Wednesday, August 31, 2011

Review: Why HP EliteBook 8560p Ranks Among The Best

Hewlett-Packard is billing the EliteBook 8560p as among its most robust notebooks ever, and the Palo Alto, Calif.-based computer maker isn’t kidding.
Built with an Intel Corei7-2620m at 2.70 GHz, 4 GB of RAM and running Microsoft  Windows 7 Professional 64-bit, this notebook is one of the best-performing PCs of any class we’ve ever reviewed -- notebook or desktop.
List-priced at $1,499, HP has pushed the envelope on price-performance with the EliteBook 8560p. It is clear that it has been built for serious work, and here is a short list of what we love about this notebook:
  • • Running Primate Labs’ Geekbench 2.1 benchmarking software, the EliteBook 8560p scored 7052, making it one of the few notebooks we’ve reviewed that has topped 7000 mark;

  • • Using the CRN Test Center standard battery life test, which is to disable power-saving utilities and run a video from the hard drive continuously until it stops, the EliteBook 8560p ran for almost six hours until the battery ran out. Given the hardware performance, that’s a big deal;

  • • The traditional, high-end HP engineering can be seen and felt throughout the product. The fit and finish is elegant, from its shiny, gray aluminum casing to the nifty keyboard light on top of the display;

  • • The on-board, 720p HD webcam is one of the better we’ve seen in any notebook, providing clear and crisp video when tested using Skype video conferencing;

  • • The dual-array microphones provide clear, crisp quality that make this notebook just great for communication;

  • • It’s loaded for media types, with four, USB 2.0 slots, a USB 3.0 slot, HDMI support, Ethernet and VGA support;

  • • The onboard fingerprint scanner and full number pad are placed comfortably on the far right of the full keyboard;

  • • The 15.6-inch display feels larger than it is, providing comfortable real estate for multi-tasking.


But a PC is not just a list of specifications or performance metrics. It’s a device that’s either great for work or less than great. The EliteBook 8560p is a device that’s great for work.
Because of all the features (in addition to those above, it also supports SD and Micro SD media), there are no performance compromises. While it weighs in at 6 pounds, 7 ounces and is not appropriate for whipping out at a Starbucks or on a plane, it is fine for transit between work and home.
The performance isn’t just fine for video playback and editing. It allowed us to breeze through a 41-MB Access Database for numbers crunching while sitting on a Skype video conference and running e-mail, TweetDeck, and multiple instant messaging applications -- all with no noticeable latency.
It’s a workhorse.
The EliteBook 8560p is built with Intel’s vPro technology and a 500-GB, on-board hard drive that supports both enterprise workloads and requirements as well as management and security needs like encryption.
The $1,499 list price makes it highly competitive and, for a Windows environment, out and out seductive. It’s one of the best notebooks we’ve seen this year and we highly recommend it for both SMB and enterprise deployments.

Saturday, August 27, 2011

Five Disaster Recovery Products You Should Know


With Hurricane Irene bearing down on the Eastern Seaboard, IT solution providers are on high alert, ready to get their customers back up and running when disaster strikes.
Some of the products they'll be using as part of their disaster recovery efforts are ones profiled by CRN in the past six months. Here are five products every IT solution provider should know about to help prepare their customers for the inevitable next disaster.
Pancetera's Disaster Recovery Software -- SmartMotion
SmartMotion is a virtual appliance that replicates virtual machines directly to any physical or cloud-based NAS target in one step, saving time for IT solution providers. Customers can save money, too, because Pancetera's solution works with their existing data protection software to keep acquisition costs low. Backup data from physical and virtual machines can be sent to any target NAS device, whether an onsite physical appliance or a virtual appliance in the cloud. As part of a disaster recovery solution, SmartMotion can create hot stand-by virtual servers either on local servers or in the cloud.
Wave2Wave's Data Center-In-A-Box
Packing a small data center into a storage container is a great strategy for IT solution providers to increase customers' capacity quickly -- and it's also an ideal way to get up and running fast after a natural disaster strikes. These portable containerized data centerscomprise servers, storage, networking, power, and cooling equipment pre-configured in standard 20-foot or 40-foot shipping containers that can be transported to locations where computing power is needed but local data centers are offline. Well known vendors, including Cisco , Hewlett-Packard, SGI, IBM , Dell , Liebert,Oracle -Sun, and Bull offer this type of solution. A lesser-known vendor, Wave2Wave, has introduced three data center-in-a-box solutions that can be used for disaster recovery. One of the Wave2Wave models can withstand a crush force of up to 70,000 pounds, or a .30-cal bullet.
Symantec 's BackupExec
Face it: Many IT solution providers' small (and maybe midsize) customers don't backup their data because it's too difficult, time consuming, etc. Backup Exec is now integrated with Symantec's storage cloud, so small businesses or remote offices can lose the excuses and more easily back up Windows-based desktops and servers over a secure SSL connection to the cloud. Critical files can be restored to any service-enabled machine after a disaster. After years of being one of the go-to solutions for data protection, Backup Exec is now available in off-premises and appliance versions, to cater to the different preferences of customers. In the end, the IT solution provider's job is to recommend products that make their customers' lives easier. If data backup is perceived as too cumbersome, it just won't get done.
Disaster recovery in the cloud offers IT solution providers more options to restore data fast and effectively compared with a traditional disaster recovery model. Aside from the technological benefits, there are cost savings too: Because cloud solutions can have predictable monthly costs, resources can be reserved in the event of an emergency. That rainy day fund can then be used during the crisis in ways that help the business function and continue to generate revenue.
ioSafe's Shock Proof Drives
For customers short on cash but long on the desire to protect data, these drives are worth their weight in gold. Given gold's prices these days, that's saying quite a bit. ioSafe guarantees the drives will survive three-day submersion in salt water, have crush resistance of up to 5,000 pounds and withstand continuous pounding of blowing sand and dust, icing and exposure to UV rays.Our Test Center loved them, too.
The drives start at $150 for a 250 GB drive and $230 for 1 TB, and the company will repair or replace a failed drive -- regardless of reason -- and recover the data free of charge. A perfect, cost effective solution for the small customer that can't invest much in disaster recovery, but can't afford not to.
VMware's vCenter Site Recovery Manager 5
In SRM 5, VMware brings the cost of storage, replication and site recovery management down to the $500 per virtual machine (VM) range by enabling the use of low-end storage on the failover side and enabling the use of different storage arrays on both sides. Typically, a comparable solution costs roughly $1,500 per VM. The product handles storage replication at the VM level using VMware vCenter Server. In addition, SRM 5 does not use synchronous replication, but will instead update every 15 minutes.
Aimed at small business, VMware is conscious of making the product budget friendly. According to the vendor, SRM 5 costs three times less than what it would cost to provide disaster recovery on a per VM basis.

