Why India-UK FTA may push medicines out of ordinary Indians’ reach https://thefederal.com/category/business/why-india-uk-fta-may-push-medicines-out-of-ordinary-indians-reach-198364
India is set to sign an FTA with the UK on July 24; most details are public except the IPR chapter, The IPR chapter may include provisions like evergreening of patents, extended patent terms, and data exclusivity, potentially raising medicine costs and limiting access for ordinary Indians.
Big Pharma advantage: Leaked drafts suggest the deal could weaken safeguards, block public objections to patents, and protect pharmaceutical monopolies far beyond global norms (TRIPS), benefitting multinational drug companies.
“The module ‘Pratibimb’ maps locations of criminals and crime infrastructure on a map to give visibility to jurisdictional officers. The module also facilitates seeking and receiving of techno-legal assistance by Law Enforcement Agencies from I4C and other SMEs. It has lead to arrest of 10,599 accused, 26,096 linkages and 63,019 Cyber Investigation assistance request,” the MHA said in its reply.
23/07/2025
While the high court does not explicitly call the 12 men “innocent,” the opening remarks strongly suggest their innocence. The judgment, while dismantling the prosecution’s case point by point, places extra emphasis on the various torture techniques used to extract confessions from these 12 men. 7/11 Judgment Fails to Hold Police Accountable For Custodial Torture, Lost Time of Those Acquitted - The Wire
Abdul Wahid Shaikh, one of the first persons to be acquitted by the Maharashtra Control of Organised Crime Act (MCOCA) court in 2015, names nearly 100 policemen and medical officers who wronged him and the other 12 incarcerated individuals. In his book Begunah Qaidi, he details the extent of the brutality and exposes how confessions have traditionally been extracted, particularly in cases involving torture.
India has had a poor track record on custodial torture and has compounded the issue by refusing to take responsibility for correcting police behavior or holding officers accountable. India has long evaded its responsibility and failed to ratify the United Nations Convention Against Torture (UNCAT).
by Sukanya Shantha
23/07/2025
questions about criminal justice system https://indianexpress.com/article/opinion/columns/in-mumbai-train-blast-case-acquittal-19-years-later-raises-questions-about-criminal-justice-system-10140964/ by Meeran Chadha Borwankar The High Court acquitting all of them after 10 years shows that something is terribly amiss in the criminal justice system. If they were innocent, how do we justify their incarceration for nearly 19 years? And if they were part of the terror gang responsible for the mass killing, why are they allowed to go scot-free? Comment: Every recording/confession must be date and time stamped. And a comprehensive list of all interviews and interaction in police custody must be provided to the defense. And we as public have to be shown the process, rather than get byte to assuage public outcry..
A Remarkable Judgement Mumbai Mirror MIHIR DESAI
(courtesy: Mumbai Mirror - awaiting a link of the above)
SSen - on Whats app 22-7-25: The gaps in this sort of path breaking judgement:
-- No compensation ordered either on the ground of torture or ruination of lives.
-- No fixing of accountability of the concerned officials of the investigating agency which took the easy and cruel path of showing up a rabbit as a tiger in order to claim solving the case and botched up the investigation.
The real culprits of the heinous crime, hence, have gone scott free and, most likely, are roaming free.
Freny M on Whatsapp Am quite shocked with this lazy regurgitation of the police versions. At the very least the reporter could have tried to speak to families to get more info.. The role of the media when covering such important cases also needs to come under scrutiny...
Do they exhibit healthy skepticism or then just toe in with police narrative which is so much easier.
https://indianexpress.com/article/cities/mumbai/who-12-men-acquitted-7-11-mumbai-train-blasts-case-10139460/ Written by Zeeshan Shaikh
https://timesofindia.indiatimes.com/blogs/toi-editorials/terror-of-omissions/ judges have revealed about the shoddy investigation and prosecution’s negligence. HC said prosecution had “utterly failed to prove the case” beyond reasonable doubt. That such “deceptive closure undermines public trust while the true threat remains at large.” Trial court’s conviction was junked on several points that included 1) confessions were a product of torture, 2) it was ‘very odd’ that witnesses identified the accused after four years, 3) witnesses were ‘stock witnesses’, rolled out frequently, 4) it took three months before one witness claimed to have seen bombs ‘assembled’, 5) prosecution’s evidence was simply ‘not safe’ to base convictions on.
