Tuesday, October 28, 2014

BJP govt shifting goal post to save face on black money foreign bank account holders-AAP

BJP govt shifting goal post to save face on black money foreign bank account holders
In its latest turnaround, the BJP-led central government has now indicated that might
disclose a limited number of names, cherry picked from the list of foreign bank account holders possessed by the government through formal/informal sources. This is clearly an exercise to save its face.

The central government’s move raises the following key questions:

  1. Why only these 136 names ?

People of the country believe that the previous Congress-led UPA government had things to hide and blocked the disclosure of names. Now, with BJP government’s similar reluctance in sharing the names gives rise to a reasonable apprehension about its real intentions.
By cherry-picking a set of names and concealing others, it has further confirmed the belief that the BJP is hell-bent on saving some of the influential people appearing in those lists.
The truth is - there is no law in India or treaty with any country that stops the Indian government from taking action against the possessors of illicit money.

  1. BJP playing politics on the issue ?

Two recent developments have confirmed that the BJP wants to play politics over the issue of black money, rather than solving it. First, is the central government’s turnaround on the non-disclosure of some names and second is the cherry-picking of names to score political points.
The Aam Aadmi Party is of the clear view that anyone who possesses illicit money, irrespective of his/her affiliation with any political party, must be brought to book. Politics should not be played, rather the promise made by Mr Rajnath Singh of bringing back every penny of black money sitting abroad within 150 days of coming to power, and that of Mr Modi of attributing such money to every citizen to the tune of Rs.15-20 Lakh per person, should be worked towards.

  1. Double Tax Avoidance Treaty is not the issue-A matter already settled by the Supreme Court :

The Supreme Court in its judgement on 4th July 2011 after perusing the double Tax Avoidance Agreement between India and Germany emphatically conveyed that there provision or hindrance in the agreement that limits the disclosure of information. The SC also pointed, such a plea is untenable as no agreement can limit infringe upon the principles laid down in our constitution.

Extract of para 58 of the judgement: “The above clause in the relevant agreement with Germany would indicate that, contrary to the assertions of Union of India, there is no absolute bar of secrecy. Comity of nations cannot be predicated upon clauses of secrecy that could hinder constitutional proceedings such as these, or criminal proceedings”.

4.      Intentional disregard  of United Nations Convention Against Corruption (UNCAC)

India, Germany and Switzerland – all are signatories to the  UNCAC  which emphatically empowers the two countries on following counts:
·         UN Convention Against Corruption gives full sanction to make simple changes in the laws of our country to tackle black money menace permanently
·         UN Convention Against Corruption overrides ‘bank secrecy laws’
·         UN Convention Against Corruption empowers to freeze, seize and confiscate illicit money
·         UN Convention Against Corruption on Mutual Assistance by different tax jurisdictions
It is indeed surprising to see that the BJP government is disregarding the UNCAC, rather than using it to its benefit and prosecute those who possess illicit money.

Regards,
Team AAP
______________________________________________

-----------------------------------------------------------------------------

Sunday, July 14, 2013

NETWORK WORLD COMMUNITIES

Top open source network management tools

As networking continues to expand and diversify, encompassing a growing number of wired and wireless devices, the demand for network monitoring tools remains high. While feature-packed commercial products abound, the growing market for monitoring tools has also fueled robust offerings from the open source community.
READ MORE
 

Issue highlights

RESOURCE COMPLIMENTS OF: AT&T

Data Storage Stress?

