Fijileaks
  • Home
  • Archive Home
  • In-depth Analysis
    • BOI Report into George Speight and others beatings
  • Documents
  • Opinion
  • CRC Submissions
  • Features
  • Archive

Graham Davis was branded a traitor and a snake for his contact with Victor Lal.  Now, Kishore Kumar claims on his Facebook that it was FFP Government Whip Sudhakar who was behind the crude attack on Davis

2/8/2017

3 Comments

 

REEKING OF CRUDE RACISM: Kishore Kumar has also released the following explanation which he claims Ashneel Sudhakar provided to him

Picture
Picture
Picture

Now, Kishore Kumar has revealed more details on the hacking and who allegedly financed it, including the attack on Graham Davis, which borders on nothing but crude racism

Picture
Picture
Picture
Picture
Picture
Picture
Picture
FIJI CRIMES DECREE 2009(DECREE No. 44 of 2009):

Division 6 — Computer Offences
Definitions
336.—(1)
In this Division--
“access to data held in a computer” means--
(a)
the display of the data by the computer or any other output of the data from the computer; or
(b)
the copying or moving of the data to any other place in the computer or to a data storage device;
or
(c)
in the case of a program—the execution of the program.
“electronic communication” means a communication of information in any form by means of guided or unguided electromagnetic energy.
“impairment of electronic communication to or from a computer” includes--
(a)
the prevention of any such communication; or
(b)
the impairment of any such communication on an electronic link or network used by the
computer--
but does not include a mere interception of any such communication.
“modification”, in respect of data held in a computer, means -
(a)
the alteration or removal of the data; or
(b)
an addition to the data.
“unauthorised” access, modification or impairment has the meaning given in section 337.
(2)
In this Division, a reference to--
(a)
access to data held in a computer; or
(b)
modification of data held in a computer; or
(c)
the impairment of electronic communication to or from a computer--
is limited
to such access,
modification
or impairment
caused
(whether
directly
or indirectly)
by the
execution of a function of a computer.
Meaning of unauthorised access, modification or impairment
337.—(1) In this Division--
(a)
access to data held in a computer; or
(b)
modification of data held in a computer; or
1132
(c)
the impairment of electronic communication to or from a computer; or
(d)
the impairment of the reliability, security or operation of any data held on a computer disk, credit card
or other device used to store data by electronic means--
by
a person is unauthorised
if the person is not entitled
to cause that access,
modification
or
impairment.
(2)
Any such access, modification or impairment caused by  the person
is not unauthorised
merely because he or she has an ulterior purpose for causing it.
(3) For the purposes
of an offence
under this Division,
a person causes any such unauthorised
access, modification
or impairment if the person’s conduct substantially contributes to it.
(4) for the purposes of sub-section (1), if--
(a)
a person
causes
any access,
modification
or impairment
of a kind mentioned
in that sub-section;
and
(b)
the person does so under a warrant issued under any law for the purpose of authorising such an
action--
the person is entitled to cause that access, modification or impairment.
Geographical jurisdiction
338.
A person commits an offence against all sections of this Division--
(a)
whether or not the conduct constituting the alleged offence occurs in fiji; and
(b)
whether or not a result of the conduct constituting the alleged offence occurs on fiji.
Saving of other laws
339.
This Division is not intended to exclude or limit the operation of any other law.
Serious computer offences
340.—(1)
A person commits an offence if he or she--
(a)
causes--
(i)
any unauthorised access to data held in a computer; or
(ii) any unauthorised modification of data held in a computer; or
(iii)
any unauthorised impairment of electronic communication to or from a computer; and
(b)
knows the access, modification or impairment is unauthorised; and
(c)
intends to commit, or facilitate the commission of, a serious offence against a law (whether by that
person or another person) by the access, modification or impairment.
(2)
In a prosecution for an offence against sub-section (1), it is not necessary to prove that the defendant knew
that the offence was--
(a)
an offence against a law; or
(b)
a serious offence.
(3)
A person who commits an offence against this section is punishable by a penalty not exceeding the penalty
applicable to the serious offence.
(4)
A person may be found guilty of an offence against this section even if committing the serious offence is
impossible.
(5)
It is not an offence to attempt to commit an offence against this section.
(6)
In this section--
“serious offence” means an offence that is punishable by imprisonment for life or a period of 5 or more
years.
1133
Unauthorised modification of data to cause impairment
341.—(1)
A person commits a summary offence if he or she--
(a)
causes any unauthorised modification of data held in a computer; and
(b)
knows the modification is unauthorised; and
(c)
is reckless as to whether the modification impairs or will impair--
(i)
access to that or any other data held in any computer; or
(ii)
the reliability, security or operation, of any such data.
Penalty — Imprisonment for 10 years.
(2)
A person may be guilty of an offence against this section even if there is or will be no actual impairment
to--
(a)
access to data held in a computer; or
(b)
the reliability, security or operation, of any such data.
(3)
A conviction for an offence against this section is an alternative verdict to a charge for an offence against
section 342 (unauthorised impairment of electronic communication).
Unauthorised impairment of electronic communication
342.—(1)
A person commits a summary offence if he or she--
(a)
causes any unauthorised impairment of electronic communication to or from a computer; and
(b)
knows that the impairment is unauthorised.
Penalty — Imprisonment for 10 years.
(2)
A conviction for an offence against this section is an alternative verdict to a charge for an offence against
section 341 (unauthorised modification of data to cause impairment).
Unauthorised access to, or modification of, restricted data
343.—(1)
A person commits a summary offence if he or she--
(a)
causes any unauthorised access to, or modification of, restricted data; and
(b)
intends to cause the access or modification; and
(c)
knows that the access or modification is unauthorised.
Penalty — Imprisonment for 2 years.
(2)
In this section--
“restricted data” means data--
(a)
held in a computer; and
(b)
to which access is restricted by an access control system associated with a function of the
computer.
Unauthorised impairment of data held on a computer disk, etc.
344.
A person commits a summary offence if he or she--
(a)
causes any unauthorised impairment of the reliability, security or operation of data held on--
(i)
a computer disk; or
(ii)
a credit card; or
(iii)
another device used to store data by electronic means; and
(b)
intends to cause the impairment; and
(c)
knows that the impairment is unauthorised.
Penalty — Imprisonment for 2 years.
Picture
3 Comments
Welcome Home
2/8/2017 06:51:40 pm

