Jump to content
Reliance Jio & Reliance Mobile Discussion Forums

rajanmehta

Super Moderators
  • Content count

    4,197
  • Joined

  • Last visited

  • Days Won

    481

Everything posted by rajanmehta

  1. Blackberry maker RIM offers data tapping at its premises in India NEW DELHI: Blackberry maker Research in Motion , which had been slapped with a January 31 deadline to provide a 'final solution' for lawful interception of services offered on its handsets , has offered to install a network data analysis system at its premises in India, to end the three-year standoff between the Canadian company and security agencies here. The home ministry has suggested that the Canadian company set up this NDAS infrastructure that has the capabilities to automatically decode all data flowing on RIM's network, and also ensure that intercepted and decoded information will not travel outside the country, at the premises of mobile phone companies. In an internal note reviewed by ET, the home ministry said its opposition towards RIM setting up the network data analysis system at its own premises here stemmed from a security perspective. Earlier this month, RIM had offered a cloud-based solution to India's home ministry , but the latter then sought changes after it was found that intercepted and decoded data was flowing via the internet from the Canadian company's servers in Europe to that of mobile networks here. "In the final solution proposed by RIM, the decoding will be automatic. Intercepted and decoded data will not travel out of India . RIM has proposed to install NDAS in India. In the final solution, intercepted and decoded data will travel between service providers and RIM India ," adds the home ministry note issued by its deputy director Arvind Kumar. This marks a significant climbdown for the Canadian company, which had previously resisted pressure from India's home ministry , to install servers here, while also maintaining that it did not have any master key to intercept any BlackBerry communication. The stakes are big for the Canadian smartphone maker, especially since India is one of its fastest growing markets. Super secure corporate email has been RIM's unique selling point, which has made the BlackBerry service an instant hit with high-flier executives. Today, India has over a million BlackBerry users although less than 4 lakh subscribe to its email and messenger service. In October, the government ordered RIM to come up with a solution by January 2011-end that would give the country's intelligence agencies complete access to all services offered on its handsets . It had earlier asked RIM to hand over the encryption keys and codes of its corporate mail and messaging services to the Indian security establishment by October 31. The extension to January-end 2011 was given since RIM had sought a timeframe of 23 weeks in August to provide a solution for lawful access 'that would not involve overseas data path'. Source:Economic Times
  2. Huawei C7300 -- OMH Rev. A

