selectric typewriters those days. Every IBM Selectric typewriter headed for Moscow was disassembled, its components were X-rayed, it was then reassembled, anti-tamper sensors and tags were installed on the inside and outside, and finally they were all sealed off in tamper-proof bags not available in the USSR. Upon arrival in their embassy in Moscow, each piece was painstakingly checked for the integrity of anti-tamper sensors and tags. All the old equipment was transported back to the US under identical anti-tamper protection.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>Unravelling the Mystery: The Ingenious Soviet Bug in IBM Selectric Typewriters</strong></p>



<p>For months, the Americans assumed the Soviets had somehow cracked their codes. The IBM Selectric typewriters shipped back to America had been torn apart, X-rayed, and reassembled with tamper tags – yet nothing obvious appeared out of place. Then one technician, frustrated after yet another fruitless inspection, noticed something strange: an extra coil in the power switch.</p>



<p>At first, it seemed trivial. After all, Moscow used a different voltage than Washington. But why did this coil look…different? The technician couldn’t let it go. He pried deeper, tracing wires, re-X-raying components, until the realisation dawned like a gut punch. This wasn’t a quirk of voltage. It was a doorway. Something hidden was drawing power inside the machine.</p>



<p>I hope you can see that such a deep attention to detail has the flavour of a scene straight from the pen of a <em>mystery thriller writer</em>.</p>



<p>And the Americans were about to find out what.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>Inside the Hack: How Magnetometers Made Every Keystroke Vulnerable</strong></p>



<p>Right underneath the keyboard, there was an aluminium bar to maintain the structural integrity of the typewriter. The American who figured the extra coil, X-rayed the humble bar only to realise that the bar was not solid, but had been hollowed out to install bugs. This was an electromechanical typewriter; every keystroke caused a unique distortion in Earth’s magnetic field. The Soviets had installed magnetometers inside the bar to measure the distortion which encoded these signals and transmitted them via onboard memory chips to an antenna hidden in the embassy chimney, which relayed the data to a nearby Soviet listening post.</p>



<p>Picture this: an American diplomat, seated at his Selectric in Moscow, tapping out a cable to Washington. He believes he is speaking in confidence to his government – every word destined for secure encryption before it travels home. What he doesn’t know is that each keystroke is already being captured, silently, invisibly, by a Soviet bug embedded beneath his fingertips.</p>



<p>By the time his memo reaches Washington, the KGB has already read it. In real time, American strategy, assessments, even private frustrations, were being siphoned off and studied blocks away. The typewriter, that unassuming office tool, had become the perfect spy.</p>



<p>What made this hack revolutionary was its subtlety. The technology intercepted information at its origin. Rather than attacking the typewriters’ encrypted output, the Soviets went straight to the source, reading each keystroke as it happened. By translating magnetic field changes into specific letters, every word typed on an American typewriter in Moscow reached Soviet ears – securely and invisibly.</p>



<p>The Soviets had been hacking into American information even before it was being encrypted.</p>



<p>Tell me in the comments below, whether you are a <em>thriller reader</em> or a <em>thriller writer</em> if this isn’t the exact kind of twist that transforms reality into <em>gripping mystery narrative</em>.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>Lessons from History: Hacking Before Encryption</strong></p>



<p>The Soviet success didn’t come from breaking ciphers or weakening security protocols. It came from bypassing encryption entirely. By targeting the unguarded moment when information was created, they rendered the debate over secure codes obsolete. The Americans’ elaborate countermeasures were powerless because the leak happened before encryption ever started.</p>



<p>This lesson reshaped intelligence thinking: the greatest danger isn’t the code-breaker, but the one who listens at the very first whisper of information.</p>



<p>Do you think that this kind of story would inspire the kind of paranoia and creativity that fuels the work of any <em>suspense writer</em>? If you ask me, in all the reading that I have done recently as an <em>Indian thriller author</em>, in the pursuit of writing a sequel to Love Swipe Blackmail, I see history repeating itself in new disguises.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>Is It Fascinating or Frightening?</strong></p>



