THIS POST IS CONTINUED FROM PART 9, BELOW--
SOMEBODY CALLED ME UP AND ASKED ME..
CAPTAIN—
WHO IS MUHAMMAD IBN MUSA AL-KHWARIZMI WHOM MODERN HISTORIANS ARE CALLING THE “FATHER OF COMPUTER SCIENCE” AND THE “FATHER OF ALGORITHMS”??.
LISTEN –
ARAB MUHAMMAD IBN MUSA AL-KHWARIZMI WAS A BRAIN DEAD FELLOW WHOSE ENTIRE WORK WAS SOLD TO HIM TRANSLATED INTO ARABIC BY THE CALCIUT KING FOR GOLD.
THE CALICUT KING MADE HIS MONEY BY NOT ONLY SELLING SPICES –BUT KNOWLEDGE TOO.
HE MAMANKAM FEST HELF AT TIRUNAVAYA KERALA BY THE CALICUT KING EVERY 12 YEARS WAS AN OCCASION WHERE KNOWLEDGE WAS SOLD FOR GOLD.
http://ajitvadakayil.blogspot.com/2019/10/perumal-title-of-calicut-thiyya-kings.html
EVERY ANCIENT GREEK SCHOLAR ( PYTHAGORAS/ PLATO/ SOCRATES ETC ) EXCEPT ARISTOTLE STUDIED AT KODUNGALLUR UNIVERSITY.. THE KERALA SCHOOL OF MATH WAS PART OF IT.
OUR ANCIENT BOOKS ON KNOWLEDGE DID NOT HAVE THE AUTHORs NAME AFFIXED ON THE COVER AS WE CONSIDERED BOOKS AS THE WORK OF SOULS , WHO WOULD BE BORN IN ANOTHER WOMANs WOMB AFTER DEATH.
THE GREEKS TOOK ADVANTAGE OF THIS , STOLE KNOWLEDGE FROM KERALA / INDIA AND PATENTED IT IN THEIR OWN NAMES, WITH HALF BAKED UNDERSTANDING .
WHEN THE KING OF CALICUT CAME TO KNOW THIS, HE BLACKBALLED GREEKS FROM KODUNGALLUR UNIVERSITY .. AND SUDDENLY ANCIENT GREEK KNOWLEDGE DRIED UP LIKE WATER IN THE HOT DESERT SANDS.
LATER THE CALICUT KING SOLD TRANSLATED INTO ARABIC KNOWLEDGE TO BRAIN DEAD ARABS LIKE MUHAMMAD IBN MUSA AL-KHWARIZMI FOR GOLD..
THESE ARAB MIDDLE MEN SOLD KNOWLEDGE ( LIKE MIDDLEMEN FOR SPICES) TO WHITE MEN FOR A PREMIUM.
FIBONACCI TOOK HIS ARABIC WORKS TO ITALY FROM BEJAYA , ALGERIA.
http://ajitvadakayil.blogspot.com/2010/12/perfect-six-pack-capt-ajit-vadakayil.html
EVERY VESTIGE OF ARAB KNOWLEDGE IN THE MIDDLE AGES WAS SOLD IN TRANSLATED ARABIC BY KODUNGALLUR UNIVERSITY FOR GOLD..
FROM 800 AD TO 1450 AD KODUNGALLUR UNIVERSITY OWNED BY THE CALICUT KING EARNED HUGE AMOUNT OF GOLD FOR SELLING READY MADE TRANSLATED KNOWLEDGE ..
THIS IS TIPU SULTANS GOLD WHO STOLE IT FROM NORTH KERALA TEMPLE VAULTS.. ROTHSCHILD BECAME THE RICHEST MAN ON THIS PLANET BY STEALING TIPU SUTANs GOLD IN 1799 AD.
http://ajitvadakayil.blogspot.com/2011/10/tipu-sultan-unmasked-capt-ajit.html
WHEN TIPU SULTAN WAS BLASTING TEMPLE VAULTS, LESS THAN 1% OF THE GOLD WAS SECRETLY TRANSFERRED TO SOUTH KERALA ( TRADITIONAL ENEMIES ) OF THE CALICUT KING. LIKE HOW SADDAM HUSSAIN FLEW HIS FIGHTER JETS TO ENEMY IRAN .
THIS IS THE GOLD WHICH WAS UNEARTHED FROM PADMANABHASWAMY TEMPLE..
http://ajitvadakayil.blogspot.com/2013/01/mansa-musa-king-of-mali-and-sri.html
ALGORITHMS ARE SHORTCUTS PEOPLE USE TO TELL COMPUTERS WHAT TO DO. AT ITS MOST BASIC, AN ALGORITHM SIMPLY TELLS A COMPUTER WHAT TO DO NEXT WITH AN “AND,” “OR,” OR “NOT” STATEMENT.
THE ALGORITHM IS BASICALLY A CODE DEVELOPED TO CARRY OUT A SPECIFIC PROCESS. ALGORITHMS ARE SETS OF RULES, INITIALLY SET BY HUMANS, FOR COMPUTER PROGRAMS TO FOLLOW.
A PROGRAMMING ALGORITHM IS A COMPUTER PROCEDURE THAT IS A LOT LIKE A RECIPE (CALLED A PROCEDURE) AND TELLS YOUR COMPUTER PRECISELY WHAT STEPS TO TAKE TO SOLVE A PROBLEM OR REACH A GOAL.
THERE IS NO ARTIFICIAL INTELLIGENCE WITHOUT ALGORITHMS. ALGORITHMS ARE, IN PART, OUR OPINIONS EMBEDDED IN CODE.
ALGORITHMS ARE AS OLD AS DANAVA CIVILIZATION ITSELF – THIEF GREEK EUCLID’S ALGORITHM BEING ONE OF THE FIRST EXAMPLES DATING BACK SOME 2300 YEARS
EUCLID JUST PATENTED MATH HE LEARNT IN THE KERALA SCHOOL OF MATH IN HIS OWN NAME.. EUCLID IS A THIEF LIKE PYTHAGORAS WHO LEARNT IN THE KERALA SCHOOL OF MATH.
http://ajitvadakayil.blogspot.com/2011/01/isaac-newton-calculus-thief-capt-ajit.html
ALGEBRA DERIVED FROM BRAIN DEAD AL-JABR, ONE OF THE TWO OPERATIONS HE USED TO SOLVE QUADRATIC EQUATIONS.
ALGORISM AND ALGORITHM STEM FROM ALGORITMI, THE LATIN FORM OF HIS NAME.
CONTINUED TO 2--
- https://ajitvadakayil.blogspot.com/2019/12/how-italian-waitress-became-empress-of.html
TODAY SONIA GANDHI IS ALL OVER TV, RUNNING DOWN MODI AND CAB/ NRC..
WHAT IS MOST HILARIOUS IS THAT SHE IS SITTING IN FRONT OF A BOOKSHELF PACKED WITH THICK HARDBOUND BOOKS..
WE ARE SUPPOSED TO IMAGINE-- OOOOHHH SUCH A LEARNED ITALIAN GENIUS..
WHO IS THIS WOMAN?
WHEN SHE MARRIED RAJIV GANDHI, MASSIVE PROPAGANDA WAS DONE THAT SHE WAS THE CLASS MATE OF RAJIV GANDHI AT CAMBRIDGE UNIVERSITY.. AND RAJIV GANDHI FELL FOR THIS ITALIAN BEAUTY...
IN REALITY , SHE WAS A WAITRESS IN CAMBRIDGE TOWN..
THIS DECEIT IS AKIN TO A CHAMIYA BEER BAR WAITRESS IN MUMBAI DECLARING THAT SHE STUDIED IN IIT MUMBAI..
THE ITALIAN WAITRESS ( MAINO JEWESS ) TURNED EMPRESS VIA NAC, NEVER GAVE AN INTERVIEW IN HER LIFE ..
ONCE SHE GAVE THAT TRAITOR JOURNALIST RAJDEEP SARDESAI AN INTERVIEW..
THE WHOLE CONVERSATION NEVER TOOK OFF BEYOND WHAT COLOUR SARI INDIRA GANDHI LIKED OR WHAT TYPE OF SPAGHETTI SHE COOKED..
AMIGO
ANTONIO
COLCOTRONI
VERGOTTINI
BABINO
SPAGHETTI
###########
HERE IS A TRUE STORY ABOUT VERGOTTINI
I WITNESSED THIS AS A SIX YEAR OLD BOY IN CALICUT
FATHER VERGOTTINI WAS AN ITALIAN PRIEST IN CALICUT.. HE WORE WHITE ROBES AND DROVE A BOTTLE GREEN ITALIAN SPORTS CAR ...
HE WAS STALL AND HANDSOME IN HIS OLD AGE AND COULD TURN EYES AS HE DROVE PAST..HE PRESIDED OVER ALMOST 9O % OF SPORTS FUNCTIONS IN CALICUT..
ONE DAY, A THIEF ON CYCLE SNATCHED THE GOLD CHAIN OF A SCHOOL GIRL .. I KNEW THIS GIRL AND SHE WAS CRYING..
SO I RAISED AN ALARM , AND ONE OF THE RAMBO TYPES OF CALICUT APPEARED.. HE WAS MY NEIGHBOURs RELATIVE ..
HE RAN AND APPREHENDED THE THIEF IN A RESTAURANT , AND GOT HIM AND THE GOLD CHAIN BACK TO THE CRYING GIRL..
PRETTY SOON A LARGE CROWD OF MORE THAN 300 GATHERED , AND WE WERE ALL POUNDING THE THIEF TAKING TURNS--GIVE A PUNCH AND GO BACK FOR OTHERS TO COME AND PUNCH..
SUDDENLY ONE MAN CRIED-- STOP HITTING HIM -- WE HAVE BEATEN HIM ENOUGH.. HE HAS LEARNT HIS LESSON.. IF WE HIT HIM ANYMORE, HE WILL DIE..
THEN A HEAVY ITALIAN VOICE ( IN MALAYALAM ) COMES FROM FATHER VERGOTTINI, WATCHING FROM THE BACK GROUND..
"IYYAALE VERUTHE VIDAAN PADILLA " ( DONT SPARE HIM--GIVE HIM SOME MORE )
BELIEVE THIS OR NOT-- THE ENTIRE CROW WAS IN SPLITS --LAUGHING THEIR GUTS OUT.. HERE WAS A MAN OF PEACE ENCOURAGING VIOLENCE.I HAVE NEVER SEEN A MOB MOOD TURN FROM ANGER TO EXTREME MIRTH..
THIS IS WHY I SAY AI MACHINES CAN NEVER DETECT HUMOR..
THIS PADRE WAS A PEDOPHILE.. HE SEXUALLY MOLESTED HUNDREDS OF SMALL GIRLS IN ST VINCENT COLONY GIRLS SCHOOL , CALICUT.. I GOT THIS FROM A GIRL WHO WAS MOLESTED ..
SUCH WAS HIS CLOUT THAT NOBODY DARED TO UTTER A WORD AGAINST HIM..
capt ajit vadakayil
..
CAPT AJIT VADAKAYIL SAYS AI MUST MEAN “INTELLIGENCE AUGUMENTATION “ IN FUTURE ..
Let this be IA
Let this be IA
OBJECTIVE AI CANNOT HAVE A VISION,
IT CANNOT PRIORITIZE,
IT CANT GLEAN CONTEXT,
IT CANT TELL THE MORAL OF A STORY ,
IT CANT RECOGNIZE A JOKE, OR BE A JUDGE IN A JOKE CONTEST
IT CANT DRIVE CHANGE,
IT CANNOT INNOVATE,
IT CANNOT DO ROOT CAUSE ANALYSIS ,
IT CANNOT MULTI-TASK,
IT CANNOT DETECT SARCASM,
IT CANNOT DO DYNAMIC RISK ASSESSMENT ,
IT IS UNABLE TO REFINE OWN KNOWLEDGE TO WISDOM,
IT IS BLIND TO SUBJECTIVITY,
IT CANNOT EVALUATE POTENTIAL,
IT CANNOT SELF IMPROVE WITH EXPERIENCE,
IT CANNOT UNLEARN
IT IS PRONE TO CATASTROPHIC FORGETTING
IT DOES NOT UNDERSTAND BASICS OF CAUSE AND EFFECT,
IT CANNOT JUDGE SUBJECTIVELY TO VETO/ ABORT,
IT CANNOT FOSTER TEAMWORK DUE TO RESTRICTED SCOPE,
IT CANNOT MENTOR,
IT CANNOT BE CREATIVE,
IT CANNOT THINK FOR ITSELF,
IT CANNOT TEACH OR ANSWER STUDENTs QUESTIONS,
IT CANNOT PATENT AN INVENTION,
IT CANNOT SEE THE BIG PICTURE ,
IT CANNOT FIGURE OUT WHAT IS MORALLY WRONG,
IT CANNOT PROVIDE NATURAL JUSTICE,
IT CANNOT FORMULATE LAWS
IT CANNOT FIGURE OUT WHAT GOES AGAINST HUMAN DIGNITY
IT CAN BE FOOLED EASILY USING DECOYS WHICH CANT FOOL A CHILD,
IT CANNOT BE A SELF STARTER,
IT CANNOT UNDERSTAND APT TIMING,
IT CANNOT FEEL
IT CANNOT GET INSPIRED
IT CANNOT USE PAIN AS FEEDBACK,
IT CANNOT GET EXCITED BY ANYTHING
IT HAS NO SPONTANEITY TO MAKE THE BEST OUT OF SITUATION
IT CAN BE CONFOUNDED BY NEW SITUATIONS
IT CANNOT FIGURE OUT GREY AREAS,
IT CANNOT GLEAN WORTH OR VALUE
IT CANNOT UNDERSTAND TEAMWORK DYNAMICS
IT HAS NO INTENTION
IT HAS NO INTUITION,
IT HAS NO FREE WILL
IT HAS NO DESIRE
IT CANNOT SET A GOAL
IT CANNOT BE SUBJECTED TO THE LAWS OF KARMA
ON THE CONTRARY IT CAN SPAWN FOUL AND RUTHLESS GLOBAL FRAUD ( CLIMATE CHANGE DUE TO CO2 ) WITH DELIBERATE BLACK BOX ALGORITHMS, JUST FEW AMONG MORE THAN 60 CRITICAL INHERENT DEFICIENCIES.
HUMANS HAVE THINGS A COMPUTER CAN NEVER HAVE.. A SUBCONSCIOUS BRAIN LOBE, REM SLEEP WHICH BACKS UP BETWEEN RIGHT/ LEFT BRAIN LOBES AND FROM AAKASHA BANK, A GUT WHICH INTUITS, 30 TRILLION BODY CELLS WHICH HOLD MEMORY, A VAGUS NERVE , AN AMYGDALA , 73% WATER IN BRAIN FOR MEMORY, 10 BILLION MILES ORGANIC DNA MOBIUS WIRING ETC.
SINGULARITY , MY ASS !
The primary reason
behind the shift to the cloud is the cost-friendliness of the technology when
compared to on-site storage. This stems from the fact as it does not need any
investments on physical investments or any kind of expert for the management as
it is handled by the cloud service provider.
Cloud computing removes
hardware expenses, as hardware is provided by a vendor. There’s no need to buy,
install, configure, and maintain servers, databases, and other components of
your runtime environment. Moreover, using cloud-based solutions, you pay only
for what you use, so if you don’t need extra resources you can simply scale down
and not pay for them.
You pay for the
capacity you use. This allows your organization to treat cloud storage costs as
an ongoing operating expense instead of a capital expense with the associated
upfront investments and tax implications.
The costs associated
with the hardware, applications, and bandwidth are responsibility of the
supplier. The payment of the service is usually monthly or annual and according
to the usage as it follows the model, pay-as-you-go.
Organizations that
deploy cloud computing services save more than 35 percent on operating costs
each year. Maintaining an in-house
IT team big enough to manage local servers can quickly lead to a ballooning
budget.
Cost of benefits, which
cloud service can help reduce include , fewer upfront costs, since you are not
required to purchase hardware. Potential for lower lifetime costs on
configuration and maintenance. Access to expert assistance on setup,
configuration, maintenance, and software licenses. Potential to consolidate
servers and increase workload efficiency..
Server virtualization
brings positive transformations, such as reduced hardware costs, improved
server provisioning and deployment, better disaster recovery solutions,
efficient and economic use of energy, and increased staff productivity.
There are a lot of
options available in the market, you need to dig deeper into Shared vs Cloud vs
Dedicated hosting to decide which best suits your needs.
Before taking a final
call, Ask yourself these Questions:
What’s my monthly
budget?
Daily and monthly
traffic I expect on my website
Any expected traffic
spikes? If yes, how much?
Security requirements.
Do I need a dedicated
IP for my website?
Is private SSL
required?
Do I need server root
access?
Best Cheap Cloud
Hosting Providers 2019--
Vultr. Vultr is a very
cheap cloud hosting provider which offer plans starting at $2.50 per month. ...
Kamatera – Get 30 Days
Free Trial. ...
CloudWays. ...
Host1Plus | Heficed.
...
Digital Ocean. ...
InterServer. ...
A2Hosting [99.99%
Uptime] ...
BlueHost [Best for
Bloggers]
Now Google is making a
terabyte of cloud storage available for just $10. Check out Google Drive's new
pricing structure announced last week, which now offers the first 15 GB per
month for free. For $100 a month, Google offers as much space you could ever need:
10 terabytes or more.
The Google Cloud
Platform Free Tier gives you free resources to learn about Google Cloud
Platform (GCP) services by trying them on your own. ... A 12-month free trial
with $300 credit to use with any GCP services. Always Free, which provides
limited access to many common GCP resources, free of charge.
Scalability in the
context of cloud computing can be defined as the ability to handle growing or
diminishing resources to meet business demands in a capable way. In essence,
scalability is a planned level of capacity that can grow or shrink as needed.
Public cloud solutions
allow you to evolve at almost infinite speed. This would not be possible in a
local data center. Because the division of resources between customers is done
dynamically, your business can double or even triple the amount of computing
and storage to meet peak demand.
The hiring of the
service is done on demand. This way, you also gain scalability to grow. If
there are traffic spikes or the data center reaches the operating limit, simply
switch to a more comprehensive plan. Again, it’s a cheaper solution than buying
mainframes and routers.
Cloud hosting provides
scalability at a vast scale as compared to dedicated hosting. This is a treat for
those users who have customers with demands changing on a daily basis. So
basically one can scale up or down easily with cloud hosting and meet the
flexibility in their demands.
Scalability is one of
the most valuable and predominant feature of cloud computing. Through
scalability you can scale up your data storage capacity or scale it down to
meet the demands of your growing business
Simply put, if a cloud
computing system (i.e. networks, storage, servers, applications and services)
can rapidly respond to meet new demands – either in size or volume – it is
scalable. Traditionally, businesses were tied to physical constraints, such as
hard-drive space and memory, all of which impeded scalability
One of the main
benefits that come with using public cloud services is the ease of
scalability—to a point. For small and medium-sized businesses in general,
scalability is pay-as-you-go. The resources are pretty much offered 'on demand'
so any changes in activity level can be handled very easily. This, in turn,
brings with it cost-effectiveness.
Thanks to the pooling
of a large number of resources, users are benefiting from the savings of
large-scale operations. There are many services, like Google Drive, which are
offered for free.
Finally, the vast
network of servers involved in public cloud services means that it can benefit
from greater reliability.
On-premises solutions
are rather difficult to scale, as the type of hardware needed depends on your
application’s demands. If your app experiences heavy traffic, you might need to
significantly upgrade on-premises hardware. This problem doesn’t exist with a
cloud service, which you can quickly scale up or down with a few clicks. Cloud
services are a perfect solution for handling peak loads. With cloud-based
services, businesses can use whatever computing resources they need.
Growth constraints are
one of the most severe limitations of on-premise storage. With cloud storage,
you can scale up as much as you need. Capacity is virtually unlimited.
Cloud hosting allows
you to be more flexible with your tech resources. Cloud hosting companies go to
great lengths to make sure that you can easily scale your site’s processing
power and disk space as you go. This makes cloud hosting a great option for
growing businesses.
The consequences of not
having enough computing or storage resources are dire: First come performance
issues, then users start getting error messages and then they are locked out of
applications.
Unfortunately, some
organizations panic and try to solve the problem by buying more and more
computer hardware. That can make the problem worse: if demand drops, hardware
goes underutilized and constrains a company’s capital expenditure budget.
Scalability is the
ability to handle growing or diminishing resources to meet business demands. In
other words, scalability is a planned level of capacity that can grow or shrink
as needed. It means your IT environment is suddenly flexible enough to deliver
exactly the right amount of computing power when you need it.
When computer
scientists talk about the kind of growth seen in most corporate environments,
it’s called exponential growth. That word gets used a lot and may be one of the
most misused terms in vogue today. To understand why traditional IT technology
cannot be expected to process high volumes of data, it’s important to
understand that term.
When faced with an
exponentially growing challenge, people often respond with linear solutions.
When a law firm that is used to dealing with gigabytes of evidence in
litigation starts to get cases involving a terabyte of data, their instinct is
to upgrade their technology. That means giving their IT guy a budget to buy
more computers.
Unfortunately,
computers can be a bottleneck. You can always throw hardware at the problem,
but when an application that used to create several gigabytes of data are
suddenly creating terabytes of data, a few new computers is not going to
address the problem.
Because cloud providers
can scale to manage increasing demand, you can have an non-linear solution for
your business challenges. A cloud provider like Amazon Web Services hosts
trillions of objects at any one time, which means your exponential growth is
just a blip to them.
Scalability Testing is
defined as the ability of a network, system or a process to continue to
function well when changes are done in the size or volume of the system to meet
a growing need. It is a type of non-functional testing.
Scalability testing
ensures that an application can handle the projected increase in user traffic,
data volume, transaction counts frequency, etc. It tests the system, processes,
and databases ability to meet a growing need.
It is also referred to
as performance testing, as such, it is focused on the behavior of the
application when deployed to a larger system or tested under excess load.
In Software
Engineering, Scalability Testing is to measure at what point the application
stops scaling and identify the reason behind it.
Why do Scalability
Testing--
Scalability testing
lets you determine how your application scales with increasing workload.
Determine the user
limit for the Web application.
Determine client-side
degradation and end user experience under load.
Determine server-side
robustness and degradation.
What to test in
Scalability Testing
Here are few
Scalability Testing Attributes:--
Response Time
Screen transition
Throughput
Time (Session time,
reboot time, printing time, transaction time, task execution time)
Performance measurement
with a number of users
Request per seconds,
Transaction per seconds, Hits per second
Performance measurement
with a number of users
Network Usage
CPU / Memory Usage
Web Server ( request
and response per seconds)
Performance measurement
under load
Test Strategy for
Scalability testing
Test Strategy for
Scalability Testing differ in terms of the type of application is being tested.
If an application accesses a database, testing parameters will be testing the
size of the database in relation to the number of users and so on.
Prerequisites for
Scalability Testing--
Load Distribution
Capability- Check whether the load test tool enables the load to be generated
from multiple machines and controlled from a central point.
Operating System- Check
what operating systems do the load generation agents and load test master run
under
Processor- Check what
type of CPU is required for the virtual user agent and load test master
Memory- Check how much
memory would be enough for the virtual user agent and load test master
How to do Scalability
Testing--
Define a process that
is repeatable for executing scalability tests throughout the application
life-cycle
Determine the criteria
for scalability
Shortlist the software
tools required to run the load test
Set the testing
environment and configure the hardware required to execute scalability tests
Plan the test scenarios
as well as Scalability Tests
Create and verify
visual script
Create and verify the
load test scenarios
Execute the tests
Evaluate the results
Generate required
reports
Scalability Test Plan
Before you actually
create the tests, develop a detailed test plan. It is an important step to
ensure that the test conforms as per the application requirement.
Following are the
attributes for creating a well-defined Test Plan for Scalability Testing.--
Steps for Scripts: The
test script should have a detailed step that determines the exact actions a
user would perform.
Run-Time Data: The test
plan should determine any run-time data that is required to interact with the
application
Data Driven Tests: If
the scripts need varying data at run-time, you need to have an understanding of
all the fields that require this data.
Virtualization is what
makes scalability in cloud computing possible.
Virtual machines (VMs)
are scalable. They’re not like physical machines, whose resources are
relatively fixed.
You can add any amount
of resources to VMs at any time. You can scale them up by:--
Moving them to a server
with more resources
Hosting them on
multiple servers at once (clustering)
The other reason cloud
computing is scalable? Cloud providers already have all the necessary hardware
and software in place.
Individual businesses,
in contrast, can’t afford to have surplus hardware on standby.
Cloud Scaling
Strategies--
There are two ways to
scale: vertically or horizontally. When you scale vertically, it’s often called
scaling up or down. When you scale horizontally, you are scaling out or in.
Cloud Vertical Scaling
refers to adding more CPU, memory, or I/O resources to an existing server, or
replacing one server with a more powerful server. Amazon Web Services (AWS)
vertical scaling and Microsoft Azure vertical scaling can be accomplished by changing
instance sizes, or in a data center by purchasing a new, more powerful
appliance and discarding the old one. AWS and Azure cloud services have many
different instance sizes, so scaling vertically is possible for everything from
EC2 instances to RDS databases.
Cloud Horizontal
Scaling refers to provisioning additional servers to meet your needs, often
splitting workloads between servers to limit the number of requests any
individual server is getting. In a cloud-based environment, this would mean
adding additional instances instead of moving to a larger instance size.
In practice, scaling
horizontally (or out and in) is usually the best practice. It’s much easier to
accomplish without downtime—even in a cloud environment, scaling vertically
usually requires making the application unavailable for some amount of time.
Horizontal scaling is also easier to manage automatically, and limiting the
number of requests any instance gets at one time is good for performance, no
matter how large the instance.
Manual vs Scheduled vs
Automatic
There are essentially
three ways to scale in a cloud environment: Manually, scheduled and automatic.
Manual scaling is just
as it sounds. It requires an engineer to manage scaling up and out or down and
in.
In the cloud, both vertical and horizontal scaling can be accomplished with
the push of a button, so the actual scaling isn’t terribly difficult. However,
because it requires a team member’s attention, manual scaling cannot take into
account all the minute-by-minute fluctuations in demand seen by a normal
application. This also can lead to human error. An individual might forget to
scale back down, leading to extra charges.
Scheduled scaling
solves some of the problems with manual scaling. Based on your usual demand
curve, you can scale out to, for example, 10 instances from 5 pm to 10 pm and
then back into two instances from 10 pm to 7 am, then back out to five
instances at 5 pm. This makes it easier to tailor your provisioning to your
actual usage without requiring a team member to make the changes manually every
day.
Automatic scaling (also
known as autoscaling) is when your compute, database, and storage resources
scale automatically based on predefined rules. For example, when metrics like
vCPU, memory, and network utilization rates go above or below a certain
threshold, you can scale up, down, out or in.
Autoscaling makes it possible to
ensure your application is always available—and always has enough resources
provisioned to prevent performance problems or outages—without paying for far
more resources than you are actually using.
Scaling and Cost
Management
Scaling is one of the
most important components of cloud cost management. Right Sizing instances, or
choosing the correct instance sizes based on your actual application
utilization, is one of the easiest ways to reduce cloud costs without affecting
performance in any way.
There are also some cost management strategies, like
Reserved Instance (RI) purchases, that take away some of the ability to scale
in or down, because you’re committing to using a certain amount and type of
resources for one to three years.
When you’re looking for
ways to reduce costs, it’s important to understand your current usage patterns
and utilization rates to make the best decisions about how to strike a balance
between total scaling flexibility and cost management strategies like Reserved
Instance purchases.
The most obvious and
the biggest advantage of cloud computing is the endless storage capacity which
can be expanded on a very nominal monthly fee.
Unlike traditional
storage infrastructure, the cloud offers a more secure ecosystem and
significantly brings down the chances of hacking, malware and even threat from
viruses.
A great thing about
using a cloud computing platform is the unlimited capacity of data storage.
Even if your cloud storage platform prompts you there’s limited space
available, then you can always upgrade it by paying a little extra fee,
whenever the need arises.
Managed cloud hosting
is built on a high performing and private cloud infrastructure. It utilizes
redundancy through its several servers, storage protection, and storage area
network to deliver dependable failure protection.
If, however, you need
to increase your processing power or storage space, you’ll have to upgrade to a
more powerful server. Traditional web hosting companies offer limited computing
resources and disk space, and once you consume your allocated resources, you’ll
either end up with lower performance or having to pay a higher fee for a
different hosting plan. And it isn’t just the $$ cost of moving to a more
powerful plan, the extra cost can be counted in the time and hassle of having
to make that move.
On the other hand,
cloud hosting allows you to more easily scale your plan based on your specific
needs. You’ll get access to multiple servers in the same cloud network enabling
you to easily make use of the computer resources and storage space you need,
when you need it. Some cloud hosting providers also let you track your usage
and automatically scale resources through an intuitive management portal.
Off-site management:
Your cloud provider assumes responsibility for maintaining and protecting the
stored data. This frees your staff from tasks associated with storage, such as
procurement, installation, administration, and maintenance. As such, your staff
can focus on other priorities.
Quick implementation:
Using a cloud service accelerates the process of setting up and adding to your
storage capabilities. With cloud storage, you can provision the service and
start using it within hours or days, depending on how much capacity is
involved..
.
Cloud allows accessing
of data or files from any location which is on the web. This comes in very
handy in the latest work cultures where many employees are working remotely. In
such cases having access to work-related files and documents becomes highly
essential.
Public cloud has
minimal risk of losing data as most of the cloud service providers will have
multiple back-up infrastructures.
With your service
provider taking care of maintenance and backups,
Data loss can spell
disaster for a company of any size.. Cloud-based storage is much more secure
than operating an on-site data center. Organizations that store their data on
the premises see 51 percent more security incidents than those that use cloud
storage.
Even if one data center
was to fail entirely, the network simply redistributes the load among the
remaining centers—making it highly unlikely that the public cloud would ever
fail. In summary, the benefits of the public cloud are:--
Cost effectiveness
Increased reliability
This alternative is
great for startups and other companies that want to maintain a lean structure
without investing in equipment or physical space.
Business continuity:
Storing data offsite supports business continuity in the event that a natural
disaster or terrorist attack cuts access to your premises.
The advantages of cloud
solutions are huge, so it stands to reason that the cloud services market is
booming. Global public cloud services
market is expected to reach almost $247 billion this year and grow to over $383
billion by 2020.
Disadvantages of the
public cloud
You can scale up with a
public cloud, but you can also run into surprise costs if you need to move
large amounts of data in, out, or even within the public cloud.
Performance can be an
issue, too. Your data transmission might be affected by spikes in use across
the internet. If application performance is a deal breaker for you, then you
may be forced to go with a private cloud.
