According to his bio, R. Manoj is an assistant editor at Fanatic Media who is "also an Independent Researcher, specializing in Systems Security". The bio goes on to say that he "has an active interest in designing security algorithms for securing mission critical systems." Beyond that, there isn't much we could find on him or his past. What we did find was extensive plagiarism in articles he "wrote" for Fanatic Media.
The following tables detail the articles he "wrote" that were taken from other sources, making up 100% of each article. In each case, he simply cut sentences or paragraphs from different articles and created his own from them. In many cases, Manoj would re-word an article to change the style so it fit the article he was piecing together. For example, a news article quoting a source would lose the quotes and attribution to be reworked into a free-standing sentence. This shows willful infringement of copyright and inexcusable plagiarism.
The article titled "Essentials of Software Security Testing" was posted some time in September, 2009 on the FanaticMedia.com InfoSecurity site, self-billed as "India's First Magazine on Complete IT Security".
Paragraph | Original Source |
Para 1, Sentence 1 | CresTech outsourcing page |
Para 1, Sentence 2/3 | Network Security Testing (NIST Bulletin) |
Para 2 | QASec.com - Writing Software Security Test Cases |
Para 3 - 4 | Software Security: Building Security In by Gary McGraw |
Para 5 | Software Security Testing by McGraw / Potter |
Para 6 - 9, 10 Sentence 1, 11 - 12 | Software Security: Building Security In by Gary McGraw |
Para 13 | Software Security Testing by McGraw / Potter |
Para 14 | Software Security: Building Security In by Gary McGraw |
Para 15 | Software Security Testing by McGraw / Potter |
Para 16 - 18 | Software Security: Building Security In by Gary McGraw |
Para 19 - 26 | NIST SP 800-42 |
Para 27 (Conclusion) | Software Security: Building Security In by Gary McGraw |
The article titled "Significance of Cloud Computing Security" was posted some time in February, 2010 on the FanaticMedia.com InfoSecurity site, self-billed as "India's First Magazine on Complete IT Security".
The article titled "Protecting SMBs from Security Threats" was posted September 3, 2010 on the SecurityTrendz.com site.
Paragraph | Original Source |
Para 2 - 3, Sentence 1-2 | 10 Ways to Mitigate Your Security Risks (pg1) at InformationWeek.com |
Para 4-8 | 10 Ways to Mitigate Your Security Risks (pg1) at InformationWeek.com |
Para 9-15 | 10 Ways to Mitigate Your Security Risks (pg2) at InformationWeek.com |
Para 16-22 | 10 Ways to Mitigate Your Security Risks (pg3) at InformationWeek.com |
Para 23 | 10 Ways to Mitigate Your Security Risks (pg4) at InformationWeek.com |
Para 24, Sentence 1-3 | 10 Ways to Mitigate Your Security Risks (pg4) at InformationWeek.com |
Para 25 | 10 Ways to Mitigate Your Security Risks (pg4) at InformationWeek.com |
The article titled "Is Microsoft using India's Skewed Patent Laws?" was posted January 10, 2010 on the FanaticMedia.com site.
The article is crafted using material from "Pay up" says the Delhi High Court-Microsoft hauled up for Forum Shopping and Latha Jishnu: Copyright aggression. The first two paragraphs are entirely taken from these two sources, with small parts re-worded to make it flow smoothly. For the rest:
Paragraph | Original Source |
Para 3-4 | Latha Jishnu: Copyright aggression at Business-Standard.com |
Para 5-6 | "Pay up" says the Delhi High Court-Microsoft hauled up for Forum Shopping at SpicyIPIndia.blogspot.com |
Para 7-9 | Latha Jishnu: Copyright aggression at Business-Standard.com |
Para 10 (non-quote material) | Latha Jishnu: Copyright aggression at Business-Standard.com |
Para 11-12 | Latha Jishnu: Copyright aggression at Business-Standard.com |
Para 13, sentences 1-2 | Latha Jishnu: Copyright aggression at Business-Standard.com |
Para 13, sentence 3 | Microsoft sues four for piracy but gets fined by the Indian court at techtickerblog.com |
Para 14 | Microsoft sues four for piracy but gets fined by the Indian court at techtickerblog.com |
Para 15-17 | Latha Jishnu: Copyright aggression at Business-Standard.com |
Para 18, Sentence 2 | "Pay up" says the Delhi High Court-Microsoft hauled up for Forum Shopping at SpicyIPIndia.blogspot.com |
In June 2010, R. Manoj posted Challenge-response Authentication Mechanism on the FanaticMedia.com site.
Paragraph | Original Source |
Para 2-3 | Challenge-Response Authentication for Dummys by Fractal, HardSoft CoreWare |
Para 5-8, 10 | Challenge-response authentication by Wikipedia |
Para 11-12 | Challenge-Response Authentication for Dummys by Fractal, HardSoft CoreWare |
Example Section | Challenge-Response Authentication for Dummys by Fractal, HardSoft CoreWare |
Para 13-15 | CRAM (challenge-response authentication mechanism) by Susan Prestage, SearchSecurity TechTarget |
Para 16-21 | Challenge-response authentication by Wikipedia |
Example Section | Challenge-response authentication by Wikipedia |
Para 22-23 | Challenge-response authentication by Wikipedia |