<p>The genius of the Soviet operation was not in breaking ciphers but in sidestepping them entirely. They proved that the real weakness often lies not in the lock, but in the act of writing the message itself.</p>



<p>That lesson resonates even louder today. Modern espionage no longer hides inside typewriter bars, but inside microchips, firmware, and smartphones we carry in our pockets. Supply chain compromises slip into hardware before devices even leave the factory. Spyware like Pegasus can hijack a phone without a single click. Processor flaws such as Spectre and Meltdown show how vulnerabilities can lurk in the very silicon our digital world runs on.</p>



<p>Cold War Moscow reminds us of a timeless truth: the most dangerous hack doesn’t wait at the gate – it lives inside the tool you trust most. As we marvel at the ingenuity and audacity of past intelligence operations, it’s worth asking: What vulnerabilities are hiding in plain sight right now, waiting to be uncovered?</p>



<p>Nitish writes on technology, relationships, and moral dilemmas blending deep research with storytelling to bring fiction and forgotten tales to light.</p>



<p><em>This was first published in The Print on the 22<sup>nd</sup> of Aug 2025.</em></p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/how-soviet-spy-tech-hacked-american-typewriters-the-untold-story-behind-embassy-espionage-in-moscow/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Indian Olfactory Bookmarks – More Mysterious than Indian Thriller Novels</title>
		<link>https://nitishbhushan.com/the-indian-olfactory-bookmarks-more-mysterious-than-indian-thriller-novels/</link>
					<comments>https://nitishbhushan.com/the-indian-olfactory-bookmarks-more-mysterious-than-indian-thriller-novels/#respond</comments>
		
		<dc:creator><![CDATA[project-admin]]></dc:creator>
		<pubDate>Wed, 10 Sep 2025 09:16:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://nitishbhushan.com/?p=3060</guid>

					<description><![CDATA[There are bookmarks… and then there are Indian olfactory bookmarks – the kind you don’t choose, they happen to you and the book that is in the grip of the culprits – your hands. Finding out their source is like reading through the 365 pages of an Indian thriller novel, to finally get it. Like [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p>There are bookmarks… and then there are Indian olfactory bookmarks – the kind you don’t choose, they happen to you and the book that is in the grip of the culprits – your hands. Finding out their source is like reading through the 365 pages of an Indian thriller novel, to finally get it.<br><br></p>



<p>Like the perfectly round coffee ring on Chapter 7 that smells like Monday mornings and mild regret. Or the gentle perfume of masala chai between pages 121 and 122, forever preserving the suspense of who actually did it. Cracked the mystery behind this thriller novel did you – the whodunit of Indian flavours?</p>



<p>Some people press dried flowers into books. Others press <em>pakoras</em>.<br><br></p>



<p>Yes, I’ve met novels where page 45 was lightly buttered, presumably in the service of an aloo paratha that ma made with much love. And then the thriller whose final chapter smelled suspiciously of Maggi noodles, the 2:00 AM and not just the 2-minute snack? Why – because the suspense in the thriller was killing you? Adds a whole new layer to the mystery – Was the reader guilty of reading, or just hungry?</p>



<p><br>And then there’s my friend who swears by “scent layering.” She’ll sip filter coffee while reading romance, and switch to samosas for political satire. I keep telling her – one day she’ll invent the world’s first edible bookmark. I pray that when she does, she shares royalty for the idea.</p>



<p>If Love Swipe Blackmail ever gets such a special edition, I’m voting for popcorn. Suspense always tastes better with a little crunch.</p>



<p>#KahaniHaiNaAmazing</p>
]]></content:encoded>
					
					<wfw:commentRss>https://nitishbhushan.com/the-indian-olfactory-bookmarks-more-mysterious-than-indian-thriller-novels/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