Benefits of a private
cloud--
The private cloud
allows you nearly all the same benefits of the public cloud, but more so.
Most notably, the
private cloud can provide a greater level of security, making it ideal for
larger businesses, or businesses that handle HIPAA or financial data. With a
private cloud, this can be achieved while still allowing the organization to
benefit from cloud computing.
Private cloud services
offer additional benefits for business users, including more control over the
server. This allows it to be tailored to your own preferences and in-house
styles. While this can remove some of the scalability options, private cloud
providers often offer what is known as "cloud bursting" (aka hybrid
clouds)—when non-sensitive data is switched to a public cloud to free up
private cloud space in the event of a significant spike in demand.
In summary, the main
benefits of the private cloud are:--
Improved security
Greater control over
the server
Flexibility in the form
of cloud bursting
Cloud computing enables
high-speed data flow over the network. As a result, it causes faster big data
processing. An enormous amount of IoT data generation which will feed the big
data systems. To reduce the complexity of data blending in IoT which is one of
its criteria to maximize its benefits.
Cloud helps in achieving efficiency,
accuracy, speed in implementing IoT applications. Cloud helps IoT application
development but IoT is not a cloud computing. ... Many cloud service providers
have identified this need and started giving IoT specific services to companies
to create better IoT solutions
Immediate availability.
Cloud solutions are available as soon as you’ve paid for them, so you can start
using a cloud service right away. There’s no need to install and configure
hardware.
Performance. Cloud
companies equip their data centers with high-performance computing
infrastructure that guarantees low network latency for your applications.
Security. Cloud
infrastructure is kept in safe data centers to ensure a top level of security.
Data is backed up and can easily be recovered. Moreover, cloud vendors ensure
the security of your data by using networking firewalls, encryption, and
sophisticated tools for detecting cybercrime and fraud.
Performance. Cloud
hosting gives you better overall performance as compared to regular web hosting
as it uses many servers to deliver the computing power and storage space your
site needs. Its huge pool of computing resources allows you to tap into more
resources, as necessary.
Uptime and consistent
availability. Cloud hosting is built to be “self-troubleshooting”. It utilizes
several servers which are joined together to automatically take over in case
one or more servers face issues. In other words, your site’s visitors won’t
experience any downtime even if the server your website is hosted on fails.
Disaster recovery.
Disaster recovery is simple and easy with cloud hosting as they’re designed to
automatically take regular data backups. Having several versions of your data
eliminates the possibility of you losing your data.
A large majority of IT
managers see the implementation of a disaster recovery plan as expensive,
complex, and difficult to deploy. But now service providers such as Microsoft
Azure provide disaster recovery for all major IT systems without the
expenditure of any secondary infrastructure.
One of the advantages of storing data in the
cloud is that there isn’t one single point of failure. Your data gets backed up
to several servers, so if one of them fails, your organization’s information
remains safe and secure.
A single point of
failure is what led to the infamous Equifax and Verizon data breaches, and many
companies have taken steps to avoid this fatal flaw in storage security. Cloud
storage is one way organizations can eliminate this danger.
Cloud computing allows
multiple employees to view and make changes to files and documents in real
time, providing a much more efficient way for workers to collaborate on
projects. Accessing documents in the cloud helps ensure everyone is working
from the correct version of a document and that obsolete versions don’t get
passed between local sources.
A significant portion
of maintaining in-house data storage is performing regular backups. The IT team
has to take time to create backups and schedule them around daily operations.
Cloud computing services go a long way toward automating these routine backups
so your team can get back to doing the work that drives your business forward.
Cloud computing can
free up your office for more workspace or amenities while eliminating the need
to plan for future equipment expansion. With cloud, you do not have to worry
about the installation of dedicated breakers, high voltage lines, special HVAC
systems or even backup generators.
Gone are the days when companies allocated a
hefty budget on maintaining and installing their data centers. Now, they can
store an endless amount of data, using a cloud computing software online.
Why is cloud better
than on-premise? Dubbed better than
on-premise due to its flexibility, reliability and security, cloud removes the
hassle of maintaining and updating systems, allowing you to invest your time,
money and resources into fulfilling your core business strategies
Cloud can be configured
to give your business the same features of a dedicated server in a shared
environment. Cloud is more reliable as it runs on multiple servers and even if
one component fails, services continue from the other servers. It is scalable
on demand. Cloud is available via internet and allows the users to access the
data from any location. Users pay for the services they use.
For a managed cloud
hosting service the provider will generally take care of the following:--
High Availability.
Automated resource
balancing. In case a server fails, cloud servers are able to quickly balance
website loads between hardware servers which also automatically take backups.
This is typically managed at the virtualization level and can also manage and
update software and hardware.
Security Management.
Protected firewalls and intrusion detection systems, virtual local area
networks (VLAN), and intrusion prevention systems are used by managed cloud
servers to offer a high-end security environment.
Hybridization of
virtual and physical servers. Apps and database systems are able to share a
dedicated network with cloud servers which creates physical and virtual systems
on a single system.
As you might expect,
managed cloud hosting is more expensive than unmanaged hosting as you are
paying for more comprehensive support from the hosting company.
Yes, cloud hosting is
more readily scalable than traditional web hosting. Easy scaling is one of the
main benefits of the cloud.
With traditional web
hosting, particularly shared hosting, hosting servers are allocated a fixed
amount of computing resources. All of the websites that are hosted on the same
server use those resources.
Cloud computing is
entirely dependent on the internet. It cannot access or store data on the cloud
without an internet connection.
If your Internet
connection goes down, you won’t have access to data stored in the cloud for the
duration of the outage.
A big cloud risk is
that the vendor can go down as well. Anything from bad weather, DDoS attacks,
or a good ol’ system failure can knock the service unresponsive.
99% uptime means 1%
downtime. Over the course of 365 days, that’s 3.65 days the service will be
down. That’s equal to 87.6 hours.
But when do those hours
occur? Late at night? During the day?
If those 87 hours were
to occur during business hours, then that’s equivalent to 10 days of downtime.
Can your client live
without this service for 10 business days?
And remember: That’s
just for the cloud service. The client’s internet connection will also
experience downtime. If you again assume 99% uptime and 1% downtime, then
that’s as much as 20 business days that your client will not be able to reach
the cloud service.
Can your client live
without the service for 20 days?
A breach of your data
or your client’s data can be devastating depending on the type of data and the
extent of the breach.
The costs of
investigating and resolving a breach, associated legal expenses, and the losses
to a company’s reputation, can be enough to shut its doors..
The security of the
data stored on the cloud is something that everybody is concerned about. It
doesn’t matter what package you decide to go for while choosing the cloud
computing platform, you can’t deviate from the reality, i.e. you will be
placing your sensitive data and information in the hands of a third party
service.
KOSHER BIG BROTHER
KNOWS EVERYTHING.. ALL BIG PLAYERS ARE
AGENTS OF THE JEWISH DEEP STATE..
Cloud storage cons
include the following:
Security: Security
concerns are common with cloud-based services. Cloud storage providers try to
secure their infrastructure with up-to-date technologies and practices, but
occasional breaches have occurred, creating discomfort with users.
Administrative control:
Being able to view your data, access it, and move it at will is another common
concern with cloud resources. Offloading maintenance and management to a third
party offers advantages but also can limit your control over your data.
Latency: Delays in data
transmission to and from the cloud can occur as a result of traffic congestion,
especially when you use shared public internet connections. However, companies
can minimize latency by increasing connection bandwidth.
Regulatory compliance:
Certain industries, such as healthcare and finance, have to comply with strict
data privacy and archival regulations, which may prevent companies from using
cloud storage for certain types of files, such as medical and investment
records. If you can, choose a cloud storage provider that supports compliance
with any industry regulations impacting your business.
There are downsides to
using public cloud services. At the top of the list is the fact that the
security of data held within a public cloud is a cause for concern. It is often
seen as an advantage that the public cloud has no geographical restrictions,
making access easy from wherever you are. But on the flip side, this could mean
that your server is in a different country which is governed by an entirely
different set of security and/or privacy regulations.
One simply can’t ignore
the vulnerabilities of trusting someone else with your company’s sensitive data
and information. Storing data on the cloud is akin to exposing your company’s
important data and information to the potential threats over the internet.
Therefore, to keep such information from becoming a hacker’s playground, always
remember to keep your passwords discreet. Plus, every once or twice a month,
don’t forget to update your cloud’s password.
EXTRA SENSITIVE DATA ,
DON’T EVEN COUNT PASSWORDS TO PROTECT..
IT IS A PIECE OF CAKE TO HACK PASSWORDS
Cloud computing refers
to the delivery of computing services over the internet—e.g., software
applications, networks, storage, servers... You have no control and visibility
over how the data center is managed and how and where your data is stored.
Data breaches may
involve personal health information (PHI), personally identifiable information
(PII), trade secrets or intellectual property. ... If anyone who is not
specifically authorized to do so views such data, the organization charged with
protecting that information is said to have suffered a data breach.
Data Breaches Expose
4.1 Billion Records In First Six Months Of 2019. According to Risk Based
Security research newly published in the 2019 MidYear QuickView Data Breach
Report, the first six months of 2019 have seen more than 3,800 publicly
disclosed breaches exposing an incredible 4.1 billion compromised records
Google to shut down
Google+ early due to bug that leaked data of 52.5 million users. ... This marks
the second data breach for Google's disappointing social network. The first
occurred in October, when up to 500,000 users' data was compromised. Shortly
after, Google announced it would shut down the platform in 2019
In September of 2017,
Equifax announced a data breach that exposed the personal information of 147
million people. Under a settlement filed today, Equifax agreed to spend up to
$425 million to help people affected by the data breach.
The financial impact of
unplanned downtime cannot be understated. For every minute of unplanned
downtime due to a data center outage, a company loses $5,600 on average. That’s
$300,000 in just one hour. While employees might enjoy the extra time spent in
the break room, the productivity lost during that time is money you won’t get
back. Unplanned downtime can also heavily damage a company’s reputation if it
affects customers.
A data breach is a
confirmed incident in which sensitive, confidential or otherwise protected data
has been accessed and/or disclosed in an unauthorized fashionAs hackers
demonstrated through the celebrity iCloud breach, poor password security can
give cybercriminals an all-access pass to your private data. ... However, the
biggest cause of concern for Cloud storage isn't hacked data, it's lost data.
One of the most famous
examples of failure to protect against this personnel security risk is Edward
Snowden and his exposure of the U.S. National Security Agency's surveillance
program, PRISM.
Besides data storage of
large-scaled data, cloud computing environment usually provides data processing
service. ... Cloud computing providers are trusted to maintain data integrity
and accuracy.
A data breach occurs
when a cybercriminal successfully infiltrates a data source and extracts
sensitive information. This can be done physically by accessing a computer or
network to steal local files or by bypassing network security remotely
Sometimes, hackers want
to steal your data so that they can hold it for ransom. This type of attack is
a ransomware attack. ... Hackers usually execute ransomware attacks by gaining
unauthorized access to data, then encrypting it or moving it and charging a
ransom in order to restore your access to it.
Be sure to use the
appropriate security methods, such as Intrusion Detection and Prevention (IDPS)
systems.
An Intrusion Prevention
System or IPS, also known as an Intrusion Detection and Prevention System or
IDPS, is a network security appliance that monitors network and system
activities and detects possible intrusions.
Intrusion detection is
the process of monitoring the events occurring in your network and analyzing
them for signs of possible incidents, violations, or imminent threats to your
security policies.
Intrusion prevention is the process of performing intrusion
detection and then stopping the detected incidents. These security measures are
available as intrusion detection systems (IDS) and intrusion prevention systems
(IPS), which become part of your network to detect and stop potential
incidents.
Intrusion detection
systems (IDS) and intrusion prevention systems (IPS) constantly watch your
network, identifying possible incidents and logging information about them,
stopping the incidents, and reporting them to security administrators.
In
addition, some networks use IDS/IPS for identifying problems with security
policies and deterring individuals from violating security policies. IDS/IPS
have become a necessary addition to the security infrastructure of most
organizations, precisely because they can stop attackers while they are
gathering information about your network.
The three IDS detection
methodologies are typically used to detect incidents.--
Signature-Based
Detection compares signatures against observed events to identify possible
incidents. This is the simplest detection method because it compares only the
current unit of activity (such as a packet or a log entry, to a list of
signatures) using string comparison operations.
Anomaly-Based Detection
compares definitions of what is considered normal activity with observed events
in order to identify significant deviations. This detection method can be very
effective at spotting previously unknown threats.
Stateful Protocol
Analysis compares predetermined profiles of generally accepted definitions for
benign protocol activity for each protocol state against observed events in
order to identify deviations.
What is difference IDS
and IPS?
The main difference
between them is that IDS is a monitoring system, while IPS is a control system.
IDS doesn't alter the network packets in any way, whereas IPS prevents the
packet from delivery based on the contents of the packet, much like how a
firewall prevents traffic by IP address.
The main difference is
that an IDS only monitors traffic. If an attack is detected, the IDS reports
the attack, but it is then up to the administrator to take action. That's why
having both an IDS and IPS system is critical. A good security strategy is to
have them work together as a team
An intrusion detection
system (IDS) is a device or software application that monitors a network or
systems for malicious activity or policy violations. Any malicious activity or
violation is typically reported either to an administrator or collected
centrally using a security information and event management (SIEM) system. A
SIEM system combines outputs from multiple sources and uses alarm filtering
techniques to distinguish malicious activity from false alarms
The IPS sits between
your firewall and the rest of your network. Because, it can stop the suspected
traffic from getting to the rest of the network. The IPS monitors the inbound
packets and what they are really being used for before deciding to let the
packets into the network
an intrusion detection
system (IDS) differs from a firewall in that a firewall looks outwardly for
intrusions in order to stop them from happening. Firewalls limit access between
networks to prevent intrusion and do not signal an attack from inside the
network.
intrusion detection
systems and intrusion prevention systems are both important parts of network
integrity.. Sometimes the systems overlap, and sometimes they’re combined or
referred to together as IDPS. Although IPS is becoming a more dominant security
method, it’s important to be familiar with both.
An IDS monitors your
network for possible dangerous activity, including malicious acts and
violations of security protocols. When such a problem is detected, an IDS alerts
the administrator but doesn’t necessarily take any other action. There are
several types of IDS and several methods of detection employed.
Network Intrusion
Detection System (NIDS): A network intrusion detection system (NIDS) monitors
packets moving into and out of a network or subset of a network. It could
monitor all traffic, or just a selection, to catch security threats. A NIDS
compares potential intrusions to known abnormal or harmful behavior. This
option is preferred for enterprises, as it’s going to provide much broader
coverage than host-based systems.
Host Intrusion
Detection System (HIDS): A host intrusion detection system lives on and
monitors a single host (such as a computer or device). It might monitor
traffic, but it also monitors the activity of clients on that computer. For
example, a HIDS might alert the administrator if a video game is accessing
private files it shouldn’t be accessing and that have nothing to do with its
operations. When HIDS detects changes in the host, it will compare it to an
established checksum and alert the administrator if there’s a problem.
HIDS can work in
conjunction with NIDS, providing extra coverage for sensitive workstations and
catching anything NIDS doesn’t catch. Malicious programs might be able to sneak
past a NIDS, but their behavior will be caught by a HIDS.
Types of Intrusion
Detection Systems
There are two primary
types of intrusion detection systems you should be aware of to ensure you’re
catching all threats on your network. Signature-based IDS is more traditional
and potentially familiar, while anomaly-based IDS leverages machine learning
capabilities. Both have their benefits and limitations:
Signature-based:
Signature-based IDS relies on a preprogrammed list of known attack behaviors.
These behaviors will trigger the alert. These “signatures” can include subject
lines and attachments on emails known to carry viruses, remote logins in
violation of organizational policy, and certain byte sequences. It is similar
to antivirus software (the term “signature-based” originates with antivirus
software).
Signature-based IDS is
popular and effective but is only as good as its database of known signatures.
This makes it vulnerable to new attacks. Plus, attackers can and do frequently
disguise their attacks to avoid common signatures that will be detected. Also,
the most thorough signature-based IDS will have huge databases to check
against, meaning big bandwidth demands on your system.
Anomaly-based:
Anomaly-based IDS begins with a model of normal behavior on the network, then
alert an admin anytime it detects any deviation from that model of normal
behavior. Anomaly-based IDS begins at installation with a training phase where
it “learns” normal behavior. AI and machine learning have been very effective in
this phase of anomaly-based systems.
Anomaly-based systems
are typically more useful than signature-based ones because they’re better at
detecting new and unrecognized attacks. However, they can set off many false
positives, since they don’t always distinguish well between attacks and benign
anomalous behavior.
Some experts consider
intrusion prevention systems to be a subset of intrusion detection. Indeed, all
intrusion prevention begins with intrusion detection. But security systems can
go one step further and act to stop ongoing and future attacks. When an IPS
detects an attack, it can reject data packets, give commands to a firewall, and
even sever a connection.
IDS and IPS are similar
in how they’re implemented and operate. IPS can also be network- or host-based
and can operate on a signature or anomaly basis.
Types of Intrusion
Prevention Systems
A robust IT security
strategy should include an intrusion prevention system able to help automate
many necessary security responses. When risks occur, a prevention tool may be
able to help quickly to thoroughly shut down the damage and protect the overall
network.
Network-based Intrusion
Prevention Systems (NIPS): As the name suggests, a NIPS covers all events on
your network. Its detection is signature-based.
Network Behavior
Analysis (NBA): NBA is similar to NIPS in that it provides network-wide
coverage. But unlike NIPS, NBA operates on anomalies. Like anomaly-based IDS,
NBA requires a training phase where it learns the network’s baseline norm.
NBA also uses a method
called stateful protocol analysis. Here, the baseline norm is pre-programmed by
the vendor, rather than learned during the training phase. But in both cases,
the IPS is looking for deviations rather than signatures.
Wireless-based
Prevention Systems (WIPS): Protecting your network brings its own unique
challenges. Enter WIPS. Most WIPS have two components, including overlay
monitoring (devices installed near access points to monitor the radio
frequencies) and integrated monitoring (IPS using the APs themselves).
Combining these two, which is very common, is known as “hybrid monitoring.”
Host-based Intrusion
Prevention Systems (HIPS): HIPS live on and protect a single host, providing
granular coverage. They are best used in conjunction with a network-wide IPS.
Differences Between IDS
and IPS
There are several
differences between these two types of systems. IDS only issues alerts for
potential attacks, while IPS can take action against them. Also, IDS is not
inline, so traffic doesn’t have to flow through it. Traffic does, however, have
to flow through your IPS. In addition, false positives for IDS will only cause
alerts, while false positives for IPS could cause the loss of important data or
functions.
A distributed
denial-of-service (DDoS) attack occurs when multiple systems flood the
bandwidth or resources of a targeted system, usually one or more web servers.
Such an attack is often the result of multiple compromised systems (for
example, a botnet) flooding the targeted system with traffic
In computing, a
denial-of-service attack (DoS attack) is a cyber-attack in which the
perpetrator seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host
connected to the Internet. Denial of service is typically accomplished by
flooding the targeted machine or resource with superfluous requests in an
attempt to overload systems and prevent some or all legitimate requests from
being fulfilled.
In a distributed
denial-of-service attack (DDoS attack), the incoming traffic flooding the
victim originates from many different sources. This effectively makes it
impossible to stop the attack simply by blocking a single source.
A DoS or DDoS attack is
analogous to a group of people crowding the entry door of a shop, making it
hard for legitimate customers to enter, thus disrupting trade.
Criminal perpetrators
of DoS attacks often target sites or services hosted on high-profile web
servers such as banks or credit card payment gateways. Revenge, blackmail and
activism can motivate these attacks.
DDoS is a type of DOS
attack where multiple compromised systems, which are often infected with a
Trojan, are used to target a single system causing a Denial of Service (DoS)
attack
More than One Third of
US Businesses Experience DDoS Attacks. The most common cyberattacks were
malware (53 percent) and viruses (51 percent). A distributed denial of service
attack (aka DDOS) is very easy, and is in fact widely considered one of the
easiest blackhat activities to do.
For a DDoS attack to be successful, an
attacker will spread malicious software to vulnerable computers, mainly through
infected emails and attachments. Layer
7 attacks focus specifically on the layer 7 features such as HTTP, SNMP, FTP
etc. Layer 7 attacks require a lot less bandwidth and packets than network
layer attacks to disrupt the services
DDoS attacks cannot
steal website visitors information. The sole purpose of a DDoS attack is to
overload the website resources. However, DDoS attacks can be used as a way of
extortion and blackmailing. For example, website owners can be asked to pay a
ransom for attackers to stop a DDoS attack
DDoS attacks can last
as long as 24 hours, and good communication can ensure that the cost to your
business is minimized while you remain under attack.
.
In DDoS attacks, threat
actors use different methods to try and amplify the volume of attack traffic
generated by a compromised system. The goal is to try and turn small queries
and packets into much larger payloads that can then be used to flood a target
network
Once the attack is
over, try to analyze it in as much detail as possible.
Some of the key
questions to ask include:---
What assets were
attacked? Was it targeted at your entire network, or did it target specific
servers or services?
What were the attack
characteristics? Was it a single sustained flood, or did it employ
sophisticated attack methods such as multi-vector attacks, dynamic IP spoofing,
or burst attacks?
What attack protocols
and patterns were used?
What was the peak
amount of network traffic, both in terms of data (bits per second) as well as
requests (connections per seconds)?
Did the attack impact
the network layer, or also the application layer?
Did the attack include
encrypted traffic or protocols?
How long did the attack
last?
Getting this
information will help you get a full picture of what happened.
Apart from analyzing
the attack itself, you need to understand how it impacted you.
This is a key step in
understanding your internal “cost” of a DDoS attack, and as a result – how much
you may be willing to spend in the future to prevent this from happening again.
Some of the key
questions to ask include:---
Was the attack stopped,
or did it get through (either entirely, or in part)?
Which services were
impacted, to what extent, and for how long?
What were the direct
monetary damages (i.e., in lost revenue, lost productivity time, etc.)?
Were there any indirect
damages, such as bad press, damage to reputation, customer complaints, etc.?
Did users experience
any impact as a result of the attack, either as a result of the attack itself,
or as a result of defensive measures (false positives)?
Identify Weak Spots-
The next step after
identifying damages is to identify any weak spots in your defense – that is,
why was attack traffic able to get through?
Did any attack traffic
get through? If so, how much?
Were there any specific
attack vectors that were more successful than others? In particular, were there
some patterns that were stopped, while others were able to get through?
Were there any targeted
resources that were impacted more than others? For example, were there some
resources (networks, servers, applications, etc.) that were able to fend off
the attack, while others were impacted?
Did legitimate users
experience any false positives? What was the ratio of legitimate traffic to
malicious traffic that was stopped (or allowed to go through)?
By identifying weak
spots, you should try to understand not only what resources were impacted, but
also why they were impacted. Was there a particular type of attack that was
able to get through, or – conversely – were there specific services that were
impacted while others were not?
Another key element to
look at is false positives. If your protections are deployed too broadly, this
can lead to false-positives which prevent legitimate users from accessing
services. Even though not a result of the attack itself, for end customers the
experience is the same…
Identifying weak spots
in your armor helps you to address them in the next steps.--
Verify Security Vendor
SLA
If you have a
pre-existing DDoS mitigation service in place, now is the time to check that
they met their SLA commitments.
A high-grade DDoS
protection service should provide you with technology, capacity and service
guarantees to ensure full protection against any type of DDoS threat.
Look at the results of
your analysis, based on the points above, and ask yourself the following
questions:--
Did my defenses stop
the attack?
Was all attack traffic
stopped, or did some of it get through?
Were my users able to
escape the impact of the attack (either directly, or as false-positives)?
Did my security vendor
provide me with all the relevant service guarantees, and was able to meet them?
If the answers to those
questions is yes, then great – you are well protected. But if the answer to one
(or more) of these questions is no, then maybe you should start looking at
alternatives.
Recommended actions to
reduce the risk of denial of service:
Check whether your CSP
is capable of scaling up bandwidth to withstand DDoS attacks. Also, ask whether
they have scrubbing centers to cleanse and filter malicious traffic.
Scrubbing Center. A
centralized data cleansing station where traffic is analyzed and malicious
traffic (ddos, known vulnerabilities and exploits) is removed.
scrubbing centres are
centralised data-cleansing stations, that filter out malicious traffic before
it can reach the applications and data centres of customers.
Employees often share
passwords for cloud accounts, which increases the risk for data breaches and
data losses. According to one report, an average employee will share six
passwords with their co-workers. Fifty-four percent of small and midsize
businesses see negligent employees as the root cause of data breaches.
The cloud access
security broker (CASB) market is forecast to reach 870 million U.S. dollars in
size worldwide in 2019. A CASB is a software or service that safeguards the
gateway between a company's on-premise IT infrastructure and a cloud provider's
infrastructure.
A CASB is a third-party
software integration that works across all the major software products used in
an organization. The CASB software tracks and analyzes all information sent and
received by each tool. This enables a granularity of insight akin to that which
was possible when all information sent and received by a company could be
tracked on its own servers.
Today, CASBs are used
by IT teams to achieve greater visibility, compliance, threat protection, and
data security.
CASBs illuminate which
shadow IT cloud services are being used in an organization and enable
visibility into user activity of sanctioned cloud applications. CASBs give
companies a 360-degree view of all the cloud services they use – and let them
tailor secure access to each. This comprehensive view also allows an
organization to see whether and where their various services overlap in
functionality, creating an opportunity to reduce costs.
CASBs can be configured
to block specified services, devices, or users – and even post-login behaviors
and signals – through adaptive access controls. For example, an employee who
either wittingly or unwittingly attempts to upload an infected file can be
prevented from doing so, in real time. This allows organizations to detect and
respond to negligent or malicious insider threats, privileged user threats, and
compromised accounts.
Data security
CASBs also allow IT
teams to enforce data-centric security practices such as secure collaboration
in cloud services, access control, and information rights management. Controls
may be customized based on a variety of factors, such as data classification or
user activity. Utilizing advanced data loss prevention (DLP) methods (like
document fingerprinting, among others), CASBs can notify IT when sensitive data
is being transmitted, allowing them to take further actions as necessary.
CASB products were
designed to provide visibility for Shadow IT and limit employee access to
unauthorized cloud services. Today, organizations have embraced the cloud,
replacing many of their datacenter applications with Software as a Service
(SaaS) or moving much of their IT into infrastructure (IaaS) providers like
Amazon or Azure.
Instead of limiting access, CASB's have evolved to protect
cloud-hosted data and provide enterprise-class security controls so that
organizations can incorporate SaaS and IaaS into their existing security
architecture.
CASBs provide four
primary security services: Visibility, Data Security, Threat Protection, and
Compliance.
A CASB identifies all
the cloud services (both sanctioned and unsanctioned) used by an organization's
employees. Originally, this only included the services they would use directly
from their computer or mobile device, often called "Shadow IT."
Today, it is possible for an employee to connect an unsanctioned SaaS directly
to a an approved SaaS via API. This "Shadow SaaS" requires more
advanced visibility tools.
Shadow IT Monitoring:
Your CASB must connect to your cloud to monitor all outbound traffic for
unapproved SaaS applications and capture real-time web activity. Since nearly
all SaaS applications send your users email notifications, your CASB should
also scan every inbox for rogue SaaS communication to identify unapproved
accounts on an approved cloud services.
Shadow SaaS Monitoring: Your CASB must connect
to your approved SaaS and IaaS providers to monitor third party SaaS
applications that users might connect to their account. It should identify both
the service as well as the level of access the user has provided.
Risk Reporting: A CASB
should assess the risk level for each Shadow IT/Shadow SaaS connection,
including the level of access each service might request (i.e. read-only access
to a calendar might be appropriate, read-write access to email might not.) This
allows you to make informed decisions and prioritize the applications that need
immediate attention.
Event Monitoring: Your
CASB should provide information about real-time and historical events in all of
your organization’s SaaS applications. If you do not know how the applications
are being used, you can not properly control them or properly assess the
threats facing your organization.
CASB (Cloud Access
Security Broker) solutions may fill many of the security gaps addressed in this
article and delivers a holistic view of the entire cloud environment which
enables organizations to effectively manage cloud security risks while
capitalizing on the benefits offered by cloud computing.
While CASB solutions
have been available now for the past 5 years, the market is still immature.
Each product on the market has its own strengths and weaknesses and covers
different threats. Therefore, it is important to understand your cloud services
use cases when it comes to choosing a CASB solution.
Assessing the impacts on
the existing infrastructure is also required. If you are interested in further
discussing CASB solutions and being well-advised in designing and choosing the
best suited solution, reach out to Orange Consulting.
Conduct risk
assessments before migrating to cloud services and use cloud access security
brokers (CASBs) as an additional security layer.
A cloud access security
broker (CASB) is on-premises or cloud based software that sits between cloud
service users and cloud applications, and monitors all activity and enforces
security policies.
A CASB can offer a variety of services, including but not
limited to monitoring user activity, warning administrators about potentially
hazardous actions, enforcing security policy compliance, and automatically
preventing malware.
A cloud access security
broker, or CASB, is a type of software developed to help IT departments monitor
cloud access and usage by employees and partners. CASBs are deployed to help
ensure the company's cloud services are used securely and properly.
It is a software tool
or service that sits between an organization's on-premises infrastructure and a
cloud provider's infrastructure. A CASB acts as a gatekeeper, allowing the
organization to extend the reach of their security policies beyond their own
infrastructure.
CASBs typically offer
the following:--
Firewalls to identify
malware and prevent it from entering the enterprise network.
Authentication to
checks users' credentials and ensure they only access appropriate company
resources.
Web application
firewalls (WAFs) to thwart malware designed to breach security at the
application level, rather than at the network level.
Data loss prevention
(DLP) to ensure that users cannot transmit sensitive information outside of the
corporation.
CASBs work by ensuring
that network traffic between on-premises devices and the cloud provider
complies with the organization's security policies. The value of cloud access
security brokers stems from their ability to give insight into cloud
application use across cloud platforms and identity unsanctioned use. This is
especially important in regulated industries.
CASBs use
auto-discovery to identify cloud applications in use and identify high-risk
applications, high-risk users and other key risk factors. Cloud access brokers
may enforce a number of different security access controls, including
encryption and device profiling. They may also provide other services such as
credential mapping when single sign-on is not available.
Microsoft includes CASB
functionality in its base Azure security services at no extra charge. To meet
the needs of IaaS and PaaS users, CASB vendors have added or expanded functionality
for security tasks, such as the following:---
Single sign-on (SSO) --
allows an employee to enter their credentials one time and access a number of
applications.
Encryption -- encrypts
information from the moment it's created until it's sitting at rest in the
cloud.
Compliance reporting
tools -- ensure that the company's security systems comply with corporate
policies and government regulations.