Five Must-Have Computer Peripherals



Taking Stock Of Computer Peripherals

With the fall selling season almost upon us, it's probably a good time to take stock of the computer peripherals you're keeping in stock. Here are five must-have products that should be on the minds and lips of your sales people.





NZXT Sentry Mix: For Music Fans

It's not a graphic equalizer, but it can still deliver sweet music to the serious over-clockers on your customer list.NZXT's Sentry Mix, which began shipping Tuesday, puts control of as many as six system fans as close as the nearest 5.25-inch drive bay. Six smooth-sliding pots control airflow between 40 to 100 percent, and its sleek black rubber and plastic design is contrasted with any one of five LED colors.
With a capacity of 50 watts per three-pin channel, the Sentry Mix can handle the down-and-dirtiest half-dozen blowers a hardcore gamer can throw at it. For example, if used it to control the 1.9-watt fans included with the brand new Tempest 410 Elite, each channel could handle as many as 25. That's some serious blowing. Sentry Mix lists for $40.




D-Link PowerLine: Ethernet Over Power

You've heard of Power Over Ethernet, but Ethernet over power? The technology's not really new, but it took a real leap of faith to plug our Ethernet cable into something that ultimately would use a electric lines to carry data. But that we did, and D-Link's PowerLine AV Wireless N Extenderdelivered an experience that was only shocking in a good way. The device lived up to the company's claims of "lag-free gaming" as it pumped packets at 200Mbps and streamed an HD video as if it were plugged in directly, which it was.
Don't let those WiFi-looking antennae fool you; this is not a WiFi access point in the traditional sense. This device works with D-Link's Wireless N PowerLine Router so that when plugged into an outlet, it routes Ethernet traffic of computers in the area over the power lines to the router. It's ideal for homes and small offices that lack wiring or the ability to easily add it. The PowerLine AV Wireless N Extender lists for $99 and requires at least one other PowerLine device (such as the Wireless N PowerLine Router, $119 list) to create a PowerLine network.

Viewsonic V3D245: Enable Your Pop-up Monitor

Now that video resolution has reached a crescendo, the next big thing in display technology will clearly be 3D. Among the most recent releases is the V3D245 from Viewsonic, which the company began shipping on Aug. 1. This handsome 24-incher boasts an LED backlight that pushes 300 nits of eye-popping 1920 x 1080 pixels at a refresh rate topping out at 120Hz.
The V3D245 is equipped with dual link DVI and VGA ports (and includes both cables) as well as an HDMI input. Also included is a 3.5-inch audio jack for powering its SRS stereo speakers. For a list price of $599, Viewsonic throws in a pair of Nvidia-branded active shutter glasses, which includes a USB charging cable, interchangeable nose pieces and a storage pouch. Although we like USB charging over (yet another) dedicated power adapter, a USB port on the monitor itself would have been a nice touch, even if only for charging the glasses.


NComputing L300: Your Own Private VDI

Now you can send a Linux or Windows desktop anywhere there's an Ethernet connection. NComputing's L300 Virtual Desktop and vSpace software instantly transform a computer into a mini-VDI system, with full-screen access to applications, full-motion 24-bit HD video, microphone input, speaker output, USB 2.0 redirection and 100 Mbps Ethermet. The software also integrates with hypervisors from Citrix, Microsoft or VMware, and can multiply the typical one-to-one desktop-to-user ratio by as much as 30 times.
The 4.5 x 4.5 x 1.2-inch device is built around a dual-core ARM-based processor (in the proprietary Numo system-on-chip) and contains no far or other moving parts. L300 Virtual Desktop lists for $189 and includes vSpace, a power adapter and a VESA bracket for connecting it to the back of most monitors.


Samsung ML-3712DW: Laser, Not Razor

For a street price of around $249, the Samsung ML-3712DW is one low-priced 37ppm laser printer. And it's as small and feature-rich as it is reasonably priced. Measuring just 10 inches high and sitting on a 14.5-inch square, the DW model includes duplex printing, WiFi access (as well as Gbit Ethernet) and resolution as high as 1200 x 1200 dpi.
And boy is this thing fast. Its 600 MHz dual-core processor kicked out the first page in less than 7 seconds, and had exhausted its 250-page bin in less than eight minutes. Unlike with cheap razors and expensive blades, Samsung helps save on toner costs with an "eco" button and offers a 10,000-sheet toner cart for about $120, or about $0.012 per page. The 2,000-page cart costs about $56, which translates to $0.028 per page.