    EVDO Rev.B has 4.9 Mbps Per Carrier. So if 3 Carriers are adopted peak rate will be 14.7 Mbps.
  3. Security Alert: Geinimi, Sophisticated New Android Trojan Found in Wild The Threat: A new Trojan affecting Android devices has recently emerged in China. Dubbed "Geinimi" based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user's phone and send it to remote servers. The most sophisticated Android malware we've seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user's phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone. Geinimi is effectively being "grafted" onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn't entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet. Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. If you are already a Lookout user (free or premium), you are protected and no action is needed. How it Works: When a host application containing Geinimi is launched on a user's phone, the Trojan runs in the background and collects significant information that can compromise a user's privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server. Though we have seen Geinimi communicate with a live server and transmit device data, we have yet to observe a fully operational control server sending commands back to the Trojan. Our analysis of Geinimi's code is ongoing but we have evidence of the following capabilities: * Send location coordinates (fine location) * Send device identifiers (IMEI and IMSI) * Download and prompt the user to install an app * Prompt the user to uninstall an app * Enumerate and send a list of installed apps to the server While Geinimi can remotely initiate an app to be downloaded or uninstalled on a phone, a user still needs to confirm the installation or uninstallation. Geinimi's author(s) have raised the sophistication bar significantly over and above previously observed Android malware by employing techniques to obfuscate its activities. In addition to using an off-the-shelf bytecode obfuscator, significant chunks of command-and-control data are encrypted. While the techniques were easily identified and failed to thwart analysis, they did substantially increase the level of effort required to analyze the malware. The Lookout Security team is continuing to analyze capabilities of new and existing Geinimi variants and will provide more information as we uncover it. Who is affected? Currently we only have evidence that Geinimi is distributed through third-party Chinese app stores. To download an app from a third-party app store, Android users need to enable the installation of apps from "Unknown sources" (often called "sideloading"). Geinimi could be packaged into applications for Android phones in other geographic regions. We have not seen any applications compromised by the Geinimi Trojan in the official Google Android Market. There are a number of applications—typically games—we have seen repackaged with the Geinimi Trojan and posted in Chinese app stores, including Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010. It is important to remember that even though there are instances of the games repackaged with the Trojan, the original versions available in the official Google Android Market have not been affected. As the Lookout team finds more variants of the Geinimi Trojan grafted onto legitimate applications, we'll provide timely updates. As stated above, Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. How to Stay Safe: * Only download applications from trusted sources, such as reputable application markets. Remember to look at the developer name, reviews, and star ratings. * Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides. * Be aware that unusual behavior on your phone could be a sign that your phone is infected. Unusual behaviors include: unknown applications being installed without your knowledge, SMS messages being automatically sent to unknown recipients, or phone calls automatically being placed without you initiating them. * Download a mobile security app for your phone that scans every app you download. Lookout users automatically receive protection against this Trojan. With the discovery of this new malware, it is more important than ever to pay attention to what you're downloading. Stay alert and ensure that you trust every app you download. Stay tuned for more details on this threat. Source:Official Lookout Blog
  4. Is the phone modem showing in Windows Device Manager Properly without any yellow exclamation mark Or errors for drivers? Have you tried by creating a new Dial Up Connection from Windows itself instead of Samsung NPS? Have you tried it on Windows Xp? Did you try to use MDN(Your Phone No.) as Username and Password?
  5. Mcafee Labs has released 2011 Security Threat Predictions. This annual forecast done for many years is quite comprehensive and respected a lot. Exploiting Social Media In 2010 we saw some significant changes in how both malicious code and malicious links are distributed. This year ended with some of the lowest global email spam levels in years, as more and more users transition from "slower" legacy communications such as email in favor of more immediate methods such as instant messaging and Twitter. This shift will completely alter the threat landscape in 2011. As both consumer and business users continue to flock to social media and networking sites for immediate communications and data sharing, we expect to see increasingly more targeted abuses of personal identity and data. Social media connections will eventually replace email as the primary vector for distributing malicious code and links. The massive amount of personal information online coupled with the lack of user knowledge of how to secure this data will make it far easier for cybercriminals to engage in identity theft and user profiling than ever before. Spear phishing—targeted phishing attacks—will move to Twitter and like technologies because choosing users and groups to exploit through these channels is simple. Two related areas of social media will also attract attention next year: short URLs and locative technologies. Short URL Service Abuse: Short URLs make sense when used in social media as well as in other forms. Short links are easier to paste or type. The trouble—and abuse—follows because users do not know where these shortened links actually lead until they click them. This is a huge opportunity for abuse. Spammers have already latched onto short URLs to evade traditional filters. McAfee Labs expects to see short URL abuse invade all other forms of Internet communications. We currently track and analyze—through multiple social media applications and all URL shortening services—more than 3,000 shortened URLs per minute. We see a growing number of these used for spam, scamming, and other malicious purposes. This nominal convenience will have a tremendous impact on the success of cybercriminals and scammers as they leverage the immediacy of social media over email for even greater success. Locative Service Abuse: More Internet users at all levels are adding global positioning system (GPS) information to their social media updates so their friends and colleagues can see where they are. Many locative services also offer users badges and rewards to increase their popularity. There's no trick to imagining how cybercriminals and scammers can potentially leverage this information: With locative services such as foursquare, Gowalla, and Facebook Places you can easily search, track, and plot the whereabouts of friends and strangers. Use Bing's mapping functionality, for example, and plot all the GPS-enabled tweets in an area. It is easy to correlate these by topic or area of interest. In just a few clicks cybercriminals can see in real time who is tweeting and where, what they are saying, what their interests are, and the operating systems and applications they are using. It then becomes child's play to craft a targeted attack based upon what the bad guys have just learned from these services. The fact that these services allow anyone to see and track individuals and groups—including their likes and dislikes, affiliations and interests—and then act on them in Internet time will make this topic a huge focus for cybercriminals and scammers in 2011 and beyond. Mobile Threats to mobile devices have been a hot topic within the security community for several years; we expect attacks to erupt at any time, yet they never quite seem to happen. Nonetheless, McAfee Labs predicts that 2011 will be a turning point for threats to mobile devices. This year we saw many new, but low-prevalence, threats to mobile devices: rootkits for the Android platform, remote "jailbreaking" exploits for the iPhone, and the arrival of Zeus (a well-known banking Trojan/botnet). The widespread adoption of mobile devices into business environments combined with these and other attacks is likely to bring about the explosion we've long anticipated. Given our historically fragile cellular infrastructure and slow strides toward encryption, user and corporate data may face serious risks. Apple Any security professional who cruises online InfoSec forums or attends conferences will know that the Mac OS X platform is a favorite target of the whitehat and blackhat communities. Whitehats have been poking at the Mac for a long time looking for vulnerabilities. Although historically not a frequently targeted platform by malicious attackers, the Mac operating system is very widely deployed. McAfee Labs saw malware of increasing sophistication that targets Mac this year; we expect this trend to increase in 2011. The popularity of iPads and iPhones in business environments and the easy portability of malicious code between them could put many users and businesses at risk next year and beyond. We anticipate threats of data and identity exposure will become more pronounced. The lack of user understanding regarding exposure on these platforms and the lack of deployed security solutions make a fertile landscape for cybercriminals. McAfee Labs expects to see botnets and Trojans move from a rare encounter to a more common occurrence on Apple platforms in 2011. Applications Regardless of our choices of platform or device, we live in an application-centric world. The drawback to that world lies in the portability of our apps among mobile devices and the coming Internet TV platforms, which combined will make threats from vulnerable and malicious apps a major concern for 2011. In addition to malicious code, McAfee Labs expects to see apps that target or expose privacy and identity data. This danger will eventually lead to data exposure and threats through new media platforms such as Google TV. As home-, work-, and device-controlling apps become more popular, they will increasingly become targets. These tools have historically weak coding and security practices, and will allow cybercriminals to manipulate a variety of physical devices through compromised or controlled apps. This assault will raise the effectiveness of botnets to a new level. In 2011 McAfee Labs expects to see increasing numbers of both suspicious and malicious apps for the most widely deployed mobile platforms and operating systems. Apps that are poorly developed have already exposed identity data. We expect developers and marketers to succumb to "rush to market" thinking as these apps becomes more commonplace. Platforms that have undersupervised models of app development and distribution are particularly at risk. This haste to sell insecure products will eventually lead to more app-centric privacy and data attacks in 2011. McAfee Labs has already seen the move toward application-controlled botnets this year in Twitter and LinkedIn; we expect this to become the norm in 2011 and beyond, as application deployment and use becomes more ubiquitous. Will this be the year of mobile botnets controlled via a downloaded app? Sophistication Mimics Legitimacy This year we saw an increase in the sophistication of some threats. "Signed" malware that imitates legitimate files will become more prevalent in 2011. This will cause an increase in stolen keys as well as the techniques and tools to forge fake keys to use in these types of attacks. "Friendly fire"—in which threats appear to come from your friends—from social media such as Koobface and VBMania will continue to grow. This will go hand-in-hand with the increased abuse of social networks, which will eventually overtake email as a leading attack vector. We also expect to see an increase in "smart bomb" attacks, those designed to trigger under certain conditions but not others. These threats require victims to follow the designated attack path—thwarting honeypots, crawlers, and security researchers—while greatly impacting designated and vulnerable targets. Such threats will create an even greater need for Global Threat Intelligence to defend against attacks observed under specific circumstances. Personalized attacks are about to get a whole lot more personal. Botnet Survival As we mentioned in the discussion of applications, botnets continue to be one of the greatest and most sophisticated threats McAfee Labs faces. In the coming years, we expect to see more data exfiltration capabilities. Through this year we have seen cybercriminals engage in a growing number of targeted attacks; we anticipate a greater focus on botnets removing data from targeted machines and companies, rather than the common use of sending spam. Botnets will also engage in advanced datagathering functionality as well as focus more on targeting and abusing social networking. Botnets are suffering losses, too. Global law enforcement has recently taken down Mariposa, Bredolab, and some Zeus botnets. However, botnets continue to evolve. We predict that the recent merger of Zeus with SpyEye will produce more sophisticated bots due to improvements in bypassing security mechanisms and law enforcement monitoring. Mergers and acquisitions have finally made their way to the malware world. Botnets that employ FaceBook and Twitter will expand their scope to include popular social networking sites such as foursquare, Xing, Bebo, Friendster, and others. The growing populations and business use of these sites is something that cybercriminals simply cannot ignore. McAfee Labs also expects to see more integration of location-based functions within botnets as GPS features continue to become more widespread. Hacktivism Attacks motivated by politics are not new, but we encounter them more and more regularly. And they will be far more numerous in 2011. In addition to defacement (the primary activity of hacktivists) and distributed denial of service (DDoS, the latest "fashionable" activity), new kinds of sophisticated attacks will appear. Information theft, stolen and then disclosed to discredit political opponents, will certainly increase. More groups will repeat the Wikileaks example, as hacktivism is conducted by people claiming to be independent of any particular government or movement. Whether governments drive these manipulations and activities covertly is open to debate, but it is likely enough that states will adopt a privateer model. Hacktivism as a diversion could be the first step in cyberwarfare. Everyone within information security—from journalists to researchers—will have to be vigilant to recognize the difference between hacktivism and the beginning of a cyberwar. We expect that social networks will be used more often to bring hacktivism into play next year. Just as cybercrime has moved from isolated individuals (able to create a piece of malware) to unstructured groups (able to launch a DDoS), we expect to see much more and stronger organization and structure within hacktivist groups in 2011. Hacktivism will become the new way to demonstrate your political position in 2011 and beyond. Transitioning from the streets, political organizers will move to the Internet to launch attacks and send messages in broad daylight or Internet time. And as in the physical world, we expect that hacktivist attacks will inspire and foment riots and other real-world demonstrations. Advanced Persistent Threats The news in January of the Operation Aurora/Google incident gave birth to the new category of advanced persistent threat (APT), which has been a hot topic of discussion in the industry and press for much of the year. However, there is much confusion about the true nature of these attacks. The generally accepted definition of an APT is one that describes a targeted cyberespionage or cybersabotage attack that is carried out under the sponsorship or direction of a nation-state for something other than a pure financial/criminal reason or political protest. Not all APT attacks are highly advanced and sophisticated, just as not every highly complex and well-executed targeted attack is an APT. The motive of the adversary, not the level of sophistication or impact, is the primary differentiator of an APT attack from a cybercriminal or hacktivist one. For instance, the RBS WorldPay hack that resulted in the theft of US$9 million by an Eastern European cybercriminal gang was not an APT, despite its high level of sophistication and coordination. APTs also are not launched by a single adversary. There are numerous APT attack teams located around the world, all with varying degrees of capabilities and expertise. Just as there are A teams and B teams in the organized cybercriminal hierarchy, the same holds true for APTs. Some have access to massive amounts of resources (hardware, software, and human) and even traditional intelligence, surveillance, and reconnaissance capabilities. Others borrow, steal, or purchase ready-made tools offered and frequently used by established cybercriminal gangs and conduct themselves in a similar manner to gangs, except for the type of data they try to exfiltrate from their targets. Companies of all sizes that have any involvement in national security or major global economic activities (even peripherally, such as a law firm advising a corporate conglomerate starting business in another country) should expect to come under pervasive and continuous APT attacks that go after email archives, document stores, intellectual property repositories, and other databases.
  6. MTS Launch