In the last set of arguments, advocate Muralidhar, who appeared for Muzzamil Ataur Rahman Shaikh, and Zameer Ahmed Latifur Rehman Shaikh looked in detail at the lapses in investigation and how the confession statements of the defendants were extracted forcefully. Under the stringent MCOCA law, confessions made before a police officer are admissible in a court, making the situation even more precarious for accused.
https://thewire.in/law/mumbai-train-blasts-all-twelve-men-acquitted-wrongful-jailed
He also had called the entire investigation a “media trial”. His entire submission focused on bringing out the biased nature of the investigation.
Murlidhar, in his written submission had argued: “Innocent people are sent to jail and then years later when they are released from jail there is no possibility for reconstruction of their lives… From last 17 years (now 19) these accused are in jail. They haven’t stepped out even for a day. The majority of their prime life is gone. In such cases where there is a public outcry, the approach by police is always to first assume guilt and then go from there.”
On the behaviour of the police, Muralidhar had said: “Police officers take press conferences in such cases, and the way the media covers the case, it kind of decides the guilt of a person. In many such terror cases, investigating agencies have failed us miserably.”
21/07/2025
Extract from Alexander Beiner -
The end of Postmodernism and the promise of Theosis https://beiner.substack.com/p/welcome-to-peak-fragmentation We are living through Peak Fragmentation. Across the Western world, there is a resurgence of traditionalism and authoritarianism in response. A ‘quiet revival’ of Christianity is getting louder every day. Others are looking to new horizons, building AI religions or retreating to ‘conscious communities’ to try and sow the seeds of a new society.
death of a cultural aesthetic : postmodernism
people also tend to be more prosocial and conscientious when they’re embedded in a coherent social network.
people’s commitment to values like love, honour and justice is often viewed as independent of culture...economic pressures often force people to trade those ‘sacred values’ in what he calls ‘taboo trade-offs,
desire to reconnect to these authentic values.
We could revert to a more authoritarian, closed-minded traditionalism, or beat the dead horse of progressive politics
we have an opportunity to re-craft culture in a way that takes the best of postmodernism and combines it with traditionalism to create something new.
Exhausted trying to figure out what it actually means to be progressive, or conservative. Political homelessness
idea that human beings can become like God through grace... It’s also found in the Hindu concept of Tat Tvam Asi, or “thou art that” which teaches that Self (Atman) is not separate from ultimate reality (Brahman). Threads of this non-dual awareness are also found in Integral Theory, Nora Bateson’s Warm Data, Trish Blain’s Four Forces, Iain McGilchrist’s work, and countless other people we’ve had on Kainos recently.
Many of these perspectives see reality as made up not of distinct things, but of relationships. In a relational view on reality, truth can’t be boiled down to a single polarity or story. Instead, all things, all paradoxes, all truths and contradictions are contained in a whole which is neither part nor whole.
We can combat pre-rational forces of authoritarianism by growing a culture that embraces multiculturalism, but doesn’t shy away from celebrating white identity and history. Education that recognises everyone learns differently, but doesn’t do away with rote learning and discipline when it’s required. Sexual politics that recognise the unfair power dynamics at play around gender identity, without shying away from biological reality in the process.
Embedding trans-rational perspectives into mainstream culture is one route toward the cultural aesthetic that comes after postmodernism,
Extract from BOI cyber caution notes
www.cybercrime.gov.in OR call on 1930.
Best Practices
1. Think before you click. Fight the phish. Don’t get phished.
2. Review your bank statements and transaction history regularly to spot any unauthorized transactions. 3. Protect your device with a strong PIN/Password or Biometrics and enable auto lock setting in mobile phones/ Laptops/ other devices.
4. Keep your system and Antivirus up-to-date with regular patches. Use authorized and licensed software only.
5. Don’t share any sensitive information with any unauthorized or unknown person over telephone or through any other medium.
6. Don’t use the same password in multiple services/websites/apps.
7. Regularly clear browser history/cookies/cached memory after confidential activities/transactions.
8. Download Apps from official app stores. Before downloading an App, check the popularity of the app and read the user reviews. Observe caution before downloading any app, which has a bad reputation or less user base, etc.
