sitemapHome | Registration | Job Portal for CA's | Expert Exchange | Currency Converter | Post Matrimonial Ads | Post Property Ads
News shortcuts: From the Courts | News Headlines | VAT (Value Added Tax) | Placements & Empanelment | Various Acts & Rules | Latest Circulars | New Forms | Forex | Auditing | Direct Tax | Customs and Excise | ICAI | Corporate Law | Markets | Students | General | Mergers and Acquisitions | Continuing Prof. Edu. | Budget Extravaganza | Transfer Pricing | GST - Goods and Services Tax
Latest Expert Exchange
News Headlines »
 Income Tax Return filing 2018: Here are some important tips for you
 Change in Examination Venue in Thane, Zone – II, May 2018 Examinations
 Here’s all you need to know New Income Tax return for salaried class available on IT portal
 What to do if you missed the (second) tax deadline
 Income-tax (5th Amendment) Rules, 2018 - Notification under section 9A (3) of the Income-tax Act, 1961 in respect of Fund Manager Regime
 Income Tax department warns salaried class again filing wrong ITRs
 ITR-1 form for AY 18-19 now available for e-filing
 New Income Tax Return Form for Salaried Class available in Portal
 Income Tax Return: ITR-1 ready for e-filing, says I-T department
 6 Tax changes you need to keep in mind while filing ITR for FY17-18 Income Tax Return efiling
 Income-tax (5th Amendment) Rules, 2018

On a mole's trail
August, 31st 2006
Accountants know well about intangible assets and secret reserves. Here is Secret Asset by Stella Rimington, from Hutchinson ( A thriller that takes the reader `into a world where no-one can be trusted and nothing is what is seems.' No different from the field of financial disclosures, one may fret, but this is different: About a mole in the intelligence services! Meet Liz Carlyle, `an experienced and extremely talented investigator' with `particular skills in assessing people'. Liz leads a two-person team. To help her is Peggy Kinsolving, who follows the paper trail. Peggy loved `the world of print, fact, data, information'. The author describes: "It was her metier. She could disinter information which might seem meaningless and sterile to others, then, like a primitive fire maker blowing on a spark, bring it to life. Peggy saw drama where others saw dust." Peggy catches up with `Technical Ted' Poyser, `the counter-terrorist branch's specialist on all matters electronic, back at Thames House.' She has disks dating back to the early 1990s. Ted's office is `more a cubbyhole, a windowless space, than an office,' though even `space' could be an exaggeration, says the author. "The walls were piled high with hardware devices, wires draped everywhere, and in the middle of it all was Ted, crouched on a stool like a spider in a very complicated web." He looks at the `blast from the past' that Peggy hands him. "What you've got here is a disk from a North Star computer, circa 1980. It had 64K of RAM," explains Ted. "The files on the disk are written in a word-processing program called PeachText, and the disk itself is five-and-a-quarter-inch, single-sided, single density. It's 360K, which is rough equivalent of 50,000 words. Not bad for the early eighties." Beat a trail to the Operations Room where investigators study the CCTV footage from Irwin Patel's shop. "There," calls Judith Spratt, and the screen froze. "It was not a very clear picture, but three figures were clearly discernible at the front of the shop by the till, where they were captured at a range of seven feet by the camera positioned high on the wall above the Lucozade clock." Foxhunt team assembles in a clinically bare room, that of Tom Dartmouth. "No family photos, no desk set, no curios brought back from abroad. Not even a favourite mug." Only, "Operation Foxhunt did not seem to be getting anywhere. And time was clearly running out." Elsewhere, Peggy is tracking a newspaper clipping that talks about `Ravi Singh and an associate,' who are under the Office of Fair Trade investigation for insider share dealing. "The Serious Fraud Office has been called in, because they think Ravi and this other chap may have been involved in an identity-fraud scam using other people's credit card numbers." Real fears, because a three-hour-old alert on Channel News Asia, Singapore informs, `Hackers steal credit card data from AT&T computer system.' A recent posting on alerts, "College students ID theft targets". And Arlington Advocate offers `10 tips to protect against identity theft'. Sleuthing can be tough. As much as auditing, you'd agree! For instance, Liz is trying to track a car, with a number, from among two lakh cars of the type she's looking for. Yet, to help, "there are 8,000 number-plate recognition cameras in the UK," so if the suspect is driving with the licence plate in question, a camera would pick it up at some point. Unless... he had changed the number. A pick for quick read.
Home | About Us | Terms and Conditions | Contact Us
Copyright 2018 CAinINDIA All Right Reserved.
Designed and Developed by Binarysoft Technologies Pvt. Ltd.
Organic SEO Outsourcing Organic Search Engine Optimization Outsourcing Organic Website SEO Organic SEO India Website SEO India Organic Search Engine Optimization India Organic Internet SEO India Organic Web

Transfer Pricing | International Taxation | Business Consulting | Corporate Compliance and Consulting | Assurance and Risk Advisory | Indirect Taxes | Direct Taxes | Transaction Advisory | Regular Compliance and Reporting | Tax Assessments | International Taxation Advisory | Capital Structuring | Withholding tax advisory | Expatriate Tax Reporting | Litigation | Badges | Club Badges | Seals | Military Insignias | Emblems | Family Crest | Software Development India | Software Development Company | SEO Company | Web Application Development | MLM Software | MLM Solutions