    @sadikkbhai Thanks for the info. Data Usage (Only browsing on device) is shown as free in all postpaid plans!! What does device mean? Does it mean that you can browse on your mobile as much as you like without paying anything on this plans? Again at the end of the sheet it says Data Charges RS 2/MB in all postpaid plans!! What is the actual position?
  7. Olive To Launch First Indian HSPA+ Android Phone

    In entire Olive Product Portfolio, most of them are good designs with some unique features. Olive has tie up with some 24 network operators worldwide and operations in many countries. One can expect some good Android handsets from them compared to a Micromax or Intex.
  8. A CSR-Corporate Scam Reversal Drive!!
  9. Govt allows pvt cos to roll out 3G After acting tough on the security interception issues in the 3G services, the government is now willing to relent and may allow private operators to roll out the 3G services, provided they give an undertaking to comply with the interception requirements within six months. A top government source on Tuesday said that telecom secretary R. Chandrashekhar and home secretary G.K. Pillai had a meeting on Monday and there is now a view that private operators could be allowed to roll-out the 3G services on the condition that they would provide real-time interception mechanism of applications like video calls by the end of June in 2011. "The operators will have to give an undertaking to the government promising they will have such a mechanism in place within the next six months. They may be then allowed to roll-out (3G services)," the source said. Till last week the ministry of home affairs (MHA) had said that private operators cannot roll out 3G services till they come up with a mechanism to allow interception of facilities like video calls in real-time. This led the department of telecom (DoT) to ask Tata Teleservices and Reliance Communications (RCom) to put their 3G services on hold on December 14. In fact, MHA officials were saying till last week that it is better to first get the realtime interception issue settled before the roll-out, rather than chase the private operators after the roll-out to comply with the same. However, with the state-owned telecom operators Bharat Sanchar Nigam Ltd (BSNL) and Mahanagar Telephone Nigam Ltd (MTNL) already offering 3G services and private operators - who paid huge amounts to procure 3G spectrum - being asked to wait, the government may have a change of mind now. A source said that there is now a view that the Blackberry model could be followed by the government for the 3G services as well, whereby time could be given to private operators to offer mechanism for real-time interception even as the 3G services are rolled out. All major private operators have plans to launch the 3G services early next year. The home ministry had earlier this year given Canada-based Research in Motion (RIM) time till January 31 to offer live interception of Blackberry services like Blackberry Messenger and Blackberry Enterprise Service, which are being used by thousands of subscribers in India. The same model may now apply to 3G services with a rollout being allowed and the realtime interception issue being settled over the next six months. Telecom minister Kapil Sibal had said last week that the security concerns regarding 3G video calls will be resolved soon. The government wants realtime interception by way of which the security agencies can monitor and intercept video calls as it happens. Till now no private operators have been able to come up with a mechanism for the online delivery of video call intercepts in real-time. The contents of such calls were displayed only after five minutes of the completion of these calls as against the requirement of the security agencies for interception on a real-time basis. Mail Today
  10. Weirdest Mobile Phones Ever