The term 'cockroaches' has twenty years of fearsome, genocidal baggage attached to it. It was used on Radio Rwanda in the two months leading up to the genocide when more than 800,000 Rwandans and some expatriates who tried to give shelter and protection to those threatened were brutally massacred. We appear not to have considered this? Nor have we given any thought to the verifiable fact that those of us who tried to forestall orchestrated violence against civilian targets were also threatened: often by the use of introduced mobile phones into prisons. The wearing of red poppies by persons who have seemingly colluded in abuse and contributed to acts of violence on civilians is intolerable. The grooming of young female students at UNIFIJI by a former Vice Chancellor has been witnessed first hand. He may well have had like-minded associates? Why should this depraved behaviour be tolerated? The sexual crimes listed by Office of DPP for July 2017 reflect the incontinent and widespread reach of these violations against even babies as young as two years or less. This is a world spinning out of control. No moral principles or discernment in sight? What future is there unless these dysfunctional, corrupted people are brought to a full accounting for their disgusting conduct? No matter how long it takes: UN's General Romeo Dallaire, a Canadian citizen, knows and tells in his memoir which was obtained and read first in April 2006. 'Cockroaches' has been a loaded word ever since. Make no mistake.

Reply
Kumar
3/8/2017 02:57:01 am

It so funny to see all the arse kissers of FFP now all complaining about the smell after being farted on. All these wanna be heroes kicked to the gutter as FFP marches on inventing new taxes to make money out the people. I wonder how great some business people think FFP is now that they are digging deeper into their pockets. FFP is nothing but a money train going full speed and we are at 1.5 billion now.

Reply
Fiji First Party
3/8/2017 07:46:14 am

One can safely assume that a political ‘Party’, which principally came into being via an act of CHORI would thus be scarce of fundamental virtues of morality and ethics. Not one amongst this Fiji Theft Party (Naam Chor Party) is innocent of their collective crime of a pitiable and despicable nature and all are thus guilty of deplorable IP thuggery.

Bainimarama, Aiyaz, Sudhakar, Bala Sala, Topper Reddy, Rosy Akbar, Koya and the damn rest of them are – first and foremost , Fiji’s First pitiable IP thieves and Chor politicians, acting their part, pretending to be something (honourable) which they are certainly not.

So it is of no surprise that Sudhakar is essentially a “racist” member of a pretentious ‘non-racist’ political party and who openly conspired with others to infringe on the privacy of citizens, threatening extortion and criminally ‘hack’ Fiji Leaks - keeping in sync with the recently expressed sentiments against social media by Fiji’s pretentious “minister of everything’ and Fiji’s most ‘pitiable’ IP Thief, bullshitting the students at UniFiji.

Chor Aiyaz is scared shit of the social media. That’s where the truth gets revealed!

Reply

Your comment will be posted after it is approved.


Leave a Reply.

    editor@fijileaks.com

    ARCHIVES

    September 2020
    August 2020
    July 2020
    June 2020
    December 2018
    November 2018
    October 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    October 2012
    September 2012
    Picture
    Picture