Aung San Suu Kyi. AP
Aung San Suu Kyi. AP
Aung San Suu Kyi. AP
Aung San Suu Kyi. AP

Suu Kyi faces five new charges over Myanmar helicopter purchase


  • English
  • Arabic

A Myanmar junta court has filed five new corruption charges against ousted civilian leader Aung San Suu Kyi.

The charges relate to the alleged hiring and purchase of a helicopter, sources close to the case told AFP.

The Nobel laureate, 76, has been detained since the coup in February last year that triggered mass protests and a bloody crackdown on dissent, with more than 1,400 civilians killed, according to a local monitoring group.

Suu Kyi is facing several criminal and corruption charges, including breaching the country's official secrets laws, and if convicted of all of them could face being sentenced to more than 100 years in prison.

The charges were levelled against Suu Kyi on Friday afternoon and were related to the hiring, maintenance and purchase of a helicopter, AFP reported.

Former Myanmar president Win Myint will face the same charges.

In December, state newspaper Global New Light of Myanmar said the pair would be prosecuted for not following financial regulations and causing a loss to the state over the rent and purchase of a helicopter for former government minister Win Myat Aye.

He rented the helicopter from 2019 to 2021 and used it for only 84.95 hours out of 720 rental hours, the newspaper said.

He is now in hiding, along with other former lawmakers.

A Myanmar court on Monday convicted Suu Kyi of three criminal charges related to illegally importing and owning walkie-talkies and breaking coronavirus rules.

She was sentenced to four years in prison.

In December, she also received a two-year jail sentence for incitement against the military and for other coronavirus breaches.

The sentences will probably prevent Suu Kyi from participating in elections that the military junta has vowed to hold by August 2023.

Suu Kyi is expected to remain under house arrest as the other legal cases proceed.

Journalists have been barred from attending the special court hearings in Naypyidaw and her lawyers were recently banned from speaking to the media.

The daughter of an independence hero, Suu Kyi spent nearly two decades enduring long periods of house arrest under the former military regime.

Her time in office was marred by her government's handling of the Rohingya refugee crisis in which hundreds of thousands escaped to Bangladesh in 2017 as they faced rapes, arson and extrajudicial killings at the hands of the Myanmar military.

Before the coup, Suu Kyi was on the cusp of beginning another five-year term as the country's de facto leader after the National League for Democracy won a landslide in November 2020 polls.

Who's who in Yemen conflict

Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government

Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council

Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south

Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Indika
%3Cp%3E%3Cstrong%3EDeveloper%3A%3C%2Fstrong%3E%2011%20Bit%20Studios%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Odd%20Meter%3Cbr%3E%3Cstrong%3EConsole%3A%3C%2Fstrong%3E%20PlayStation%205%2C%20PC%20and%20Xbox%20series%20X%2FS%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%204%2F5%3C%2Fp%3E%0A
Updated: January 15, 2022, 9:07 AM