    Thanks Kamalbhai
  11. Customs Duty for Shipping Used Motorola Droid X from US?

    What's the point of worrying now even if penalty and high charges may be there? तीर कमान से निकल गया है That's why given you the whole procedure in my earlier post. Instead of waiting for the Postal Dept. to deliver it with whatever duties, penalty by Customs... Why don't do a personal follow up and settlement with Customs while the parcel is with them...
  12. Intex Mobiles, an Indian handset brand, has announced that it is joining the Android bandwagon with a smartphone powered by version 2.2 or Froyo in February. Sudhir Kumar, assistant general manager of the telecom division at Intex, announced to Press , "We will launch an Android 2.2 phone in the first week of February and it will priced at around Rs 5,500." The Intex Android smartphone will be equipped with a 3.2 mega pixel camera, 2.8 inch resistive full-touch screen, WiFi and GPS. This phone from Intex will the cheapest Android handset in India and is expected to challenge Micromax A60, which is priced at Rs 6,999.
  13. Weirdest Mobile Phones Ever

    Search karta hu par lagta hai Kamalbhai ki jarurat padegi. Unko sab topic yaad hote hai!! Wah..Wah...Hiteshbhai....Looks like this phones fits perfectly on a Mel Gibson type Western Cowboy!!
  14. Rs 5,500 Android Mobile By Intex-In February 2011

    We all should welcome this chinese invasion of android!! Not exactly for buying this Chinese Androids.... But the indirect effect of this low price Androids forces Top Brands to come down from their high horses and correct their astronomical pricing models to stay relevant in the market....So we all can afford to buy a good quality android from a top brand at prices that makes sense... This has happened before....At what prices Nokia and other top brands used to hawk handsets in Indian Markets before this Cheap Chinese mobiles arrived? Same thing will repeat for Android and i am glad... आम आदमी से ले के ख़ास आदमी, सबको अपने टाइप का अन्द्रोइड अपनी मनचाही कीमत पे मिलेगा
  15. Customs Duty for Shipping Used Motorola Droid X from US?