User behavior analytics
-- identifies aberrant behavior indicative of an attack or data breach.
The ability of a CASB
to address gaps in security extends across software-as-a-service (SaaS),
platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS)
environments. In addition to providing visibility, a CASB also allows
organizations to extend the reach of their security policies from their
existing on-premises infrastructure to the cloud and create new policies for
cloud-specific context.
The CASB serves as a
policy enforcement center, consolidating multiple types of security policy
enforcement and applying them to everything your business utilizes in the
cloud—regardless of what sort of device is attempting to access it, including
unmanaged smartphones, IoT devices, or personal laptops.
With the increase in
workforce mobility, the growth in BYOD and the presence of unsanctioned
employee cloud usage, or Shadow IT, the ability to monitor and govern the usage
of cloud applications has become essential to the goal of enterprise security.
Rather than banning cloud services outright and potentially impacting employee
productivity, a CASB enables businesses to take a granular approach to data
protection and the enforcement of policies—making it possible to safely utilize
time-saving, productivity-enhancing, and cost-effective cloud services.
Shadow IT is a term
that refers to Information Technology (IT) applications and infrastructure that
are managed and utilized without the knowledge of the enterprise's IT
department.
Shadow IT, also known
as Stealth IT or Client IT, are Information technology (IT) systems built and
used within organizations without explicit organizational approval, for
example, systems specified and deployed by departments other than the IT
department.
Shadow IT is the use of
information technology systems, devices, software, applications, and services
outside the scope and supervision of an organization's approved IT system.
Examples include employee use of: USB flash drives or other personal data
storage
Shadow IT can present
itself in many ways, a few examples being: Staff sharing files between
themselves, suppliers and customers. Often with a cloud file store such as
OneDrive, Dropbox or Google Drive
Many people consider
shadow IT an important source of innovation, and such systems may become
prototypes for future approved IT solutions. On the other hand, shadow IT
solutions are not often in line with organizational requirements for control,
documentation, security, reliability, etc
One of the main causes
of increased cloud-computing risks is the tendency of employees and managers to
bypass the IT team and download third-party applications. The growth in the
number of SaaS applications that help you carry out random tasks—convert JPEG
files into PDF, record and edit video files, instant messaging, etc.—result in employees
signing up and using these programs without taking the necessary precautions.
Often, sensitive files
are uploaded onto unknown cloud servers to simply convert them into different
file types. Though these go undetected most of the time, a single instance of
confidential company information surfacing in the public or landing in the
hands of competition can damage business reputation forever.
The explosion of cloud
and as-a-service (remote) technologies has made it easy for employees to buy
and use their own applications without the help of IT
Shadow IT can introduce
security risks when unsupported hardware and software are not subject to the
same security measures that are applied to supported technologies. Furthermore,
technologies that operate without the IT department’s knowledge can negatively
affect the user experience of other employees by impacting bandwidth and
creating situations in which network or software application protocols
conflict.
Shadow IT can also become a compliance concern when, for example, an
employee stores corporate data in their personal DropBox account.
Feelings toward shadow
IT are mixed; some IT administrators fear that if shadow IT is allowed, end
users will create data silos and prevent information from flowing freely
throughout the organization. Other administrators believe that in a
fast-changing business world, the IT department must embrace shadow IT for the
innovation it supplies and create policies for overseeing and monitoring its
acceptable use.
Popular shadow
technologies include personal smartphones, tablets and USB thumb drives.
Popular shadow apps include Google Docs, instant messaging services and Skype.
People generally don’t
start shadow IT projects because they disrespect the IT department or want to
cause trouble. We live in a digital world. As a result, more non-technical
workers are becoming tech-savvy through osmosis. They pick up new tech trends
here, read about digital transformation there. They dream up all the ways that
new software and hardware can make their jobs easier and more productive.
Often, this tinkering
moves beyond daydreams and into the office where people outside of the IT team
make moves to improve their work via technology. Think marketers researching
and purchasing marketing automation software or hoteliers downloading project
workforce management software to communicate with staff.
And while these motions
might be in conflict with their IT department’s road map, the intentions behind
shadow IT comes from an earnest, entrepreneurial place. People who do the work
know the work best. The non-technical workers pushing for their own tech
solutions have unique insights into their job's pain points, and can quickly
recognize a solution’s ability to tackle problems.
Cause for concern
However, good
intentions should not to minimize an IT department’s worries around shadow IT.
Information technology departments are subject matter experts as well. Their
concerns around unofficial technology programs are directly related to the
department's areas of expertise, including:
Compliance. IT needs to
ensure that solutions are compliant with industry standards. Are teams
following license agreements? Are users correctly installing and using
encrypted devices?
Security. This is a
no-brainer for IT teams. Job one is to make sure that all tech used within
their company is unbreachable and private so that proprietary information
remains internal.
Reliability. IT makes
sure that systems are suited for the long haul. Tools need to stay live,
functional, and updated. They need to scale for the enterprise.
Compatibility.
Similarly, enterprise companies often rely on various systems. These large
companies have powerful and diverse IT stacks. There’s a danger that shadow
projects will not be compatible with legacy software and tools.
Redundancies. When tech
projects happen below the board, communication tends to breakdown. Time and
money are wasted when departments overlap work on the similar – or even
identical – solutions.
IT departments can empower non-technical workers to
explore and iterate on new tech solutions – all while staying within proper
IT-defined guardrails. This arrangement will inspire company-wide agility while
maintaining centralized, IT-sanctioned approaches to business technology.
One way to implement
this change is to embed technical experts within non-technical team. For
instance, many marketing teams now have a MarTech division led by IT folks who
also have marketing acumen.
No-code platforms
represent another opportunity which enables non-technical employees to develop
workplace applications without writing code. Using this approach, workers of
all stripes can build applications uniquely suited to their needs.
Meanwhile,
IT remains the centralized point of control for this no-code technology,
setting guardrails on which teams and individuals can create. In other words,
security and governance remain safely in the hands of IT experts.
Security risks at the
vendor
When a cloud service
vendor supplies a critical service for your business and stores critical data –
such as customer payment data and your mailing lists – you place the life of
your business in the vendor’s hands.
Ask yourself – how
clean are those hands?
Many small businesses
know almost nothing about the people and technology behind the cloud services
they use.
They rarely consider:--
The character of the
vendor’s employees
The security of the
vendor’s technology
The secret access the
vendor has to their data
Your reputation no
longer depends on the integrity of only your business – now it also depends on
the integrity of the vendor’s business. And that’s a cloud computing risk. So you are
transferring the responsibility of protecting the data to a third party, but
you are still liable if that party fails to live up to the task.
This is one of the many
risks in cloud computing. Even if a vendor has your best interests at heart,
your interests will always be secondary to theirs.
However, when you use a
cloud service provider, the vendor is in control. You have no guarantee that
the features you use today will be provided for the same price tomorrow. The
vendor can double its price, and if your clients are depending on that service,
then you might be forced to pay.
What happens if you are not able to make
payment?
If you get behind on
your bill, then you may be surprised to find your data is held hostage by the
vendor. You cannot access the service and export your data until you pay up.
When you host a service
locally, the data and level of service is always in your control. You can
confidently assure your clients that their systems and data are safe because
they are always within your reach.
Remember: you have many
ways to protect your data when it is in control. However, once it’s in the
hands of a cloud service provider, you have ceded control to an entity over
which you have no oversight.
When you rely on a
cloud service for a business-critical task, then you are putting the viability
of your business in the hands of two services: the cloud vendor and your ISP.
One of the
disadvantages of cloud computing can come in the form of vendor mismatches.
Organizations might run into complications when migrating services to a
different vendor with a different platform. If this process isn’t handled
correctly, data can be exposed to unnecessary vulnerabilities. A good cloud
services provider has the expertise to migrate your data between vendors
safely.
Malicious insiders
could have a wide raging impact on the confidentiality, integrity and
availability of enterprise data. With the use of cloud apps, the risk increases
as insiders can use their cloud accounts with their unmanaged devices to spread
malwares throughout an organization, infect rich data or exfiltrate sensitive
data.
A malicious insider can
use an unmanaged device to exfiltrate sensitive date from corporate OneDrive
storage
A malicious insider can
use an unmanaged device to upload malicious file to corporate OneDrive storage
or attach it to a Salesforce record. The file may then be opened by a
legitimate user connected to the enterprise corporate network.
On the other hand, user
credentials may become compromised through phishing attacks of other similar
techniques. Threath actors may use the stolen cloud accounts to perform
malicious activities.
Sensitive data can be
leaked, falsified, infected or destroyed causing significant cost to business.
Legal implications are also possible for organizations in highly regulated
industries, such as healthcare, if personal information is exposed during cloud
account takeover (ATO) incidents.
Unfortunately, these
new threats cannot be handled by the standard IT security measures. Therefore,
organizations should enhance their security measures to protect their assets
against malware, ransomware, cloud ATO and other malicious cloud activities.
Here below some known
security measures to protect enterprises against the above-mentioned malicious
cloud activities:--
Develop and deploy a
data loss prevention (DLP) strategy.
Perform user and entity
behavior analytics (UEBA) for better visibility.
Scan and quarantine
malware at upload, at download and at rest.
Block known and
zero-day threats.
Encrypt sensitive data
before it goes to cloud storage.
Identity Sprawl
Historically, users
used to authenticate on a central identity datastore to access on-premise
corporate apps. Overtime, business
began to use cloud apps and Software as A Service (SaaS) such as ServiceNow or
Salesforce.
Likewise, social media and other shadow cloud apps gained
popularity and are incorporated into day-to-day business operations. Suddenly,
employees found themselves authenticating against different datastores all over
the internet. This ID sprawl increases the risk of user’s cloud accounts
takeover and makes protecting access to an organization’s information far more
challenging.
Here are some security
measures to protect user’s cloud accounts:--
Use a central identity
and access management (IAM) platform for approved cloud apps.
Restrict access from
unmanaged devices and control the type of cloud apps used companywide.
Enforce multi-factor
authentication to access corporate cloud apps.
Apply granular
content-based and context-based policies..
Be sure to use the
appropriate security methods, such as Intrusion Detection and Prevention (IDPS)
systems.
An Intrusion Prevention
System or IPS, also known as an Intrusion Detection and Prevention System or
IDPS, is a network security appliance that monitors network and system
activities and detects possible intrusions.
Intrusion detection is
the process of monitoring the events occurring in your network and analyzing
them for signs of possible incidents, violations, or imminent threats to your
security policies. Intrusion prevention is the process of performing intrusion
detection and then stopping the detected incidents. These security measures are
available as intrusion detection systems (IDS) and intrusion prevention systems
(IPS), which become part of your network to detect and stop potential
incidents.
Intrusion detection
systems (IDS) and intrusion prevention systems (IPS) constantly watch your
network, identifying possible incidents and logging information about them,
stopping the incidents, and reporting them to security administrators.
In
addition, some networks use IDS/IPS for identifying problems with security
policies and deterring individuals from violating security policies. IDS/IPS
have become a necessary addition to the security infrastructure of most
organizations, precisely because they can stop attackers while they are
gathering information about your network.
The three IDS detection
methodologies are typically used to detect incidents.
Signature-Based
Detection compares signatures against observed events to identify possible
incidents. This is the simplest detection method because it compares only the
current unit of activity (such as a packet or a log entry, to a list of
signatures) using string comparison operations.
Anomaly-Based Detection
compares definitions of what is considered normal activity with observed events
in order to identify significant deviations. This detection method can be very
effective at spotting previously unknown threats.
Stateful Protocol
Analysis compares predetermined profiles of generally accepted definitions for
benign protocol activity for each protocol state against observed events in
order to identify deviations.
What is difference IDS
and IPS?
The main difference
between them is that IDS is a monitoring system, while IPS is a control system.
IDS doesn't alter the network packets in any way, whereas IPS prevents the
packet from delivery based on the contents of the packet, much like how a
firewall prevents traffic by IP address.
The main difference is
that an IDS only monitors traffic.
If an attack is detected, the IDS reports
the attack, but it is then up to the administrator to take action. That's why
having both an IDS and IPS system is critical. A good security strategy is to
have them work together as a team
An intrusion detection
system (IDS) is a device or software application that monitors a network or
systems for malicious activity or policy violations. Any malicious activity or
violation is typically reported either to an administrator or collected
centrally using a security information and event management (SIEM) system. A
SIEM system combines outputs from multiple sources and uses alarm filtering
techniques to distinguish malicious activity from false alarms
The IPS sits between
your firewall and the rest of your network. Because, it can stop the suspected
traffic from getting to the rest of the network. The IPS monitors the inbound
packets and what they are really being used for before deciding to let the
packets into the network
an intrusion detection
system (IDS) differs from a firewall in that a firewall looks outwardly for
intrusions in order to stop them from happening. Firewalls limit access between
networks to prevent intrusion and do not signal an attack from inside the
network.
Intrusion detection
systems and intrusion prevention systems are both important parts of network
integrity.. Sometimes the systems overlap, and sometimes they’re combined or
referred to together as IDPS. Although IPS is becoming a more dominant security
method, it’s important to be familiar with both.
An IDS monitors your
network for possible dangerous activity, including malicious acts and
violations of security protocols. When such a problem is detected, an IDS
alerts the administrator but doesn’t necessarily take any other action. There
are several types of IDS and several methods of detection employed.
Network Intrusion
Detection System (NIDS): A network intrusion detection system (NIDS) monitors
packets moving into and out of a network or subset of a network. It could
monitor all traffic, or just a selection, to catch security threats. A NIDS
compares potential intrusions to known abnormal or harmful behavior. This
option is preferred for enterprises, as it’s going to provide much broader
coverage than host-based systems.
Host Intrusion
Detection System (HIDS): A host intrusion detection system lives on and
monitors a single host (such as a computer or device). It might monitor
traffic, but it also monitors the activity of clients on that computer.
For
example, a HIDS might alert the administrator if a video game is accessing
private files it shouldn’t be accessing and that have nothing to do with its
operations. When HIDS detects changes in the host, it will compare it to an
established checksum and alert the administrator if there’s a problem.
HIDS can work in
conjunction with NIDS, providing extra coverage for sensitive workstations and
catching anything NIDS doesn’t catch. Malicious programs might be able to sneak
past a NIDS, but their behavior will be caught by a HIDS.
Types of Intrusion
Detection Systems
There are two primary
types of intrusion detection systems you should be aware of to ensure you’re
catching all threats on your network. Signature-based IDS is more traditional
and potentially familiar, while anomaly-based IDS leverages machine learning
capabilities. Both have their benefits and limitations:
Signature-based: Signature-based
IDS relies on a preprogrammed list of known attack behaviors. These behaviors
will trigger the alert. These “signatures” can include subject lines and
attachments on emails known to carry viruses, remote logins in violation of
organizational policy, and certain byte sequences. It is similar to antivirus
software (the term “signature-based” originates with antivirus software).
Signature-based IDS is
popular and effective but is only as good as its database of known signatures.
This makes it vulnerable to new attacks. Plus, attackers can and do frequently
disguise their attacks to avoid common signatures that will be detected. Also,
the most thorough signature-based IDS will have huge databases to check
against, meaning big bandwidth demands on your system.
Anomaly-based:
Anomaly-based IDS begins with a model of normal behavior on the network, then
alert an admin anytime it detects any deviation from that model of normal
behavior. Anomaly-based IDS begins at installation with a training phase where
it “learns” normal behavior. AI and machine learning have been very effective
in this phase of anomaly-based systems.
Anomaly-based systems
are typically more useful than signature-based ones because they’re better at
detecting new and unrecognized attacks. However, they can set off many false
positives, since they don’t always distinguish well between attacks and benign
anomalous behavior.
Some experts consider
intrusion prevention systems to be a subset of intrusion detection. Indeed, all
intrusion prevention begins with intrusion detection. But security systems can
go one step further and act to stop ongoing and future attacks. When an IPS
detects an attack, it can reject data packets, give commands to a firewall, and
even sever a connection.
IDS and IPS are similar
in how they’re implemented and operate. IPS can also be network- or host-based
and can operate on a signature or anomaly basis.
Types of Intrusion
Prevention Systems
A robust IT security
strategy should include an intrusion prevention system able to help automate
many necessary security responses. When risks occur, a prevention tool may be
able to help quickly to thoroughly shut down the damage and protect the overall
network.
Network-based Intrusion
Prevention Systems (NIPS): As the name suggests, a NIPS covers all events on
your network. Its detection is signature-based.
Network Behavior
Analysis (NBA): NBA is similar to NIPS in that it provides network-wide
coverage. But unlike NIPS, NBA operates on anomalies. Like anomaly-based IDS,
NBA requires a training phase where it learns the network’s baseline norm.
NBA also uses a method
called stateful protocol analysis. Here, the baseline norm is pre-programmed by
the vendor, rather than learned during the training phase. But in both cases,
the IPS is looking for deviations rather than signatures.
Wireless-based
Prevention Systems (WIPS): Protecting your network brings its own unique
challenges. Enter WIPS. Most WIPS have two components, including overlay
monitoring (devices installed near access points to monitor the radio
frequencies) and integrated monitoring (IPS using the APs themselves).
Combining these two, which is very common, is known as “hybrid monitoring.”
Host-based Intrusion
Prevention Systems (HIPS): HIPS live on and protect a single host, providing
granular coverage. They are best used in conjunction with a network-wide IPS.
Differences Between IDS
and IPS
There are several
differences between these two types of systems. IDS only issues alerts for
potential attacks, while IPS can take action against them. Also, IDS is not
inline, so traffic doesn’t have to flow through it. Traffic does, however, have
to flow through your IPS. In addition, false positives for IDS will only cause
alerts, while false positives for IPS could cause the loss of important data or
functions.
A distributed
denial-of-service (DDoS) attack occurs when multiple systems flood the
bandwidth or resources of a targeted system, usually one or more web servers.
Such an attack is often the result of multiple compromised systems (for
example, a botnet) flooding the targeted system with traffic
In computing, a
denial-of-service attack (DoS attack) is a cyber-attack in which the
perpetrator seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host
connected to the Internet. Denial of service is typically accomplished by
flooding the targeted machine or resource with superfluous requests in an
attempt to overload systems and prevent some or all legitimate requests from
being fulfilled.
In a distributed
denial-of-service attack (DDoS attack), the incoming traffic flooding the
victim originates from many different sources. This effectively makes it
impossible to stop the attack simply by blocking a single source.
A DoS or DDoS attack is
analogous to a group of people crowding the entry door of a shop, making it
hard for legitimate customers to enter, thus disrupting trade.
Criminal perpetrators
of DoS attacks often target sites or services hosted on high-profile web
servers such as banks or credit card payment gateways. Revenge, blackmail and
activism can motivate these attacks.
DDoS is a type of DOS
attack where multiple compromised systems, which are often infected with a
Trojan, are used to target a single system causing a Denial of Service (DoS)
attack
More than One Third of
US Businesses Experience DDoS Attacks. The most common cyberattacks were
malware (53 percent) and viruses (51 percent). A distributed denial of service
attack (aka DDOS) is very easy, and is in fact widely considered one of the
easiest blackhat activities to do.
For a DDoS attack to be successful, an
attacker will spread malicious software to vulnerable computers, mainly through
infected emails and attachments. Layer
7 attacks focus specifically on the layer 7 features such as HTTP, SNMP, FTP
etc. Layer 7 attacks require a lot less bandwidth and packets than network
layer attacks to disrupt the services
DDoS attacks cannot
steal website visitors information. The sole purpose of a DDoS attack is to
overload the website resources. However, DDoS attacks can be used as a way of
extortion and blackmailing. For example, website owners can be asked to pay a
ransom for attackers to stop a DDoS attack
DDoS attacks can last
as long as 24 hours, and good communication can ensure that the cost to your
business is minimized while you remain under attack.
A cloud service
provider, or CSP, is a company that offers some component of cloud computing --
typically infrastructure as a service (IaaS), software as a service (SaaS) or
platform as a service (PaaS) -- to other businesses or individuals.
Cloud computing
security refers to a broad set of policies, technologies, applications, and
controls utilized to protect virtualized IP, data, applications, services, and
the associated infrastructure of cloud computing. It is a sub-domain of
computer security, network security, and, more broadly, information security.
Cloud computing and
storage provides users with capabilities to store and process their data in third-party
data centers. Organizations use the
cloud in a variety of different service models (with acronyms such as SaaS,
PaaS, and IaaS) and deployment models (private, public, hybrid, and community).
Application-level
security issues (or cloud service provider CSP level attacks) refer to intrusion
from the malicious attackers due to vulnerabilities of the shared nature of the
cloud. Some companies host their applications in shared environments used by
multiple users, without considering the possibilities of exposure to security
breaches, such as:
1. SQL injection
An unauthorized user
gains access to the entire database of an application by inserting malicious
code into a standard SQL code. Often used to attack websites, SQL injection can
be avoided by the usage of dynamically generated SQL in the code. It is also necessary
to remove all stored procedures that are rarely used and assign the least
possible privileges to users who have permission to access the database.
2. Guest-hopping attack
In guest-hopping
attacks, due to the separation failure between shared infrastructures, an
attacker gets access to a virtual machine by penetrating another virtual
machine hosted in the same hardware. One possible mitigation of guest-hopping
attack is the Forensics and VM debugging tools to observe any attempt to
compromise the virtual machine. Another solution is to use the High Assurance
Platform (HAP), which provides a high degree of isolation between virtual
machines.
3. Side-channel attack
An attacker opens a
side-channel attack by placing a malicious virtual machine on the same physical
machine as the victim machine. Through this, the attacker gains access to all
confidential information on the victim machine. The countermeasure to eliminate
the risk of side-channel attacks in a virtualized cloud environment is to
ensure that no legitimate user VMs reside on the same hardware of other users.
4. Malicious insider
A malicious insider can
be a current or former employee or business associate who maliciously and
intentionally abuses system privileges and credentials to access and steal
sensitive customer information within the network of an organization. Strict
privilege planning and security auditing can minimize this security risk that
originates from within an organization.
5. Cookie poisoning
Cookie poisoning means
to gain unauthorized access into an application or a webpage by modifying the
contents of the cookie. In a SaaS model, cookies contain user identity
credential information that allows the applications to authenticate the user
identity. Cookies are forged to impersonate an authorized user. A solution is
to clean up the cookie and encrypt the cookie data.
6. Backdoor and debug
option
The backdoor is a
hidden entrance to an application, which was created intentionally or
unintentionally by developers while coding. Debug option is also a similar
entry point, often used by developers to facilitate troubleshooting in
applications. But the problem is that the hackers can use these hidden doors to
bypass security policies and enter the website and access the sensitive information.
To prevent this kind of attack, developers should disable the debugging option.
7. Cloud browser
security
A web browser is a
universal client application that uses Transport Layer Security (TLS) protocol
to facilitate privacy and data security for Internet communications. TLS
encrypts the connection between web applications and servers, such as web
browsers loading a website. Web browsers only use TLS encryption and TLS
signature, which are not secure enough to defend malicious attacks. One of the solutions
is to use TLS and at the same time XML based cryptography in the browser core.
8. Cloud malware
injection attack
A malicious virtual
machine or service implementation module such as SaaS or IaaS is injected into
the cloud system, making it believe the new instance is valid. If succeeded,
the user requests are redirected automatically to the new instance where the
malicious code is executed. The mitigation is to perform an integrity check of
the service instance before using it for incoming requests in the cloud system.
9. ARP poisoning
Address Resolution
Protocol (ARP) poisoning is when an attacker exploits some ARP protocol
weakness to map a network IP address to one malicious MAC and then update the
ARP cache with this malicious MAC address. It is better to use static ARP
entries to minimize this attack. This tactic can work for small networks such
as personal clouds, but it is easier to use other strategies such as port
security features on large-scale clouds to lock a single port (or network device)
to a particular IP address.
Network-level security
attacks
Cloud computing largely
depends on existing network infrastructure such as LAN, MAN, and WAN, making it
exposed to some security attacks which originate from users outside the cloud
or a malicious insider. In this section, let’s focus on the network level
security attacks and their possible countermeasures.
10. Domain Name System
(DNS) attacks
It is an exploit in
which an attacker takes advantage of vulnerabilities in the domain name system
(DNS), which converts hostnames into corresponding Internet Protocol (IP)
addresses using a distributed database scheme. DNS servers are subject to
various kinds of attacks since DNS is used by nearly all networked applications
– including email, Web browsing, eCommerce, Internet telephony, and more. It
includes TCP SYN Flood Attacks, UDP Flood Attack, Spoofed Source Address/LAND
Attacks, Cache Poisoning Attacks, and Man in the Middle Attacks.
11. Domain hijacking
Domain hijacking is
defined as changing a domain’s name without the owner or creator’s knowledge or
permission. Domain hijacking enables intruders to obtain confidential business
data or perform illegal activities such as phishing, where a domain is
substituted by a similar website containing private information. One way to
avoid domain hijacking is to force a waiting period of 60 days between a change
in registration and a transfer to another registrar. Another approach is to use
the Extensible Provisioning Protocol (EPP), which utilizes a domain
registrant-only authorization key as a protection measure to prevent unintended
name changes. Another approach is to use the Extensible Provisioning Protocol
(EPP), which utilizes a domain registrant-only authorization key as a
protection measure to prevent unauthorized name changes.
12. IP Spoofing
In IP spoofing, an
attacker gains unauthorized access to a computer by pretending that the traffic
has originated from a legitimate computer. IP spoofing is used for other
threats such as Denial of Service and Middle Attack Man:
a. Denial of service
attacks (DoS)
It is a type of attack
that tries to make a website or network resource unavailable. The attacker floods
the host with a massive number of packets in a short amount of time that
require extra processing. It makes the targeted device waste time waiting for a
response that never comes. The target is kept so busy dealing with malicious
packets that it does not respond to routine incoming requests, leaving the
legitimate users with denied service.
An attacker can
coordinate hundreds of devices across the Internet to send an overwhelming
amount of unwanted packets to a target. Therefore, tracking and stopping DoS is
very difficult. TCP SYN flooding is an example of a DoS attack in which the
intruder sends a flood of spoofed TCP SYN packets to the victim machine. This
attack exploits the limitations of the three-way handshake in maintaining
half-open connections.
b. Man In The Middle
Attack (MITM)
A man-in-the-middle
attack (MITM) is an intrusion in which the intruder relays remotely or probably
changes messages between two entities that think they communicate directly with
each other. The intruder utilizes network packet sniffer, filtering, and
transmission protocols to gain access to network traffic. MITM attack exploits
the real-time processing of transactions, conversations, or transfer of other
data. It can be reduced using packet filtering by firewall, secure encryption,
and origin authentication techniques.
End-user/host level
attacks
The cloud end-user or
host level attacks include phishing, an attempt to steal the user identity that
includes usernames, passwords, and credit card information. Phishing is to send
the user an email containing a link to a fake website that looks like a real
one. When the user uses the fake website, his username and password will be
sent to the hacker who can use them to attack the cloud.
Another method of
phishing is to send an email to the user claiming to be from the cloud service
company or, for instance, to tell the user to provide their username and
password for maintenance purposes. Countermeasures of phishing are the use of
Spam filters and spam blockers in the browsers. You can also train the users
not to respond to any spoofed email and not to give their credentials to any
website.
Emerging attacks called
denial of service (DoS) and distributed denial of service attacks (DDoS) are
among the top ways that risk application security. DoS and DDos attacks are
when legitimate users are prevented from accessing the service commonly through
flooding. Flooding targets machines or resources with excessive requests to
overload systems that prevent legitimate request from being met.
Denial of service
attacks (DoS) is a type of attack that tries to make a website or network
resource unavailable. The attacker floods the host with a massive number of
packets in a short amount of time that require extra processing. It makes the
targeted device waste time waiting for a response that never comes. The target
is kept so busy dealing with malicious packets that it does not respond to
routine incoming requests, leaving the legitimate users with denied service.
An attacker can
coordinate hundreds of devices across the Internet to send an overwhelming
amount of unwanted packets to a target. Therefore, tracking and stopping DoS is
very difficult. TCP SYN flooding is an example of a DoS attack in which the
intruder sends a flood of spoofed TCP SYN packets to the victim machine. This
attack exploits the limitations of the three-way handshake in maintaining
half-open connections.
Other possible
application security issues can result from cloud malware injection. The
attacker, in this case, focuses on inserting harmful implementations to cloud
services. In other instances, cookie poisoning can modify a user’s cookies so
the attacker can gain unauthorized information for identity fraud.
Backdoor attacks is a
conventional technique that bypasses system security undetectably to directly
access user information directly in the cloud. Through hidden filters on
webpages, hidden field attack attackers yield and collect unauthorized
information.
When attackers identify
two virtual machines hosted on same physical hardware and attempt to penetrate
one machine from another, it is called guest hopping. Another way of attack is
through SQL injection in which the attack embeds a malicious code into a poorly
designed application and then passes it to the back-end database. SQL Injection
(SQLi) is an injection attack where an attacker executes malicious SQL
statements to control a web application’s database server, thereby accessing,
modifying and deleting unauthorized data.
What can SQL Injection
do?
There are a lot of
things an attacker can do when exploiting an SQL injection on a vulnerable
website. By leveraging an SQL Injection vulnerability, given the right
circumstances, an attacker can do the following things:--
Bypass a web
application’s authorization mechanisms and extract sensitive information
Easily control
application behavior that’s based on data in the database
Inject further
malicious code to be executed when users access the application
Add, modify and delete
data, corrupting the database, and making the application or unusable
Enumerate the
authentication details of a user registered on a website and use the data in
attacks on other sites
It all depends on the
capability of the attacker, but sometimes an SQL Injection attack can lead to a
complete takeover of the database and web application.
An inside channel
attack refers to a cache attack when cache accesses are monitored to gain
encrypted data. At times, a person or employee will attempt to threaten
enterprises since they have access to their system and data.
How do SQL Injection
attacks work?
A developer usually
defines an SQL query to perform some database action necessary for his
application to function. This query has one or two arguments so that only
desired records are returned when the value for that argument is provided by a
user.
An SQL Injection attack
plays out in two stages:--
Research: Attacker
gives some random unexpected values for the argument, observes how the
application responds, and decides an attack to attempt.
Attack: Here attacker
provides carefully crafted value for the argument. The application will
interpret the value part of an SQL command rather than merely data, the
database then executes the SQL command as modified by the attacker.
An unauthorized user gains
access to the entire database of an application by inserting malicious code
into a standard SQL code. Often used to attack websites, SQL injection can be
avoided by the usage of dynamically generated SQL in the code. It is also
necessary to remove all stored procedures that are rarely used and assign the
least possible privileges to users who have permission to access the database.
Lastly, network level
attacks are among the security risks of cloud computing. A DNS attack includes
domain hijacking and cross site scripting that can be costly for enterprises.