'Apache Killer' Tool Exploits DoS Flaw

Apache is scrambling to address an attack tool released in the wild exploiting a serious HTTPD Web Server vulnerability that enables attackers to launch denial of service (DoS) attacks remotely.
The denial of service attack tool, dubbed “Apache Killer,” affects Apache 1.3 and all versions of Apache 2 by exploiting a flaw in the way Apache handles simultaneous HTTPD-based range requests, according to the open-source Apache Software Foundation.
Specifically, a request for triggering memory consumption includes what’s known as a “range header,” which requests as many bytes as possible from an httpd file.
However, an exploit can occur when attackers send specially crafted HTTP requests that incorporate malformed range HTTP headers. The flaw would cause each of the bytes requested in the range header to be compressed separately, subsequently consuming vast quantities memory that would effectively cause the system to shut down.
“The behavior when compressing the streams is devastating and can end up in rendering the underlying operating system unusuable when the requests are sent parallely,” according to Apache’s Bugzilla forum. “Symptoms are swapping to disk and killing of processes including but solely httpd processes.”
The range header vulnerability enables attackers to execute DoS attacks remotely and is currently being exploited in the wild, warned developers in an Apache advisory Wednesday.
“The attack can be done remotely and with a modest number of requests leads to very significant memory and CPU usage,” the advisory said.
Thus far there is no patch addressing the flaw, although Apache said that a fix could be expected in the next few days.
Until a patch is released, Apache recommended an array of mitigations that include limiting the size of the request field to a few hundred bytes, and limiting the number of ranges.
“Apache HTTPD users are advised to investigate whether they are vulnerable (e.g. allow range headers and use mod-deflate) and consider implementing any of the above mitigations,” Apache said in its advisory.
The range header DoS vulnerability was first detected in 2007 by security researcher Michal Zalewski, who maintained that the flaw affected both Apache and Microsoft ’s IIS Web servers.
“Combined with the functionality of window scaling (as per RFC 1323), it is my impression that a lone, short request can be used to trick the server into firing gigabytes of bogus data into the void, regardless of the server file size, connection count, or keep-alive request number limits implemented by the administrator,” said Zalewski in the blog. “Whoops?”
Zalewski noted in the BugTraq forum that “there are easier tools to (D)DoS a service,” while “nothing about this attack is particularly innovative,” which perhaps prevented the exploit from making it farther up Apache’s list of priorities.

Facebook Revamps Privacy Settings, Overhauls 'Tagging' Feature

No stranger to privacy updates, Facebook has once again revamped its privacy settings, this time with the intention of giving users more control over who can and can’t view their content.
Some of the biggest privacy changes the social networking giant is rolling out include beefed up geo-location settings, revamped tagging features and inline profile controls.
Specifically, Facebook said that the newly enhanced location settings allow users to slap a location tag to just about anything from status updates to Wall posts, from just about anywhere, regardless of device.
As before, the geo-location information will stream right into Facebook’s News Feed, like any other status update or post.
Meanwhile, Facebook added that it is simultaneously phasing out the mobile-only Places feature, which previously only allowed users carrying a smart phone to announce their location by “checking-in” at various businesses they frequented.
The updated location features will be gradually rolled out over the next few weeks starting Thursday, but will be turned off by default. Users, however, can opt-in to activate the location feature in order to broadcast their whereabouts from moment to moment.
Facebook also unveiled a new profile tag review, which gives users the option of approving or rejecting tagged photos before automatically appearing on their profile.Search Amazon.com for facebookSearch Amazon.com for facebook
“Your profile should feel like your home on the web - you should never feel like stuff appears there that you don't want, and you should never wonder who sees what's there,” said Chris Cox, Facebook vice president of products, in a blog post Tuesday. “The profile is getting some new tools that give you clearer, more consistent controls over how photos and posts get added to it, and who can see everything that lives there.
Previously, photos would automatically show up on the user’s profile as soon they were tagged. “One of the top requests we’ve heard is for the ability to approve the tags before they show upon your profile,” Cox added.
Similarly, the revamped privacy settings include a content tag review, which also gives users the option of approving or rejecting a tag that another user attempts to add to their photos and posts after they’re published.
Conversely, the tweaks give users the ability to more effectively remove tags or content from Facebook, with the options of removing them from the profile entirely, removing the tag itself, messaging the photo owner or tagger, and request that the content get taken down.
Meanwhile, Graham Cluley, Sophos senior technology consultant, contended that Facebook’s overhauled tagging feature fell short of preventing an unwanted photo from being published or really addressing privacy issues related to tagging.
“It’s our belief that many Facebook users would like the ability to block anyone from tagging them in photographs without their express permission, rather than simply blocking the photo from appearing on their profile,” Cluley said in a blog post. “Instead, you’ll probably find yourself continuing to request that people untag you from photographs, and kindly learn not to do it anymore in future.”
In addition, Facebook introduced in-line profile controls, which position content on a users profile next to an icon and a drop-down menu that lets users know who can see that particular part of their Facebook page.
Facebook says the in-line privacy controls provide a simpler, more streamlined Settings page that moves privacy setting options directly inline.
Finally, Facebook also added one small, clarifying tweak that changed the privacy setting labeled “everyone,” which allows the entire Internet to access profile content and images, to be deemed as “public.”

Android Malware Tops Charts In Q2: Report

Malware targeting the Android mobile operating system outpaced all others during the second quarter of 2011, representing a sharp upward spike that positions Google’s platform as a prime target for anticipated mobile attacks down the road, according to a McAfee threat report.
These and other findings were revealed in McAfee Threats Report: Second Quarter 2011, released Tuesday.
Android malware comprised about 60 percent of the total 1,200 mobile malware samples collected by McAfee researchers during the second quarter, representing a 76 percent from Q1, according to the report. During the second quarter, malware targeting the Android platform rose from third to first place, surpassing second place Java Micro Edition (ME) by a factor of three, and malwarewritten for the Symbian platform, which came in third.
”This increase in threats to such a popular platform should make us evaluate our behavior on mobile devices and the security industry’s preparedness to combat this growth,” wrote McAfee researchers in the report.

Toralv Dirro, security strategist for McAfee Labs, said that the total number "was not as impressive at the moment compared to what we are seeing on the PC side," although the rapid growth was still significant.
Researchers at McAfee said that the current crop of for-profit Android threats emulates similar PC threats, which take advantage of exploits, employ botnets and use rootkit features to avoid detection and hide their tracks when they compromise a legitimate app or game.
“The quality of the malware has changed compared to recent years,” Dirro said. “We also see the same kind of Trojans that we see on the PC emerging on mobile platforms, that are able to steal information. Trojans that give the attacker complete control over the device itself.”