    @rahiljnmc Here is detailed info. Since you are getting it VIA USPS, use this Website http://ipsweb.ptcmys...SWeb_submit.htm to track it till it reaches india. Enter your USPS number and it will show you the exact status. See how the status looks like with this actual USPS Code EC669875019US The update will stop as your parcel reaches Indian Customs as it will get stuck there for Custom Duty Assessment. You need to Go to the Foreign Customs Department to get the shipment confirmed. Upon request, Customs will give you an Indian Code of the same USPS Label/Receipt No. This is called BL Number. Now request Customs to approve the shipment and value it for Customs Duty after which they will pass it on to India Post for Delivery and payment. Usually the Customs will not bother to value the item at Actual Invoice Price shown in US Dollars but will value it at prices prevailing in the Indian Market. So the Customs duty will tend to be higher. Use the Indian Methods here to soften the blow. Remember The Principle. Dont't quote the LAW but remain LOW and YIELDING. Hope this helps
  16. The house that Raja built DMK chief M Karunanidhi seems to have been in the dark as A Raja and his coterie built a huge business empire. JEEMON JACOB unearths exclusive and mind-boggling details AS THE 2G spectrum scam unfolded, senior DMK leaders were in for a shock. Till the raids by the Central Bureau of Investigation (CBI), they believed that Andimuthu Raja's actions as Union telecom minister were dictated by his master, DMK supremo and Tamil Nadu Chief Minister M Karunanidhi, and that the protege was merely taking his 'commission', a well-understood practice in politics and business — and in the business of politics. But now they know Raja was aggressively building a parallel business empire that would have rivalled the K-family's if he had continued in power. Which is ironic, for when Raja was preferred over family member Dayanidhi Maran for the telecom minister's post, it was because he was considered so loyal that he could never be a threat. No wonder, right from May 2010, when both Houses of Parliament were rocked by demands for Raja's resignation over the 2G scam, Karunanidhi backed him, saying detractors were opposed to him because he is a Dalit. But after the December raids and subsequent disclosures, the DMK chief ended up saying that Raja would be punished if he was found guilty. If Raja wants to uplift downtrodden Dalits, a pious declaration he makes from time to time, his starting point is clearly his own family. Raja has a wife, three brothers and four sisters, and a proportionate number of nephews and nieces, all of whom provided names and faces for expanding the diversified conglomerate. His only daughter is still too young, but his relatives, friends and old associates have all been roped in to run the business empire. Raja's modus operandi, say CBI sources, was not very sophisticated: he did what film folk do, floating companies in different names and channelling funds to them via two or three other front companies. He ran this empire through proxy and to ensure that the directors didn't take their roles too seriously, he apparently asked them to give him advance undated resignations. As the CBI puts the jigsaw puzzle together, it finds Raja had set up front companies well before the spectrum allocation: a mix of hawala channels, realty firms, NGOs, family trusts and export firms ensuring safe passage for the spoils of politics. For this, he established contact with NRIs, audit firms in Malaysia and local companies in Chennai, Perambalur, Trichy, and Coimbatore. With easy money flowing in, many became millionaires overnight. One such man was Sadiq Batcha, who heads several real estate firms in Chennai. Twenty years ago, he was a salesman in Pallapatti village in Salem district, knocking at doors to sell sarees on 10 instalments. Later, he sold radios and tape recorders. Unable to make ends meet, he migrated to Perambalur, where he met AIADMK's Varathur Arunachalam. This was his stroke of luck, his key to fame and fortune. Arunachalam introduced him to Raja, a small-time DMK politician. Both were ambitious and ready to take risks. It was Raja who told him to venture into real estate. With small investments on both sides, they grew together. Today Batcha's real estate empire is worth more than Rs. 2,000 crore. Batcha floated companies one after another with Raja's close relatives on the board of directors. Chennai-based Green House Promoters, a private limited company set up in 2004 with a seed capital of Rs. 1 lakh, grew exponentially to record a turnover of several hundred crores in a short span. It opened an office in Singapore in 2006. Raja's wife Parameshwari joined the board in 2007. The Enforcement Directorate issued a notice to the company for Foreign Exchange Management Act violations and the Singapore office was shut down in 2009. It was clear from the transactions that the office had been set up to channel huge amounts of money to Chennai. For this, Batcha used his connections in Malaysia and Dubai. Later, Welcome Communications, a Malaysia-based telecom company, channelled the scam money to Chennai through its Indian arm Wellcom. The latter was in the news in March 2009, when there were reports that a company run by Raja's associate, T Silvarajoo, was participating in the WiMax franchise allotment by BSNL. Subsequently, BSNL refrained from shortlisting Wellcom, also dropping Wipro and Cisco for good measure. WHILE INTERROGATING RP Paramesh Kumar, the son of Raja's sister Vijayammal, and joint managing director of Green House Promoters, the CBI has unearthed huge money transfers through export orders. The Enforcement Directorate is probing the possibility of the use of textile and vegetable exporters based in Chennai, Tirupur and Coimbatore to channel the money through hawala operations. Paramesh Kumar is a common factor in all Raja companies, whose personal and company accounts show large-scale money transactions. But then, all the companies made huge profits within a short span of time — and this happened from 2008 onwards, right when the rest of the world was coping with the global meltdown. The money seems to have flowed as follows: companies that were favoured with spectrum allocation sold it off at a huge profit, sent the money abroad, from where it flowed back to show up as profit in Raja's business empire. Raja also depended on his family, friends and associates to park the money while others dumped their shares in Dubai, Singapore, Malyasia and Sri Lanka. The money involved was so huge that it could not be absorbed only in benami properties, which is the usual way to stash away ill-gotten wealth in India. Swiss bank accounts are no longer safe, as they were for earlier generations. The CBI seems to have had good reason to raid the charity Tamil Maiyam run by Catholic priest Jegath Gasper Raj (Raiders of the Lost Loot, TEHELKA, 25 December). The NGO, which actively raised funds for rehabilitation of the 2004 tsunami victims, has links to Sri Lanka, the Philippines and Singapore, all of which is being probed. More damningly, from 2007 onwards, the NGO received large amounts of money from Green House India Promoters, Equaas Real Estates and Kovai Shelters. The ETA Ascon Star Group also made donations. If the CBI manages to establish that spectrum beneficiary companies gave large donations to Tamil Maiyam, the noose will tighten around Raja and his close friend Kanimozhi, Rajya Sabha MP and Karunanidhi's daughter, who is on the non-profit's board of directors. Raja proved to be the man with the Midas touch not only for Batcha but also for S Saravanan, who started as a humble servant in Royal Enterprises, the furniture shop run by Rajathiammal, Karuna - nidhi's third wife and Kanimozhi's mother. Today, Saravanan is one of Chennai's crorepatis. His road to riches was paved with shady transactions such as the Voltas land deal in Chennai, which figured in the Radia tapes. Voltas is a Tata concern. Though Rajathiammal issued a press release on 17 December distancing herself from the land deal, she had admitted the mediator in the land deal was her employee Saravanan, who holds power of attorney of the disputed land, which is owned by PN Shanmugham, PN Arumugham and 16 others. Voltas had taken the 53,000 sq ft plot on a 30-year lease in 1975. In 2005, when the company asked for a renewal, the owners did not oblige and filed a case in the Madras High Court, which is still pending. The company kept depositing the rent but the plot was sold by Saravanan to Shangkalpam Industries Pvt Ltd, Coonoor, for a sum of Rs. 25 crore, much below the market price, which is estimated to be around Rs. 200 crore. The land deal was struck just before the 2009 Lok Sabha elections. But Voltas never pursued the case and the court never sent notices to the respondents. It's clear that highlevel mediation silenced the company and prevented it from actively pursuing legal proceedings. Now it's up to the CBI to find out how Saravanan was able to get the power of attorney of 18 persons and execute the land deal. Shangkalpam Industries, which now owns the property, is run by Dr Shanmughanathan Vellanthurai, 45, a Malay - sian auditor and businessman. He is also director of Shan & Co, an audit firm which has close links with Raja and Ratnam, who is Rajathiammal's auditor. Shanmugham is a tax expert who once worked with Ernst & Young. It's a mystery why the Income Tax department didn't bother to probe the prime land deal in Chennai — normally, its intelligence wing does routine checks on big land deals. Only after the Radia tapes were leaked did the CBI interrogate Ratnam and raid his residence. The CBI is exploring whether any spectrum money was used for the land deals. According to a business associate, Dr Shanmughanathan has close contacts with Raja and is an influential businessman in Malayasia. He is also on the board of Kamdar Group (M) Berhad, an investment holding company, and engages in the import, export, retail and wholesale of textile and textile-based products globally. The Kamdar group has operations in South Africa too. It is said his close relatives are manning Shangkalpam Industries in India. Dr Shanmughanathan was introduced to A Raja by his relative, Dr Kumaraswamy Shanmughanathan, who heads the Colacumby tea estates in the Nilgiris and is a PhD in dairy science. SHANGKALPAM LTD has an