When intruders sends malicious data to computers with an IP address that
indicates the message originates from a trusted host, this is known as IP
spoofing.
A man-in-the-middle
attack, communication between two users is monitored by attackers to gain
confidential information. To conclude network level attacks, sniffing is an
attack in which data is captured and interpreted while flowing through the
network. The attacker is able to gain access to all information that is
transported through the network.
A man-in-the-middle
attack (MITM) is an intrusion in which the intruder relays remotely or probably
changes messages between two entities that think they communicate directly with
each other. The intruder utilizes network packet sniffer, filtering, and
transmission protocols to gain access to network traffic. MITM attack exploits
the real-time processing of transactions, conversations, or transfer of other
data. It can be reduced using packet filtering by firewall, secure encryption,
and origin authentication techniques.
IP spoofing is the
creation of Internet Protocol (IP) packets which have a modified source address
in order to either hide the identity of the sender, to impersonate another
computer system, or both.
In IP spoofing, an
attacker gains unauthorized access to a computer by pretending that the traffic
has originated from a legitimate computer. IP spoofing is used for other
threats such as Denial of Service and Middle Attack Man:
IP spoofing is the
creation of Internet Protocol (IP) packets which have a modified source address
in order to either hide the identity of the sender, to impersonate another
computer system, or both
In IP spoofing, the
attacker modifies the source address in the outgoing packet header, so that the
destination computer treats the packet as if it is coming from a trusted
source, e.g., a computer on an enterprise network, and the destination computer
will accept it.
End-user/host level
attacks
The cloud end-user or
host level attacks include phishing, an attempt to steal the user identity that
includes usernames, passwords, and credit card information. Phishing is to send
the user an email containing a link to a fake website that looks like a real
one. When the user uses the fake website, his username and password will be
sent to the hacker who can use them to attack the cloud.
Another method of phishing
is to send an email to the user claiming to be from the cloud service company
or, for instance, to tell the user to provide their username and password for
maintenance purposes. Countermeasures of phishing are the use of Spam filters
and spam blockers in the browsers. You can also train the users not to respond
to any spoofed email and not to give their credentials to any website.
Security concerns associated with cloud
computing fall into two broad categories: security issues faced by cloud
providers (organizations providing software-, platform-, or
infrastructure-as-a-service via the cloud) and security issues faced by their
customers (companies or organizations who host applications or store data on
the cloud). The responsibility is
shared, however.
The provider must ensure that their infrastructure is secure
and that their clients’ data and applications are protected, while the user
must take measures to fortify their application and use strong passwords and
authentication measures.
Due to the lower costs
and ease of implementing PaaS and SaaS products, the probability of
unauthorized use of cloud services increases. However, services provisioned or
used without IT's knowledge present risks to an organization. The use of
unauthorized cloud services could result in an increase in malware infections
or data exfiltration since the organization is unable to protect resources it
does not know about. The use of unauthorized cloud services also decreases an
organization's visibility and control of its network and data.
Internet-Accessible Management APIs can be
Compromised. CSPs expose a set of application programming interfaces (APIs) that
customers use to manage and interact with cloud services (also known as the
management plane). Organizations use these APIs to provision, manage,
orchestrate, and monitor their assets and users. These APIs can contain the
same software vulnerabilities as an API for an operating system, library, etc.
Unlike management APIs for on-premises computing, CSP APIs are accessible via
the Internet exposing them more broadly to potential exploitation.
Threat actors look for
vulnerabilities in management APIs. If discovered, these vulnerabilities can be
turned into successful attacks, and organization cloud assets can be
compromised. From there, attackers can use organization assets to perpetrate
further attacks against other CSP customers.
Separation Among Multiple
Tenants Fails. Exploitation of system and software vulnerabilities within a
CSP's infrastructure, platforms, or applications that support multi-tenancy can
lead to a failure to maintain separation among tenants. This failure can be
used by an attacker to gain access from one organization's resource to another
user's or organization's assets or data. Multi-tenancy increases the attack
surface, leading to an increased chance of data leakage if the separation
controls fail.
This attack can be
accomplished by exploiting vulnerabilities in the CSP's applications,
hypervisor, or hardware, subverting logical isolation controls or attacks on
the CSP's management API. To date, there has not been a documented security
failure of a CSP's SaaS platform that resulted in an external attacker gaining
access to tenants' data.
No reports of an attack
based on logical separation failure were identified; however, proof-of-concept
exploits have been demonstrated.
Data Deletion is
Incomplete. Threats associated with data deletion exist because the consumer
has reduced visibility into where their data is physically stored in the cloud
and a reduced ability to verify the secure deletion of their data. This risk is
concerning because the data is spread over a number of different storage
devices within the CSP's infrastructure in a multi-tenancy environment. In
addition, deletion procedures may differ from provider to provider.
Organizations may not be able to verify that their data was securely deleted
and that remnants of the data are not available to attackers. This threat
increases as an agency uses more CSP services.
Cloud and On-Premise
Threats and Risks
The following are risks
that apply to both cloud and on-premise IT data centers that organizations need
to address.
Credentials are Stolen.
If an attacker gains access to a user's cloud credentials, the attacker can
have access to the CSP's services to provision additional resources (if
credentials allowed access to provisioning), as well as target the
organization's assets. The attacker could leverage cloud computing resources to
target the organization's administrative users, other organizations using the
same CSP, or the CSP's administrators. An attacker who gains access to a CSP
administrator's cloud credentials may be able to use those credentials to
access the agency's systems and data.
Administrator roles
vary between a CSP and an organization. The CSP administrator has access to the
CSP network, systems, and applications (depending on the service) of the CSP's
infrastructure, whereas the consumer's administrators have access only to the
organization's cloud implementations. In essence, the CSP administrator has
administration rights over more than one customer and supports multiple
services.
Vendor Lock-In Complicates
Moving to Other CSPs. Vendor lock-in becomes an issue when an organization
considers moving its assets/operations from one CSP to another. The
organization discovers the cost/effort/schedule time necessary for the move is
much higher than initially considered due to factors such as non-standard data
formats, non-standard APIs, and reliance on one CSP's proprietary tools and
unique APIs.
This issue increases in
service models where the CSP takes more responsibility. As an agency uses more
features, services, or APIs, the exposure to a CSP's unique implementations
increases. These unique implementations require changes when a capability is
moved to a different CSP. If a selected CSP goes out of business, it becomes a
major problem since data can be lost or cannot be transferred to another CSP in
a timely manner.
Increased Complexity Strains IT Staff.
Migrating to the cloud can introduce complexity into IT operations. Managing,
integrating, and operating in the cloud may require that the agency's existing
IT staff learn a new model. IT staff must have the capacity and skill level to
manage, integrate, and maintain the migration of assets and data to the cloud
in addition to their current responsibilities for on-premises IT.
Key management and encryption
services become more complex in the cloud. The services, techniques, and tools
available to log and monitor cloud services typically vary across CSPs, further
increasing complexity. There may also be emergent threats/risks in hybrid cloud
implementations due to technology, policies, and implementation methods, which
add complexity. This added complexity leads to an increased potential for
security gaps in an agency's cloud and on-premises implementations.
Insiders Abuse Authorized Access. Insiders,
such as staff and administrators for both organizations and CSPs, who abuse
their authorized access to the organization's or CSP's networks, systems, and
data are uniquely positioned to cause damage or exfiltrate information.
The impact is most
likely worse when using IaaS due to an insider's ability to provision resources
or perform nefarious activities that require forensics for detection. These
forensic capabilities may not be available with cloud resources.
Stored Data is Lost. Data stored in the cloud
can be lost for reasons other than malicious attacks. Accidental deletion of
data by the cloud service provider or a physical catastrophe, such as a fire or
earthquake, can lead to the permanent loss of customer data. The burden of
avoiding data loss does not fall solely on the provider's shoulders. If a
customer encrypts its data before uploading it to the cloud but loses the
encryption key, the data will be lost. In addition, inadequate understanding of
a CSP's storage model may result in data loss. Agencies must consider data
recovery and be prepared for the possibility of their CSP being acquired,
changing service offerings, or going bankrupt.
This threat increases
as an agency uses more CSP services. Recovering data on a CSP may be easier than
recovering it at an agency because an SLA designates availability/uptime
percentages. These percentages should be investigated when the agency selects a
CSP.
CSP Supply Chain is
Compromised. If the CSP outsources parts of its infrastructure, operations, or
maintenance, these third parties may not satisfy/support the requirements that
the CSP is contracted to provide with an organization. An organization needs to
evaluate how the CSP enforces compliance and check to see if the CSP flows its
own requirements down to third parties. If the requirements are not being
levied on the supply chain, then the threat to the agency increases.
This threat increases
as an organization uses more CSP services and is dependent on individual CSPs
and their supply chain policies.
Insufficient Due
Diligence Increases Cybersecurity Risk. Organizations migrating to the cloud
often perform insufficient due diligence. They move data to the cloud without
understanding the full scope of doing so, the security measures used by the
CSP, and their own responsibility to provide security measures. They make
decisions to use cloud services without fully understanding how those services
must be secured..
Cloud Security Alliance
(CSA) is a not-for-profit organization with the mission to “promote the use of
best practices for providing security assurance within Cloud Computing, and to
provide education on the uses of Cloud Computing to help secure all other forms
of computing.”
The CSA has over 80,000
individual members worldwide. CSA gained
significant reputability in 2011 when the American Presidential Administration
selected the CSA Summit as the venue for announcing the federal government’s
cloud computing strategy
The latest CSA ( Cloud Security Alliance ) report highlights
leading concerns: --
1. Data breaches.
"Data is becoming the main target of cyber attacks,".the report's
authors point out. "Defining the business value of data and the impact of
its loss is essential important for organizations that own or process
data." In addition, "protecting data is evolving into a question of
who has access to it," they add. "Encryption techniques can help
protect data, but negatively impacts system performance while making
applications less user-friendly."
2. Misconfiguration and
inadequate change control. "Cloud-based resources are highly complex and
dynamic, making them challenging to configure. Traditional controls and change
management approaches are not effective in the cloud." The authors state
"companies should embrace automation and employ technologies that scan
continuously for misconfigured resources and remediate problems in real
time."
3. Lack of cloud
security architecture and strategy. "Ensure security architecture aligns
with business goals and objectives. Develop and implement a security
architecture framework."
4. Insufficient
identity, credential, access and key management. "Secure accounts,
inclusive to two-factor authentication and limited use of root accounts.
Practice the strictest identity and access controls for cloud users and
identities."
5. Account hijacking.
This is a threat that must be taken seriously. "Defense-in-depth and IAM
controls are key in mitigating account hijacking."
6. Insider threat.
"Taking measures to minimize insider negligence can help mitigate the
consequences of insider threats. Provide training to your security teams to
properly install, configure, and monitor your computer systems, networks,
mobile devices, and backup devices." The CSA authors also urge
"regular employee training awareness. Provide training to your regular
employees to inform them how to handle security risks, such as phishing and
protecting corporate data they carry outside the company on laptops and mobile
devices."
7. Insecure interfaces
and APIs. "Practice good API hygiene. Good practice includes diligent
oversight of items such as inventory, testing, auditing, and abnormal activity
protections." Also, "consider using standard and open API frameworks
(e.g., Open Cloud Computing Interface (OCCI) and Cloud Infrastructure
Management Interface (CIMI))."
8. Weak control plane.
"The cloud customer should perform due diligence and determine if the
cloud service they intend to use possesses an adequate control plane."
9. Metastructure and
applistructure failures. "Cloud service providers must offer visibility
and expose mitigations to counteract the cloud's inherent lack of transparency
for tenants. All CSPs should conduct penetration testing and provide findings
to customers."
10. Limited cloud usage
visibility. "Mitigating risks starts with the development of a complete
cloud visibility effort from the top down. Mandate companywide training on
accepted cloud usage policies and enforcement thereof. All non-approved cloud services must be
reviewed and approved by the cloud security architect or third-party risk
management."
11. Abuse and nefarious
use of cloud services. "Enterprises should monitor their employees in the
cloud, as traditional mechanisms are unable to mitigate the risks posed by
cloud service usage."
Attacks on the
resources used by one or more of the other tenants can affect your operations
as well. Attackers may hit the entire network and cause downtime to several
clients, depending on the bandwidth available. This can frustrate your clients
as well as stall your regular operations.
EXAMPLE:
Hackers targeted Portland-based cloud computing company Cedexisnin May
2017 in an attack that caused widespread outages across Cedexis’
infrastructure. Many French media outlets, including Le Monde, Le Figaro, and
more that used Cedexis services were impacted. Their customers faced downtime
because of the denial of service attack on Cedexis’ cloud.
Insider threats include
intentional or unintentional behavior by employees that results in exposing or
sharing of sensitive data.
This includes
mistakenly sharing files with confidential information (like employee social
security numbers) with a larger unauthorized group and using inappropriate
sharing controls.
Ninety-four percent of
all organizations experience at least one insider threat incident every month.
EXAMPLE:
Data thefts are most common when people jump ship. For example, a
salesperson leaving the company for a competitor can easily download customer
data from a cloud CRM application. Cloud data thefts such as this are more
difficult to detect than the theft of hard-copy documents, for example.
Recommended actions to
reduce the risk of an insider attack:--
Improve access controls
using tools such as multifactor authentication and authorization to ensure that
only the right people have access to your data.
Use computer-based
security awareness training courses and employee agreements to prevent
intentional or unintentional sharing of confidential data.
Insider threats are not
limited to employees. They extend to contractors, supply chain partners,
service providers and account compromise attacks that can abuse access to an
organization’s assets both on-premise and in the cloud
Disgruntled employees
sometimes become malicious insiders.
The most dangerous are
those who have received termination notices. They may decide that they have
nothing to lose because they aren’t worried about getting fired anymore.
Depending on the nature of your organization and the work you do, it might be a
good idea for them to stop working for your company the moment they know
they've been terminated. Get them to give you any physical keys they might have
and disable their user accounts right away.
It may ultimately cost your
organization less money to just give your terminated employee their severance
pay than to pay them to work an extra few weeks. But if they must work for some
time after they've been terminated, watch them especially carefully.
Another type of
indication of an employee or a contractor who could be a malicious insider is
when they seem unusually enthusiastic about their work. They may volunteer for
more work or additional tasks not because they want a raise, but because they
want to expand their access to sensitive data
Types of Insider
Threats
There are three types
of insider threats, Compromised users, Careless users, and Malicious users.
Compromised Employees
or Vendors
Compromised employees
or vendors are the most important type of insider threat you’ll face. This is
because neither of you knows they are compromised. It can happen if an employee
grants access to an attacker by clicking on a phishing link in an email. These
are the most common types of insider threats.
Careless Employees
Careless employees or
vendors can become targets for attackers. Leaving a computer or terminal
unlocked for a few minutes can be enough for one to gain access.
Granting DBA
permissions to regular users (or worse, using software system accounts) to do
IT work are also examples of careless insider threats.
Malicious Insider
Malicious attackers can
take any shape or form. They usually have legitimate user access to the system
and willfully extract data or Intellectual Property. Since they are involved
with the attack, they can also cover up their tracks. That makes detection even
more difficult.
The most significant
issues with detecting insider threats are:
1. Legitimate Users
The nature of the
threat is what makes it so hard to prevent. With the actor using their
authentic login profiles, there’s no immediate warning triggered. Accessing
large files or databases infrequently may be a valid part of their day to day
job requirements.
2. System and Software
Context
For the security team
to know that something terrible is happening, they need to know what something
bad looks like. This isn’t easy as. Usually, business units are the experts
when it comes to their software. Without the right context, detecting a real
insider threat from the security operations center is almost impossible.
3. Post Login
Activities
Keeping track of every
user’s activities after they’ve logged in to the system is a lot of work. In
some cases, raw logs need to be checked, and each event studied. Even with
Machine Learning (ML) tools, this can still be a lot of work. It could also
lead to many false positives being reported, adding noise to the problem.
Indicators of Insider
Attacks
Detecting attacks is
still possible. Some signs are easy to spot and take action on.
Common indicators of
insider threats are:
Unexplained Financial
Gain
Abuse by Service
Accounts.
Multiple failed logins.
Incorrect software
access requests.
Large data or file
transfers.
Using systems and tools
that look for these items can help raise the alarm for an attack. While regular
endpoint scans (daily) will ensure workstations stay clean from viruses and
malware.
Your cloud environment
interfaces with all of your infrastructure stacks and applications, so it’s
very important to watch for any insider threats which may exist there.
In order to help
prevent insider threats to your cloud, you need to make sure that it’s properly
configured for optimal security. Secure-by-default landing zones can prevent
new attack surfaces from opening up in development, staging and production
environments.
You must also implement identity access management that’s well
suited to the cloud. The principle of least privilege can also be as useful for
protecting cloud networks as it is for on-premises networks. No user should
have more privileges than they absolutely need in order to do their jobs.
Insider threats can be
a lot more dangerous than outsider threats. As far as malicious attackers are
concerned, insiders already have authorized access to your buildings and user
accounts. An outside attacker needs to work to find an external attack vector
into your networks and physical facilities. Those are steps inside attackers
can usually skip. It's a lot easier to privilege escalate from a user account
you already have than to break into any user account in the first place.
Organizations, on
average, experience 14 Compromised account incidents each month, where
unauthorized third-party agents exploit stolen user credentials to gain access
to corporate data stored in a public cloud service. Eighty percent of
organizations are affected by this risk every month.
EXAMPLE:
Cybercriminals stole personal data (including the residential addresses
and earnings) of 3 million customers of the media and entertainment company WWE
(World Wrestling Entertainment). Hackers gained access to the data after
targeting a database left unsecured on the Amazon cloud server.
Recommended actions to
reduce the risk of a data breach:
Shadow IT and BYOD
(bring your own device) practices often lead to data breaches. Strengthen data
security by installing anti-malware, encryption, authentication, and data
protection software in the personal devices that employees use for work.
Educate employees about
the need to keep their manager and IT lead in the loop when using any new
applications other than those specified or provided by the IT team.
Check terms and
conditions as well as security features offered by CSPs and SaaS providers to
ensure data privacy.
Bring Your Own Device
(BYOD)
Fifty-nine percent of
organizations today allow their employees to bring their own devices to work, a
concept called BYOD. While it helps businesses save money on IT equipment, it
also increases security risks.
Employees might use
unapproved SaaS applications from their personal devices. They may also use
personal and official cloud storage applications side-by-side, increasing the
risk of confidential data getting posted in a personal space. BYOD policies
make it difficult to track employees’ use of business data on their personal
devices. Stolen, lost, or misused devices can also result in business data
getting breached
A service level
agreement (SLA) is a consensus between a client and a service provider. SLA
agreement encapsulates roles & responsibilities, exceptions, accountability
& penalties for both parties.
The following definitions
apply to the SLA:--
"Back-off
Requirements" means, when an error occurs, the Application is responsible
for waiting for a period of time. This means that after the first error, there
is a minimum back-off interval of 1 second and for each consecutive error, the
back-off interval increases exponentially up to 32 seconds.
"Covered
Service" means Production-Grade Cloud Bigtable Instance.
"Downtime"
means more than a five percent Error Rate for a Production-Grade Cloud Bigtable
Instance. Downtime is measured based on server side Error Rate.
"Downtime
Period" means a period of five consecutive minutes of Downtime with a
minimum of 60 requests per minute. Intermittent Downtime for a period of less
than five minutes will not be counted towards any Downtime Periods.
"Error Rate"
means the number of Valid Requests that result in a response with HTTP Status
50x and Code "Internal Error", "Unknown", or
"Unavailable" divided by the total number of Valid Requests during
that period. Repeated identical requests do not count towards the Error Rate
unless they conform to the Back-off Requirements.
"Financial
Credit" means the following for Cloud Bigtable Replicated Instances with
Valid Requests using a Multi-Cluster routing policy:
"Monthly Uptime
Percentage" means total number of minutes in a month, minus the number of
minutes of Downtime suffered from all Downtime Periods in a month, divided by
the total number of minutes in a month.
"Production-Grade
Cloud Bigtable Cluster" means a Cloud Bigtable Cluster with 3 or more
nodes provisioned.
"Production-Grade
Cloud Bigtable Instance" means a Cloud Bigtable Instance that only
contains Production-Grade Cloud Bigtable Clusters.
"Region"
means a region described at https://cloud.google.com/about/locations/, as may
be updated by Google from time to time.
"Replicated
Instance" means a Production-Grade Cloud Bigtable Instance which contains
2 or more Production-Grade Cloud Bigtable Clusters, with each cluster in a
different Zone of either the same Region or different Regions.
"Valid
Requests" are requests –
for a Replicated
Instance using the Multi-Cluster routing policy and that conform to the
Documentation and that would normally result in a non-error response.
for a Replicated
Instance using a Single-Cluster routing policy that conform to the
Documentation and that would normally result in a non-error response.
for a Zonal Instance
that conform to the Documentation, and that would normally result in a
non-error response.
"Zonal
Instance" means a Production-Grade Cloud Bigtable Instance with one
Production-Grade Cloud Bigtable Cluster.
Many
small businesses sign up for cloud providers without asking for a robust
service level agreement (SLA).
A Service Level
Agreement (SLA) is the bond for performance negotiated between the cloud
services provider and the client. Earlier, in cloud computing all Service Level
Agreements were negotiated between a client and the service consumer
SLAs provide companies
a standard to hold each other accountable in regards to customer support
efforts. They also create a goal for employees to meet so they remain
productive. Most importantly, they can prove that negotiated promises between
companies are being kept.
Depending on the agreement, failing to meet an SLA
(often called an SLA violation) can result in a cash payment and/or a discount
to the customer. This compensation is for the business inconvenience that may
occur from the poor support experience.
Service-level agreements, amongst other
things, bolster trust in and between organizations – making it clear what needs
to be done, to what standard, and when.
In the event of a
disaster, your cloud provider should have a plan in place to prevent total loss
of your data. Cloud providers should have a section of the SLA that describes
their disaster recovery and backup solutions in detail.
Depending on the
provider, they may provide automatic backups and snapshots of your data. If the
user is required to set up backup and recovery systems, the SLA should outline
that. It may not specifically state how to activate them, but you should be
aware if you need to activate them or not.
SLAs should not be made
up of incomprehensible legal language; look for terms that guarantee a
specified level of performance by the CSP. Understanding the extent of security
features, e.g., encryption and data loss prevention, offered by the vendor
along with the technical and business features—up-time, resilience, etc.—will
help to ensure that your data in the cloud is secured.
Multifactor
authentication: Multifactor authentication is an authentication method that
allows access to a portal or application only after the user successfully
presents two or more pieces of evidence. A two-factor authentication that uses
a password as well as a one-time authentication key (OTP) is an example of
this.
The front line of
defense for any system is encryption. It uses complex algorithms to conceal or
encrypt information. To decrypt these files, you must have a confidential
encryption key. Encryption helps prevent confidential data from falling into
the wrong hands. Encrypting data at rest is a must while encrypting data
in-transit is highly advised.
What is encryption
algorithm?
A mathematical
procedure for performing encryption on data. Through the use of an algorithm,
information is made into meaningless cipher text and requires the use of a key
to transform the data back into its original form. Blowfish, AES RC4, RC5, and
RC6 are examples of encryption algorithms.
Data backup is the
process of duplicating data to allow for its retrieval in case of a data loss
event. It helps to ensure that data is not lost because of natural disasters,
theft, or any other mishap
A firewall is a network
security tool that monitors incoming and outgoing traffic to detect anomalies.
It also blocks specific traffic based on a defined set of rules. Cloud-based
virtual firewalls help to filter network traffic to and from the internet and
secure the data center.
A software bug is a
coding error that causes an unexpected defect in a computer program. In other
words, if a program does not perform as intended, it is most likely because of
a bug
A software bug is an
error, flaw or fault in a computer program or system that causes it to produce
an incorrect or unexpected result, or to behave in unintended ways.
The process of finding
and fixing bugs is termed "debugging" and often uses formal
techniques or tools to pinpoint bugs, and since the 1950s, some computer
systems have been designed to also deter, detect or auto-correct various
computer bugs during operations.
Most bugs arise from
mistakes and errors made in either a program's source code or its design, or in
components and operating systems used by such programs. A few are caused by
compilers producing incorrect code. A program that contains many bugs, and/or
bugs that seriously interfere with its functionality, is said to be buggy
(defective).
Bugs can trigger errors that may have ripple effects. Bugs may
have subtle effects or cause the program to crash or freeze the computer. Other
bugs qualify as security bugs and might, for example, enable a malicious user
to bypass access controls in order to obtain unauthorized privileges.
The Top Reasons for Software
Bugs:
Lack of Communication.
Lack of organized communication leads to miscommunication. ...
Recurring Ambiguity in
Requirements. ...
Missing Process
Framework. ...
Programming Errors. ...
Too much Rework. ...
Self Imposed Pressures.
Here are possible
occurrences that threaten data integrity:--
Data breaches, locks,
and removals are among the possibilities that can risk in the loss of data
integrity. Data breaches are incidents in which sensitive data are stolen by
individuals who have no authorization to do so. Also referred to vendor
lock-in, data lock is a situation in which customers using a service cannot
easily convert to a competitor’s product or service, usually as a result or
incompatible technologies. In the case of data removal where there is a
rendering representation of data loss, recovery may become difficult if the
server broke down or failed.
Guest-hopping attack
In guest-hopping
attacks, due to the separation failure between shared infrastructures, an
attacker gets access to a virtual machine by penetrating another virtual
machine hosted in the same hardware. One possible mitigation of guest-hopping
attack is the Forensics and VM debugging tools to observe any attempt to
compromise the virtual machine. Another solution is to use the High Assurance
Platform (HAP), which provides a high degree of isolation between virtual
machines.
Side-channel attack
An attacker opens a
side-channel attack by placing a malicious virtual machine on the same physical
machine as the victim machine. Through this, the attacker gains access to all
confidential information on the victim machine. The countermeasure to eliminate
the risk of side-channel attacks in a virtualized cloud environment is to
ensure that no legitimate user VMs reside on the same hardware of other users.
Malicious insider
A malicious insider can
be a current or former employee or business associate who maliciously and
intentionally abuses system privileges and credentials to access and steal
sensitive customer information within the network of an organization. Strict
privilege planning and security auditing can minimize this security risk that
originates from within an organization.
Cookie poisoning
Cookie poisoning means
to gain unauthorized access into an application or a webpage by modifying the
contents of the cookie. In a SaaS model, cookies contain user identity
credential information that allows the applications to authenticate the user
identity. Cookies are forged to impersonate an authorized user. A solution is
to clean up the cookie and encrypt the cookie data.
Cookie poisoning is the
act of manipulating or forging session cookies for the purpose of bypassing
security measures and achieving impersonation and breach of privacy. By forging
these cookies, an attacker can impersonate a valid client, and thus gain information
and perform actions on behalf of the victim. Or attackers can use forged
cookies to trick a server into accepting a new version of the original
intercepted cookie with modified values. The ability to forge such session
cookies (or more generally, session tokens) stems from the fact that all tokens
are not generated in a secure way.
A cookie is information
that a web site puts on your hard disk so that it can remember something about
you at a later time. More technically, it is information for future use that is
stored by the server on the client side of a client / server communication.
Typically, a cookie records your preferences when using a particular site.
Cookies stored on your computer's hard drive maintain bits of information that
allow web sites you visit to authenticate your identity, speed up your
transactions, monitor your behavior, and personalize their presentations for
you.
How do cookies work?
When a user visits a
site, the site sends a tiny piece of data, called a cookie, which is stored on
the user's computer by their browser. The browser sends the cookie back to the
server with every request the browser makes to that server, such as when the
user clicks a link to view a different page or adds an item to a shopping
basket.
The data stored in the
cookie lets the server know with whom it is interacting so it can send the
correct information back to the user. Cookies are often used by web servers to
track whether a user is logged in or not, and to which account they are logged
in. Cookie-based authentication is stateful for the duration of multiple
requests and has been the default method for handling user authentication for a
long time. It binds the user authentication credentials to the user's requests
and applies the appropriate access controls enforced by the web application.
A typical example of a
cookie use begins with a user entering their login credentials, which the
server verifies are correct. The server then creates a session that is stored
in a database, and a cookie containing the session ID is returned to the user's
browser. On every subsequent request, the browser returns the cookie data, and
the session ID is verified by the server against the database; if it is valid,
the request is processed. When the user logs out of the site, the session is
usually destroyed on both the client and server side, but if the user has
checked the “Keep me logged in” or “Remember me” option, the cookie will
persist on the user's computer
Cookies can be accessed
by persons unauthorized to do so due to insufficient security measures. An
attacker can examine a cookie to determine its purpose and edit it so that it
helps them get user information from the website that sent the cookie.
Cross-site scripting
(XSS) injection attacks are a common method used to steal session cookies. If
attackers can find a page on a site that is vulnerable to XSS injection, they
can insert a script into the page that sends them the session cookie of
everyone that views the page. The cookie then enables the attackers to impersonate
its rightful owner, enabling them to stay logged in to the victim's account for
as long as they want, without ever having to enter a password.
Alternative cookie
attacks include predicting, brute force hacking or replicating the contents of
a valid authentication cookie. Any such forged cookies would enable the
attacker to impersonate a site's genuine users.
How can we prevent
cookie poisoning?
As cookie poisoning is
fairly easy to do, adequate cookie-poisoning protection should detect cookies that
were modified on a client machine by verifying that cookies which are sent by
the client are identical to the cookies that were set by the server.
Ingrian Networks has
developed a patented platform which provides a means for securing cookies
authenticity. When cookies pass through the platform, sensitive information is
encrypted. A digital signature is created that is used to validate the content
in all future communications between the sender and the recipient. If the
content is tampered with, the signature will no longer match the content and
will be refused access by the server.
In addition, web
applications should be developed so that certain key parameters are not stored
within cookies so as to minimize the damage if they are stolen or forged.
Backdoor and debug
option
The backdoor is a
hidden entrance to an application, which was created intentionally or
unintentionally by developers while coding. Debug option is also a similar
entry point, often used by developers to facilitate troubleshooting in
applications. But the problem is that the hackers can use these hidden doors to
bypass security policies and enter the website and access the sensitive
information. To prevent this kind of attack, developers should disable the
debugging option.
Cloud browser security
A web browser is a
universal client application that uses Transport Layer Security (TLS) protocol
to facilitate privacy and data security for Internet communications. TLS
encrypts the connection between web applications and servers, such as web
browsers loading a website. Web browsers only use TLS encryption and TLS
signature, which are not secure enough to defend malicious attacks. One of the
solutions is to use TLS and at the same time XML based cryptography in the
browser core.
