R. Manoj, Assistant Editor at Fanatic Media, Plagiarizer

Sat Dec 3 15:12:12 CST 2011

According to his bio, R. Manoj is an assistant editor at Fanatic Media who is "also an Independent Researcher, specializing in Systems Security". The bio goes on to say that he "has an active interest in designing security algorithms for securing mission critical systems." Beyond that, there isn't much we could find on him or his past. What we did find was extensive plagiarism in articles he "wrote" for Fanatic Media.

The Plagiarism

The following tables detail the articles he "wrote" that were taken from other sources, making up 100% of each article. In each case, he simply cut sentences or paragraphs from different articles and created his own from them. In many cases, Manoj would re-word an article to change the style so it fit the article he was piecing together. For example, a news article quoting a source would lose the quotes and attribution to be reworked into a free-standing sentence. This shows willful infringement of copyright and inexcusable plagiarism.

Essentials of Software Security Testing

The article titled "Essentials of Software Security Testing" was posted some time in September, 2009 on the FanaticMedia.com InfoSecurity site, self-billed as "India's First Magazine on Complete IT Security".

Paragraph Original Source
Para 1, Sentence 1 CresTech outsourcing page
Para 1, Sentence 2/3 Network Security Testing (NIST Bulletin)
Para 2 QASec.com - Writing Software Security Test Cases
Para 3 - 4 Software Security: Building Security In by Gary McGraw
Para 5 Software Security Testing by McGraw / Potter
Para 6 - 9, 10 Sentence 1, 11 - 12 Software Security: Building Security In by Gary McGraw
Para 13 Software Security Testing by McGraw / Potter
Para 14 Software Security: Building Security In by Gary McGraw
Para 15 Software Security Testing by McGraw / Potter
Para 16 - 18 Software Security: Building Security In by Gary McGraw
Para 19 - 26 NIST SP 800-42
Para 27 (Conclusion) Software Security: Building Security In by Gary McGraw


Significance of Cloud Computing Security

The article titled "Significance of Cloud Computing Security" was posted some time in February, 2010 on the FanaticMedia.com InfoSecurity site, self-billed as "India's First Magazine on Complete IT Security".

Paragraph Original Source
Para 1, Sentence 2 Vendors have their heads in the cloud at computing.co.uk
Para 2, Sentence 1 Vendors have their heads in the cloud at computing.co.uk
Para 2, Sentence 3 - Para 5 Cloud computing could bring security threats at computing.co.uk
Para 6, Sentence 1 EU Security Agency Highlights Cloud Computing Risks at pcworld.com
Para 7, Sentence 2 Cloud computing could bring security threats at computing.co.uk
Para 8, Sentence 3/4 Industry debates security risks of cloud computing at computerweekly.com
Para 9 - 12 Menacing shadows loom over the cloud at keylogger.org
Para 13 EU Security Agency Highlights Cloud Computing Risks at pcworld.com
Para 14 - 15 Countering cloud computing threats at scmagazineus.com
Para 16, Sentence 1-4 EU Security Agency Highlights Cloud Computing Risks at pcworld.com
Para 17 Industry debates security risks of cloud computing at computerweekly.com
Para 18 - Para 19, Sentence 1 What is cloud computing, and can it be trusted? at techworld.com
Para 19, Sentence 2-3 - Para 21 How to secure your data in the cloud at techworld.com
Para 22 User comment on 'Bigger businesses lag behind with cloud adoption' at itpro.co.uk
Para 23-26 Industry debates security risks of cloud computing at computerweekly.com


Protecting SMBs from Security Threats

The article titled "Protecting SMBs from Security Threats" was posted September 3, 2010 on the SecurityTrendz.com site.

Paragraph Original Source
Para 2 - 3, Sentence 1-2 10 Ways to Mitigate Your Security Risks (pg1) at InformationWeek.com
Para 4-8 10 Ways to Mitigate Your Security Risks (pg1) at InformationWeek.com
Para 9-15 10 Ways to Mitigate Your Security Risks (pg2) at InformationWeek.com
Para 16-22 10 Ways to Mitigate Your Security Risks (pg3) at InformationWeek.com
Para 23 10 Ways to Mitigate Your Security Risks (pg4) at InformationWeek.com
Para 24, Sentence 1-3 10 Ways to Mitigate Your Security Risks (pg4) at InformationWeek.com
Para 25 10 Ways to Mitigate Your Security Risks (pg4) at InformationWeek.com


Is Microsoft using India's Skewed Patent Laws?

The article titled "Is Microsoft using India's Skewed Patent Laws?" was posted January 10, 2010 on the FanaticMedia.com site.

The article is crafted using material from "Pay up" says the Delhi High Court-Microsoft hauled up for Forum Shopping and Latha Jishnu: Copyright aggression. The first two paragraphs are entirely taken from these two sources, with small parts re-worded to make it flow smoothly. For the rest:

Paragraph Original Source
Para 3-4 Latha Jishnu: Copyright aggression at Business-Standard.com
Para 5-6 "Pay up" says the Delhi High Court-Microsoft hauled up for Forum Shopping at SpicyIPIndia.blogspot.com
Para 7-9 Latha Jishnu: Copyright aggression at Business-Standard.com
Para 10 (non-quote material) Latha Jishnu: Copyright aggression at Business-Standard.com
Para 11-12 Latha Jishnu: Copyright aggression at Business-Standard.com
Para 13, sentences 1-2 Latha Jishnu: Copyright aggression at Business-Standard.com
Para 13, sentence 3 Microsoft sues four for piracy but gets fined by the Indian court at techtickerblog.com
Para 14 Microsoft sues four for piracy but gets fined by the Indian court at techtickerblog.com
Para 15-17 Latha Jishnu: Copyright aggression at Business-Standard.com
Para 18, Sentence 2 "Pay up" says the Delhi High Court-Microsoft hauled up for Forum Shopping at SpicyIPIndia.blogspot.com


Challenge-response Authentication Mechanism

In June 2010, R. Manoj posted Challenge-response Authentication Mechanism on the FanaticMedia.com site.

Paragraph Original Source
Para 2-3 Challenge-Response Authentication for Dummys by Fractal, HardSoft CoreWare
Para 5-8, 10 Challenge-response authentication by Wikipedia
Para 11-12 Challenge-Response Authentication for Dummys by Fractal, HardSoft CoreWare
Example Section Challenge-Response Authentication for Dummys by Fractal, HardSoft CoreWare
Para 13-15 CRAM (challenge-response authentication mechanism) by Susan Prestage, SearchSecurity TechTarget
Para 16-21 Challenge-response authentication by Wikipedia
Example Section Challenge-response authentication by Wikipedia
Para 22-23 Challenge-response authentication by Wikipedia



main page ATTRITION feedback