office in London, registered at the address 188 Royal College Street. The company was incorporated in 1993 and Shangkalpam Ltd owns a tea estate in Nilgiris, the constituency represented by Raja in the Lok Sabha. The company has operations in Singapore, Malaysia, Australia and Dubai, the countries to which Raja and his men travel most frequently. Raja & Co's real estate operations were never innocuous. His henchmen effectively used mafia, police and the district administration to wrest land from the poor. He didn't shy away from squeezing poor Dalits in his hometown Perambalur. Projecting a grand vision of making the town the industrial hub of Tamil Nadu, Raja contacted MRF and offered 400 acres to set up a new plant for manufacturing passenger and truck tyres and a trial track. Batcha signed an MoU with MRF for acquiring land in November 2007. Atter a month, while inaugurating the district police station in Perambalur, Raja announced a Rs. 900 crore MRF project, which was greeted with loud cheers by the poor farmers. Raja's men had already started buying farmland offering Rs. 65,000-80,000 per acre in Naranamangalam village. Within months, they acquired 250 acres of land from 130 villagers. Some of the villagers, including Dalits, were not ready to sell their land at such a low price. Then Raja showed his true colours. First he threatened them that the land will be notified by the government and forcefully taken over. The poor villagers knew that litigation will swallow up the next 10-15 years, during which the politician could manipulate anything. A majority of them yielded to pressure and sold their land. Then Raja targeted the remaining villagers. Many of them were arrested and threatened by police, district administration and Raja's men. A few non-Dalits were even arrested under the SC/ST Act and released abruptly once their land was transferred to Green House Promoters. Even women were not spared, being detained illegally in police stations and released only after the title documents were signed. The MRF plant is scheduled to start operations in April-May, 2011. According to insider information, Green House Promoters sold the land to MRF for Rs. 15-18 lakh per acre. District Collector Anil Meshram and then Superintendent of Police Prem Anand Sinha were the people facilitating Raja's dream to transform dry Perambalur. After Raja was raided by the CBI, around 160 villagers, including 80 Dalits, came forward to petition the National Human Rights Commission about the land grab. Thanks to his proximity with the K-family, Raja influenced the state government to announce a Ring Road at a cost of Rs. 25 crore and announced an SEZ at an investment of Rs. 5,000 crore. Green House Promoters acquired land nearby and is running a project on 50 acres. All the directors of these real estate firms, whose total assets run into Rs 3,000 crore, hail from Perambalur. These firms were set up just after Raja became a Union minister of state for environment and forests in May 2004. A Kamaraj, associate editor of Nakeeran, is a sleeping partner in many of the companies and his wife was running the Chennai operations of Vaishnavi Com - mu nications. Their books are professionally managed. The bank accounts in State Bank of India branch at Thiru - vanaikoil indicate huge transactions in the name of Raja's elder brother A Ramachandran, and his sister Saroja. Investigators are exploring whether officers in the chief minister's office were involved, but their focus is not on the K-family, only on Raja & Co. But the involvement of Raja's family in these businesses doesn't need any proving. His wife Parameshwari joined the board of directors of Green House and Equaas Estates Pvt Ltd in 2007 and resigned in 2008. While she was on board, the minister's official residence was listed as her business address. His niece R Malarvizhi is a director in both firms. The company has 12 projects in posh areas of Chennai and another seven in Trichy. After resigning, Parameswari transferred her shares to Malarvizhi. IN FACT, both Green House and Equaas Estates were floated by Raja's close relatives soon after he became a minister. His nephew Paramesh Kumar was joint managing director. His brother A Kaliaperumal and his nephew R Ramganesh are directors. Within a year, the company showed a turnover of Rs. 755 crore. Then there is Kovai Shelters and Promoters, Chennai. Its managing director Dr Krishnamoorthy is a close associate of Raja dating back to the time when Raja was a lawyer and had an office in Krishnamoorthy's building in Perambalur. Dr R Sridhar, Raja's nephew and a deputy director in the Ministry of Environment and Forests, holds 15 per cent shares of the company. Raja's niece R Anandabhuvaneswari holds another 15 percent stake, as does another niece R Santhanalakshmi. Similarly, AGM Investment and Finance Pvt Ltd, Coimbatore, was promoted by Dr Krishnamoorthy and his brother C Sathyanarayanan soon after Raja became a Union minister. If these companies were flush with cash, Raja's charitable moves also paid off. He donated land for a governmental project via a trust he floated in the name of his late mother. Velur Andimuthu Chinnapillai Charitable Trust, headed by his brother Kaliaperumal, was set up in 2001. Raja and his close relatives offered to donate land for setting up educational institutions in Othium village. The trust donated 30.28 acres where the government has announced a medical college, 8.51 acres for an arts and science college at Karumbalur village and 4.5 acres for a technical school, all these institutions to be named after his father or mother. Green House purchased large tracts of farmland nearby for a price of Rs. 35,000 to 3 lakh per acre. After announcing the projects, the land value of the area shot up to Rs. 50 lakh per acre. By that time, Green House Promoters had announced housing projects and commercial complexes in the area. Thus a huge profit was made on what looked like philanthropy. Raja has three brothers and four sisters. He is the youngest of them all but has feathered not only all their nests, but that of their myriad children as well. The nation is the poorer for this. As these facts tumble into the public domain, will Karunanidhi drop Raja? It is a tricky situation as it was the DMK supremo who bargained hard with the Congress to get him a seat in Nilgiris when Perumbalur, Raja's home constituency, was listed as a general seat. Even if members of the K-family like Stalin, Azhagiri and Maran put pressure on the veteran leader to expel Raja, ostensibly to save the party image, Karunanidhi might hold back due to fears that Raja can play Brutus. And since his business deals involved Rajathiammal and Kanimozhi, Raja could implicate them by revealing too much during interrogation. Such a stab in the back from Raja would hurt the family. Not just that, there would be political repercussions if the DMK first family leaves Raja to his own devices. For the impact on the Dalit vote of such a drastic move could damage the party's prospects as Tamil Nadu heads for polls. SO, WHODUNNIT? The byzantine rumour bazaar of power-crazed Delhi is rife with wild conspiracy theories about who leaked the Radia tapes and for what purpose. Here go some of the most imaginative ones: THEORY #1 Finance Minister Pranab Mukherjee had the tapes leaked to kill two birds with one stone: upstage Home Minister P Chidambaram and teach 10, Janpath, a not-so gentle lesson about nuisance value. Rumour has it that there is a bitter rivalry between the UPA's two most powerful ministers. The finance minister is whispered to be close to Mukesh Ambani; the home minister apparently prefers younger brother Anil. Both would like the PM's post. There is already talk of Defence Minister AK Antony being the regent. It did not help that Rahul Gandhi mentioned Antony at a meeting with youth leaders in Ahmedabad as the most honest politician and not Mukherjee. It did help that both the Enforcement Directorate and Income Tax departments come under the finance ministry. THEORY #2 Chidambaram had the tapes leaked for exactly the same reasons. Show the finance minister — and his camp — in bad light. Send a signal to 10, Janpath. Shake up power equations. Particularly creative theorists say the plot was to fell the government and cobble a Third Front with Chidambaram in the PM's chair. The home minister is certainly capable of such precisions. THEORY #3 Anil Ambani's able man Tony Jesudasan leaked the tapes. Some say the intention was not just to fix Big Brother but his uber-able lobbyist Niira Radia: the rivalries of the second rung. Other rumours have it that Ambani Jr needed a smokescreen to hide his own wrongdoing and sliding fortunes. He is in big money trouble and needs a bailout. It would help to have Chidambaram as PM. THEORY #4 Former telecom minister Dayanidhi Maran leaked the tapes. Classic revenge tale: he lost the telecom ministry to A Raja, outmanoeuvered by Radia, her corporate clients and the powerful Kanimozhi faction in the DMK. Besides, he was piqued that Raja refused to share the spoils of the spectrum money with the K-family. In one stroke, the leak educated them all: Radia, Raja, Kanimozhi, Karunanidhi and the Congress. With Raja disgraced, Maran is now back in the family bosom, attending all public functions and meeting the K-family regularly. He has even buried the hatchet with Azhagiri and Stalin, brokered by Selvi, Karunanidhi's daughter. It's also being rumoured that restored trust always comes at a price. THEORY #5 Airtel honcho Sunil Mittal had the tapes leaked. Maran was his man; Raja was hostile to him. The latter's policy opened up the market, brought in too many players and pooped his party. Raja may have scammed the country, but Mittal stood to lose a lot of money and business and his cosy spot in the sun. The end of Raja and all those who supped with him must seem a sweet dessert. Tehelka
  17. 2G Spectrum Scam-Easy To Understand In Pictures and Infographs
  18. This may be the cheapest product available online..... USB MicroSD Card Reader at Rs 27 (Plus Shipping Rs 22) Buying Link http://shopping.indi...208/pid/4022185
  19. If this revision applies to Mobile Office 98-2 GB pack, then cost for browsing and using 2 GB Data Will be Rs 30,000 Be Safe Than Sorry. Get an E Mail Confirmation. (BTW Airtel CC had no idea about this revision as usual when i called)
  20. Google Unveils New Smartphone, Nexus S