The large majority of the most popular detected Trojanized apps during the second quarter infected users by sending SMS, or text, messages to premium services. “It’s an easy way for criminals to make money,” Dirro added.
Some of the most popular Android malware included the Android/Smsmecap.A, a modified version of a legitimate comedy app which first appeared on May 21, the date of an alleged “Rapture,” and was designed to send humorous and anti-ChristianSMS messages to all the contacts stored on the user’s mobile device.



Also high on the list was the Android/Jmsonez.A, a version of an infected calendar app that displays the calendar for January 2011. Malware is triggered that sends SMS messages to a premium rate number if the user attempts to change the month to another date.
Meanwhile, Dirro said that while Android comprised the majority of malware, it was “certainly not the only attacked platform. We’ve also seen malware for other operating systems as well.”
One prolific example included two pieces of crimeware known as SymbOS/Zitmo.C for the Symbian platform as well as a correlating BlackBerry/Zitmo.D, both of which are simple SMS forwarders that compromise a user’s mobile device.
“More and more people are using smartphones or iPads for Web surfing and online shopping,” Dirro said. “With those devices being used more in business expect that this trend of mobile malware and more attacks against mobile devices to continue.”
Other findings from the report include the rise of hacktivism, propelled by global collectives such as Anonymous and LulzSec and an increase in fake antivirus for the Mac OS X.
Meanwhile, other threats are trending downward, such as spam, which continues to be at an all-time low, in part because of the take-downs of high profile spam botnets Bredolab at the end of 2010 and Rustock, decapitated earlier in 2011.

Skype Cross-Site Scripting Flaw Enables Phone Session Attacks

A gaping cross-site scripting flaw in the latest version of Skype enables attackers to inject malicious code into a user’s phone sessions.
The cross-site scripting vulnerability occurs in Skype 5.5.1.113, affecting Windows XP, Vista and 7, and stems from a persistent code injection vulnerability due to a validation input error that prevents the VoIP client from properly inspecting phone numbers sourced from users’ home, office and mobile Skype accounts, according to researcher Levent Kayan.
Attackers who exploit the flaw could potentially inject the Skype session with malicious HTML/Javascript code, Kayan said in an advisory, although, “It has not been verified though, if it’s possible to hijack cookies or to attack the underlying operating system,” he added.
During an attack, users could be exposed to malicious code via a booby-trapped profile, which hackers could create by injecting a malicious JavaScript command or Web address in the place of a phone number, Kayan told The Register .
The vulnerability could also enable an attacker to embed an infected link on a victim’s Skype client that leads to a malicious Web site.
Skype has since disputed the vulnerability.
“We have had this reported to us by various media outlets and have confirmed that the person is mistaken, this is not the Web window and while it does cause a phone number to be underlined, does nothing other than this,” wrote a Skype spokesperson in an e-mail.
However, this is not the first time that a security flaw has been found in the popular voice-over IP service, soon to be acquired byMicrosoft.
In July Kayan had revealed another Skype cross-site scripting vulnerability , which enabled attackers to change a user’s password and hijack their computer remotely. The vulnerability was mitigated slightly due to the fact that the victim user and the attacker had to be friends on Skype for an exploit to work. However, once executed, Kayan said that the attack was easily repeatable.
Meanwhile, another security researcher discovered in May that theSkype client for Apple Mac computers contained a critical zero-day vulnerability allowing attackers to execute remote code attacks and take complete control of the victim’s computer.
“The long and the short of it is that an attacker needs only to send a victim a message and they can gain remote control of the victims Mac. It is extremely wormable and dangerous,” according to Gordon Maddern in a Pure Hacking blog post.

Friday, August 26, 2011

2 Cool Security Features In Mac OS X Lion


Mac OS X Lion: Roaring Security

No doubt, when it comes to security, Apple’s new Mac OS X Lion is shedding its spots and is ready to roar. As the dust has settled on the release of Apple’s Mac OS X Lion, unveiled July 20, experts have started asking, “Yes, but is it secure?”
And thus far, the short answer appears to be ‘yes.’
The latest Mac OS (version 10.7) comes equipped with a slew of security enhancements—some major, others incremental—designed to harden the operating system, bolster security defenses and ultimately make the system more resilient to security threats.
That said, experts maintain that with Lion still in its infancy, many of the new or enhanced security mechanisms have yet to pass the test of time. But at least Apple has given its new OS a fighting chance. Here are 10 of the Mac OS X security features users can expect to find.


Full Address Space Layout Randomization

This feature, inherent in the new Mac OS X Lion, will make it a lot more challenging for cyber criminals to exploit security vulnerabilities.
Specifically, the Address Space Layout Randomization (ASLR) security feature thwarts exploits by randomizing the arrangement position of key data areas, which make it more challenging for hackers to predict target addresses and launch attacks.
While Mac OS X 10.6 Snow Leopard first introduced the ASLR feature, it was limited to libraries, and missed randomizing the stack and heap.
The ASLR feature baked into Mac OS X Lion, however, is fully implemented, covering 32 and 64-bit applications, and is expected to be a big step up from its feline predecessor.



Full text of Rahul Gandhi's speech in Parliament

Madam Speaker,

I have been deeply distressed at the developments of the last few days. Many aspects of the situation have caused me anguish.

We are all aware that corruption is pervasive. It operates at every level. The poor may carry its greatest burden but it is an affliction that every Indian is desperate to be rid off. Fighting corruption is as integral to eliminating poverty as is Mahatma Gandhi NREGA or the Land Acquisition Bill. Yet it is equally imperative to the growth and development of our nation.

Madam Speaker, we cannot wish away corruption by the mere desire to see it removed from our lives. This requires a comprehensive framework of action and a concerted political program supported by all levels of the state from the highest to the lowest. Most importantly, it requires firm political will.

Madam Speaker, in the past few years I have travelled the length and breadth of our country. I have met scores of countrymen, rich and poor, old and young, privileged and disempowered who have expressed their disillusionment to me. In the last few months, Annaji has helped the people to articulate this same sentiment. I thank him for that.

I believe that the real question before us as representatives of the people of India today is whether we are prepared to take the battle against corruption head on? It is not a matter of how the present impasse will resolve, it is a much greater battle. There are no simple solutions. To eradicate corruption demands a far deeper engagement and sustained commitment from each one of us.