9. Keep the GPS, bluetooth, NFC and other sensors disabled on your computers and mobile phones, when not required.
10. Don’t share system passwords or printer passcode or Wi-Fi passwords with any unauthorized person.
11. Scan USB device with Antivirus/Endpoint Protection before its use. Disable USB devices if not needed.
12. Be wary of fake advertisements/sponsored contents on search results or websites.
13. Be cautious of public Wi-Fi. Information shared over public network may be misused. Do not use any public computer or Wi-Fi for carrying out financial transactions or do online shopping.
14. Be cautious before revealing your location over internet. Be Vigilant, Not a Victim.
15. Always use Multi Factor Authentication for social media accounts.
16. Immediately, change password which might have been shared or compromised.
Phishing is an unethical way of stealing confidential, personal,
professional & financial data through fake emails and links.
MODUS OPERANDI:
- Lucrative offers difficult to be true.
- Urgent/threatening language.
- Strange or abrupt business requests.
- Requests to install some App / click on unfamiliar hyperlinks or attachments.
- Requests to share Money / Banking credentials / personal information.
- Spelling errors and poor grammar.
- Sender’s e-mail address doesn’t match, the display name of sender.
PRECAUTIONS:
- Avoid clicking on any links or replying, rather just delete the email.
- Block the sender.
- Never install any App through link shared via E-Mail or SMS Link.
- Don’t Share OTP / PIN / Passwords to Anyone.
Screen Sharing
MODUS OPERANDI:
- Fraudsters trick the customer to download a screen sharing app.
- Using such app, the fraudsters can watch/ control the customer’s mobile/laptop
and gain access to the financial credentials of the customer.
- Fraudsters use this information to carry out unauthorized transfer of funds or
make payments using the customer’s Internet banking/payment apps.
PRECAUTIONS:
- If your device faces any technical glitch and you need to download any screen
sharing app, deactivate/log out of all payment related apps from your device.
- Download such apps only when you are advised through the official Toll-free
number of the company as appearing in its official website. Do not download such
apps in case an executive of the company contacts you through his/her personal
contact number.
- As soon as the work is completed, ensure that the screen sharing app is removed
from your device.
UPI Request Money Fraud
MODUS OPERANDI:
- Use UPI app’s “request money” feature.
- Persuade you to enter your UPI PIN.
- Your money ends up in the scammer’s account.
PRECAUTIONS:
- To avoid Request money scam, always remember followings points:
- While receiving money, UPI PIN is not required.
- Your UPI PIN is only required when you make the payment.
- If you receive a fake money request, refuse it and report it as fraud attempt on Govt. portal given below.
- Never pay advance money without verifying the identity of the person.
- On platforms like OLX, Quikr, and others:- Do not pay a vendor in advance.
- Always pay for your purchases, when they are delivered to you.
Job Offer Scams
MODUS OPERANDI:
- Fraudsters use text messages to entice victims with part-time jobs.
- Victims who join a chat group are given simple prepaid tasks and an initial payment.
- They are then presented with a fake high-return investment plan, leading to small initial investments.
- As minor profits roll in, victims are manipulated into larger investments.
- When victims attempt to withdraw funds, the platform requests payments for withdrawal fees.
- Fearful of financial loss, victims pay these fees, only to discover that the platform crashes, taking all their money. This is how the scam reveals itself.
PRECAUTIONS:
- Be alert on job offers with high pay for minimal effort qualifications or guaranteed employment.
- Thoroughly investigate any potential employer by checking their official website, address, and contact details.
- Exercise caution with emails or texts from unknown companies, as scammers might use them to collect personal information.
- Don’t share sensitive data like bank details, or IDs on initial job applications.
- Legitimate employers won’t request upfront payments, like fees for background checks or training.
- Be suspicious of any such requests.
Ransomware Threats
MODUS OPERANDI:
- Threat actors send emails with malicious links or attachments disguised as legitimate files (e.g., PDFs, Office documents). They also use malicious advertisements on legitimate websites which redirect victims to websites hosting ransomware.
- Once executed on a system, ransomware starts encrypting files using strong encryption algorithms. Encrypted files become inaccessible to the victim, who receives a ransom note demanding payment in cryptocurrency (e.g., Bitcoin) to decrypt files.
- Fraudsters further instruct to pay the ransom and often threaten to delete files or sell it on dark-web.