    Android in space! Google send Nexus-S 60,000 ft above Earth - and it still works It's official - there are little green men in space. Disappointingly the aliens are not from another planet but were launched from Earth by Google to test the outer limits of their new Nexus S phone. The tiny Android astronauts were strapped to seven payloads, which each contained one of the new mobiles. They were carried into Earth's outer atmosphere using weather balloons. The Android alien overlooking Earth at more than 100,000ft. The Nexus S it was strapped to was still functioning at 60,000ft Zi Wang from Google Android said: 'We wanted an opportunity to collect some interesting data about the sensors in Nexus S - GPS, gyroscope, accelerometer, and magnetometer.' The phones were running a variety of apps. Google Maps for Mobile 5.0 (with offline map data) which allowed the team what was directly below the balloon, Google Sky Map to try and identify the real stars in the backdrop and Latitude to report location when the phones had a data connection. Amazingly the Nexus S could withstand temperatures as low as minus 50 degrees celsius, while the GPS kept track of the phone up to 60,000ft and started working again on the balloon's descent. The balloons reached heights of over 100,000ft and travelled at up to 139mph at the top of their flight. They were equipped with still and video cameras and footage published on Wednesday shows the moment when the helium-filled balloons popped and the plucky Android astronauts plummeted back to Earth. All seven high altitude balloons were launched on November 13. The average flight lasted two hours and 40 minutes with the descent taking around 34 minutes. The Android team managed to locate all the payloads by using windcharts and GPS beacons, which transmitted the latitude and longitude of the balloon every two minutes. Mr Wang added: 'By analyzing all the collected data, we were able to find some interesting trends. For instance, we determined the speed and altitude of the jet stream: about 130mph at 35,000 ft.' The Google Nexus S is the first Android 2.3 smartphone (using the Gingerbread operating system). Daily Mail
  21. MTS Launch