Cloud malware injection
attack
A malicious virtual
machine or service implementation module such as SaaS or IaaS is injected into
the cloud system, making it believe the new instance is valid. If succeeded,
the user requests are redirected automatically to the new instance where the
malicious code is executed. The mitigation is to perform an integrity check of
the service instance before using it for incoming requests in the cloud system.
A cloud browser is a
cloud-based combination of a web browser application with a virtualized
container that implements the concept of remote browser isolation. Commands
from the web are executed in a secure container, separate from the user
endpoint, and accessed by the remote display protocol. By placing a browser
application in the cloud, it becomes more centralized, manageable, cost
effective, scalable and protected.
Enhanced security: Due
to the fact that no executable web code ever reaches the user endpoint, pieces
of malicious code and potential threats are blocked.
Better privacy: Unlike
traditional web browsers, cloud browsers protect a user's digital identity and
location during each session by passing information through a cloud-based data
center.
Implemented cloud
service benefits: Similar to other cloud services, cloud browser providers will
manage the maintenance, scalability and capacity. This gives administrators a
single point of command and control.
Reduced need for point
solutions: Browsing within the cloud minimizes the necessity of added
functionality such as content filtering, data loss protection (DLP), SSL
inspection, endpoint security protection, domain name system (DNS) services,
firewalls and VPNs
ARP poisoning
Address Resolution
Protocol (ARP) poisoning is when an attacker exploits some ARP protocol
weakness to map a network IP address to one malicious MAC and then update the
ARP cache with this malicious MAC address. It is better to use static ARP
entries to minimize this attack. This tactic can work for small networks such
as personal clouds, but it is easier to use other strategies such as port
security features on large-scale clouds to lock a single port (or network
device) to a particular IP address.
Network-level security attacks
Cloud computing largely
depends on existing network infrastructure such as LAN, MAN, and WAN, making it
exposed to some security attacks which originate from users outside the cloud
or a malicious insider..
Domain Name System
(DNS) attacks
It is an exploit in
which an attacker takes advantage of vulnerabilities in the domain name system
(DNS), which converts hostnames into corresponding Internet Protocol (IP)
addresses using a distributed database scheme. DNS servers are subject to
various kinds of attacks since DNS is used by nearly all networked applications
– including email, Web browsing, eCommerce, Internet telephony, and more. It
includes TCP SYN Flood Attacks, UDP Flood Attack, Spoofed Source Address/LAND
Attacks, Cache Poisoning Attacks, and Man in the Middle Attacks.
Domain hijacking
Domain hijacking is defined
as changing a domain’s name without the owner or creator’s knowledge or
permission. Domain hijacking enables intruders to obtain confidential business
data or perform illegal activities such as phishing, where a domain is
substituted by a similar website containing private information. One way to
avoid domain hijacking is to force a waiting period of 60 days between a change
in registration and a transfer to another registrar.
Another approach is to use
the Extensible Provisioning Protocol (EPP), which utilizes a domain
registrant-only authorization key as a protection measure to prevent unintended
name changes. Another approach is to use the Extensible Provisioning Protocol
(EPP), which utilizes a domain registrant-only authorization key as a protection
measure to prevent unauthorized name changes.
All cloud based
security issues can be broken down into four departments. Risks include data
integrity, application security, content and policy security, and network level
attacks.
https://static.googleusercontent.com/media/1.9.22.221/en//enterprise/pdf/whygoogle/google-common-security-whitepaper.pdf
- WE ASK THE MODI GOVT..
MAKE IT COMPULSORY FOR EVERY INDIAN TO DECLARE HOW MUCH BITCOIN HE HAS WITH HIM..
HE ALSO HAS TO DECLARE HOW HE GOT IT..
MAKE IT A JAILABLE OFFENCE FOR MISDECLARATION ..
CYBER HACKERS ARE ASKING FOR PAYMENT IN BITCOIN..
DDOS SCAMMERS ARE IMPERSONATING ONE OF RUSSIA’S MOST NOTORIOUS HACKING GROUPS IN ORDER TO EXTORT VICTIMS OUT OF THOUSANDS OF DOLLARS WORTH OF BITCOIN.
THE SCHEME WORKS LIKE THIS: ATTACKERS LAUNCH THE DDOS ATTACK FROM A BOTNET, IN WHICH EACH IP IN THE BOTNET SENDS A FRACTION OF THE OVERALL TRAFFIC TO THE TARGET. THE VICTIM HAS A DEADLINE, TYPICALLY SIX DAYS, TO PAY TWO BITCOIN. IF THEY DON’T PAY BY THE TIME THE DEADLINE EXPIRES, THE FEE INCREASES BY ONE BITCOIN PER DAY, AND THE DDOS RESUMES.
A U.S. JUDGE SENTENCED A 21-YEAR-OLD MAN SERGIY USATYUK, OF ILLINOI TO 13 MONTHS IN PRISON FOR RUNNING SERVICES THAT MADE IT POSSIBLE FOR ATTACKERS TO LAUNCH MILLIONS OF THEIR OWN DDOS ATTACKS WITH LITTLE FEAR OF BEING APPREHENDED
https://ajitvadakayil.blogspot.com/2019/11/what-artificial-intelligence-cannot-do_15.html
capt ajit vadakayil
..
SOMEBODY ASKED ME
WHAT IS THIS EXTREME VIOLENCE IN NE STATES ABOUT CAB ?
WELL THIS VIOLENCE IS SPONSORED BY DEEP STATE ( ROTHSCHILD ) FUNDED NGOs.
ONLY ONE PERSON ON THE PLANET CAN TELL YOU WHY JEW ROTHSCHILD INTRODUCED "INNER LINE PERMIT" IN NE STATES AND WHY CHINA WANTS TO ANNEX ARUNACHAL PRADESH..
MY NEXT POST WILL BE ABOUT THIS..
IT WILL MAKE DONALD TRUMPS OLD BALLS GO TRRR PRRR BRRRR.
AJIT DOVAL-- STOP RESTING ON YOUR PAST DEEP PAKISTAN LAURELS.. MOVE YOUR SCRAWNY ASS !
capt ajit vadakayil
..
WHAT IS THIS EXTREME VIOLENCE IN NE STATES ABOUT CAB ?
WELL THIS VIOLENCE IS SPONSORED BY DEEP STATE ( ROTHSCHILD ) FUNDED NGOs.
ONLY ONE PERSON ON THE PLANET CAN TELL YOU WHY JEW ROTHSCHILD INTRODUCED "INNER LINE PERMIT" IN NE STATES AND WHY CHINA WANTS TO ANNEX ARUNACHAL PRADESH..
MY NEXT POST WILL BE ABOUT THIS..
IT WILL MAKE DONALD TRUMPS OLD BALLS GO TRRR PRRR BRRRR.
AJIT DOVAL-- STOP RESTING ON YOUR PAST DEEP PAKISTAN LAURELS.. MOVE YOUR SCRAWNY ASS !
capt ajit vadakayil
..
- THE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS...
ALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..
THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIEMENT.
THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS.. OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN.
WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGEMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION..
THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN..
JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...
JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…
WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..
http://ajitvadakayil.blogspot.com/2018/11/the-indian-constitution-does-not-allow.html
WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..
WE NEED TO FORM MILITARY COURTS IN INDIA TO HANG TRAITOR JUDGES IN PAYROLL OF THE DEEP STATE.. THESE JUDGES ARE IN CAHOOTS WITH BENAMI MEDIA..
PEOPLE IN NE STATES CONTROLLED BY JEW ROTHSCHILD ( DEEP STATE ) FUNDED NGOs ARE ENGAGED IN RIOTS.. MY NEXT POST WILL EXPLAIN WHY?
OUR POTHOLE JOURNALISTS AND STUPID JUDGES DO NOT EVEN KNOW WHAT IS “INNER LINE PERMIT” IN ARUNACHAL PRADESH CREATED BY JEW ROTHSCHILD WHO RULED INDIA ..
WE KNOW ILLEGAL COLLEGIUM JUDGES HAVE FOREIGN SUPPORT WHEN THEIR LEGISTLATE AND DO EXTREME JUDICIAL OVERREACH..
Capt ajit vadakayil
..
- This means that Indian parliament has already passed NJAC and all it needs is someone with balls of steel to face off the judges as it has been illegally cancelled by the judges..
So what has been done illegally is null and void and the original bill is the law as passed by the parliament.
THIS POST IS NOW CONTINUED TO PART 11 , BELOW--
https://ajitvadakayil.blogspot.com/2019/12/what-artificial-intelligence-cannot-do_1.html
CAPT AJIT VADAKAYIL
..
ReplyDeletehttps://timesofindia.indiatimes.com/india/in-dhoti-punjabi-abhijit-receives-nobel-india-cheers/articleshow/72465231.cms
ONLY TRAITORS CHEER ABHIJIT BANNERJEE....
JEW ROTHSCHILD HAS GIVEN US A NEW AMARTYA SEN NAMED ABHIJIT BANNERJEE --..
AMARTYA SEN HAS BEEN PUT OUT TO PASTURE FOR BEING INEFFECTIVE ….
A MILLION BONGS DANCED ON THE STREETS OF CALCUTTA WHEN AMARTYA SEN GOT NOBEL PRIZE.. LET ME SEE HOW MANY ATTEND HIS FUNERAL….
WHAT WAS AMARTYA SENs QUALIFICATION? . HE MARRIED JEWESS EMMA ROTHSCHILD …
WHAT IS ABHIJEET BANNEJEEs QUALIFICATION? .. HE MARRIED FRENCH JEWESS ESTHER DUFLO….
BOTH MIYA AND BIWEE GOT NOBEL PRIZE.. EKATTA.. BRAAAAYYYYYYYYYY !..
DEEP STATE DARLING ABHIJIT BANNERJEE WAS ONE OF THE 108 SIGNATORIES WHO LIED THAT MODI COOKED UP STATISTICS PUBLISHED BY CENTRAL STATISTICAL OFFICE NSSO JUST PRIOR TO 2019.. THIS WAS A POLITICAL MOVE..
COMMIE ABHIJIT BANERJEEs NAME IS NO 5 IN THE LIST..
ABHIJIT BANNERJEE WON NOBEL PRIZE ONLY BECAUSE HIS WIFE IS A JEWESS ESTHER DUFLO WHO SHARED THE NOBEL PRIZE WITH HIM....
ABHIJIT BANNERJEE , IS A DEEP STATE AGENT --JUST LIKE AMARTYA SEN AND RAGHURAM RAJAN..
HE IS GUILTY OF LYING USING A PLATFORM GIVEN TO HIM BY FORD FOUNDATION TO BRING HIS OWN WATAN DOWN..
I HAVE READ SOME OF HIS WORKS INCLUDING HIS BOOK “POOR ECONOMICS “ AND HEARD HIS VIEWS -- AND I CONSIDER HIM A MEDIOCRE BRAIN WHO HAS REACHED PLACES BY SPONSORSHIP FROM JEWISH NEOCONS ..
DEEP STATE DARLING ABHIJIT BANNERJEE WAS ONE OF THE 108 SIGNATORIES WHO LIED THAT MODI COOKED UP STATISTICS PUBLISHED BY CENTRAL STATISTICAL OFFICE NSSO JUST PRIOR TO 2019 TO PAINT A ROSY PICTURE OF INDIAN ECONOMY ..
WE ASK WHICH PROFESSOR WITH INTEGRITY WILL MARRY HIS OWN DOCTORAL STUDENT ?
IS ABHIJIT BANNERJEEs WIFE ESTHER DUFLO ( A JOINT NOBEL PRIZE WINNER ) WORTHY OF HER DEGREE ?'ROTHSCHILD ECONOMISTS SWAMY/ MANMOHAN SINGH/ MONTEK SINGH AHLUWALIA/ RAGHURAN RAJAN / CHID/ AMARTYA SEN / ABHIJIT BANNERJEE / GITA GOPINATH --
DO NOT KNOW THAT GDP IS USED TO PORTRAY WHITE BEGGAR NATIONS AS RICH AND ECONOMICALLY STRONG NATION LIKE INDIA , AS A BEGGAR NATION..
INDIA IS GROWING TODAY AT 10.1%.. WE ARE A 5 TRILLION USD ECONOMY ALREADY.. WE ARE NO 3 IN ECONOMIC STRENGTH ON THE PLANET..
. READ ITEMS 686 TO 820 OF THE POST BELOW--
Go0gle for the blogpost below---
……………………….. ARCHIVED - QUESTIONS TO QUORA FROM CAPT AJIT VADAKAYIL , NO 1 TO NO 1017 ……………………
Pranam Captain
ReplyDeleteWhich is your favourite Attar? And what is the correct way to apply an attar?
Regards
Sagar
THE INDIAN JUDICIARY HAS FACILITATED CONVERSION OF TRIBALS AND COASTAL FISHERMEN OF TAMIL NADU AND KERALA INTO CHRISTIANITY.. THERE ARE REWARDS FOR THIS..
ReplyDeletehttp://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
HERE IS A SHOCKER-- PEOPLE CANT THINK DEEP..
WHY DID PRAYER BREAKFAST GROUP ( FAMILY/ FELLOWSHP ) SPONSOR NAC IN INDIA?
THEY WANTED TO CREATE A SITUATION AMONG HINDUS LIKE IN THE TIME OF SIKANDAR BHUTSHIKAN..
THIS WIKIPEDIA ARTICLE IS WATERED DOWN TO SHOW THIS BASTARD IN GOOD LIGHT..
https://en.wikipedia.org/wiki/Sikandar_Shah_Miri
THIS 7TH MUSLIM KING OF KASHMIR , SIKANDAR BUTSHIKAN , WAS THE MOST CRUEL OF ALL THE MUSLIM RULERS WHO INVADED INDIA.
SIKANDAR BHUTSHIKAN MADE HINDUS KAFFIRS ( LESSER HUMANS ) ..
KASHMIRIS WERE PROUD HINDUS, THE LAND OF KASHMIR HAD 100% HINDUS.
KAFFIRS ARE LESSER HUMAN BEINGS WHO ARE CRIMINALS BY DEFINITION BECAUSE THEY ARE NOT MUSLIMS.
LIFE BECASE SO TOUGH THAT HINDUS TO ISLAM CONVERTED FOR SURVIVAL.
IN KASHMIR, SIKANDAR BUTSHIKAN LEVIED BOTH JIZYA AND ZAKAT ON HINDUS.
SIKANDAR BHUTSHIKAN DESTROYED THE MARTHANDA TEMPLE. WHICH WAS MORE MAGNIFICIENT THAN TAJMAHAL.
IT TOOK HIS SOLDIERS 13 MONTHS TO DESTROY THE GLORIOUS 3100 YEAR OLD MARTHANDA SUN TEMPLE OF KASHMIR--SUCH WAS ITS AMAZING STRENGTH WITH HUGE INTERLOCKING STONES..
THIS CRUEL MUSLIM KING AUTHORISED HIS SOLDIERS TO RAPE DEAD HINDU WOMEN WHO TOOK POISON TO ESCAPE CAPTURE. HE HAD ALREADY BANNED ALL HINDUS IN KASHMIR FROM CREMATING THEIR DEAD BODIES.
FOR A HINDU CREMATION AFTER DEATH IS A MUST TO PREVENT THE SOUL BEING TRAPPED ON EARTH.
HE BANNED DANCE, DRAMA, MUSIC AND ICONOGRAPHY AS AESTHETIC ACTIVITIES OF THE HINDUS AND FIATED THEM AS HERETICAL AND UN-ISLAMIC. HE FORBADE THE HINDUS TO APPLY A TILAK MARK ON THEIR FOREHEADS.
HE DID NOT PERMIT HINDUS TO PRAY AND WORSHIP, BLOW A CONCH SHELL OR TOLL A BELL. A HEAVY JIZYA (TAX) EQUAL TO 4 TOLAS OF SILVER WAS IMPOSED ON THE HINDUS.
IF A HINDU WAS CAUGHT IN A MUSLIM DRESS TO ESCAPE CAPTURE, HE WOULD BE TORTURED MOST SEVERELY.
HIS POLICY TOWARDS HINDUS WAS -- CONVERT OR DIE.
THE HINDUS WILL NOT REPAIR TEMPLES
THEY WILL NOT RIDE A HORSE WITH SADDLE AND BRIDLE.
THEY WILL NOT CARRY SWORDS OR BOWS AND ARROWS.
THEY WILL NOT PREVENT MUSLIM TRAVELERS FROM STAYING IN THEIR TEMPLES & SHRINES.
THEY WILL NOT MOURN THEIR DEAD LOUDLY.
THEY WILL NOT BUILD HOUSES IN NEIGHBOURHOOD OF MUSLIMS.
THEY WILL NOT CARRY THEIR DEAD NEAR THE GRAVE-YARDS OF MUSLIMS.
THEY WILL NOT GIVE UP THEIR TRADITIONAL DRESS SO THAT THEY CAN BE DISTINGUISHED FROM MUSLIMS.
THEIR SACRED HINDU BOOKS WERE THROWN INTO THE DAL LAKE BY SIKANDAR BUTSHIKAN . THE PANDITS NUMBERING OVER ONE LAKH ( 100 000 ) WERE DROWNED IN THE DAL LAKE BY HOLDING THEIR HEADS UNDERWATER AND THEN THEY WERE BURNED IN A HEAP AT A SPOT IN THE VICINITY OF RAINAWARI IN SRINAGAR CITY KNOWN AS BHATTA MAZAR BEYOND PRESENT DAY JOGILANKER.
THE WATERS OF THE PLACID DAL LAKE HOLDS ALL THESE MORBID MEMORIES.
HISTORICALLY HINDUS HAVE NEVER ENGAGED PRO-ACTIVELY I VIOLENCE AND DRAWN FIRST BLOOD.. HINDUS HAVE ALWAYS BEEN REACTIVE – TOTALLY EXASPERATED , AND TO AVOID BEING BRANDED AS COWARDS.
GODHRA RIOTS WAS A REACTION, NOT A PROACTIVE ACTION.
CONTINUED TO 2-
CONTINUED FROM 1--
Deletehttp://ajitvadakayil.blogspot.com/2012/11/babri-masjid-demolition-mughal-emperor.html
CAPT AJIT VADAKAYIL WILL WRITE THE LEGACY OF UDDHAV THACKREY, A DROHI..
MARATHA HINDUS DID NOT VOTE FOR THE ITALIAN WAITRESS OF AHMED PATEL ( PAKISTANI, ISI SPONSORED )
http://ajitvadakayil.blogspot.com/2017/11/hindu-holocaust-continues-capt-ajit.html
NAC TRIED TO MAKE HINDUS CONVERT TO CHRISTIANITY/ ISLAM.. YOU CANT EVEN SAY, WE DON’T WANT ILLEGAL BANGLADESI MUSLIM IMMIGRANTS INTO INDIA.
TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP. SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..
I WILL PUT A FULL BLOGPOST ON NAC AND COMMUNAL VIOLENCE BILL.
THE ITALIAN WAITRESS PACKED NAC WITH ANTI-HINDU PEOPLE.. MIND YOU, NAC WAS NOT APPLICABLE IN KASHMIR BECAUSE HINDUS WERE MINORITY THERE..
THE ILLEGAL COLLEGIUM JUDICIARY PLAYED ALL..
WE WILL FORM MILITARY COURTS TO HANG DESH DROHIS WHO SPONOSRED NAC..
Capt ajit vadakayil
..
SOMEBODY CALLED ME UP AND ASKED ME---
ReplyDeleteWHY WAS BR AMBEDKAR SO BITTER IN THE LAST YEARS OF HIS LIFE ..
INDEED –AFTER BR AMBEDKAR LOST THE LOK SABHA ELECTIONS FROM BHANDARA IN 1954 HE LOST ALL HOPE OF BECOMING PM.
JEW COMMIE JOHN DEWEY WAS BR AMBEDKARs MENTOR WHILE DRAFTING THE CONSTITUTION.
ROTHSCHILDs AGENT JEW JOHN DEWEY WROTE MAOs LITTLE RED BOOK.
JOHN DEWEY WANTED TO MAKE BR AMBEDKAR THE PM OF INDIA.. BUT THERE WAS ZERO CHANCE OF HIM GETTING ELECTED LIKE MANMOHAN SINGH..
BR AMBEDKAR HAD LEFT A WEE UNNOTICED LOOP HOLE FOR HIMSELF VIA ARTICLE 75 OF THE CONSTITUTION.. HE COULD COME VIA THE RAJYA SABHA BACKDOOR, IF HE COULD INFLUENCE THE PRESIDENT RAJENDRA PRASAD, BUT THAT WAS NOT TO HAPPEN.
THE BRITISH CONSTITUTION DOES NOT ALLOW AN UNELECTED PM -- HE HAS TO COME VIA THE HOUSE OF COMMONS.
BUT THE INDIAN CONSTITUTION WHICH WAS A STRAIGHT LIFT OF THE BRITISH CONSTITUTION ( WITH SOME SOCIAL ENGINEERING PROVIDED BY JOHN DEWEY ) ALLOWED A MAN WHO IS NEITHER IN THE LOK SABHA OR RAJYA SABHA ( ARTICLE 75 ) TO BECOME PM, PROVIDED THE PRESIDENT SANCTIONS IT..
IN EVERY FUNCTIONING PARLIAMENTARY DEMOCRACY ON THIS PLANET THE GOLDEN THUMB RULE IS THAT THE HEAD OF THE GOVERNMENT MUST BE A MEMBER OF THE PARLIAMENT , AND MUST BE ELECTED BY THE PEOPLE..
HEY , IS INDIA A BANANA REPUBLIC ?
ROTHSCHILD VIA BILDERBERG CLUB DECIDED MANMOHAN SINGH ( WORSE THAN A LAME DUCK ) WOULD BE RBI GOVERNOR/ FINANCE MINISTER/ PM OF INDIA..
http://ajitvadakayil.blogspot.com/2016/03/pm-defense-minister-finance-minister-of.html
MANMOHAN SINGH WITH SOFTER THAN RUBBER SPINE LOST THE 1999 LOK SABHA ELECTION FROM THE SOUTH DELHI CONSTITUENCY AND HAD NO HOPES OF EVER BEING ELECTED. PEOPLE REJECTED THIS LIMPET PERSON, NO SARDARJEE CAN BE LIKE HIM EVER..
http://ajitvadakayil.blogspot.com/2011/09/shrewd-club-within-naive-bilderberg.html
IMAGINE WHEN THE ITALIAN MAINO JEWESS WAITRESS WAS EMPRESS VIA NAC, SHE HAD LAME DUCK SARDARJEE AS HER PM.. SHE DID NOT ADVISE HIM , SHE COMMANDED HIM..
FOR A DECADE MANMOHAN SINGH REMAINED PM WHILE BEING THE MEMBER OF RS – VIA CHRISTIAN STRONGHOLD ASSAM.
RAHUL GANDHI LOST MISERABLE IN AMETHI BUT HE BECAME MP VIA WAYANAD ( KERALA ) WHERE TRIBALS HAVE BEEN CONVERTED TO CHRISTINITY ENMASSE BY RICE BAGS.
THE ITALIAN MAINO JEWESS FELL PHUTT ON HER FACE WHEN SHE TRIED TO MADE KAFIRS OUT OF MAJORITY HINDUS IN THEIR OWN LAND VIA COMMUNAL VIOLENCE BILL ..
KAFIRS ARE LESS THAN HUMANS – LIKE ANIMALS.. KAFIRS ARE CRIMINALS BY DEFINITION JUS BECAUSE THEY ARE NOT MUSLIMS.
NAC TRIED TO MAKE HINDUS CONVERT TO CHRISTIANITY/ ISLAM.. YOU CANT EVEN SAY, WE DON’T WANT ILLEGAL BANGLADESI MUSLIM IMMIGRANTS INTO INDIA.
IN 1997,THE ILLEGAL COLLEGIUM JUDICARY , THE SUPREME COURT STATED THAT A PERSON WHO IS NOT A MEMBER OF EITHER HOUSE OF PARLIAMENT CAN BE APPOINTED AS PM FOR SIX MONTHS, WITHIN WHICH HE MUST BECOME A MEMBER OF EITHER HOUSE OF PARLIAMENT OR HE CEASES TO BE PM.
TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP. SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..
THE ITALIAN WAITRESS PACKED NAC WITH ANTI-HINDU PEOPLE.. MIND YOU, COMMUNAL VIOLENCE BILL VIA NAC WAS NOT APPLICABLE IN KASHMIR BECAUSE HINDUS WERE MINORITY THERE..
THE ILLEGAL COLLEGIUM JUDICIARY PLAYED ALL..
WE ASK MODI TO FORM MILITARY COURTS AND TRY DESH DROHIS WITHIN INDIA WHO MADE UNCONSTITUTIONAL NAC POSSIBLE.. WE WANT CAPITAL PUNISHMENT FOR SEDITION..
WHY DID PRAYER BREAKFAST GROUP ( FAMILY/ FELLOWSHP ) SPONSOR NAC IN INDIA?
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
THEY WANTED TO CREATE A SITUATION AMONG HINDUS LIKE IN THE TIME OF ISLAMIC BIGOT KING SIKANDAR BHUTSHIKAN WHO DERPIVED KASHMIRI HINDUS OF HUMAN RIGHTS AND FORCED HINDUS TO CONVERT TO ISLAM FOR SURVIVAL , IN SHEER IN EXPASPERATION..
BEFORE SIKANDAR BHUTSHIKAN KASHMIR HAD 100% HINDUS..
MY NEXT POST WILL BE ON NAC AND COMMUNAL VIOLENCE BILL —WATCH THIS SPACE..
Capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteRBI
RBI GOVERNOR
NIRMALA SITARAMAN
FINANCE MINISTRY CENTRE/ STATES
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
https://timesofindia.indiatimes.com/home/environment/global-warming/teen-climate-activist-greta-thunberg-is-times-person-of-the-year/articleshow/72476521.cms
ReplyDeleteWE THE PEOPLE OF INDIA SPIT ON JEWESS GRETA THUNBERG-- A DEEP STATE AGENT.
DEEP STATE WANTS INDIA TO MOTHBALL OUR ENORMOUS RESERVES PF COAL..
MODI TO GET A NOBEL PRIZE IS DANCING TO THE TUNE OF HIS JEWISH MASTERS..AND HE HAS RETAINED A STUPID FELLOW PRAKASH JAVEDEKAR AS HIS ENVIRONMENT MINISTER..
https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF—
DeleteTRUMP
PUTIN
AMBASSADORS TO FROM RUSSIA- USA
NGT
ENVIRONMENT MINISTER/ MINISTRY
ALL STATE ENVIRONMENT MINISTERS
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
https://twitter.com/rakeshsivan/status/1204797269884588033
Deletehttps://twitter.com/rakeshsivan/status/1204797510599901184
https://twitter.com/rakeshsivan/status/1204797547925000193
https://twitter.com/rakeshsivan/status/1204797574231707648
https://twitter.com/rakeshsivan/status/1204797613771378688
Sent to
Deleteed-del-rev@nic.in
alokmittal.nia@gov.in
Russian President website
swamy39@gmail.com
rsccell@sansad.nic.in
editor@thequint.com
editorial@thewire.in
ideas@scroll.in
mrs.mlekhi@gmail.com
contact@pgurus.com
cons1.washington@mea.gov.in
cg.vladi@mea.gov.in
rusembindija@mid.ru
rusembindia@mid.ru
consulate_mumbai@mail.ru
Captain, I found somebody lifting your blogs.
ReplyDeleteSee this person, he has copied your blogpost & comment contents on topics such as Activity-traps, Gratitude, MLM, Team-dyamics, etc......What is interesting is that he never mentiones your name explicity and does not give any link to the original-blog/comment......Instead, in a strange-manner, he simply states --- "From the famous Captain" --- see it yourself.
Original-comment about activity-trap (from 2017):---
https://tinyurl.com/tmprrnt
Lifted-content of activity-trap & others (from 2018):---
https://www.linkedin.com/pulse/meaning-real-work-vs-activity-trap-chinmaya-mishra
https://www.linkedin.com/pulse/mlm-merchants-pipe-dreams-greed-driving-spirit-slaves-chinmaya-mishra
https://www.linkedin.com/pulse/gratitude-noblest-all-virtues-chinmaya-mishra
https://www.linkedin.com/pulse/team-work-dynamics-chinmaya-mishra-1
https://www.linkedin.com/pulse/life-management-chinmaya-mishra
https://www.linkedin.com/pulse/team-work-dynamics-chinmaya-mishra-1
ReplyDeleteASK THIS BASTARD IF CAPTAIN HAS A NAME ..
IF HE HAS LIFTED WHOLESALE HE MUST PUBLISH THE LINK..
http://ajitvadakayil.blogspot.com/2010/12/team-work-team-dynamics-capt-ajit.html
Have commented and asked him in the link above.
DeleteDear Captain,
DeleteHe is an IIM Lucknow grad and works at Eriksson. He has deleted the article.
infact he has deleted all the other articles copied from captain's blog.
Deleteso he is ready to delete it all but cannot write "From Ajit Vadakayil" , not expected from someone with such a good education background!
https://timesofindia.indiatimes.com/india/dark-day-in-constitutional-history-of-india-sonia-gandhi-on-passage-of-citizenship-bill-by-parliament/articleshow/72478929.cms
ReplyDeleteITALIAN MAINO JEWESS WHO WAS A WAITRESS TRIED TO BE EMPRESS OF INDIA VIA NAC...
USING CVB SHE TRIED TO CONVERT HINDUS TO KAFIRS IN THEIR OWN LAND.
Captain,
ReplyDeleteRavi shankar prasad in a discussion on CAB in R.S said that parliment is sovereign and it has even the power to override the ruling of sc and he further went on to assert the power of parliment in making laws.All credit goes to you captain.atleast now he has spoken something sensible.
AS A LAW MINISTER YOU MUST KNOW THIS -- WITH ATTORNEY GENERAL YOU CAN TEAR THE ASS OF THE ILLEGAL COLLEGIUM JUDICIARY...
Delete🙏🙏
ReplyDeleteCaptain sir,
CAB passed in Rajya sabha.
Vadakayil effect in action
🇮🇳🇮🇳🇮🇳👏👏👏
Oops O dear! Lutyens media lost their bete noire ...Modi got clean chit from Nanavati Mehta commission...
ReplyDeleteSOMEBODY ASKED ME
ReplyDeleteWHAT IS THIS EXTREME VIOLENCE IN NE STATES ABOUT CAB ?
WELL THIS VIOLENCE IS SPONSORED BY DEEP STATE ( ROTHSCHILD ) FUNDED NGOs.
ONLY ONE PERSON ON THE PLANET CAN TELL YOU WHY JEW ROTHSCHILD INTRODUCED "INNER LINE PERMIT" IN NE STATES AND WHY CHINA WANTS TO ANNEX ARUNACHAL PRADESH..
MY NEXT POST WILL BE ABOUT THIS..