Witnessing the events of the last few days it would appear that the enactment of a single Bill will usher in a corruption-free society. I have serious doubts about this belief.

An effective Lok Pal law is only one element in the legal framework to combat corruption. The Lok Pal institution alone cannot be a substitute for a comprehensive anti-corruption code. A set of effective laws is required. Laws that address the following critical issues are necessary to stand alongside the Lok Pal initiative:

(1) government funding of elections and political parties,
(2) transparency in public procurement,
(3) proper regulation of sectors that fuel corruption like land and
mining,
(4) grievance redress mechanisms in public service delivery of old
age pensions and ration cards; and
(5) continued tax reforms to end tax evasion.

We owe it to the people of this country to work together across party lines to ensure that Parliament functions at its optimum capacity and delivers these laws in a just and time bound manner.

We speak of a statutory Lok Pal but our discussions cease at the point of its accountability to the people and the risk that it might itself become corrupt. Madam Speaker, why not elevate the
debate and fortify the Lok Pal by making it a Constitutional body accountable to Parliament like the Election Commission of India? I feel the time has come for us to seriously consider this idea.

Madam Speaker, laws and institutions are not enough. A representative, inclusive and accessible democracy is central to fighting corruption.

Individuals have brought our country great gains. They have galvanized people in the cause of freedom and development. However, individual dictates, no matter how well intentioned, must not weaken the democratic process. This process is often lengthy and lumbering. But it is so in order to be inclusive and fair. It provides a representative and transparent platform where ideas are translated into laws. A tactical incursion, divorced from the machinery of an elected Government that seeks to undo the checks and balances created to protect the supremacy of Parliament sets a dangerous precedent for a democracy.

Today the proposed law is against corruption. Tomorrow the target may be something less universally heralded. It may attack the plurality of our society and democracy.

India's biggest achievement is our democratic system. It is the life force of our nation. I believe we need more democracy within our political parties. I believe in Government funding of our political parties. I believe in empowering our youth; in opening the doors of our closed political system; in bringing fresh blood into politics and into this House. I believe in moving our democracy deeper and deeper into our villages and our cities.

I know my faith in our democracy, is shared by members of this House. I know that regardless of their political affiliation, many of my colleagues work tirelessly to realize the ideals upon which our nation was built. The pursuit of truth is the greatest of those ideals. It won us our freedom. It gave us our democracy. Let us commit ourselves to truth and probity in public life. We owe it to the people of India.

india cables by wikileaks

UNCLAS NEW DELHI 008628 



SIPDIS



SENSITIVE



E.O. 12958: N/A

TAGS: KDEM PREL EAID ECON EFIN IN AF

SUBJECT: INDIA AND THE KABUL AGENDA



REF: A. STATE 203820

B. NEW DELHI 8247

C. NEW DELHI 7346



1. (SBU) Poloff shared Ref A points with MEA Under Secretary

(Afghanistan) Acquino Vimal on October 8, reiterating USG

appreciation for India's contributions to Afghan

reconstruction and urging continued commitment in the next

phase of assistance. Vimal reported that the GOI intends to

continue its involvement in Afghanistan, and was aware of

plans for a future donors conference, but had not been

invited yet to the "Kabul Agenda" post-Bonn discussions.



Comment and Action Request

--------------------------



2. (SBU) As reported in Refs B and C, New Delhi is very open

to the idea of increased engagement and assistance to

Afghanistan, and India's long-running technical assistance

programs to developing countries are well-matched to

Afghanistan's conditions. Greater Indian assistance has been

checked largely by the inability of the GOA to identify and

request targeted aid from New Delhi. As we approach the

donors conference in London in January, Post recommends that

Washington try to include the GOI in planning, both to draw

on its domestic experience in developing democratic

institutions in conditions similar to those in Afghanistan,

and to enlist its full support for and commitment to a

greater donor role. We suggest that an institute for the

promotion of democracy located in Kabul would be an ideal

project for the US and India to support jointly, contributing

to our shared goal of strengthening democratic institutions

in Afghanistan.

MULFORD

us-india cables by wikileaks 2


UNCLAS SECTION 01 OF 04 NEW DELHI 002912 



SIPDIS



SENSITIVE

SIPDIS



USDOC FOR ITA/MAC/OSA/LDROKER/ASTERN/KRUDD

DEPT PASS TO USTR DHARTWICK/CLILIENFELD/AADLER

DEPT PASS TO TREASURY FOR OFFICE OF SOUTH ASIA ABAUKOL

TREASURY PASS TO FRB SAN FRANCISCO/TERESA CURRAN

STATE FOR SCA/INS MICHAEL NEWBILL AND EB/TRA JEFFREY HORWITZ AND TOM

ENGLE

PASS TO FAA THOMAS NASKOVIAK

PASS TO DOT DAVID MODESSIT



E.O. 12958: N/A

TAGS: EFIN EINV EAIR PTER KTFN PREL ENRG ECON IN PK IR

GM, UK

SUBJECT: NEW DELHI WEEKLY ECON OFFICE HIGHLIGHTS





NEW DELHI 00002912 001.2 OF 004





1. (U) Below is a compilation of Economic highlights from Embassy

New Delhi for the week of June 18-22, 2007.



FIRST ROUND ON INDIA/EC FTA TALKS

TO BEGIN NEXT WEEK

--------------



2. (SBU) European Commission Trade Counselor Bermejo told us that

the first round of negotiations for an Indian/EC FTA will begin next

week in Brussels, following a two-month delay at the GOI's request.

All negotiation rounds are expected to be comprehensive, and the EC

has informed India that they will not allow negotiators from any

specific sector pleading absences (this is apparently a favorite

negotiating tactic used by the GOI when they wish to avoid making

concessions in politically sensitive sectors). The Indians have

imposed a two year timetable for the negotiations that should end

theoretically in November 2008, in advance of the 2009 national

elections. The ECN has not accepted this timetable. Also from the

European side, apparently both Gordon Brown and Angela Merkel

tentatively plan visits to India in the late September/October time

frame (separate visits), according to their embassies.