    MTS Launches Mobile Services in UP EAST and WEST Sistema Shyam Tele Services Limited (SSTL) the CDMA Mobile and Data service operator today announced the expansion of its national footprint. The company has launched its CDMA mobile telephony and Data services under the MTS brand in Uttar Pradesh East and UP West telecom Circles. Announcing the launch of MTS in UP East and UP West Circles, Sergey Savchenko, Chief Financial Officer, Sistema Shyam TeleServices Limited (SSTL) said, "The launch of telephony services by MTS in UP East and UP West has further expanded our national footprint. MTS would now be able to address the telecom needs of over 80% of India 's population and about 92% of the data market potential in the country. This truly represents a very exciting opportunity for MTS." According to Arvind Kumar, Chief Operating Officer, UP East and UP West Circles, "The launch of MTS services will provide mobile customers in UP East and UP West Circles access to our nationally successful ½ paisa per second tariff plan or 1 paisa per second + 25% extra value on core Talk time with every recharge. This is bound to result in huge savings for the customers. Additionally, our customers would get to experience world class telecom services backed by seamless connectivity on a congestion free network." Telecomtalk
  22. The slim and sleek QUENCH XT3 is Motorola's entry-level Android-powered device to date and is just 12.5mm thin, weighs a featherweight 114 grams, and fits naturally and easily into the palm of the hand with a comfortable soft-touch finish. Motorola Mobility India Private Limited today announced the launch of the QUENCH XT3 in India. With a winning combination of power, usability and style, the QUENCH XT3 is designed to bring to you the power of Android1 2.1 and an easy and fun touch screen mobile Internet experience at an attractive price. "We are offering innovative and exciting Android-powered devices to a larger Indian audience for whom affordability and features in a sleek form factor make the difference. With the QUENCH XT3, we are targeting those users who are interested in smartphones but haven't yet made the leap to invest in one," said Faisal Siddiqui, country head of India, Motorola Mobility. "The value for money Motorola QUENCH XT3 is elegant and intuitive with a high style quotient. For the Indian consumers, we have a special festive offer---with the purchase of every Motorola QUENCH XT3, you get an adidas jacket and 2 pairs of movie tickets absolutely free4!" The slim and sleek QUENCH XT3 is Motorola's entry-level Android-powered device to date and is just 12.5mm thin, weighs a featherweight 114 grams, and fits naturally and easily into the palm of the hand with a comfortable soft-touch finish. The user can navigate the phone with either the bright, high-resolution 8.1cm (3.2inch) capacitive touch screen, or with just one hand using a convenient trackball that keeps the screen finger-free for easy viewing. Pinch-and-zoom features, 3.5G1 speed and WiFi1 connectivity help the user surf the web1 effortlessly and ensure that you're always connected with friends and colleagues1. A 3 megapixel camera with digital zoom and LED flash ensures great pictures and videos that can easily be uploaded to favourite social networking sites1&2. The Motorola QUENCH XT3 supports the Android platform, a vast range of GoogleTM services1, and access to more than 100,000 applications and widgets on Android MarketTM1. An expanded search function helps the user to keep track of all data on the phone, such as bookmarks, browsing history, contacts and more. It even helps find data in applications, a useful feature in a phone with support for up to 32GB of storage and space for thousands of songs and dozens of hours of video2. Motorola's winning design gives the QUENCH XT3 a premium feel at a price that's right for everyone. There's never been a better time to make the leap to a sleek, trendy, full-featured, Android-powered smartphone. Key Features Include: A 3 megapixel camera with digital zoom and LED flash Android1 2.1 platform 8.1cm (3.2inch) HVGA screen, 320 x 480 Capacitive pinch and zoom display Extras1 such as 3.5G1 and Wi-Fi access, aGPS and stereo Bluetooth make QUENCH XT3 a solid Android-powered device. Supports varied music formats---MP3, MIDI, OGG VORBIS, PCM/WAV, AAC LC/LTP, AAC+, Enhanced AAC+ Accelerometer Full HTML browser with Webkit for PC-like browsing Video: Capture / Playback / Streaming, H.263, H.264, Mpeg-4 MP3 Player Preloaded Social Networking Sites (e.g. Myspace / Facebook) Premium, pocketable design, 12.5 mm thin Expanded search function makes it easier to find information online or within the device to keep track of all data on the phone, such as bookmarks, browsing history, contacts and more, serve up Google web search results based on location1, or launch applications. It comes powered with a 600 MHz processor. The Trackball allows browsing through menus and web pages without obstructing the screen. Android Market1 has more than 100,000 applications and widgets, and there are opportunities for limitless customizations and enhancements to QUENCH XT3. Size: 116 x 56.8 x 12.5mm Internal Memory : 512 MB flash, 256MB RAM Expandable up to 32GB 3.5mm (0.35cm) headset jack Availability The Android2.1-powered QUENCH XT3 is available in India at an attractive Best Buy price of Rs 12,990 (MRP: Rs 14,990). With every Motorola QUENCHXT3, get an adidas jacket4 and 2 pairs of movie tickets absolutely free!
  23. Sprint Samsung Epic 4G - The Beast Is Here!

    Sorry for conveying the bad news but EPIC Froyo update is not happenning..... http://www.phonedog....26th-after-all/
  24. Weirdest Mobile Phones Ever

    ^^^ Stunning!! The Power of Communication and Creativity!!
  25. If you are in employment, it's worthwhile to know whether you are remunerated correctly? And More important to know Hot Jobs, Sectors and Salary Range for further career planning. Here is an authentic Source for Such Information and hope should be useful to many. Kelly Services which is among world's top staffing firm has released India Specific Employment Outlook and Salary Guide For 2010/11. Gives details of Hot Jobs in key sectors of Banking & Finance, Call Center & BPO, Engineering, Human Resource, Information Technology, KPO Analytics, Procurement Supply Chain and Logistics, Real Estate, Sales and Marketing. Job Titles, Qualification, Experience, Job Description and Minimum-Maximum Salary Levels for all Hot Jobs in these sectors are given. Download India Employment Outlook and Salary Guide For 2010/11 Employment Outlook and Salary Guide 2010-11.pdf
×