
HT This Day: May 1, 1975 -- Peace at last in Vietnam: NLF forces take control in Saigon
Saigon: The National Liberation Front (NLF) and the North Vietnamese forces today occupied Saigon following the unconditional surrender of the Saigon Government putting an end to nearly 30 years of war in Vietnam.
Many Government soldiers turned in their arms and tried to lose themselves amid the civilian population. But there were periodic outbursts of gunfire-some from scattered pockets of resistance and others from celebrating PRG and North Vietnamese firing into the air.
The blue and red flag with a yellow star of the Provisional Government was hoisted over the presidential palace in Saigon.
General Duong Van Minh, who took over the presidency only two days ago, watched resignedly as three NLF front tanks broke through the big main gate of the palace and soldiers leapt out of a lorry to hoist the flag.
A Reuter correspondent was in the palace grounds when dozens of NLF tanks came rumbling at noon, prompting soldiers of the Saigon regime to raise their hands in surrender. Just minutes before, President Minh told the correspondent he was still awaiting word from the PRG, whose grinning green-uniformed troops waved to hundreds of Saigon residents cheering them as their convoys moved through a capital festooned with white flags of surrender.
PRG flags fluttered atop many buildings.
After 120 years of French colonialism, Japanese occupation during World War II and American military intervention, the Indo-China peninsula was free of foreign domination.
Conciliation
President Duong Van Minh announced his Government's unconditional surrender in a broadcast this morning and ordered the South Vietnamese soldiers to turn in their arms.
'All soldiers, be calm,' said the President in a 60-second radio address. 'I also call on soldiers not to open fire so that together we can discuss ways to hand-over the rems of Government without bloodshed.'
'In the interest of peace, national conciliation and concord of the people, to save the lives of the people, I believe deeply in conciliation among the Vietnamese people,' Minh said. 'Therefore, I call on all the soldiers of the Republic of Vietnam to stay where you are.'
'We also call on the soldiers at the Provisional Revolutionary Government (PRG) not to open fire because we are here waiting to meet with the Government of the PRG to discuss the turnover of the administration, both civilian and military, without causing senseless bloodshed of the people.'
Four hours later, a jeepload of North Vietnamese soldiers brought the 51-year-old President to the microphone, and he again appealed to the Government forces to give up.
PRG Foreign Minister Nguyen Thi Binh said in an interview in Da Nang yesterday that Gen. Minh might 'still have some role to play in the future of Vietnam.'
The 51-year-old retired General was taken into custody, one report said.
Saigon fell with a whimper. Diehard palace guards fought a fierce last fight with the communist tanks which rolled into the grounds and elite Government paratroops fought to the finish near Tan Son hut airbase.
But, as another Reuter correspondent reported, the city capitulated virtually without resistance and the population in fear of final bloodbath - greeted the NLF troops with great relief.
The correspondent watched the first NLF troops enter the centre of Saigon - a jeepload of barefoot, teenage guerillas.
They were followed by regular soldiers, perhaps of the North Vietnamese army. clad in jungle fatigues and carrying assault rifles and grenade launchers.
A festive mood instantly replaced the anarchy and fear. As soon as the communists arrived, looting and armed robberies stopped.
The collapse came only hours after the Americans completed their disorderly pullout which President Ford described as closing a chapter in the American experience.
Four hours before the tanks entered at 9-30 a.m. (IST), the last American helicopter plucked the final dozen Americans from the roof of the now-pillaged US embassy.
The end of US involvement came in chaos. Weeping Vietnamese begged to be taken out and tried to force their way into the Embassy.
In all some 1,000 Americans and 5,300 Vietnamese were evacuated on the last day. Moments after the last marines left today, escorted by helicopter gunships people broke into and looted the building.
The consular building was set ablaze, writing a fiery end to a war that claimed more than one million lives, some 33,000 of them Americans.
The disarray of the evacuation was visible too at the other end of the helicopter flights from Saigon to offshore warships. The choppers were pushed wholesale into the sea to make room for others to land.
President Minh gave up as the flow of Vietnamese refugees already had begun to land in the US, much as previous runaways from hostilities - Hungarians in the 1930's, Cubans in the 1960's had done.
American relief agency officials said as many as 60,000 Vietnamese will eventually settle in the US.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
&w=3840&q=100)