- Paying the ransom does not guarantee file recovery or removal of malware, and this encourage further attacks.
PRECAUTIONS:
- Ensure regular back up of important files to an external hard drives, tapes, or cloud storage service.
- Regularly update operating system, antivirus software, and applications from legitimate OEM websites to protect against vulnerabilities.
- Avoid opening attachments or clicking on links in emails from unknown or dubious senders.
- Install licensed and effective antivirus software and keep it up to date to detect and block ransomware and other malware threats.
- Learn to recognize phishing attempts, where attackers attempt to trick you for revealing sensitive information or installing malware.
- Install software and files from trusted sources only. Verify the authenticity of websites before downloading anything.
QR Code Scams
MODUS OPERANDI:
- Fraudsters often contact customers under various pretexts and trick them into scanning Quick Response (QR) codes using the apps on the customer’s phone.
- By scanning such QR codes, customers may unknowingly authorize the payment to fraudsters account.
PRECAUTIONS:
- Be cautious while scanning QR code/s using any payment app. QR codes have account details embedded in them to transfer money to a particular account, check it before authorizing the payment.
- Never scan any QR code for receiving money. Transactions involving receipt of money do not require scanning barcodes / QR codes or entering mobile banking PIN (m-PIN), passwords, etc.
- If you use UPI mobile app, ensure to secure it with a code.
- Never share your UPI ID or bank account details with people whom you do not know.
- Never share OTPs with anyone.
Investment Scams
MODUS OPERANDI:
- Fraudsters lure people by promising for quick and high returns.
- They persuade you to invest money in such schemes, which actually are Investment scheme scams.
- They offer money against simple jobs i.e. like the YouTube videos shared via links to earn money.
- Fraudster gives you high profits in first few days to gain your trust and adds you in a fake Whatsapp /Telegram group. showcasing false profits made by others.
- Then they slowly pressurize you to invest more money.
- As you sufficiently invest more money, fraudster asks extra fees from you to withdraw your profit.
- They disappear in between, leaving you with no money.
PRECAUTIONS:
- Do Your Research: Before investing in any scheme, check thoroughly about the company and person offering the opportunity. Look for any warnings from regulators on that company, application, personnel etc.
- Verify Credentials: Make sure that the person/company is having license and duly registered.
- Avoid Hasty Decisions: Don’t rush into making decision and invest money. Legitimate
investment schemes will provide you sufficient time to think and consult.
AePS Frauds
Guard Your Biometrics: Outsmart AePS Fraud Tactics
MODUS OPERANDI:
- Cybercriminals use Aadhaar numbers and other information obtained from various sources such as scanned copies and digital records.
- By using dummy fingers (silicone fingers) that contain impressions of your fingerprints and unauthorized biometric devices, they gain access to your bank accounts.
- Once successfully authenticated, they transfer money from the bank account using the dummy fingers and immediately withdraw the money.
PRECAUTIONS:
- Regularly check your bank statement.
- Be careful while sharing Aadhaar details.
- Always try to use a masked Aadhaar/ DigiLocker instead of an Aadhaar card.
- Lock Aadhaar and biometrics via the m-Aadhaar application or https://uidai.gov.in/ and unlock them as and when required.
- Register your AePS fraud complaint on https://www.npci.org.in/register-a-complaint
Digital House Arrest
MODUS OPERANDI:
- Fraudsters set up a fake police station with actors posing as officers. They create a convincing background to appear legitimate during video calls.
- Victims receive video calls from these officers who present fabricated charges with arrest warrants.
- To avoid digital arrest or legal action, the victims are coerced into transferring money to the fraudsters accounts.
PRECAUTIONS:
- Always verify the identity of the caller independently. Contact the relevant law enforcement agency directly using official contact details.
- Never provide personal or financial information over the phone or video call unless you are certain of the caller’s identity.
- If you suspect a scam, report it to local cyber police authorities immediately.
- Report fraudulent communication on Chakshu Portal https://sancharsaathi.gov.in/sfc/
Deep fake AI-powered Vishing Attacks
Attackers impersonate familiar voices to trick you into revealing personal information or sending money to them.
MODUS OPERANDI:
- Fraudster pretend to be from government agencies, banks, or even your known persons by using Deepfake Al to mimic their voice.