INDIA TO HOST IRAN AND PAKISTAN

AT JUNE END TO DISCUSS PIPELINE

----------------



3. (SBU) India from June 27-29 will play host to Iranian and

Pakistani delegations hoping to finalize a framework agreement on a

proposed $7.4 billion pipeline to bring gas from Iran to India

through Pakistan, The Economic Times reported June 20. Bilateral

meetings between India and Pakistan are to take place June 27.

Trilateral meetings are planned for June 28 and 29 in New Delhi.

Indian Petroleum Minister Murli Deora expects a second

ministerial-level meeting to ink a framework by mid-July. According

to June 18 press reports, Deora said the pipeline project will

launch "very soon" and noted that the GOI discussed the project with

Pakistani PM Aziz during his recent visit to India. He said the GOI

is in talks about pricing and logistics, adding that major issues

have been sorted out already while pending issues like

transportation fees and alignment will be worked out soon. The

proposed pipeline would carry around 60 million cubic meters of gas

per day from Iranian gas fields, split equally between Pakistan and

India. [Comment: Econ does not expect the pipeline will be agreed

to or built any time soon. However, we believe there is a

possibility that some sort of very preliminary and prefatory

framework understanding could be reached this summer. Any such

"agreement" would be in part an exercise undertaken for different

political reasons by each partner. End comment.] In an interview

with the newspaper Mint on June 18, Planning Commission member Kirit

Parikh forecasted that the pipeline will not happen in the immediate

future as "people are changing the rules of the game all the time."

Pakistan is demanding a transit fee for the pipeline portion running

through its area that India deems too high, Parikh said. With

Pakistan demanding more than $1 per mBtu for transit, Parikh said it

would be better to pay $2 more per mBtu to get LNG directly from

Iran instead of investing in a pipeline.



INDIA JOINS GLOBAL ANTI-MONEY

LAUNDERING CLUB

--------------



4. (U) This week's press reports highlighted India's Financial

Intelligence Unit's (FIU) achievement as the newest member of the

Egmont Group, an international body which facilitates and enhances

exchange of information with counterpart FIUs and FINCENs.

Admission to the Egmont Group, which was conferred at the group's

May plenary session, is seen as a major step forward for India in

joining the international community to fight against terrorism

financing. While Egmont membership is an important consideration

for joining the Financial Action Task Force (FATF), India must adopt



NEW DELHI 00002912 002.2 OF 004





several mandated recommendations, including passing specific

legislation criminalizing money laundering and countering financial

terrorism, to move beyond its current observer status in FATF.

India's Admission into the Egmont Group was reported by several

domestic and international newspapers, including the Economic Times,

Daily India, and Malaysia Sun.



ANTI-MONEY LAUNDERING SEMINAR

FOR INDIAN BANKS

-------------



5. (U) USAID and Financial Services Volunteer Corps (FSVC)

sponsored a seminar on June 21, 2007 titled "Detecting, Monitoring,

and Reporting Suspicious Activity within an Anti-Money Laundering

(AML) Framework." Presentations by Rosalind Lazar of Citigroup and

Thomas Burnside of JP Morgan outlined how banks can create, develop,

and implement an AML framework. About 12 representatives from

various Indian banks and government agencies, including RBI and

Financial Intelligence Unit (FIU), participated in the seminar and

asked presenters to focus on how to use risk models involving

businesses with high cash deposits (such as transport operators) and

high net worth individuals.



6. (U) Bank representatives expressed concerns about

competitiveness with non-AML compliant banks which are not forced to

ask invasive questions to their customers. Presenters emphasized

that Know Your Customer (KYC) policies and employee accountability

require querying new and existing customers about fund source and

business - which are critical to the success of any AML program. JP

Morgan Senior Vice President explained that despite the concerns and

initial loss of a few customers, the real profit for banks is with

customers who want to grow internationally. Today, banks should be

familiar with the global banking economy. Indian banks also need to

consider reputation risk as a major incentive for investing in an

AML program since loss of reputation is ultimately the real price

for not complying.



7. (U) Many Indian banks, particularly public banks, are still in

the initial stages of implementing AML programs and would benefit

from a technical seminar to address challenges in monitoring and

reporting suspicious activity. Some participants explained the

difficulty of asking intrusive questions to customers. Most

importantly, the seminar stressed that a successful AML program

requires buy-in from all the stakeholders in a bank, including front

line personnel, management, marketing department, and especially,

the customers.



SHARP RISE IN REMITTANCES

TO INDIA

---------------



8. (U) A study by the Migration Policy Institute estimates that of

the $268 billion (World Bank figure) worldwide remittances in 2006,

India accounts for nearly 10 percent. RBI has reported that Indian

migrants transferred $24.1 billion to India in fiscal year 2005-06.

India continues to be the leading recipient of remittances in the

world with World Bank estimates putting India in the lead at $23.5

billion, followed by China at $22.4 billion and Mexico at $21.7

billion. Compared to RBI figures from 1990-91, when remittances

were $2.1 billion, India's dominant position in remittance receipts

is relatively new. In 2005-06, remittances constituted 3.10 percent

of India's GDP - a sharp rise from 0.7 percent in 1990-91.

Moreover, in the same year, remittances were higher than the $23.6

billion in revenues from India's software exports, which had

increased 33 percent that year. The impact of remittances is more

pronounced in parts of the country due to higher volumes of

emigration. The southern state of Kerala sends many emigrants to

the Gulf countries and remittances represent 22 percent of the

state's domestic product.





NEW DELHI 00002912 003.2 OF 004





9. (U) The study outlines the main factors for the growth in

remittances - including the diminishing role of unofficial channels,

shifting emigration patterns to high-skilled technology jobs,

greater competition in the money transfer market, and the strength

of the Indian economy. First, the incentives to employ informal

networks like hawalas to transfer funds have diminished with the

government establishing a market-based exchange rate and increased

international monitoring of such networks after the September 11

attacks. Second, many Indian IT workers have migrated to the US,

mostly through H-1B worker visas, and more Indian professional

workers are going abroad. This new class of highly-skilled workers

has greater purchasing power and more saving potential than

lower-skilled workers. RBI estimates that 44% of the remittances

come from North America while 24% come from the Gulf Countries.

