Egyptians prepare for historic constitutional referendum



CAIRO // Egyptians go to the polls on Tuesday and Wednesday to vote in a referendum on a charter drafted by a mainly liberal panel of 50 members.

The vote’s significance cannot be overestimated.

A comfortable “yes” vote with a respectable turnout between 65 and 70 per cent would carve in stone the legitimacy of the administration installed by the military following its removal of Mohammed Morsi after millions protested to demand the Islamist president resign.

A poor turnout and a slender “yes” majority would be enough to ratify the draft but would undermine the authority of the interim government.

Even more importantly, a high turnout and a comfortable “yes” majority would serve as a nod to Egypt’s most powerful man, the military chief Gen Abdel Fattah El Sisi, to run for president in elections scheduled for this autumn. Crucially, an emphatic yes to the draft constitution would nullify claims by Mr Morsi and his Muslim Brotherhood that they are Egypt’s leaders and, in effect, establish a new legitimacy for the post-Morsi regime.

With the stakes so high, authorities are not taking any chances in the face of the persistent street protests by supporters of Mr Morsi, who say they will boycott the vote and step up their street demonstrations against what they call “the constitution of blood”.

The army and police are planning an elaborate security operation to protect polling stations and the country’s 52 million voters.

There have been stern warnings that anyone who attempts to disrupt the process would be dealt with harshly. According to the military spokesman Colonel Mohammed Ahmed Ali, 160,000 soldiers will be deployed on the streets to protect voters – about a third of the armed forces.

For its part, the government has announced that voters can cast their ballots anywhere in Egypt rather than in the polling station where he or she are registered. The move is clearly designed to bolster the turnout but raises the spectre of fraud, with voters casting ballots more than once. To counter that possibility, the government said offenders would be imprisoned if caught.

The campaign to approve the constitution, meanwhile, has been in full swing. Giant billboards exhort Egyptians to vote “yes”. Television advertisements equate a “yes” vote to stability and a strike against “terrorism”, a reference to the Brotherhood and its more radical allies.

Egyptians are fed up with three years of economic hardship and violence that has marred the country since Hosni Mubarak was toppled in 2011. They see the vote as a giant step towards the return of stability.

It is also taking place as the crackdown against the Brotherhood continues, with thousands rounded up, including the group’s top leaders and midlevel operatives. Mr Morsi is on trial for three different cases that carry the death sentence.

His trial was postponed last week after weather cancelled his transport to Cairo from a prison near Alexandria. Some observers say that authorities did not want a court appearance by Mr Morsi to distract from the referendum.

Mr Morsi was quoted by Egyptian newspapers before his hearing as saying he was saving a few “surprises” for the court.

Security officials say the Brotherhood is clandestinely campaigning for a “no” vote to dent a possible “yes” majority while publicly sticking to its boycott.

Planned street protests by Mr Morsi’s supporters against the vote are also likely to end in violence as they often have in recent weeks. That, the officials fear, could keep voters at home out of fear for their safety.

The potential for violence is immense.

Islamist protesters have been pelting security forces with rocks and firebombs. The police respond with tear gas, water cannons and bird shots. But in recent weeks, a growing number of pro-Morsi protesters have been spotted carrying firearms.

Video footage and photos show Brotherhood supporters torching civilian and police cars and attacking students who refuse to observe strikes declared by the Islamists.

The Brotherhood insists that its protests are peaceful.

foreign.desk@thenational.ae

The specs

  Engine: 2-litre or 3-litre 4Motion all-wheel-drive Power: 250Nm (2-litre); 340 (3-litre) Torque: 450Nm Transmission: 8-speed automatic Starting price: From Dh212,000 On sale: Now

If you go
Where to stay: Courtyard by Marriott Titusville Kennedy Space Centre has unparalleled views of the Indian River. Alligators can be spotted from hotel room balconies, as can several rocket launch sites. The hotel also boasts cool space-themed decor.

When to go: Florida is best experienced during the winter months, from November to May, before the humidity kicks in.

How to get there: Emirates currently flies from Dubai to Orlando five times a week.
From Zero

Artist: Linkin Park

Label: Warner Records

Number of tracks: 11

Rating: 4/5

Women & Power: A Manifesto

Mary Beard

Profile Books and London Review of Books 

COMPANY PROFILE
Name: ARDH Collective
Based: Dubai
Founders: Alhaan Ahmed, Alyina Ahmed and Maximo Tettamanzi
Sector: Sustainability
Total funding: Self funded
Number of employees: 4
The%20specs%3A%20Taycan%20Turbo%20GT
%3Cp%3E%3Cstrong%3EEngine%3A%20%3C%2Fstrong%3EDual%20synchronous%20electric%20motors%0D%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E1%2C108hp%0D%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E1%2C340Nm%0D%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3ESingle-speed%20automatic%20(front%20axle)%3B%20two-speed%20transmission%20(rear%20axle)%0D%3Cbr%3E%3Cstrong%3ETouring%20range%3A%20%3C%2Fstrong%3E488-560km%0D%3Cbr%3E%3Cstrong%3EPrice%3A%20%3C%2Fstrong%3EFrom%20Dh928%2C400%0D%3Cbr%3E%3Cstrong%3EOn%20sale%3A%20%3C%2Fstrong%3EOrders%20open%3C%2Fp%3E%0A
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.