AT&T shows you four easy ways to get relief here. Click to continue

The year in 3D printing (so far)

With the Inside 3D Printing conference kicking off this week, what better time than now to recap what has been the most eventful year for 3D printing technology so far. This READ MORE

iPad 5 rumor rollup for the week ending July 11

With real information about iPad 5 and iPad mini 2 almost non-existent, the iOSsphere seized on the dregs, most of them provided by anonymous Asian supply chain sources. READ MORE

10 Hot Security Startups to Watch

Tablets and smartphones, which employees are bringing into work in “Bring Your Own Device” (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It’s all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it’s not just mobile spurring the creation of young security firms out to change the world. READ MORE
RESOURCE COMPLIMENTS OF: Cisco

Cisco Nexus 1000V delivers data center consistency to cloud

Knowing is half the battle. And there are many technical challenges for virtualized network environments on the way to cloud-readiness. Gary Kinghorn, Senior Solution Marketing Manager at Cisco, and Bob Laliberte, Senior Analyst at the Enterprise Strategy Group (ESG), discuss these obstacles in this informative webinar. Learn how Cisco Nexus 1000V helps

The ban on feds at Defcon draws a mixed reaction

Call for U.S. government workers to avoid security conference rankles some cyber warriors, gets cheers from others READ MORE

Military robots conquer air, land without humans

The U.S. Navy's X-47B drone made an autonomous landing on an aircraft carrier and Boston Dynamics' Atlas builds on its predecessors. Follow reporter Nick Barber on Twitter @nickjb READ MORE

Cryptocat vulnerability excuse sparks debate over open source

Is proprietary software inherently more secure? Or is it the other way around. Security experts weigh in. READ MORE
WHITE PAPER: Cisco Systems

Data Center Dinosaur: Adapt or Die

Nearly everything in data centers is changing, from cabling and network design, to more sophisticated, faster compact builds. Network security has to adapt, and IT must drive new security approaches--installing technologies and policies that can protect today’s and tomorrow’s data centers. Read more >>

Confidence in U.S. as dominant innovator rises

A global survey of 811 technology business leaders by KPMG gives the U.S. an edge in what may be a mercurial index that rises and falls with the overall economy. READ MORE

Microsoft's latest Patch Tuesday vulnerabilities already being exploited

Normally companies should proceed at their own pace when deploying Microsoft's monthly updates, known as Patch Tuesday, since they come out on the second Tuesday of every month. This month's batch, though, is pretty hefty in terms of impact and volume, so you may want to make them a priority. This month’s Patch Tuesday consists of seven bulletins addressing a total of 34 vulnerabilities, and half... READ MORE

Dropbox, WordPress used in cyberespionage campaign

The attackers did not exploit any vulnerabilities, but they opened up accounts and used the services as their infrastructure READ MORE

No doubt about it, Chromebooks are here to stay

Low-cost Chromebooks are doing very well with retailers, in stores and online, and now make up a significant share of the low end market, said market research firm NPD Group. READ MORE

Microsoft: Purges, personalities, ‘pursuing other opportunities’

At Microsoft periodic reshufflings of the players and the executive hierarchy are a way of life. READ MORE
WEBCAST: IBM

Leveraging SaaS to Drive Innovation and Results

Learn how sales, finance, marketing, procurement, and supply chain leaders are leveraging SaaS to become more agile and serve the customer better. Learn More.
SLIDESHOWS
Names you'll want to know in the free software/open-source world.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
MOST-READ STORIES

Friday, June 21, 2013

CPI(M) extends its deep condolences to Victims of Uttarakhand Tragedy


The horror and immense tragedy of the loss of human lives and unprecedented destruction of homes and livelihoods in the Kedarnath, Chamoli and other regions of Uttarakhand is still unfolding. The numbers of those killed is rising every day. The urgency of immediate rescue and evacuation operations for the thousands who are stranded cannot be emphasized enough. The Central Government must extend its full support to the State Government including for funds and materials.

It is essential for the State Government to harness the energy of all political parties and citizens organisations to devote their entire united energy into providing relief and succour to those affected. It must also enquire into the role that the indiscriminate tunneling of the hills by power projects and the huge dumps of silt which were never cleared, had to play in this terrible tragedy.

The Polit Bureau of the CPI(M) extends its deep condolences to the families of those who have lost their lives. It expresses its sympathy and solidarity to the lakhs of people affected. It calls upon its units all over the country to collect funds and materials urgently for relief to those affected.