First Post
40 minutes ago
- First Post
China clears rare earths export applications, not clear if Indian companies included
China's decision in April to halt exports of a wide range of rare earths and related magnets disrupted global supply chains, affecting industries from automotive and aerospace to semiconductors and defence read more Miners are seen at the Bayan Obo mine containing rare earth minerals, in Inner Mongolia, China. File image/ Reuters China said Saturday (June 7) it is prepared to accelerate the approval process for rare earth exports to European Union companies and will issue a final ruling on its trade probe into EU brandy imports by July 5. The developments come amid broader efforts to resolve ongoing trade tensions between Beijing and Brussels. Talks were held earlier this week in Paris between Chinese Commerce Minister Wang Wentao and EU Trade Commissioner Maros Sefcovic, China's Commerce Ministry said in a statement. STORY CONTINUES BELOW THIS AD Price commitment discussions on Chinese-made electric vehicles exported to the EU have also reached the final phase. 'Efforts from both sides are still needed,' the ministry said. The ministry added that China 'was willing to establish a green channel for qualified applications to speed up the approval process' for rare earth exports. It also noted that Beijing recognised rising demand for rare earth materials across sectors including electric vehicles and robotics and that it 'was willing to further strengthen communication and dialogue with relevant countries' on the matter. Rare earths and trade friction China's decision in April to halt exports of a wide range of rare earths and related magnets disrupted global supply chains, affecting industries from automotive and aerospace to semiconductors and defence. The move has become a flashpoint in EU-China trade relations. The ministry said it 'attached great importance to the EU's concerns' and indicated it would work to resolve the bottleneck in a timely manner. Brandy duties under review China's anti-dumping duties of up to 39 per cent on European brandy, particularly French cognac, were implemented shortly after the EU imposed tariffs on Chinese electric vehicles. The Chinese measures have impacted major French producers including LVMH's Hennessy, Pernod Ricard's Martell, and Remy Cointreau. French President Emmanuel Macron previously accused Beijing of 'pure retaliation' over the duties. Beijing had initially planned to announce a final decision on the brandy investigation in January, later postponing it to April and now July 5. On Saturday, the Commerce Ministry confirmed that French firms and industry associations had submitted price commitment proposals and that investigators had reached agreement on key terms. 'Chinese authorities are now reviewing the complete text on those commitments and will issue a final announcement before July 5,' the statement said. Electric vehicle negotiations ongoing The European Commission said in April it was working with Beijing to consider a minimum price framework for Chinese electric vehicles in lieu of the tariffs imposed in 2023. China's Commerce Ministry said the EU also proposed examining 'new technical paths' related to electric vehicles, and that China was now evaluating those ideas. Wang also told Sefcovic that China hoped the EU would 'meet us halfway and take effective measures to facilitate, safeguard and promote compliant trade in high-tech products to China.' STORY CONTINUES BELOW THIS AD With inputs from agencies


Time of India
an hour ago
- Time of India
Chinese hackers, user lapses turn smartphones into 'mobile security crisis'
Cybersecurity investigators noticed a highly unusual software crash - it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in US cyberdefences. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. "The world is in a mobile security crisis right now," said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. "No one is watching the phones." US zeroes in on China as a threat, and Beijing levels its own accusations US authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. "They were able to listen in on phone calls in real time and able to read text messages," said Rep Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the US of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. "The US has long been using all kinds of despicable methods to steal other countries' secrets," Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. US intelligence officials have said China poses a significant, persistent threat to US economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The US and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the US - a growing concern to lawmakers. "The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure," US Rep John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices have become an intel treasure trove Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a "cyber trust mark" for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon 's Joint Special Operations Command. "They're finding backdoors in Barbie dolls," said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. Risks emerge when smartphone users don't take precautions It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University . "They all have access to a variety of secure communications platforms," Williams said. "We just can't share things willy-nilly." (AP)


Time of India
an hour ago
- Time of India
Chinese hackers, user lapses turn smartphones into 'mobile security crisis'
Cybersecurity investigators noticed a highly unusual software crash - it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China 's government and had been targeted by Chinese hackers in the past. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Undo Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in US cyberdefences. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. Live Events "The world is in a mobile security crisis right now," said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. "No one is watching the phones." US zeroes in on China as a threat, and Beijing levels its own accusations US authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. "They were able to listen in on phone calls in real time and able to read text messages," said Rep Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the US of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. "The US has long been using all kinds of despicable methods to steal other countries' secrets," Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. US intelligence officials have said China poses a significant, persistent threat to US economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The US and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the US - a growing concern to lawmakers. "The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure," US Rep John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices have become an intel treasure trove Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles , Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a "cyber trust mark" for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon 's Joint Special Operations Command. "They're finding backdoors in Barbie dolls," said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. Risks emerge when smartphone users don't take precautions It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University . "They all have access to a variety of secure communications platforms," Williams said. "We just can't share things willy-nilly." (AP)