Most significantly, the Indian government has demonstrated its

ability to attract non-resident Indian (NRI) capital through NRI

deposit accounts and successive bond issues. The report recommends

the government and banking community look for strategic ways to

offer higher rates of return on remittance receipts allocated

towards specific assets or microfinance operations.



INDIA SIGNS FLIGHT SCHOOL DEALS

AT THE PARIS AIR SHOW

------------------



10. (U) India signed two MOUs on June 19, 2007 at the Paris Air

Show to forge a partnership with Montreal-based Canadian Aviation

Electronics (CAE) to enhance the capacity of GOI's existing flight

school, Indira Gandhi Rashtriya Uran Akademi (IGRUA), and proposed

National Flying Training Institute (NFTI). CAE will now become the

managing partner of IGRUA and the majority stakeholder in NFTI.



11. (U) The NFTI will be a joint venture between CAE and the

Airport Authorities of India with 51 and 49 percent of the equity,

respectively. The Institute will provide fixed and rotary wing

training for pilots using the Airline Transport Pilot License (ATPL)

program which leads to the Multi-crew Pilot License (MPL) program.

NFTI will be based in Gondia (in western Maharashtra), an electoral

constituency of Civil Aviation Minister Praful Patel. The institute

will operate new aircraft using CAE's course material and training

equipment. The total projected investment for NFTI is expected to

be about $25 million. Once it is fully operational, NFTI is

estimated to produce approximately 200 pilots a year.



12. (U) CAE will also manage IGRUA's existing flight school

activities, including maintenance of aircraft, flying operations,

air traffic control, runway maintenance, navigation aids, and fire

fighting facilities. IGRUA is located in Rae Bareli (district in

Uttar Pradesh), an electoral constituency of ruling Congress Party

President Sonia Gandhi. The CAE-IGRUA MOU is expected to increase

from an initial 40 cadet pilots to 110 cadet pilots per year and

finally to 200 cadet pilots annually. While India currently has

about 2,500 active pilots, an estimated 5,000 pilots will be

required over the next 5 years to cater to the exponential growth in

domestic air traffic. For example, the Air Passengers Association

of India estimates that the annual air traffic growth rate in India

has been around 26 percent over the past two years, causing the

airline industry to order approximately 400 new aircraft for

delivery by 2010.



INDIA CREATING MORE NEW JOBS

THAN ANY OTHER BRIC COUNTRY

----------------



13. (U) OECD's Economic Outlook 2007 reports that India is creating

more jobs than any other BRIC (Brazil, Russia, India and China)

country, generating 11.3 million net new jobs annually between 2000

to 2005 in contrast to China's 7 million, Brazil's 2.7 million, and

Russia's 0.7 million. India alone accounted for half of the jobs

generated by BRIC countries. Despite the good news, the report also



NEW DELHI 00002912 004.2 OF 004





cites concerns, such as the low level of employment elasticity to

economic growth at 0.3 percent which indicates that fewer jobs are

created as GDP rises. Also, the report says that India has among

the lowest employment to population ratios with 50.5 percent as

compared to at least 66 percent in the other BRIC countries. Rural

unemployment continues to be a challenge in the BRIC countries,

particularly India where there are an estimated 130 million surplus

workers.



14. (U) Visit New Delhi's Classified Website:

http://www.state.sgov/p/sa/newdelhi




Mulford

us-india cables by wikileaks 1


UNCLAS SECTION 01 OF 03 NEW DELHI 005521 



SIPDIS



E.O. 12958: N/A

TAGS: PHUM PGOV KWMN PINR SOCI IN AF BG PK

SUBJECT: INDIAN WOMEN CONTINUE TO FACE OBSTACLES IN POLITICS



REF: NEW DELHI 5135



1. Summary: Despite an impressive list of accomplishments,

including several current Chief Ministerships and presidency

of the Congress party, Indian women continue to face cultural

and practical barriers to their participation in politics.

Female political leaders insist that greater women's

participation is essential to ensure adequate treatment of

issues such as health, education, food and water security,

and children's welfare, as well as gender inequality in the

workforce and insufficient attention to crimes against women

and children. One million female local council (Panchayat)

members demonstrate the competence of women as politicians,

but women's representation in political parties, state

assemblies, and national parliament remains modest. Parties

continue to claim commitment to the Women's Reservation Bill,

but Parliament is unlikely to pass it anytime soon. End

Summary.



2. (U) Female Indian political experts discussed successes

and challenges of Indian women in politics in a series of

panels at a National Democratic Institute (NDI) workshop in

New Delhi in June (Reftel). Topics discussed included

cultural and practical obstacles faced by Indian women in

politics, the current state of women in Indian political

parties and elected bodies, and the prospects of the women's

reservation bill. Panelists included leading experts from

NGOs, political parties, academia, and the media.



Women's Involvement in Politics is Essential

--------------------------------------------



3. (U) Indian panelists underscored the need for women to be

involved in politics to ensure that so-called "women's

issues" - health, education, food and water security, and

children's welfare - will no longer be relegated to low

priority. Rita Sarin, of the NGO The Hunger Project,

emphasized that these issues are actually "human issues," and

therefore cannot be ignored. Dr. Syeda Hameed, Planning

Commission member, indicated that these are the "issues of

the future." Panelists insisted that women must be included

in the decision-making process on these and other political

issues; they agreed that simply voting every five years does

not constitute adequate political participation for women.



Women in Political Parties and Elected Bodies

---------------------------------------------



4. (U) Despite the high profile examples of party leaders

like Sonia Gandhi (Congress), Vasundhra Raje (BJP), and

Mayawati (BSP), most women's participation in Indian

political parties is reduced to administrative or campaign

support. Several Indian women who have risen to powerful

positions, including Indira and Sonia Gandhi and Chief

Ministers Raje, J Jayalalithaa, and Sheila Dikshit, have done

so through the connections of their political families. Many

parties tout their women's wings as evidence of their

commitment to women, but these wings often serve as a way for

the party to give lip service to women while keeping them out

of the mainstream of the party leadership, activists argue.