- They create urgency and pressure, to manipulate you to take quick decisions.
- They often sight emergencies, legal issues, financial problems, or reputational harm, urging you to act fast without thinking clearly.
PRECAUTIONS:
- Never share personal information or transfer money hastily without verifying caller identity through official channels like helpdesk numbers on official websites etc.
- Be wary of urgency tactics, take your time to verify the situation before making a decision. Discuss with your well-wishers / other persons having exposure to referenced agencies.
- Be cautious with unknown calls and messages. Don’t click on suspicious links or attachments received on Emails and SMSs.
Extracted from : https://bankofindia.co.in/documents/20121/408538/BOI_CYBER_STAR-2024.pdf
I'm universal first
before I'm Indian,
before I have this belief or that belief,
before I have these mental states arising or that mental state.
So,
anchoring in that universality
and then Skillfully
finding our uniqueness.
If
we flip the order
and unique goes before the universal,
we get into a lot of trouble. - Nipun Mehta, Ahimsa Conversations: https://www.youtube.com/watch?v=vZmu_xRoR-g 1 min
- www.youtube.com/embed/M2NMcCU6BG4?start=1380&end=1512 2 min
- https://www.youtube.com/watch?v=M2NMcCU6BG4 Ahimsa Conversations #5 30 mins
PLEASE DOUBLE CHECK WITH YOUR PHYSICIAN...
5 Health Checkups You Should Avoid After 70 That May Harm You More Than Help! | Senior Health Tips
https://www.youtube.com/watch?v=JLa7tsq6K8Y
Five health checkups you should avoid after 70
Checkup No.5 https://www.youtube.com/watch?v=JLa7tsq6K8Y&t=99s
Number five, bone density scan. What to do.. started her on a regimen of vitamin D, weightbearing exercises like resistance bands, and a calciumrich diet with foods like sardines and leafy greens
Checkup No.4 https://www.youtube.com/watch?v=JLa7tsq6K8Y&t=277s Number four, brain MRI for memory loss. most MRIs in people over 70 simply show age related changes, which means slight shrinkage or white matter spots that are totally normal in older adults.
Checkup No.3 https://www.youtube.com/watch?v=JLa7tsq6K8Y&t=440s Number three, cardiac stress test.,
Checkup No.2 https://www.youtube.com/watch?v=JLa7tsq6K8Y&t=601s Number two,colonoscopy.
Checkup No.1 https://www.youtube.com/watch?v=JLa7tsq6K8Y&t=754s Number one, annual fullbody CT scans. The scan can detect harmless nodules, calcifications, or cysts that are simply part of aging.
https://www.youtube.com/@SeniorSecrets60
5 Armed Men Walk Into Patna Hospital, Kill Murder Accused https://www.news18.com/india/patna-hospital-firing-gangwar-paras-hospital-patna-criminals-fire-shots-9445696.html A person, identified as Chandan Mishra, who is out on parole and was undergoing treatment at Paras HMRI hospital, was shot dead by gunmen. The attackers allegedly worked as builders and were associated with a real estate firm in the area. The attackers had been allegedly involved in crime-related activities earlier.
video: https://x.com/i/status/1945757550357393855
- What Is Holding The Investors Back?
- INECC on Green Skilling
- Rahul Gandhi Plays Judge & Jury As He Threatens To Jail Assam CM
- Deans of four major TISS centres replaced
- Bihar’s SIR exercise is a threat to right to vote — across India
- Tourist Come Home
- GAIA IS CALLING: LET'S RESTORE THE PLANET TOGETHER
- PRIDE COMBATS PREJUDICE
- Richard Gere & Gaza
- Democratic Socialist of America - 2025
- Mamdani, a Communist?
- The Echo Chamber Trap: How ChatGPT Could Be Boosting Your Ego
- ow reason, particularly in its modern, abstracted, and institutionalized form, leads to violence
- What to Learn in the Age of AI
- Eric Chenoweth
- Former Israeli Intel Official Claims Jeffrey Epstein, Ghislaine Maxwell Worked for Israel
- How Nazi cinema finds a reflection in Hindutva films
- Startup co-founder warns hidden trap of India’s new tax regime
- FIR: Ajit Anjum files story after story on Bihar electoral rolls
- Withdraw Entire Land Acquisition Proceedings for 1,777 acres