IT WILL MAKE DONALD TRUMPS OLD BALLS GO TRRR PRRR BRRRR.
AJIT DOVAL-- STOP RESTING ON YOUR PAST DEEP PAKISTAN LAURELS.. MOVE YOUR SCRAWNY ASS !
capt ajit vadakayil
..
The appointment of Kummanam Rajasekharan, Kerala BJP chief, as Governor of Mizoram was preceded by a barrage of protests from China backed maoists and Vatican backed missionaries. But soon he became a respected person in the state, as indicated by the results of recent elections.
Deletehttps://timesofindia.indiatimes.com/city/mumbai/accused-doctor-trio-in-payal-tadvi-case-seek-strict-bail-conditions-to-be-dropped-hc-defers-matter/articleshow/72459089.cms?UTM_Source=Google_Newsstand&UTM_Campaign=RSS_Feed&UTM_Medium=Referral
ReplyDeleteThese doctors are doing their higher studies. None have the means to do a Mallya. They will not give up on their hard earned seats for PG....
Thanks a ton...Ajit sir...love you....just want to bow down to you once and if i am lucky get a Hug from you....God bless you all...
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteTHE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS..
ReplyDeleteALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..
THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIEMENT.
THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS.. OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN.
WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGEMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION..
THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN..
JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...
JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…
WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..
http://ajitvadakayil.blogspot.com/2018/11/the-indian-constitution-does-not-allow.html
WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..
WE NEED TO FORM MILITARY COURTS IN INDIA TO HANG TRAITOR JUDGES IN PAYROLL OF THE DEEP STATE.. THESE JUDGES ARE IN CAHOOTS WITH BENAMI MEDIA..
PEOPLE IN NE STATES CONTROLLED BY JEW ROTHSCHILD ( DEEP STATE ) FUNDED NGOs ARE ENGAGED IN RIOTS.. MY NEXT POST WILL EXPLAIN WHY?
OUR POTHOLE JOURNALISTS AND STUPID JUDGES DO NOT EVEN KNOW WHAT IS “INNER LINE PERMIT” IN ARUNACHAL PRADESH CREATED BY JEW ROTHSCHILD WHO RULED INDIA ..
WE KNOW ILLEGAL COLLEGIUM JUDGES HAVE FOREIGN SUPPORT WHEN THEIR LEGISTLATE AND DO EXTREME JUDICIAL OVERREACH..
Capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF-
DeleteLAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Many Thanks for the Deeksha Captain, I have spread on social media every which way
Deletedear captain, twitter has suspended me from posting messages due to a previous tweet.
Deletehttps://drive.google.com/open?id=1sUG_sKFB0DBZWGjcUbMIzzhkuEHktk-0
i have raised a public grivence in pmo portal. ( PMOPG/E/2019/0706674).
your new signature picture looks good with clear blue background. thanks.
Mailed to-
Deleteravis@sansad.nic.in
contact@amitshah.co.in
adityathackeray@me.com
supremecourt@nic.in
nalsa-dla@nic.in
info@vhp.org
info.nia@gov.in
rammadhav@gmail.com
38ashokroad@gmail.com
secylaw-dla@nic.in
contactus@rss.org
narendramodi1234@gmail.com
shared on Facebook sir, and thanks for the deeksha.
DeleteHello captain,
ReplyDeleteThank you very much for 17th deeksha.
Eagerly waiting for your next post on collegium.
Gratitude
Aditya Kamath
Dear Captain the anti Cab protest is not communal ,nor it's against any other fellow Indians .It's our fight against illegal Bangladeshi,infiltrators .Assam is already overburdened from years and years , our own language and culture are at a total threat .Bringing in another set of foreigners as Assamese local people are facing scarcity of jobs. The Assam Accord will be diluted. Assam is already full of illegal Bangladesi and Rohingya immigrants.No process of proper deportation has been done to them. Assamese people will become a minority in their own homeland just like Kashmiri Hindus and Tripuris in Tripura.Assam has a very rich culture. Most of the people are proud hindus. Lord Krishna visited Assam many times. Assam is the homeland of Narakasura, Rukmini,Banasura son of Kerala King Bali and Ghatokocha . Assamese people are very similar to Kerala culture like tangy fish and Assamese New Year Bohag(Baisakh) Bihu and Kerala New Year Vishu,Assamese Makar Sankaranti Magh Bihu where a Fire Meji is burnt which symbolise Bhisma which is similar to Sabarimala Makara Vilaku. Banasura made Baneshwar Temple in Guwahati and Mahavairav Temple in Tezpur. Also Assam lost Sylhet district to Pakistan during partition. Our reason of opposing Citizenship Amendment Bill is totally different from the leftist narrative. Just like Malayalee Hindu people love Malayalam and their religion similarly Assamese Hindu people love Assamese and Hinduism . Most of the immigrants or refugees belong to a different culture and language which do not match with the local culture and language while the religion might be same. This possess a threat to linguistic, cultural and economic opportunities like employment and job to the local population.
ReplyDeleteAssam is burning and the Government is totally turning it's back to us .
Each of us is carrying a deep seated anguish and anger . The agitation is similar to the Sabarimala Agitation of Kerala. This is our fight for our motherland .
If u feel our pain ,stand in solidarity with us . Jai Sri Ram Jai Sri Shyam
Jai Guruvaurappan Swami Sharanam Ayyapan Jai Mahavishnu Jai Sai Asom Jai Matri Keralam
EVERY THING IS NE STATES IS A CHARADE..
DeleteTHERE IS A DEEP SINISTER DEEP STATE CONSPIRACY-- IN NE STATES ..
SOME OF THESE TRIBALS IN NE STATES WAS CREATED BY JEW ROTHSCHILD BY BLENDING CRIMINAL DNA OF FOREIGN PEOPLE ( TIBETAN / MYANMAR / CHINA YUNNAN) FOR FUTURE USE AS HIS SLAVES ..
I WILL EXPLAIN IN MY NEXT POST
NRC was set up with good ideals. But the Officials destroyed it from within. Most Bengali Hindus were denied whereas Bengali Muslims were included. This happened because of bribes and a certain misplaced reasoning and sympathy. Many Assamese officials think that B'deshi Muslims will integrate because they have declared themselves as 'No-Axomiya' or New Assamese but Bengali Hindus declared their mother tongue as Bengali. Assamese people are fixated on their Culture and how Bengali culture and language can dominate them. The fear has proper historic reasons. But this idea is misplaced now ... but Assamese officials could not see beyond their deep hatred for Bengalis.
DeleteYes, you wouldn't agree. But i know better than the most. But my father worked in Assam police and he was involved in detection of B'deshis. All his colleagues got rich within three months whereas he had to sell family jewelry for medical treatment. All Muslim chaps had some documents, real or created ones whereas Hindus never bothered about documentation. And the bias of Assam Police officials was very clear.
Your pain is understood and shared. However, CAB is good for India. And yes, it is detrimental to Assam as the demography is at its tipping point. However, do you think that those who are detected in NRC can be pushed back to B'desh ? Impossible. So, CAB is not adding any refugees right now. It is only legalizing the Hindu ones who are already there.
The present unrest is partly funded and fueled by the Islamic groups and gradually turning the protest in to Assamese- (Hindu) Bengali riots, as happened in Assam too many times. And yes, Assamese people are dancing to that tune without using their brains.
Take the case to HC. State that CAB and NRC dates are not reconcilable and ask for clarification from Centre and direction from Court. Also ask that till such clarification is not received the CAB maybe suspended in Assam. And please do understand that B'deshi Muslims are not anyone's friend. Ask Hindus from Kashmir who will tell you about that....or even few non-dhimmified Hindus from B'desh.
I understand the pain and plight of persecuted Hindus of Pakistan,Bangladesh,Afghanistan. I am also not anti Bengali but there is already overpopulation in Assam and The Assamese General Caste have shrinking opportunities for jobs. I love my language , culture and religion and I also respect other languages,culture and religion. I also see the plight of Tripuri people in Tripura and Kashmiri Pandits in Jammu and Kashmir. Due to large scale immigration Dhubri, Barpeta, Nagaon,Morigaon etc districts became Bangladeshi Islamic Majority. They declare themselves as Assamese and I oppose them too.Most Assamese people look for jobs rather then doing business. I wish that the government creates good jobs for the local Assam people. Assam is often ignored by mainstream media. rest of India and I wish they give importance to it. Assam has a lot of resources and the deep state is targeting those resources.The government sold many oilfields to the private companies and they can exploit the resources without the local people getting benefits.The floods and earthquakes in Assam did not receive media attention it deserves. I wish that the persecution of the people should stop in these nations. We should highlight the persecuted Hindus in agencies like UN,ICJ. I want the government should respect the sentiments of local Assamese population. I also wish that there is Akhand Bharat so that there is stopage of Hindu persecution and demographic shift of people.
DeleteDear Captain,
ReplyDeleteFound this twitter link while browsing reddit.
https://twitter.com/JennyJinya/status/1198631966343606276?s=09
Don't know why i bawled after going through that twitter thread. Are black cats really bad luck captain. Please reply.
NO
DeleteMaa Durga rides a cat.. A big one though.
Deletelot of black magic people have great demand for black cats. Some chitpavan jews are involved. They are sold for high price. The cat is killed in the practice by them.
DeleteCaptain Sir, does this mean that illegal collegium judges can strike down CAB even after both houses approval? Then this can happen to article 370/35 A as well? Sorry if a wrong question...very happy today...my late mother and me were in a temple at Kabul in 2005, the Hindu pujari and family had no other place to go and my mom advised them to approach Indian embassy...she would be so happy today...wherever she is...saubhagyam Gurudev _/\_
ReplyDeleteILLEGAL COLLEGIUM JUDICARY STRUCK DOWN NJAC AFTER 100% UNANIMOUS VOTES IN LOK / RAJYA SABHA-- AND THE SIGNATURE OF THE PRESIDENT .
DeleteJUSTICES J. S. KHEHAR, MADAN LOKUR, KURIAN JOSEPH AND ADARSH KUMAR GOEL HAD DECLARED THE 99TH AMENDMENT AND NJAC ACT UNCONSTITUTIONAL .. THESE FOUR JUDGES AND EX-CJI CL DATTU MUST BE TRIED BY THE MILITARY COURT FOR SEDITION…
AND ONE CUNT JUDGE TRIED TO JAIL ARUN JAITLEY FOR SEDITION..
https://timesofindia.indiatimes.com/india/Sedition-charge-on-finance-minister-Arun-Jaitley-for-slamming-SCs-NJAC-ruling/articleshow/49488057.cms
OUR MPs ARE ALL NAPUNSAKS---WITHOUT BALLS !
https://twitter.com/davidfrawleyved/status/1204791606064435200
ReplyDeleteTHE JEWISH ROYAL SAUDI BLOODLINE HAS NOT TAKEN A SINGLE SYRIAN MUSLIM REFUGEE..
Thanks for the diksha Captain
ReplyDeletehttps://timesofindia.indiatimes.com/india/insidious-cab-will-wreck-statute-fail-court-test-p-chidamabaram/articleshow/72482822.cms
ReplyDeleteCHID BABY , APPIDIYAAAA?.. ..
WE PLAN TO CREATE MILITARY COURTS AND HANG THE JUDGES WHO HAVE USED ILLEGAL JUDICIAL REVIEW TO UNDERMINE INDIAs DEMOCRACY BY JUDICIAL REVIEW....
ILLEGAL COLLEGIUM JUDICIARY CREATED THE NAXAL RED CORRIDOR AND CAUSED ETHNIC CLEANSING OF KASHMIRI PANDITS..
WE WILL PUNISH BENAMI MEDIA AND SOME UPA POLITICIANS IN THE PAYROLL OF THE DEEP STATE..
THE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS..
ALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..
THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIAMENT....
THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS..
OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN...
WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGEMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION...
THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN...
JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...
JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…
WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..WE THE PEOPLE ARE ABOVE THE CONSTITUTION..
THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..
TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP.
SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..
THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN..
JUSTICES J. S. KHEHAR, MADAN LOKUR, KURIAN JOSEPH AND ADARSH KUMAR GOEL HAD DECLARED THE 99TH AMENDMENT AND NJAC ACT UNCONSTITUTIONAL .. THESE FOUR JUDGES AND EX-CJI CL DATTU MUST BE TRIED BY THE MILITARY COURT FOR SEDITION…
capt ajit vadakayil..'
PUT ABOVE COMMENT IN WEBSITES OF-
DeleteCHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
AK ANTONY
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Your Registration Number is : PMOPG/E/2019/0708006
DeleteALL READERS LISTEN UP
ReplyDeleteIF YOU MESSAGES ARE BEING BLOCKED BY TWITTER/ FACEBOOK---
COMPLAIN TO I&B MINISTER/ MINISTRY, PMO, PM MODI, LAW MINISTER/ MINISTRY, HOME MINISTER/ MINISTRY --EVERY SINGLE TIME..
COMPLAIN THAT MESSAGES TO INDIAN RULERS FOR THE SURVIVAL OF BHARATMATA , PROTECTING THE WATAN FROM FOREIGN AND DOMESTIC DESH DROHIS ARE BLOCKED DELIBERATELY ..
capt ajit vadakayil
..
This means that Indian parliament has already passed NJAC and all it needs is someone with balls of steel to face off the judges as it has been illegally cancelled by the judges.
ReplyDeleteSo what has been done illegally is null and void and the original bill is the law as passed by the parliament.
NJAC STANDS !
DeleteWE NEED A PM AND LAW MINISTER WHO ARE NOT SLAVES OF THE JEWISH DEEP STATE..
CAPT AJIT VADAKAYIL WILL WRITE THE LEGACY OF MODI AND PRASAD.. FUTURE GENERATIONS WILL SPIT ON THEM.
THE INDIAN PRESIDENT WAS KICKED ON HIS HEAD BY THE CJI NAMED DATTU ..
capt ajit vadakayil
..
Wow, what a pic of yours Captain
ReplyDeleteDashing hunk
Good Morning Sir!
ReplyDeleteRegards,
Sriganesh
Dear Captain, Very timely written blog on CAB. Please expand, how Govt can convince these people. Why do they see a problem if at all few Bangla Hindus settle? Why not a Southie cannot make a living there? All this mess needs to clean up. With the international pressure I am afraid, SC may interfere. Advise Shah what to do to get it implemented, I think he is listening.
ReplyDeleteThank you!
WATCH THIS SPACE !
ReplyDeletehttps://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBISTES OF-
TRUMP
PUTIN
PM OF UK
CHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
GVL NARASIMHA RAO
SAMBIT PATRA
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
ASADDUDDIN OWAISI
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
ALSO SEND TO --
DeleteENTIRE BBC GANG
https://en.wikipedia.org/wiki/List_of_BBC_newsreaders_and_reporters
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
Your Registration Number is : PMOPG/E/2019/0708004
Deletehttps://www.thehindu.com/news/international/trump-signs-order-targeting-college-anti-semitism/article30283327.ece
ReplyDeleteIt seems that on the issues that directly affects the American economy like trade,climate change summits trump is against the deep state.But on the matters related to foreign policy issues with other countries that does not directly affects American economy trump seems to be on the side of isreal(be it on iran,recognition of Jerusalem,venezula,coup in bolivia..)
You are most probably right. However, me thinks, situation would be infinitely worse with hilary in power. Thats the only saving grace of the whole package for the time being given the balance of power/threat of mass destruction.
DeleteTrump is the most suitable president for USA.He will not do anything that would jeopardize the interests of usa and put their people at risk,though he does not care about sufferings of people in countries where coups are initiated by deep state.He softened his stance on north Korea because our captain had shown him how kim would pound usa in war with north Korea .
Deletehttps://www.theguardian.com/media/2019/dec/12/fox-host-lambasts-trump-over-most-sustained-assault-on-press-freedom-in-us-history
ReplyDeleteUS MEDIA IS CONTROLLED BY THE JEWISH DEEP STATE --JUST LIKE INDIAN MEDIA..
https://www.bloomberg.com/news/articles/2019-12-11/greenwashing-ceos-are-a-top-climate-peril-greta-thunberg-says
ReplyDeleteMENTALLY SICK AND GROWTH STUNTED MIDGET-- JEWESS GRETA !
https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html
ReplyDeletenamiDecember 12, 2019 at 9:33 AM
Sir
Please explain time permitting why you have said Rohingya muslims are having criminal DNA.
This will help silence those overflowing with milk of human kindness
Hi Sir,
ReplyDeleteReally grateful for the deeksha. Thanks again sir.
In the series El Chapo, EL Chapo also killed the workers and Engineers digging the secret tunnels he built... Just like the Bengal Regiment you mentioned..
ReplyDeleteALL DRUG CARTELS BURY MONEY UNDERGROUND IN PLASTIC TANKS..
DeleteAFTER THE JOB IS DONE, BEFORE THEY CAN TALK TO THEIR FAMILY THEY ARE KILLED..
THE BENGAL REGIMENT OF ROTHSCHILD WHO GUARDED THE SECRET OPIUM OVERLAND ROUTE KNEW THAT THEIR COLLEAGUES ARE GETTING KILLED ..
THIS WAS THE REASON FOR THE 1857 SEPOY MUTINY-- NOT SOME PIG AND COW GREASE ON CARTRIDGES WE WERE TAUGHT IN NCERT SCHOOL TEXTS IN SCHOOL.
THE FIRST LOCALLY RECRUITED BATTALION WAS RAISED BY THE EAST INDIA COMPANY IN 1757 AND BY THE START OF 1857 THERE WERE 74 REGIMENTS OF BENGAL NATIVE INFANTRY IN THE BENGAL ARMY.
http://ajitvadakayil.blogspot.com/2011/07/back-swing-of-john-galt-capt-ajit.html
DURING THE INDIAN MUTINY ALL BUT TWELVE OF THE SEVENTY-FOUR REGULAR BENGAL NATIVE INFANTRY REGIMENTS MUTINIED.. IT IS A SECRET THAT MOST WERE DISBANDED AND KILLED OFF.
THE EXECUTIONS WERE CARRIED OUT EITHER BY HANGING, BY FIRING SQUAD OR BY BLOWING FROM A GUN.
MUTINYING REGIMENTS OFFICIALLY CEASED TO EXIST AND THEIR PLACE IN THE ORDER OF PRECEDENCE OF THE BENGAL ARMY WAS TAKEN BY ANOTHER UNIT.
34TH REGIMENT OF BENGAL NATIVE INFANTRY WHICH WAS DISBANDED ON 6 MAY 1857 AT BARRACKPORE FOLLOWING THE ACTIONS OF MANGAL PANDEY AND HIS EXECUTION FOR MUTINY SHORTLY BEFORE THE MAIN OUTBREAK.
TWO REGIMENTS OF BNI (THE 65TH AND 70TH) WERE SERVING IN CHINA AT THE TIME OF THE OUTBREAK GUARDING THE SECRET OVERLAND ROUTE FROM ARUNACHAL PRADESH TO HUNNAN PROVINCE CHINA
DURING THE 1857 MUTINY THE UNITED KINGDOM GOVERNMENT PASSED THE GOVERNMENT OF INDIA ACT 1858 WHICH ESTABLISHED THE BRITISH RAJ, BRINGING TO AN END COMPANY RULE IN INDIA ( SIC) BY STRIPPING THE EAST INDIA COMPANY OF ALL ITS ADMINISTRATIVE POWERS AND HANDING OVER CONTROL OF ITS INDIAN TERRITORIES AND ARMED FORCES TO THE BRITISH CROWN ( ON PAPER )- SIC SIC SIC
THE TRUTH IS ROTHSCHILD STOPPED ALL PRETSNCES OF BEING A PEPPER TRADER AND TOOK OVER INDIA AS ITS RULER ..
capt ajit vadakayil
..
Dear Capt Ajit sir,
DeleteI don't know what to say....this is such an important revelation and you have not even said it....what simplicity and humbleness....pranams to you. The dots connect between India and China so easily...the core business of opium driving everything around India and the globe for supremacy and retention of power !!!
All pretenses dropped by Rothschild but masked for others....what a boomerang on the history of India and the world now with your revelation....hats off to you and your guts...grand salute...Jai Hind.
Ajit Sir,
ReplyDeleteThank you for the Diksha Given in earlier post. However, can you please help me how to take/initiate this Diksha in proper manner.
Thank you Sir for your continuous support and guidance.
Regards,
Ravi
Write it down on your body preferablly parts covered by cloths or simply receite it an no of times. Check out the comment section of previous blog.. Its there
DeleteRespected Sir,
ReplyDeleteOn this auspicious day i seek your and Ma'm s blessings for me and my husband.
I went to Parthasarathy temple and had a glorious darshan of the Supreme Lord!! I owe everything to you Sir,you
Are my Guru.my humble pranaams at your and Ma'm s feet.
Thank you
Best message doing rounds....
ReplyDeletePakistan should come up with its own CAB so that those who are unhappy in India can go there.
Kerala muslim league party has gone to Supreme court against CAB.
ReplyDeleteHysteria is being whipped up in some sections of Muslim community that CAB is against muslim refugees .
As usual any fire is good for roasting political poppadoms...
प्लीज कमेंट हियर ऑन कैप्टैन्स क्वेश्चन. फुक quora
ReplyDeletehttp://qa.bharatha.in/
डेस्कटॉप गूगल लॉगिन में थोड़ा समस्या है. इसका इलाज करने तक सबर करें.
धन्यवाद
ताकत और सम्मान हमेशा.
https://qa.bharatha.in/questions/41/who-is-captain-ajit-vadakayil
ReplyDeleteCaptain sir,
ReplyDeleteCan I give the number to a person I know who survived the cancer.She may not know you but she is highly spiritual and a devotee of Lord Ganesha..
Regards,
Sriganesh
not only arunachal pradesh but burma and thailand's indian population were driven out by fake mountain tribes from guangxi/yunnan called 'thais' and various other groups....the indian dna khmer people were the ones who mostly died in the drug wars of the 70's....by the way china's history is not 2000 or 3000 years but far less and was only civilized by indian hindu/buddhist doyens......china was not a single centralized imperial state until the manchus but always different kingdoms that have been deliberately labelled as different dynasties over a long timeline instead of seperate kingdoms coexisting independantly just like in india.......and china never ruled tibet manchuria inner mongolia or xinjiang even under the manchus [old maps even at the end of 19th century clearly show this unlike current CCP sponsored fake imperial qing maps]
ReplyDeleteALL ANCIENT CHINESE INVENTIONS AND DISCOVERIES ( 100% ), ARE IN REALITY INDIAN..
Deletehttps://twitter.com/SreenivasanJain/status/1204972498221031424
ReplyDeleteTHIS FELLOWs MOTHER IS A SUPPORTER OF URBAN NAXAL.. HE IS THE MAGAGING EDITOR OF NDTV
HIS MATERNAL GRANDFATHER IS MA SREENIVASAN A ROTHSCHILD AGENT
HIS FATHER WAS LAKSHMI CHAND JAIN, WHOM ROTHSCHILD GAVE MAGSAYSAY AWARD ..
https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html
ReplyDeleteI WANT THE ARMY COMMANDERS , BSF COMMANDERS , CRPF COMMANDERS AND SECURITY AGENCIES WHO SERVE IN NE STATES TO READ THIS BLOG POST..
MY NE READERS MUST DO THIS NOW !
USE WHATS APP..
NE STATES HAD 100% HINDU POPULATION , 1000 YEARS AGO.. THE ANCIENT HINDU TEMPLES ARE ALL DESTROYED..
ANIMAL SACRIFICE IN HINDU TEMPLES OF NE STATES WAS STARTED BY JEW ROTHSCHILD..TO MAKE THE HINDU SELF LOATHING.. TODAY MOST ANIMALS IN OPIUM PRODUCING AREAS ARE FOR SACRIFICE ALONE..
http://ajitvadakayil.blogspot.com/2014/11/all-animal-sacrifices-in-hindu-temples.html
THE ITALIAN WAITRESS CONVERTED MOST OF NE STATES PEOPLE INTO CHRISTIANITY FOR VOTE BANKS..
THE NATIONAL PRAYER BREAKFAST PARTY WAS ACTIVELY INVOLVED.
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
capt ajit vadakayil
..
https://twitter.com/Swamy39/status/1204796040219512832
ReplyDeleteSHIV SENA IS DEAD ---LIKE JDS IN KARNATAKA
POOR UDDHAV THACKREY-- NO VISION , NO INTEGRITY
https://twitter.com/AnaMyID/status/1204420768752234498
ReplyDeleteTHIS SLUT ANAMIKA IS THE BITCH OF JACK DORSEY..
POOR JACK DORSEY THINKS THIS FOUL PROPAGANDA CAN INFLUENCE HINDUS.. TEE HEEEEEEE..
http://ajitvadakayil.blogspot.com/2017/12/testosterone-boosted-by-onion-and.html
SANATANA DHARMA PRACTICES WERE MOLDED BY DANAVA CIVILIZATION FROM KERALA.. AYURVEDA DOES NOT PROHIBIT ONION AND GARLIC IN THE DAILY DIET, RATHER IT ENCOURAGES IT..
http://ajitvadakayil.blogspot.com/2019/09/onam-our-only-link-to-planets-oldest.html
HINDUS ARE REGAINING THEIR FAITH AND KSHATRIYA BLOOD OF OUR HERO ANCESTORS LIKE BHISHMA/ KARNA/ DRONA/ ARJUNA
LIES WONT WORK ANYMORE..
TODAY THE FASTEST GROWING RELIGION IN THE WEST AND BREAK AWAY NATIONS OF USSR , IS HINDUISM..
capt ajit vadakayil
..
SOMEBODY ASKED ME
ReplyDeleteHAS JEW ROTHSCHILD ETHNICALLY CLEANSD ORIGINAL HINDU PEOPLE AND REPLACED THEM WITH FOREIGNERS –LIKE IN OPIUM GROWING ARUNACHAL PRADESH AND NE STATES..
IN NORTH SENTINEL ISLANDS AND ANDAMAN CHAIN, THE ORIGINAL PEOPLE WERE HINDUS .. I HAVE SEEN ALL ANDAMAN ISLANDS..
NORTH SENTINEL ISLAND WAS ETHNICALLY CLEANSED AND REPLACED WITH A HEAD HUNTING TRIBE FROM PAPUA NEW GUINEA .. THEY ARE STILL THERE.. THESE PEOPLE ARE NOT SEA NAVIGATORS BY DNA..
THE WHOLE IDEA WAS TO CEMENT ROTHSCHILDs “OUT OF AFRICA” BULLSHIT THEORY AND MAD MAN DARWINs EVOLUTION THEORY
https://en.wikipedia.org/wiki/North_Sentinel_Island
IN THIS DNA AGE OUR SCHOOL CHILDREN ARE STILL STUDYING MAD MAN CHARLES DARWINs THEORIES..
http://ajitvadakayil.blogspot.com/2010/12/charles-darwin-and-his-apple-capt-ajit.html
HUMAN LIFE BEGAN FROM NARMADA RIVER 65 MILLION YEARS AGO..WITH DNA FROM SHIVA LINGAM BLACK METEORITE STONES..
https://ajitvadakayil.blogspot.com/2019/07/shiva-lingam-meterorite-hit-65-million.html
AND THESE NEGROID PEOPLE ARE NO LONGER IN THE STONE AGE..
WHEN MY SHIP WENT TO ANDAMANS - I SERVED ON A TIMBER CARRIER MV DIGLIPUR IN 1976.. WE WENT TO ALL ISLAND TO LOAD TIMBER EXCEPT SENTINEL ISLAND..
THE TIMBER WAS SO HEAVY ( RED WOOD PADDOCK ) THAT THE LOGS WOULD SINK IN SALT WATER..SO THESE LOGS CAME ON RAFTS .. ELEPHANT GANDS WORKED ..
BUCKINGHAM PALACE IS MADE OUT OF THIS STRONG WOOD..
IN THOSE DAYS THE SENTINEL TRIBE HAD NO IRON..
THEN A HUGE SHIP NAMED MV. PRIMROSE, RAN AGROUND IN A STORM ( NW OF SENTINEL ISLAND ) WHILE ON VOYAGE FROM BANGLADESH TO AUSTRALIA ON 2ND AUG 1981
SINCE THEN THESE NEGRO PEOPLE HAVE HELPED THEMSELVES TO GOODIES.. THEIR ARROWS HAVE STEEL TIPS..
SENTINEL ISLAND NEGROES HAVE THE SAME LOOKS AS ONGE TRIBE IN THE REST OF ANDAMANS..THIS VIDEO BELOW SHOWS ONGE TRIBE..
https://www.youtube.com/watch?v=6XPriuvAwqk
THERE WAS A RETIRED ANGLO INDIAN SHIP CAPTAIN NAMED CAPT BEALE IN ANDAMANS ( HE OWNED TUGS AND TOURIST BOATS ) WHO WAS THE DUFFERIN BATCHMATE OF MY SHIPSs ANGLO INDIAN CAPTAIN..
SO I GOT TO GO ON VARIOUS ISLANDS ON CAPT BEALEs TUGS-- IT WAS DANGEROUS..WITH SO MANY SUBTRIBES LIKE JARAWAS, SHOMPEN , NICOBARESE ETC WHO ARE DOMESTICATED..BUT YOU NEVER KNOW , IF THEY LOVED HUMAN FLESH..
CAPT BEALE HAD A WORKSHOP IN CALCUTTA, NAMED BEALEs MARINE.. THEY WOULD OVERHAUL OUR DERRICK CARGO BLOCKS IN A JIFFY..
I KNOW ANDAMANS - IF I WANT I CAN WRITE A BOOK ABOUT IT.
WE USED TO HAVE PICNICS IN VARIOUS ISLAND ..WE TOOK THE SHIPs LIFE BUOY WITH US.. WE WERE TREATED LIKE ROYALY, AS MV. DIGLIPUR BROUGHT ALL GENERAL STORES ( 100% ) FROM CHENNAI..
INDIAN NAVY HELICOPTERS PLAYED TRICKS --DROPPING MUSIC SETS GIVING MUSIC.. AND THE MEN USED TO SHOOT ARROWS AT THE HELICOPTER..
capt ajit vadakayil
..
Below a case of positive acknowledgement by dept of justice
ReplyDeleteDate of Receipt 10/09/2019
Received By Ministry/Department Justice
Grievance Description
Namaskar
Kindly acknowledge the below comment taken from Captain Ajit Vadakayils blog
https://www.opindia.com/2019/09/ndtv-journalist-who-insulted-isro-scientist-found-selling-isro-images-on-getty-social-media-users-question-whether-its-allowed/
WE ASK AMIT SHAH TO IMMEDIATELY ARREST PALLAV BAGLA / PRANNOY JAMES ROY-- AND SLAP SEDITION CHARGES ..
https://twitter.com/vigil_nte/status/1170575818415857664
WE HAD SO MANY ISRO/ DRDO SCIENTISTS DYING MYSTERIOUSLY IN RECENT TIMES..
http://ajitvadakayil.blogspot.com/2012/09/isro-spy-case-s-nambinarayanan.html
capt ajit vadakayil
..