Several parties have policies reserving a certain percentage

of their party leadership positions for women, but they have

not fulfilled these promises.



5. (U) There are now approximately one million women in

Panchayats (local councils), due to the constitutional

reservation of 33 percent of the seats for women. The

reserved seats rotate every five years. This constitutional

mechanism has been a significant driver of increased

political involvement for women. In many cases, women have

been re-elected to their Panchayat position even after their

seat was no longer reserved; in a few states, women's

representation at the panchayat level is approaching 50

percent. Center for Social Research Director Ranjana Kumari

noted that while women Panchayat members or leaders often

begin as "fronts" for their husbands or male relatives, they

often become empowered in their own right and are able to

shed themselves of male family members' control. Veena

Nayyar, of Women's Political Watch, estimated that one-third

of the Panchayat women are ruling in their own right,

one-third are essentially proxies of their husbands or other

male relatives, and the remaining third are somewhere along

the process of empowerment described by Kumari. Nayyar

emphasized the need for these Panchayat women to convert

their large numbers into real power.



Obstacles Remain

----------------

6. (U) Neerja Chowdhury, Political Editor of the Indian

Express, noted that women excel in every field in India,

except in politics, where they have "hit a glass ceiling."

She explained that Indian men oppose women in politics mainly

because they fear changes in the power balance in the family,

marketplace, and community. Kumari opined that when a

society is more democratic, the state is more democratic.

She predicted that when there is more equality for women in

the family and community in India, there will be more female

representation in government. She urged participants to

bring this about by supporting economic and social

empowerment of women to change family income balances.

According to Benita Sharma of UNIFEM, Indian women elected to

political office have begun to break stereotypes, but Indian

men continue to cling to traditional gender roles and refuse

to help out in the home.



7. (U) In addition to cultural obstacles, Indian women also

face constraints of time, money, media access, and muscle

power. Sharma explained that without more electricity, child

care, and primary education, women would remain too busy

working in the fields, obtaining food and water, and taking

care of children to be involved in politics. Najma

Heptullah, a parliamentarian who recently joined the BJP,

noted that women entering politics are often unprepared to

interact effectively with the media and need to cultivate the

toughness required to face and take advantage of media

exposure. She also explained that politics is dominated by

money and muscle power, both of which women often lack,

especially in Muslim areas. Sarin gave examples of elected

women at the panchayat level being replaced by men under

dubious circumstances, citing regulations saying that

illiterate women or women with more than two children must

vacate their seats. Another tactic is filing a no-confidence

motion and then replacing the ousted woman with a man.





Prospects Bleak for Women's Reservation Bill

--------------------------------------------



8. (U) In state assemblies and in the national Parliament,

representation of women has hovered around 8-9 percent for

the past several years. The Women's Reservation Bill, which

calls for reserving one-third of the seats in the Parliament

and state assemblies for women, is a major goal of women

political activists, including a majority of the panelists at

the NDI workshop. First introduced in 1996, and

re-introduced in 1998, 1999, and 2001, the bill faces stiff

opposition from most male politicians across party lines.

They have repeatedly blocked the bill either by voting it

down or using parliamentary delay tactics.



9. (U) Panelists offered mixed opinions on the future of the

Women's Reservation Bill. Those who are most active in

lobbying for the bill, including Kumari and Rita Bahuguna

Joshi, President of Congress' women's wing, were optimistic

that it would pass in the upcoming Parliamentary session.

Joshi pointed out that the bill is included in the UPA

government's Common Minimum Programme and in the manifestos

of several parties (including Congress, BJP, and the Left

parties). Kumari noted the importance of media exposure and

unity among women across party lines to cultivate support for

the bill.



10. (SBU) Panelists with a more objective viewpoint, such as

journalist Chowdhury, expect the bill to flounder once again

due to lack of political will and the opposition of Congress'

UPA partners. In a separate meeting with Poloff, G Devarajan

of the All India Forward Bloc explained that if Congress had

been sincere in its commitment to women's reservation, it

would have already passed the bill. He also noted that

Bihar's leading politician, Lalu Prasad Yadav, opposes the

bill, and Congress will not do anything to offend Lalu in

light of upcoming elections in Bihar.



Comment

-------



12. (U) Women continue to face an uphill battle in Indian

politics due to traditional gender roles and lack of time,

money, and political muscle. We do not expect the Women's

Reservation Bill to pass anytime soon. However, there are

other means by which Indian women can improve their lot.

Efforts to improve women's social and economic empowerment -

such as women's self-help groups, the recent anti-domestic

violence bill, and educating women and girls - can have a

multiplier effect that would do more for women than efforts

to pursue the out-of-reach Women's Reservation Bill. The

women elected to the Panchayats are demonstrating that women

are capable of performing well in elected positions, and they

have drawn many more Indian women into political life. In

time, participation of women in local governance will give

more women experience in political leadership and may lead to

a wider acceptance of women in Indian politics.



13. (U) Bionotes on NDI Panelists:

----------------------------------



Kiran Bedi, Indian Police Service

Neerja Chowdhury, Political Editor, Indian Express

Rita Bahuguna Joshi, President, All India Mahila Congress

Syeda Hameed, Member, Planning Commission, GOI

Najma Heptullah, BJP Member, Rajya Sabha

Ranjana Kumari, Director, Center for Social Research

Veena Nayyar, President, Women's Political Watch

Rita Sarin, Director, The Hunger Project

Padma Seth, Former Member, National Commission for Women

Benita Sharma, Program Officer, UNIFEM

K P Vijaylaxmi, Associate Professor, Jawaharlal Nehru

University

Girija Vyas, Chairperson, National Commission for Women



BLAKE

Lijit Ad Wijit

add this

Related Posts Plugin for WordPress, Blogger...