Thanks And Regards
Debdoot Sarkar....
Current Status Case closed
Date of Action 12/12/2019
Remarks
noted
Officer Concerns To
Officer Name Smt. Sandhya Venugopal Sharma
Officer Designation Joint Secretary Personnel
Contact Address
Email Address sandhyavs@isro.gov.in
Contact Number 08022172300
respected capt. Today my nephew ( 1 yo ) birthday, please bless him.
ReplyDeleteYou also blessed him 1 year ago. req. to u plz check my one year old comment:-
http://ajitvadakayil.blogspot.com/2018/12/sanatana-dharma-hinduism-exhumed-and.html?showComment=1544629375553#c1927008346212393990
https://twitter.com/zainabsikander/status/1204805688678998017
ReplyDeleteZAINAB BABY.. MUCH MORE ARE COMING... APPLY GREASE TO EASE THE PAIN..
https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html
capt ajit vadakayil
..
PUT ABOVE COMMENTS IN WEBSITES OF--
ZAINAB SIKANDER
RANA AYYUB
BARKHA DUTT
SHEHLA RASHID
NIVEDITA MENON
IRFAN HABIB
NIDHI RAZDAN
ASADDUDIN OWAISI
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDI
ARUNDHATI ROY
SHOBHAA DE
SUHEL SETH
THOMAS ISAAS KERALA FINANCE MINISTER
GITA GOPINATH ( IMF CHIEF )
JOHN BRITAS
KUNHALIKUTTY
KODIYERI BALAKRISHNAN
BRINDA KARAT
JAVED AKHTAR
SHABANA AZMI
INDIRA JAISING
VRINDA GROVER
ANAND GROVER
JOHN DAYAL
KANCHA ILAIH
ANNA VETTICKAD
FATHER CEDRIC PEREIRA
JULIO RIBEIRO
PAGALIKA GHOSE
SWARA TTR BHASKAR ( OR IS IT PRRR )
IRA BHASKAR
ANNIE RAJA
ROMILA THAPAR
THAMBI SUNDAR PICHAI
KAMALAHASSAN
RAVISH KUMAR
NAVJOT SINGH SIDHU
TAREK FATAH
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
STALIN
FAAL GHAFOOR
UDDHAV THACKTEY
RAJ THACKREY
SANJIV BHATT
TEESTA SETALVAD
NASEERUDDIN SHAH
EX-VICE PRESIDENT ANSARI
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
KAVITA KRISHNAN
JAIRAM RAMESH
SHASHI THAROOR
JNULIO RIBEIRO
JEAN DREZE
BELA BHATIA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MS SWAMINATHAN
ARUNA ROY
UMAR KHALID
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
DEREK O BRIEN
ADHIR RANJAN CHOWDHURY
RASHID ALVI
AJOY KUMAR
ASADDUDDIN OWAISI
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
ASHISH KHETAN
SHATRUGHAN SINHA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
PEABRAIN
https://timesofindia.indiatimes.com/india/googles-year-in-search-2019-want-to-know-what-indians-searched-most-this-year/articleshow/72491848.cms
ReplyDeleteGOOGLE IS SINKING AJIT VADAKAYIL WITH 1020 MILLION GOOGLE PROFILE VIEWS..
TEEEE HEEEEEEE
Captain,
DeleteAccording to world population, nearly 20% have view ur profile
It took ur 10 years to reach this place in people's heart... This 10 years which u could have enjoy in ur way rather than blogging for people
That's called true humanship and sacrifice..... If Tesla, Chanakya, Henry ford, ramanujam will make list of hero of planet than u will be included in their award list like u have included them
Thanks for the Deeksha dear Captain. Requesting Deeksha for people suffering from interstitial lung disease or acute bronchitis. Requesting for my mother. Pranam
DeleteRANA AYYUB IS ON BBC , THROWING SHIT ON BHARATMATA AND HINDUS..
ReplyDeleteWE HAVE A NAPUNSAK I&B MINISTER-- DEEP STATE DARLING PRAKASH JAVEDEKAR..
https://www.nytimes.com/2019/12/11/us/harvey-weinstein-settlement.html
ReplyDeleteJEWISH PEDOPHILE RAPISTS CAN ALWAYS GET AWAY..
JEW ROMAN POLANSKI WHO RAPED SEVERAL UNDERAGE GIRLS ANALLY IS SCOT FREE.
https://en.wikipedia.org/wiki/Roman_Polanski
JEW JEFFREY EPSTEIN WAS MURDERED SO THAT JEW CELEBRITIES CAN ESCAPE FROM JAIL..
https://en.wikipedia.org/wiki/Jeffrey_Epstein
Chosen people.
Deletehttps://www.nbcnews.com/politics/donald-trump/trump-mocks-greta-thunberg-after-she-wins-time-person-year-n1100531
ReplyDeleteTRUMP ONLY MOCKS HER
WE IN INDIA SPIT ON HER LYING FACE ..
https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html
THE DAYS OF JEWISH DEEP STATE HIJACKING WORLD OPINION BY USING JEWESS GIRLS ARE OVER..
JEWESS ANNE FRANKs DIARY WAS FAKE.. SHE WROTE WITH BALL PEN, WHICH DID NOT EXIST IN THOSE DAYS..
https://en.wikipedia.org/wiki/Anne_Frank
AAARRRGGHHH PPTTHHEEOOYYYYYYYYYYYYYYY
http://falsificationofhistory.co.uk/false-history/the-faked-diary-of-anne-frank/
CHECK OUT JEWESS NOOR INAYAT KHAN..
http://ajitvadakayil.blogspot.com/2012/11/noor-inayat-khan-new-mata-hari-reloaded.html
capt ajit vadakayil
..
https://aninews.in/news/world/others/brazilian-president-calls-greta-thunberg-a-brat20191211215339/
DeleteBrazil president calls greta thunberg a 'brat'
Dear Sir
ReplyDeletePlease clear the little understanding of the below said lines
Unlike the Parsis, these Bene Israel Jews mixed blood with the Indian stock.
Is this means that Bene Israeli Jews married to Indian citizens after they arrived at konkan.
And regarding below said lines
These are the Chitpavan Brahmins like Tilak, Gokhale, Savarkar , Ranade etc.. The Chitpavan Jews were loyal to Jew Rothschild, not to Bharatmata.
Were these above mentioned chitpavans know that their origin was from Bene Israrelis or else after that it was told to them by Jews ruler at that time.
WHEN PARSIS CAME TO INDIA SEEKING REFUGE, THE GUJARATI KING REFUSED TO TAKE THEM..
DeleteTHERE WAS A FULL GLASS OF MILK IN FRONT OF THE KING
THE PARSI LEADER TOOK SOME SUGAR AND PUT IT IN THE MILK..
THE MEANING WAS , WE PARSIS WILL MERGE INTO INDIAN SOCIETY LIKE HOW SUGAR DISSOLVED IN MILK..
BUT PARSIS NEVER KEPT THEIR PROMISE.. THEY NEVER MARRIED INTO INDIAN SOCIETY..
PARSIS WERE RADDHIWAALAS TILL JEW ROTHSCHILD TOOK THEM AS HIS OPIUM DRUG RUNNING AGENTS..
ROTHSCHILD KNIGHTED 65 PARSIS..
FOR WHAT ?
BEING LOYAL TO BHARATMATA ?
IF YOU SEE BY PERCENTAGE , PARSIS HAVEGOT HIGHEST PERCENTAGE OF SIRs-- BY SEVERAL TIMES THAN THE REST OF THE CLANS OF THE PLANET
PARSIS WERE TRAITORS ...
THEY BIT THE HAND THAT FED THEM..
BUT THE GUJARATI KING WAS NOT AN IDIOT..
HE KNEW THAT PARSIS CAN NEVER BE TRUSTED TO BE LOYAL TO THEIR NEW WATAN..
SO HE ASKED THE LEADER TO SAY SOMETHING , TO PROVE THAT HE WILL BE LOYAL -- INSTEAD OF KEEPING MUM AND PUTTING BULLSHIT SUGAR IN MILK.
TO HE SURPRISE THE PARSI LEADER RECITED IN PURE SANSKRIT, THE 16 SAMSKARAS OF A HINDU, WHICH HIS CLAN INTENDED TO FOLLOW ...
WHEN HE RECITED 15 SAMSKARAS , THE GUJARATI KING STOPPED HIM AND GAVE THE FINAL SAMSKARA FOR PARSIS TO FOLLOW.. HE WONT ALLOW THEM CREMATION AND HENCE MOKSHA..
HE HOPED THE PARSIS WOULD GO BACK.. THEY DID NOT..
WHEN THE FINAL AND 16TH VERSE WAS TO BE RECITED-- THE GUJARATI KING SAID --"I WILL RECITE IT FOR YOU "....
HE LAID OUT THE FINAL ANTHEYESTHI ( LAST FUNERAL RITE ) -- THAT PARSIS MUST NOT CREMATE AS PER HINDU RITES --THEY MUST FOLLOW ANOTHER CUSTOM WHICH WAS PREVALENT IN ANCIENT IRAN AMONG NON-HINDUS..THAT OF OFFERING THEIR DEAD BODIES TO VULTURES…
THE ONLY REAL SAMSKARA OF A HINDU-- IS THAT HE MUST CREMATE HIS DEAD BODY ( TO FOLLOWS LAWS OF KARMA AND MOKSHA )..
CULTURE IS EVERYTHING !
http://ajitvadakayil.blogspot.com/2016/03/sanatana-dharma-hinduism-exhumed-and_21.html
TODAY THESE RADHIWAALA DESCENDENTS ARE ACTING AS IF THEY HAVE BECOME PROSPEROUS BY THEIR MERIT.. BALLS -- THEY BECAME RICH BY BEING DRUG RUNNERS AND TRAITORS..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
AND TODAY WE HAVE PARSI PRIEST JUDGE NARIMAN TELLING HINDUS WHAT TO DO..
capt ajit vadakayil
..
https://timesofindia.indiatimes.com/city/aurangabad/pankaja-munde-says-she-wont-quit-dares-bjp-to-remove-her/articleshow/72493877.cms
ReplyDeleteGET RID OF THIS STAR KID !
https://edition.cnn.com/2019/12/12/europe/russian-carrier-fire-intl/index.html
ReplyDeleteUS AIRCRAFT CARRIERS CATCH FIRE REGULARLY.. IT IS KEPT A SECRET..
http://ajitvadakayil.blogspot.com/2011/09/deadly-fire-on-aircraft-carrier-uss.html
Sir
ReplyDeletethank you and lot Pranamas for your spending your valuable time for answering the doubt.
ReplyDeletehttps://www.theguardian.com/books/2019/dec/12/neal-katyal-second-term-donald-trump-fundamentally-destabilise-democracy-interview
THE ILLEGAL CRIMINAL MEXICAN IMMIGRANTS ARE CALLED "DREAMERS"
TEE HEEEEEEEEEEEE
SO CAN THEY CALL ROHINGYA CRIMINAL DNA ILLEGAL IMMIGRANTS DREAMERS TOO ? THEY WERE VOTE BANKS AND SMURFS FOR LAUNDERING DRUG MONEY.
https://www.youtube.com/watch?v=-MpAahd-Q6g
https://www.youtube.com/watch?v=8FUiMiSWZLg
How should a Prime Minister sound in a wartime situation with his country facing external aggression? British Prime Minister Winston Churchill made one of the defining speeches during the Second World War, when his country was near collapse at the onslaught of Hitler’s Germany.
ReplyDeleteNehru, by a speech on All India Radio (AIR), had let North-East Down During 1962 China War. After the fall of Bomdila to the Chinese, many in Assam’s Tezpur felt he was not concerned about the Brahmaputra Valley. In his address to the nation on AIR on November 20, 1962, Nehru said almost in a choked voice, ".... I want to make that clear to all of you, and, especially our countrymen in Assam, to whom our heart goes out at this moment".
If the head of the nation was so helpless, then how could the common people withstand an attack by the Chinese? After Nehru’s speech was broadcast, people in Tezpur became hysteric. They began fleeing. There was chaos everywhere. Guwahati was flooded with thousands of such refugees.
https://timesofindia.indiatimes.com/india/1962-Sino-Indian-war-Nehrus-speech-still-hurts-Assam/articleshow/16746435.cms
Dear Capt Ajit sir,
ReplyDeleteHere's the fact on NE riots...from fb fwd...
" Know your India -- the man behind Propaganda in Assam
Akhil Gogoi -- Kanhaia Kumar of Assam -- A mini-Land-Lord who promote him as POOR FARMER like Robert Bhadra -- One Over Ground Operator of Naxal -- Funded by central committee of CPIML -- He is forefront at new initiative of NAXALS who trying to develop a base in NE after they are mercilessly wiped out from Central India "
Dear Capt Ajit sir,
ReplyDeleteHere's some brief on 5 secret societies of which u have exposed 4 in great detail except Skulls and bones....;-)
https://www.history.com/news/secret-societies-freemasons-knights-templar
https://www.dailypioneer.com/2019/state-editions/will-not-implement-cab-in-punjab--capt.html
ReplyDeleteCAPT AMARINDER SINGH HAS BECOME SENILE..
THIS IS LIKE CHIEF COOK ON THE SHIP SAYING.. I WILL NOT TAKE THIS SHIP TO NEW YORK ..
https://www.thehindu.com/business/notional-loss-in-bpcl-sale-plan-at-45-lakh-cr/article30269996.ece
ReplyDeleteDear Captain,
RSS=BJP decision to sell assets worth Rs 9 lakh crore at mere Rs 70000 crore is a daylight robbery!!
?fyi
ReplyDeletehttps://www.miindia.com/messageboard/details/Infinity-foundation-update-184323
ANYBODY INCITING VIOLENCE IN NE STATES MUST BE CHARGED WITH SEDITION..
ReplyDeletePROFILE WARIS PATHAN..
PAKISTANI OFFICERS SAY HIS FATHER IS A JEW.
Dear captain The Indian government should guarantee protection of the indigenous culture, religion , language of the A ssamese people. The Assamese people are facing a lot of threats . Their language is in danger ,their Hindu religion is in danger from illegal Muslim immigrants and Christian Missionaries ,Their job opportunities are in danger as the refugees will work hard to establish themselves through job employments which can snatch away the job opportunites of the locals. Assamese people are in danger. We donot want Assam to be another Kashmir or Tripura. In Tripura the local Tripuri language and culture is suppressed by Bengalis and they became a minority in their own homeland . In Kashmir the Kashmiri Pandits became a minority in their own homeland. They were driven out and persecuted even the Sharda Script of the Kashmiri language was forgotten and most of the Kashmiri Pandits forgot their mother tongue and they speak at other languages.Assam has a lot of natural resources like oil , tea. The deep state is eyening on these resources. There is internet shut down in Assam , innocent Assamese people are lathicahrged , curfew is imposed one Assamese people died. Most of the Assamese peoples tribals or non tribals are Hindus.
ReplyDelete1. We are not protesting against CAB because we are a
bunch of left liberal pseudo-seculars who are unhappy
because persecuted Muslims are not part of CAB
Sorry, we don't care about that. Our protest is not
because it is discnminatory towards Muslims as some
of the foreign media and politicians are trying o
portray.
2 We are also not protesting because persecuted
Hindus are being given citizenship We are okay with it
as we understand that India’s long cultural heritage
makes it the only domicile of all Hindus
3. Then why are we protesting? We are protesting
because Assam has a history of massive influx of
illegal Bangladeshis For various reasons (from
economic to partition to war), over last 50 years, 7
million Bangladeshis have taken shelter in Assam
changing its demography completely (There are
various articles and studies on this which can be
googled) The people of Assam, especially the
students, led a massive protest against this problem in
the 80s (google Assam Agitation, Student's Movement,
AASU, Prafulla Mahanta) After sacrificing 800+ lives,
and countless student-years, we finally got NRC
(among other things) thru Assam Accord Despite all
its flaws, high court monitored NRC was the best
effort made so far in identifying illegal Bangladeshis
after years of lip service by politicians We were not
happy with the final outcome of NRC as it could detect
only 1.9 million but nonetheless, we accepted it
grudgingly as ‘something is better than nothing’ It also
gave us confidence that no more Bangladeshis can
come or get regularized beyond 2019 Unfortunately,
CAB nullifies all of it and not only legitimize 0.5 million
out of 1.9 million but also opens the door for future
influx! That's why we are protesting. Also there is no deportation of the illegal immigrants.
A LOT OF NE TRIBALS ARE NOT OF INDIAN BLOOD/ STOCK..
DeleteTHEY WERE HEAD HUNTER CRIMINAL DNA MIXED BREEDS ( CHINESE HUNNAN/ MYANMAR/ TIBET ) WHOM ROTHSCHILD USED TO DRIVE AWAY INDIAN HINDUS, SO THAT HE CAN CULTIVATE OPIUM AND GUARD IT WITH EXTREME VIOLENCE..
THIS SYSTEM OF DRUG CARTEL HENCHMEN KILLING ANYBODY WHO COMES IN THEIR PATH STARTED IN ARUNACHAL PRADESH 250 YEARS AGO..
NOW THIS DEATH SYSTEM EXISTS IS IN COLUMBIA/ MEXICO..
AT LEAST THERE IT IS " SILVER OR LEAD " (TAKE BRIBE OR DIE )..
IN ARUNACHAL PRADESH IS WAS " OFF WITH HIS HEAD" ..
NONE OF THESE TRIBALS LOOK LIKE INDIANS.. THEY HAVE NO LOVE FOR BHARATMATA..
capt ajit vadakayil
..
The ethnic cleansing works with the slogan "off with his head". The Kashmiri pandits were systematically removed from their own lands. The population of Hindus in East & West Pakistan reduced to less than 5% after independence. During the period when the Mysore Sultans ransacked Kerala, people were given only two choices – Sword or Cap. That is, either they had to convert themselves into Muslims or they had to face the sword.
DeleteHINDUS OF NORTH KERALA HAVE HONOUR IN THEIR BLOOD.
DeleteTHEY HAVE SURVIVED EXTREME TERROR FROM MUSLIMS..
AND HINDUS IN SOUTH KERALA HAVE SURVIVES THE GREED OF CHRISTIAN SOPS..
http://ajitvadakayil.blogspot.com/2014/04/azam-khan-injecting-islamic-religious.html
deep in the dark innards
of kaalapani cellular jail
spirits suddenly come alive
captain , could you tarry a while –
could you ponder why
4 of my 7 wings were demolished?
demolished after independence!
could you pause to reflect
on the cost of our freedom?
on mothers, wives and sons
their hearts torn between grief and pride
for those who died for freedom's sake.
are you so busy
you fail to reflect on 800 years of slavery,
the price in blood
this jail paid for your freedom.
why do you expect courts
to decide your freedom
the freedom which
snuffed out inmates of this jail
gave to everyone,
painful price paid in blood ,
for freedom and justice for all,
are we still not one nation, one blood?
do you calm each other in times of distress?
do we in moments of horror cuddle together?
why did you allow a system to be hijacked ?
why this silence of conformity?
why so many people lost in apathy?
lying foreign benami front TV cataracts
now shroud your eyes
fed intravenously 24X7
by supari fed mass media feeders
lisping mystifying lies
fire smouldering in judas eyes
why is big brother profiting from fear?
why is comfort a business?
why is liquor laden breath calling the shots ?
why is the child in the classroom
with the curious mind
beaten and conditioned
until he too is blind ?
"trust in the system"
sold out benami fronts whisper
"question nothing , higher you can reach"
are you just content being a slave?
content , to stand on street corners
holding big white signs
held beneath people sights
clamouring of injustice
why allow targeting of desh bhakt shakers
who sacrifice their peace
so that true freedom may be regained
who do you still sell your souls?
to evil foreign banksters who robbed india blind
who still hold the sinister remote control
who still have our rulers on their payroll
who have build for themselves a lobbied up shield
what kind of life is this ?
is self inflicted numbness a virtue?
is feigning ignorance bliss?
why do you pretend to sleep?
do you still expect to be woken up?
https://timesofindia.indiatimes.com/city/delhi/jnu-vc-holds-meeting-with-students-representatives-teachers-no-headway/articleshow/72496352.cms
ReplyDeleteTHIS LIMPET IS UNFIT TO BE A VC..
https://twitter.com/AsYouNotWish/status/1205011580775104512
ReplyDeleteSONAM BABY MUST KNOW THAT THESE MINI SKIRTED GIRLS ( THEY WEAR THONGS UNDERNEATH ) OR WEAR SPANDEX TIGHTS DISPLAYING PRIME CAMEL TOE -- ARE THE MASTURBATING TYPES..
THEY FANTASIZE -- WHO ALL HAVE WATCHED MY PRIVATE PARTS TODAY , WHILE MASTURBATING ..
WOE BEGONE IF YOU MARRY THESE SLUTS..
THEY ARE SWARA TRRR BHASKAR ( OR IS IT PRRRRR ) FANS.. NEVER MARRY A WOMAN WHO IS ADDICTED TO MASTURBATION.. THEY ARE NAGS OF THE FIRST ORDER..
WOMEN PUT ON WAR PAINT AND MINISKIRTS TO MAKE WOMEN FEEL JEALOUS --OR ATTRACT STRANGER MEN?
TWO OF THE HOTTEST TOPICS IN WOMEN'S MAGAZINES— WHY MEN ARE SUCH FILTHY PIGS AND HOW TO ATTRACT A MAN!
A MAN WILL HELP A WOMAN UNDRESS HERE MULTILAYERED TEDIOUS CLOTHING BEFORE SEX. HOWEVER AFTER SEX, SHE ALWAYS DRESSES ON THEIR OWN.
MORAL OF THE STORY: IN LIFE, NO ONE HELPS YOU , ONCE YOU'RE SCREWED.
http://ajitvadakayil.blogspot.com/2013/11/nagging-unhappiness-at-home-death-of.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBISTES OF
SONAM MAHAJAN
SWARA TRRR BHASKAR ( OR IS IT PRRR )
SHOBHAA DE
KAVITHA KRISHNAN ( HER OWN ADMISSION: ONCE SHE WORE MINISKIRT AND SMOKED IN JNU TO FINGER HINDU BOYS-- WHAT SHE DID NOT TELL IS THAT ALMOST ALL BOYS PUKED AFTER SEEING HER UGLY BLACK HAIRY LEGS )
ARUNDHATI ROY
Posted comment screenshots on their twitter a/cs.
DeleteI DONT SEE IT IN SONAM MAHAJANs TWITTER SITE
DeleteDO NOT REPORT TO ME THAT YOU HAVE POSTED-- ONLY IF YOU SEE YOUR POST AFTER VERIFYING -- ONLY THEN REPORT BACK..
She has blocked me. Thats why you can't see my comment. I posted it there only.
DeleteJust posted a screenshot of this comment on Sonam Mahajan's Twitter site and saw it posted.
DeleteI SAW IT !
DeleteMumbai IPs A Rehman quits job citing CAB blah blah ,he had applied for VRS which was rejected earlier.
ReplyDeleteBleeding hearts want Uighur Muslims from China to come here too..
The entire CAB protests are being done by Muslim Lobby too as influx of muslim refugees are a heaven sent opportunity to increase their population and convert India to Dar ul Islam from present state.
Most mainstream broadsheets have covered arguments of all bleeding hearts selectively.
https://indianexpress.com/article/explained/explained-why-basmati-export-has-come-to-a-standstill-in-punjab-6164891/
ReplyDeletePesticides banned in EU and US are sold by the EU , US companies here.
So if Indian exports if Basmati dwindle which country benefits the most? As the next supplier.
Paraquat is one pesticide which is used most to commite sucide by farmers in Odisha.
DeleteThis pesticide does not have an antidote. Thats why doctors are nit able to save the farmers.
Recently deshbhakt type doctors demanded Odisha govt to ban it.
https://www.facebook.com/story.php?story_fbid=454589545495744&id=339463143675052
ReplyDeletesir chinese troops have crossed into arunachal and have been staying there .our govt is sleeping. doval seem to be alice in wonderland
https://m.facebook.com/story.php?story_fbid=528091794586733&id=251316115213541
ReplyDeletenorth east ppl esp xtians and muslims are spreading hatred against CAB .they are demanding separate country comprising of 8 NE states
https://www.indiatoday.in/india/story/kerala-not-to-implement-citizenship-amendment-bill-says-cm-pinarayi-vijayan-1627819-2019-12-12
ReplyDelete
Deletehttps://www.indiatoday.in/india/story/kerala-not-to-implement-citizenship-amendment-bill-says-cm-pinarayi-vijayan-1627819-2019-12-12
THIS IS LIKE CHIEF COOK ON MY SHIP DECLARING
I AM "CHIEF"-- I WONT LOAD SULPHURIC ACID IN HOUSTON..
95% OF OUR POLITICIANS, 99.9% OF OUR MEDIA AND 100% OF OUR ILLEGAL COLLGIEUM JUDGES CANT THINK FOR NUTS..
INDIAN CONSTITUTION IS TO PROTECT LAW ABIDING INDIAN CITIZENS-- NOT PROSPECTIVE ROHINGYA REFUGEES OR BANGLADESI MUSLIM ILLEGAL IMMIGRANTS ALREADY HIDING IN NORTH KERALA..
BANGLADESHI MUSLIM ILLEGAL IMMIGRANTS HAVE AADHAR CARD AND PASSPORTS-- THEY PRETEND TO BE FROM ASSAM.. BUT THEY ALL ARE FLUENT IN BANGLADESI STYLE BENGALI.. ( ADMISSION--THEY WORK VERY HARD UNLIKE LAZY MALAYALIS )
I HAVE TRAPPED MANY OF THEM BY SINGING THEIR FAVORITE CUSS SONG FOR HINDU KAFIRS.. I AM AN EXPERT IN BODY LANGUAGE
"EARLY MORNING KRISHNA WOKE UP AND HELD HIS HUGE PRICK IN BOTH HIS HANDS AND SHOVED IT INTO RADHAs CUNT"
"SHOKAALE UTHIYO KAANOO DOH HAATHE DAREYOO NUNNOO , THAKAYILE RADHAR GUDHE "
RADHA NEVER EXISTED.. TEE HEEEEEE..
https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteCM/ GOVERNOR/ HIGH COURT CHIEF JUSTICES / DGP -- OF KERALA/ PUNJAB/ BENGAL/ ALL 7 NE STATES
PMO
PM MODI
ZAINAB SIKANDER
RANA AYYUB
BARKHA DUTT
SHEHLA RASHID
NIVEDITA MENON
IRFAN HABIB
NIDHI RAZDAN
ASADDUDIN OWAISI
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDI
ARUNDHATI ROY
SHOBHAA DE
SUHEL SETH
THOMAS ISAAS KERALA FINANCE MINISTER
GITA GOPINATH ( IMF CHIEF )
JOHN BRITAS
KUNHALIKUTTY
KODIYERI BALAKRISHNAN
BRINDA KARAT
JAVED AKHTAR
SHABANA AZMI
INDIRA JAISING
VRINDA GROVER
ANAND GROVER
JOHN DAYAL
KANCHA ILAIH
ANNA VETTICKAD
FATHER CEDRIC PEREIRA
JULIO RIBEIRO
PAGALIKA GHOSE
SWARA TTR BHASKAR ( OR IS IT PRRR )
IRA BHASKAR
ANNIE RAJA
ROMILA THAPAR
THAMBI SUNDAR PICHAI
KAMALAHASSAN
RAVISH KUMAR
NAVJOT SINGH SIDHU
TAREK FATAH
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
STALIN
FAAL GHAFOOR
UDDHAV THACKTEY
RAJ THACKREY
SANJIV BHATT
TEESTA SETALVAD
NASEERUDDIN SHAH
EX-VICE PRESIDENT ANSARI
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
KAVITA KRISHNAN
JAIRAM RAMESH
SHASHI THAROOR
JNULIO RIBEIRO
JEAN DREZE
BELA BHATIA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MS SWAMINATHAN
ARUNA ROY
UMAR KHALID
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
DEREK O BRIEN
ADHIR RANJAN CHOWDHURY
RASHID ALVI
AJOY KUMAR
ASADDUDDIN OWAISI
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
ASHISH KHETAN
SHATRUGHAN SINHA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
CHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
GVL NARASIMHA RAO
SAMBIT PATRA
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
ASADDUDDIN OWAISI
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
The subject of citizenship is in the union list.only parliment has the right to make laws on the items of union list.once a law is made over these items,it applies to all over india.It is obligatory on the states to implement it.They can't deny it.It is unconstitutional to deny it and the centre can take any measures to make the states implement the law.
DeleteSTATE GOVERNOR OF WEST BENGAL DOES NOT KNOW HIS OWN POWERS
DeleteIF CAPT AJIT VADAKAYIL WAS GOVERNOR , HE WOULD HAVE MADE THE CM DO MURGA POSITION ON THE CALCUTTA CITY CENTRUM
Your Registration Number is : PMOPG/E/2019/0709440
DeleteKerala, Punjab, Chattisgarh, Bengal,Maharashtra have joined the chorus saying they won't implement CAB...
DeleteCentral Govt will have to launch public awareness campaign soon.
Notice how all corners of our country are being nibbled at!
The system of constantly appealing against court judgement must change.
ReplyDeleteIf there is no merit in argument why take up a case for eg that fellows lawyer says any way my client is in Delhi a gas chamber so he will die anyway so why hang him? Such jokers .
By that half baked logic disband all courts in Delhi As anyway they will die from the gas chamber ... Why spend any money on the lawyers.
Respected guruji today is my birthday
ReplyDeleteMy name is Dr Hanuman Ram
Please bliss me
GODSPEED
Delete657685
DHONI MUST PUT HIMSELF OUT TO PASTURE.. HE IS A SPENT FORCE
ReplyDeleteTHERE ARE BETTER YOUNG PLAYERS LIKE PANT AND SAMSON
RAHUL GANDHI HAS DECLARED THIS INDIA IS THE RAPE CAPITAL OF THE WORLD..
ReplyDeleteCAPT AJIT VADAKAYIL WILL MAKE SURE HE CAN NEVER BECOME PM OF INDIA EVER AGAIN.. THE LAST NAIL IN HIS POLITICAL COFFIN IS DRIVEN DEEP NOW..
INDIA HAS THE LEAST RAPES/ DIVORCES/ LOSS OF VIRGINITY BEFORE MARRIAGE ON THE PLANET..
I HAVE SEEN THIS PLANET FOR 40 YEARS..
TEN RAPES IN INDIA HAVING 1350 MILLION PEOPLE IS NOT THE SAME PERCENTAGE OF TEN RAPES IN SWEDEN WHICH HAS ONLY 9.9 MILLION PEOPLE..
AKKAL KA DUSHMAN RAHUL GANDHI DOES NOT KNOW MATH -- NOR DOES HIS MAINO JEWESS ITALIAN WAITRESS MOTHER , WHO LIED THAT SHE STUDIED IN CAMBRIDGE WITH HER HUSBAND RAJIV GANDHI..
THIS IS LIKE A CHAMIYA BAR WAITRESS IN MUMBAI LYING THAT SHE STUDIED IN IIT MUMBAI..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteRAHUL GANDHI
SONIA GANDHI
PRIYANKA VADRA
PMO
PM MODI
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
STALIN
ZAINAB SIKANDER
RANA AYYUB
BARKHA DUTT
SHEHLA RASHID
NIVEDITA MENON
IRFAN HABIB
NIDHI RAZDAN
ASADDUDIN OWAISI
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDI
ARUNDHATI ROY
SHOBHAA DE
SUHEL SETH
THOMAS ISAAS KERALA FINANCE MINISTER
GITA GOPINATH ( IMF CHIEF )
JOHN BRITAS
KUNHALIKUTTY
KODIYERI BALAKRISHNAN
BRINDA KARAT
JAVED AKHTAR
SHABANA AZMI
INDIRA JAISING
VRINDA GROVER
ANAND GROVER
JOHN DAYAL
KANCHA ILAIH
ANNA VETTICKAD
FATHER CEDRIC PEREIRA
JULIO RIBEIRO
PAGALIKA GHOSE
SWARA TTR BHASKAR ( OR IS IT PRRR )
IRA BHASKAR
ANNIE RAJA
ROMILA THAPAR
THAMBI SUNDAR PICHAI
KAMALAHASSAN
RAVISH KUMAR
NAVJOT SINGH SIDHU
TAREK FATAH
FAZAL GHAFOOR
UDDHAV THACKTEY
RAJ THACKREY
SANJIV BHATT
TEESTA SETALVAD
NASEERUDDIN SHAH
EX-VICE PRESIDENT ANSARI
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
KAVITA KRISHNAN
JAIRAM RAMESH
SHASHI THAROOR
JNULIO RIBEIRO
JEAN DREZE
BELA BHATIA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MS SWAMINATHAN
ARUNA ROY
UMAR KHALID
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
DEREK O BRIEN
ADHIR RANJAN CHOWDHURY
RASHID ALVI
AJOY KUMAR
ASADDUDDIN OWAISI
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
ASHISH KHETAN
SHATRUGHAN SINHA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
CHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
GVL NARASIMHA RAO
SAMBIT PATRA
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
ASADDUDDIN OWAISI
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Your Registration Number is : PMOPG/E/2019/0709438
Deletehttps://timesofindia.indiatimes.com/india/sabarimala-sc-declines-to-pass-any-order-for-safe-entry-of-women/articleshow/72514084.cms
ReplyDeleteSLUT REHANA FATIMA AND HER SPONSORS--LISTEN UP..
http://ajitvadakayil.blogspot.com/2018/11/5900-year-old-sabarimala-this-planets.html
ReplyDeleteNelson sDecember 13, 2019 at 11:25 AM
https://www.facebook.com/story.php?story_fbid=454589545495744&id=339463143675052
sir chinese troops have croosed into our territory in arunachal . our govt is sleeping .doval seem to be alice in wonderland
Thanks guruji
ReplyDeletehttp://ajitvadakayil.blogspot.com/2013/02/jealousy-growing-ulcer-within-capt-ajit.html
ReplyDeleteTO WRANGLE A NOBEL PRIZE MODI DOES NOT WARN WESTERN RULERS WHO GIVE TRAVEL ADVISORIES THAT INDIA IS THE WORST RAPE NATION ON THE PLANET..
TEN RAPES IN INDIA HAVING 1350 MILLION PEOPLE IS NOT THE SAME PERCENTAGE OF TEN RAPES IN SWEDEN WHICH HAS ONLY 9.9 MILLION PEOPLE..
INDIA HAS THE LEAST RAPES/ DIVORCES/ LOSS OF VIRGINITY BEFORE MARRIAGE ON THE PLANET..
INDIA MUST WARN OUR CITIZENS TRAVELLING TO EUROPEAN NATIONS AS TOURISTS..
MOST INDIANS GO ON CHEAP PACKAGE TOURS SO THAT THEY CAN IMPRESS THEIR FRIENDS ON FACEBOOK..BY PUTTING PHOTOS..
THEY WILL NEVER SAY HOW THEY GOT CHEATED OFF THEIR MONEY..
TODAY I WAS SPEAKING TO A RICH FRIENDS WHO CAME BACK AFTER AN EUROPEAN TOUR.. HE WENT PRIVATE WITH WIFE AND CHILD..
HE LOST HIS PASSPORT ( FAMILY TOO ) .. HE LOST 400 EUROS AS HIS BAG WAS SWIPED .. HIS CARDS WERE USED TO SIPHON OFF HIS MONEY FROM HIS BAN..
EVEN HIS MOBILE PHONE SIM CARD WAS USED TO STEAL HIS MONEY-- I GUESS THE FIND OUT PASSWORDS THIS WAY..
WE ASK PM MODI/ AJIT DOVAL/ EXTERNAL AFFAIRS MINISTER.. DO YOUR JOB.. YOU ARE JUST FLOATING WITH THE FLOW.. EVEN IF WE KEEP A STONE ON YOUR OFFICIAL CHAIRS, YOUR PERSONAL WORTH MAKES NO DIFFERENCE..
BE WARNED !
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteRAHUL GANDHI
SONIA GANDHI
PRIYANKA VADRA
PMO
PM MODI
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
STALIN
ZAINAB SIKANDER
RANA AYYUB
BARKHA DUTT
SHEHLA RASHID
NIVEDITA MENON
IRFAN HABIB
NIDHI RAZDAN
ASADDUDIN OWAISI
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDI
ARUNDHATI ROY
SHOBHAA DE
SUHEL SETH
THOMAS ISAAS KERALA FINANCE MINISTER
GITA GOPINATH ( IMF CHIEF )
JOHN BRITAS
KUNHALIKUTTY
KODIYERI BALAKRISHNAN
BRINDA KARAT
JAVED AKHTAR
SHABANA AZMI
INDIRA JAISING
VRINDA GROVER
ANAND GROVER
JOHN DAYAL
KANCHA ILAIH
ANNA VETTICKAD
FATHER CEDRIC PEREIRA
JULIO RIBEIRO
PAGALIKA GHOSE
SWARA TTR BHASKAR ( OR IS IT PRRR )
IRA BHASKAR
ANNIE RAJA
ROMILA THAPAR
THAMBI SUNDAR PICHAI
KAMALAHASSAN
RAVISH KUMAR
NAVJOT SINGH SIDHU
TAREK FATAH
FAZAL GHAFOOR
UDDHAV THACKTEY
RAJ THACKREY
SANJIV BHATT
TEESTA SETALVAD
NASEERUDDIN SHAH
EX-VICE PRESIDENT ANSARI
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
KAVITA KRISHNAN
JAIRAM RAMESH
SHASHI THAROOR
JNULIO RIBEIRO
JEAN DREZE
BELA BHATIA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MS SWAMINATHAN
ARUNA ROY
UMAR KHALID
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
DEREK O BRIEN
ADHIR RANJAN CHOWDHURY
RASHID ALVI
AJOY KUMAR
ASADDUDDIN OWAISI
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
ASHISH KHETAN
SHATRUGHAN SINHA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
CHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
GVL NARASIMHA RAO
SAMBIT PATRA
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
ASADDUDDIN OWAISI
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Posted
Deletehttps://twitter.com/Avii02379630/status/1205465284124954625?s=19
Mailed to-
Deletecontact@amitshah.co.in
eam@mea.gov.in
office@rahulgandhi.in
pgv@inc.in
soniagandhi@sansad.nic.in
mot_fb@nic.in
ravis@sansad.nic.in
prakash.j@sansad.nic.in
rammadhav@gmail.com
jpnadda@gmail.com
38ashokroad@gmail.com
info@digvijayasingh.in
koenraadelst@hotmail.com
minister.hrd@gov.in
supremecourt@nic.in
nalsa-dla@nic.in
narendramodi1234@gmail.com
Sent Emails.
DeleteYour Registration Number is : PMOPG/E/2019/0709437
DeleteAlmost entire media is showing CAB against Constitution and fanning the flames..
ReplyDeleteCaptain,https://en.m.wikipedia.org/wiki/Bnei_Menashe,Are they being fooled into believing they are Jews like those Ethiopian tribes?
ReplyDeleteCaptain has called them assamese Jews. Bora of assam are bndi menashe Jews. Indrani mukherjea real name is pari bora
DeleteAre the sumi nagas also headhunters? nscn leader isak chishi swu was from this tribe.
ReplyDeletehttps://economictimes.indiatimes.com/news/politics-and-nation/parliament-has-right-to-undo-courts-verdicts-ravi-shankar-prasad/videoshow/72479956.cms
ReplyDeleteit appears the kayastha fellow whom you keep deriding has been listening to you.
Deletehttps://economictimes.indiatimes.com/news/politics-and-nation/parliament-has-right-to-undo-courts-verdicts-ravi-shankar-prasad/videoshow/72479956.cms
THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB..
IT DOES NOT END WITH THIS... PUNISH ALL JUDGES WHO STRUCK DOWN NJAC...
NJAC STILL STANDS.. THE ILLEGAL COLLEGIUM JUDICIARY VERDICT VIA JUDICIAL REVIEW IS NULL AND VOID...
JUSTICES J. S. KHEHAR, MADAN LOKUR, KURIAN JOSEPH AND ADARSH KUMAR GOEL HAD DECLARED THE 99TH AMENDMENT AND NJAC ACT UNCONSTITUTIONAL ..
THESE FOUR JUDGES AND EX-CJI CL DATTU MUST BE TRIED BY THE MILITARY COURT FOR SEDITION…
http://ajitvadakayil.blogspot.com/2018/11/the-indian-constitution-does-not-allow.html
THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN...
THIS IS LIKE A MAD CHIEF COOK DECLARING "I AM CHIEF OF THIS SHIP,N OUR NEXT POST IS NEW YOURK .. MY SWEET WHORE IS THERE " AND STRIKING DOWN LEGITIMATE ORDERS OF THE SHIP CAPTAIN..
JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...
JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…
WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..
WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..
INDIA IS THE ONLY NATION WHERE JUDGES ELECT JUDGES...
WHAT IS ALL THIS ?..
TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP. SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS.
PAST RULINGS OF JUDGES ( IN A JUSTICE IS BLIND SYSTEM SANS CONTEXT ) CANNOT BE ATTACHED TO THE CONSTITUTION AS A LANGOT VIA STARE DECISIS.. THIS IS ILLEGAL..
JUDICIARY HAS NO POWER TO REVIEW LAWS CREATED BY THE ELECTED LAW MAKERS.. THIS IS UNCONSTITUTIONAL ..
JUDGES AND BENAMI MEDIA WORK INCAHOOTS… WE KNOW THE TRAITORS…
Capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteRAHUL GANDHI
SONIA GANDHI
PRIYANKA VADRA
PMO
PM MODI
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
STALIN
ZAINAB SIKANDER
RANA AYYUB
BARKHA DUTT
SHEHLA RASHID
NIVEDITA MENON
IRFAN HABIB
NIDHI RAZDAN
ASADDUDIN OWAISI
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDI
ARUNDHATI ROY
SHOBHAA DE
SUHEL SETH
THOMAS ISAAS KERALA FINANCE MINISTER
GITA GOPINATH ( IMF CHIEF )
JOHN BRITAS
KUNHALIKUTTY
KODIYERI BALAKRISHNAN
BRINDA KARAT
JAVED AKHTAR
SHABANA AZMI
INDIRA JAISING
VRINDA GROVER
ANAND GROVER
JOHN DAYAL
KANCHA ILAIH
ANNA VETTICKAD
FATHER CEDRIC PEREIRA
JULIO RIBEIRO
PAGALIKA GHOSE
SWARA TTR BHASKAR ( OR IS IT PRRR )
IRA BHASKAR
ANNIE RAJA
ROMILA THAPAR
THAMBI SUNDAR PICHAI
KAMALAHASSAN
RAVISH KUMAR
NAVJOT SINGH SIDHU
TAREK FATAH
FAZAL GHAFOOR
UDDHAV THACKTEY
RAJ THACKREY
SANJIV BHATT
TEESTA SETALVAD
NASEERUDDIN SHAH
EX-VICE PRESIDENT ANSARI
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
KAVITA KRISHNAN
JAIRAM RAMESH
SHASHI THAROOR
JNULIO RIBEIRO
JEAN DREZE
BELA BHATIA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MS SWAMINATHAN
ARUNA ROY
UMAR KHALID
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
DEREK O BRIEN
ADHIR RANJAN CHOWDHURY
RASHID ALVI
AJOY KUMAR
ASADDUDDIN OWAISI
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
ASHISH KHETAN
SHATRUGHAN SINHA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
CHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
GVL NARASIMHA RAO
SAMBIT PATRA
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
ASADDUDDIN OWAISI
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
ASK PMO/ LAW MINISTER/ ATTORNEY GENERAL FOR AN ACK--
DeleteALL OF YOU MUST DO THIS.. IT IS NOW OR NEVER..
https://twitter.com/shree1082002/status/1205495394647465984
DeleteOn Law Minister Ravi Shankar Prasad - PMOPG/E/2019/0709385
DeleteCheers
Ravi
KL
Your Registration Number is : PMOPG/E/2019/0709420
DeleteYour Registration Number is : PMOPG/E/2019/0709435
DeleteMailed to-
Deleteravis@sansad.nic.in
secy-jus@gov.in
secylaw-dla@nic.in
Mail sent captain
Deletehttps://timesofindia.indiatimes.com/india/states-have-no-powers-to-refuse-implementation-of-citizenship-act-home-ministry-official/articleshow/72529317.cms
ReplyDeleteWHAT A DISGRACE.... CAPT AMARINDER SINGH HAS BECOME SENILE.. HE HAS LOST MY RESPECT FOREVER...
WE CAN UNDERSTAND A PEA BRAINED ACTIVIST LIKE MAMATA BANNERJEE MAKING FOOLISH STATEMENTS .LIKE THIS...
OUR COLLEGIUM JUDICIARY IS WORSE THAN POT HOLE JOURNALISTS.. THESE STUPID JUDGES DO NOT KNOW THAT JUDICIARY HAS NO POWERS OVER EXTERNAL AND INTERNAL SECURITY OF BHARATMATA, HE WATAN..
WE PLAN TO CREATE MILITARY COURTS AND HANG THE JUDGES WHO HAVE USED ILLEGAL JUDICIAL REVIEW TO UNDERMINE INDIAs DEMOCRACY BY JUDICIAL REVIEW....
ILLEGAL COLLEGIUM JUDICIARY CREATED THE NAXAL RED CORRIDOR AND CAUSED ETHNIC CLEANSING OF KASHMIRI PANDITS..
THE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS..
ALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..
THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIAMENT....
THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS.. OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN...
WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION...
THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN...
WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..
THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..
TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP.
SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..
https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html
capt ajit vadakayil.
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteRAHUL GANDHI
SONIA GANDHI
PRIYANKA VADRA
PMO
PM MODI
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
STALIN
ZAINAB SIKANDER
RANA AYYUB
BARKHA DUTT
SHEHLA RASHID
NIVEDITA MENON
IRFAN HABIB
NIDHI RAZDAN
ASADDUDIN OWAISI
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDI
ARUNDHATI ROY
SHOBHAA DE
SUHEL SETH
THOMAS ISAAS KERALA FINANCE MINISTER
GITA GOPINATH ( IMF CHIEF )
JOHN BRITAS
KUNHALIKUTTY
KODIYERI BALAKRISHNAN
BRINDA KARAT
JAVED AKHTAR
SHABANA AZMI
INDIRA JAISING
VRINDA GROVER
ANAND GROVER
JOHN DAYAL
KANCHA ILAIH
ANNA VETTICKAD
FATHER CEDRIC PEREIRA
JULIO RIBEIRO
PAGALIKA GHOSE
SWARA TTR BHASKAR ( OR IS IT PRRR )
IRA BHASKAR
ANNIE RAJA
ROMILA THAPAR
THAMBI SUNDAR PICHAI
KAMALAHASSAN
RAVISH KUMAR
NAVJOT SINGH SIDHU
TAREK FATAH
FAZAL GHAFOOR
UDDHAV THACKTEY
RAJ THACKREY
SANJIV BHATT
TEESTA SETALVAD
NASEERUDDIN SHAH
EX-VICE PRESIDENT ANSARI
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
KAVITA KRISHNAN
JAIRAM RAMESH
SHASHI THAROOR
JNULIO RIBEIRO
JEAN DREZE
BELA BHATIA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MS SWAMINATHAN
ARUNA ROY
UMAR KHALID
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
DEREK O BRIEN
ADHIR RANJAN CHOWDHURY
RASHID ALVI
AJOY KUMAR
ASADDUDDIN OWAISI
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
ASHISH KHETAN
SHATRUGHAN SINHA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
CHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
GVL NARASIMHA RAO
SAMBIT PATRA
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
ASADDUDDIN OWAISI
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
https://twitter.com/shree1082002/status/1205496589596282880
DeleteYour Registration Number is : PMOPG/E/2019/0709428
Deletehttps://www.google.com/amp/s/m.timesofindia.com/india/amit-shahs-visit-to-meghalaya-arunachal-cancelled/amp_articleshow/72529754.cms
ReplyDeleteYour Registration Number is : PMOPG/E/2019/0709194
ReplyDeleteRef : THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB ..
Dear Capt Ajit sir,
ReplyDeleteProject Joshua is in motion...for 15 NEW Indian origin MP's are elected in UK....including Rishi Sanak - son in law of NRN Murthy... so it's Indians taking global powershare albeit Rothschild way...;-)
https://www.hindustantimes.com/india-news/more-indian-origin-mps-elected-to-house-of-commons/story-hGSYPdqEpresAFPL2Ti8RK.html?fbclid=IwAR25WgVIzVwWULEh1dW5Dd_8b_h-dk2bhulH0VZBV1ZFsv9GgtIubJ5draU
https://economictimes.indiatimes.com/news/politics-and-nation/parliament-has-right-to-undo-courts-verdicts-ravi-shankar-prasad/videoshow/72479956.cms
ReplyDeleteTHIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB..
IT DOES NOT END WITH THIS... PUNISH ALL JUDGES WHO STRUCK DOWN NJAC...
NJAC STILL STANDS.. THE ILLEGAL COLLEGIUM JUDICIARY VERDICT VIA JUDICIAL REVIEW IS NULL AND VOID...
SOME BODY ASKED ME – CAPTAIN WHY HAVE YOU WRITTEN THAT OUR JUDGES ARE 100% USELESS.
THESE JUDGES DO NOT KNOW HOW TO PRIORITISE.
BECOME AWARE WHERE YOU ARE INVESTING YOUR ENERGY AND TIME..
WHEN YOU CAN PRIORITSE , HAPPINESS ALIGHTS ON YOU. IT IS ABOUT YOUR OWN VALUES.
YOU CANNOT MANAGE TIME UNLESS YOU CAN PRIORTISE
YOU CANNOT BE A CHANGE MANAGER IF YOU CANNOT PRIORITISE
IF YOU DON’T HAVE THE ABILITY TO PRIORITISE YOU ARE NOT HUMAN— YOU ARE AT THE LEVEL OF AN ANMAL WHO HAS ONLY MOOLADHARA CHAKRA ( SURVIVAL SEAT ).
NOT ONE SINGLE JUDGE CAN PRIORITISE.. “BODMAS” HAS TO BE APPLIED ON THE CONSTITUTION , TO FIND WHICH LAW HAS PREPONDERANCE ..
AT SEA AS A CHEMICAL TANKER CAPTAIN, I HAVE TO FOLLOW MORE LAWS THAT THE SIMPLE INDIAN CONSTITUTION.
IN FAT WE HAVE A WHOLE SHIP LIBRARY FULL OF BOOKS ON INTERNATIONAL LAWS. UNLESS YOU HAVE THIS LIBRARY, THE SHIP IS CONSIDERED UNSEAWORTHY.
EXAMPLE TWO AMONG DOZENS ?
http://tmrl.gov.tm/wp-content/uploads/2019/05/4.-solas.pdf
http://www.mar.ist.utl.pt/mventura/projecto-navios-i/imo-conventions%20%28copies%29/marpol.pdf
OUR JUDGES ARE THE BOTTOM DREGS OF THE SCHOOL CEREBRAL BARREL AND DISCARDS OF THE LOSER LAWYER POOL..
MOST OF THESE JUDGES HAVE TAKEN UP THIS LOW PAYING JOB, JUST TO GET EVEN WITH THEIR MERCEDES DRIVING RICH LAWYER COLLEAGUES.
AS SEA CAPT AJIT VADAKAYIL WAS A LEGENDARY TEACHER AS HE HAS THE ABILITY TO TRANSLATE LAWS ETC TO DIRTY SEX.. SAILORS AND DIRTY SEX ?—THEY ARE ALL EARS .
FOR EXAMPLE- TASK: DESCRIBE A HUMAN BEING IN 100 POINTS
NO 1 WOULD BE—A HUMAN HAS A SOUL WITHIN WHICH IS A PIECE OF THE FIELD OF BRAHMAN AT LOWER FREQUENCY
NO 100 WOULD BE—A HUMAN HAS AN ASSHOLE IN WHICH A WHORE CAN SHOVE HER TONGUE AND DO ANALINGUS.
FOR THESE STUPID JUDGES , PRIORITY WOULD BE NO 100.. IT IS NO LONGER FUNNY.
JUSTICE LOKUR HAS TOLD NDTV THAT ARTICLE 14 APPLIES TO CAB. SORRY, THE ENTIRE CONSTITUTION IS FOR LAW ABIDING INDIAN CITIZENS – NOT FOR ISI PAYROLL TERRORIST LIKE SOHRABUDDIN FOR WHOM HOME MINISTER AMIT SHAH WAS KICKED INTO JAIL..
OUR CONSTITUTION DOES NOT APPLY TO ILLEGAL ROHINGYA MUSLIMS.
WE MUST FORM MILITARY COURTS AND HANG JUDGES WHO WERE IN PAKISTANI ISA AND JEWISH DEEP STATE PAYROLL. HOW DID 20% OF INDIAN LANDMASS ( RED CORRIDOR ) COME UNDER NAXAL CONTROL?
HOW WERE KASHMIRI PANDITS ETHNICALLY CLEANSED ?
http://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html
WE THE PEOPLE WHO ARE ABOVE THE CONSTITUTION WARN THE JUDGES— “GET YOUR ACT TOGETHER..YOU ARE IN CONTEMPT OF THE CONSTITUTION ITSELF “
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteRAHUL GANDHI
SONIA GANDHI
PRIYANKA VADRA
PMO
PM MODI
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
STALIN
ZAINAB SIKANDER
RANA AYYUB
BARKHA DUTT
SHEHLA RASHID
NIVEDITA MENON
IRFAN HABIB
NIDHI RAZDAN
ASADDUDIN OWAISI
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDI
ARUNDHATI ROY
SHOBHAA DE
SUHEL SETH
THOMAS ISAAS KERALA FINANCE MINISTER
GITA GOPINATH ( IMF CHIEF )
JOHN BRITAS
KUNHALIKUTTY
KODIYERI BALAKRISHNAN
BRINDA KARAT
JAVED AKHTAR
SHABANA AZMI
INDIRA JAISING
VRINDA GROVER
ANAND GROVER
JOHN DAYAL
KANCHA ILAIH
ANNA VETTICKAD
FATHER CEDRIC PEREIRA
JULIO RIBEIRO
PAGALIKA GHOSE
SWARA TTR BHASKAR ( OR IS IT PRRR )
IRA BHASKAR
ANNIE RAJA
ROMILA THAPAR
THAMBI SUNDAR PICHAI
KAMALAHASSAN
RAVISH KUMAR
NAVJOT SINGH SIDHU
TAREK FATAH
FAZAL GHAFOOR
UDDHAV THACKTEY
RAJ THACKREY
SANJIV BHATT
TEESTA SETALVAD
NASEERUDDIN SHAH
EX-VICE PRESIDENT ANSARI
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
KAVITA KRISHNAN
JAIRAM RAMESH
SHASHI THAROOR
JNULIO RIBEIRO
JEAN DREZE
BELA BHATIA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MS SWAMINATHAN
ARUNA ROY
UMAR KHALID
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
DEREK O BRIEN
ADHIR RANJAN CHOWDHURY
RASHID ALVI
AJOY KUMAR
ASADDUDDIN OWAISI
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
ASHISH KHETAN
SHATRUGHAN SINHA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
CHID BABY
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
GVL NARASIMHA RAO
SAMBIT PATRA
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
ASADDUDDIN OWAISI
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Your Registration Number is : PMOPG/E/2019/0709424
Delete"THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB..THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB.."
Deletethanks only to an old sea salt
dear captain, the document url mentioned in the post http://tmrl.gov.tm/wp-content/uploads/2019/05/4.-solas.pdf, seems missing.
Deletehttps://twitter.com/rakeshsivan/status/1205675981693841408
https://twitter.com/rakeshsivan/status/1205676176754139137
https://timesofindia.indiatimes.com/entertainment/hindi/bollywood/news/kareena-kapoor-khan-reveals-taimur-ali-khans-birthday-plans-he-has-demanded-two-cakes/articleshow/72527436.cms
ReplyDeleteTOH MEIN NACHOON ?
PAID NEWS !
https://timesofindia.indiatimes.com/city/bengaluru/bengaluru-pil-challenges-liquor-vend-opposite-mahatma-gandhi-statue-hc-orders-notice-to-state-bbmp/articleshow/72541880.cms
ReplyDeleteWE THE PEOPLE DINT CARE FOR GANDHI
He was a sargeant in the British military - why we would ever trust him?
Deletehttps://twitter.com/CitizenKamran/status/1205530327973675009
ReplyDeleteDear Capt Ajit sir,
ReplyDeleteThis is Yogi Adityananth sarkar of the masses...wants inclusivity of everyone to be part of Ram temple...what a great start..... https://www.opindia.com/2019/12/yogi-adityanath-jharkhand-family-donate-rs-11-stone-ram-mandir-ayodhya/?fbclid=IwAR38Mh8HLEYsnd7ETkXB31wXUoQCq4IwAYMiarJsyPXOAd81jmTWm8hVv1U
DATE -13TH DEC 2019
ReplyDeleteTIME - 2230 IST
TV CHANNEL - INDIA TODAY
TV ANCHOR- RAHUL KANWAL
SUBJECT -- INDIAN ECONOMICS
TODAY FOR THE FIRST TIME I SAW A DISCUSSION WHERE ECONOMISTS HAVE DECLARED THERE IS A DIFFERENCE BETWEEN SWADESHI ECONOMICS ( VADAKAYIL ECONOMICS ) AND VIDESHI ECONOMICS ( ROTHSCHILD ECONOMICS)..
YEARS OF MY EFFORTS HAVE BORNE FRUIT..
HEY GITA GOPINATH-- YOU ARE IMF CHIEF ONLY BECAUSE YOU ARE A BLOOD RELATIVE OF ROTHSCHILD COMMIE AK GOPALAN.. SO LISTEN UP..
INDIA IS ALREADY A 5 TRILLION ECONOMY
INDIA IS GROWING TODAY AT 10.1%
INDIA IS THIS PLANETs NO 3 ECONOMY TODAY..
INDIA HAS THE BEST POTENTIAL AND BEST STRATEGIC LOCATION , WITH ENORMOUS NATURAL RESOURCES..
INDIA IS TODAY THE ONLY ROARING ECONOMY ON THIS PLANET..
INDIA DOES NOT CARE FOR ROTHSCHILDs RATING AGENCIES FITCH/ MOODYs / S&P ETC..
G6 GROUP ( A BUNCH OF BEGGAR NATIONS PRETENDING TO BE RICH ) WITHOUT INDIAN AND CHINA IS A JOKE..
READ CAPT AJIT VADAKAYILs QUESTIONS TO QUORA FROM 686 TO 820... YOU WILL NOTICE THAT ROTHSCHILDs ECONOMICS IS PURE BULLSHIT..
YOU DONT NEED TO BE A HEN TO JUDGE AN OMELETTE. I HAVE TRAVELED THIS PLANET FOR 40 YEARS , CHECKED OUT EVERY BACKYARD...
WE KNOW THE TRAITOR INDIAN ECONOMISTS.. WE THE PEOPLE HAVE A SHORT ROPE AND A LAMP POST EARMARKED FOR THEM.. DESH DROHIS IN THE PAYROLL OF THE JEWISH DEEP STATE..
INDIA WILL BE THIS PLANETs NO 1 SUPERPOWER IN 14 YEARS , EVEN IF WE ARE ON AUTO PILOT... WE WERE SLAVES FOR 800 YEARS ..
IN 200 YEARS FLAT JEW ROTHSCHILD CONVERTED INDIA FROM THE RICHEST NATION ON THE PLANET TO THE POOREST.. WE HAVE LEARNT OUR LESSONS .. WE HAVE PROFILE THE TRAITORS..
PAIN AWAITS THESE TRAITORS..
capt ajit vadakayil
..
PUT ABOVE COMMMENT IN WEBSITES OF--
DeleteRAHUL KANWAL
AROON PURIE
GITA GOPINATH
BAIJAYANT PANDA
SOUMYA JANTI GHOSH
SAMIRAN CHAKRABORTY
ASMIMA GOYAL
RBI GOVERNOR
RBI
FINANCE MINISTRY CENTRE/ STATES
FINANCE MINISTER CENTRE / STATES
PMO
PM MODI
PIYUSH GOEL
CHID BABY
MONTEK SINGH AHLUWALIA
MANMOHAN SINGH
RAGHURAN RAJAN
ABHIJEET BANNERJEE ( NOBEL )
AMARTYA SEN
YASHWANT SINHA
PRANAB MUKHERJEE
JAGDISH BHAGWATI
JAYATI GHOSH
ARVIND SUBRAMANIAN
BIMAL JALAN
ARVIND PANAGARIYA
SUBRAMANIAN SWAMY
AMIT MITRA
BIBEK DEBROY
JAIRAM RAMESH
KAUSHIK BASU
MS SUNDARA RAJAN
REETIKA KHERA
MIHIR SHAH
JEAN DREZE
PMO
PM MODI
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
JOHN BRITAS
RAVISH KUMAR
TAREK FATAH
UDDHAV THACKREY
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDA MITRA
MANISH SISODIA
RAGHAV CHADDHA
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
ATISHI MARLENA
YOGENDRA YADAV
SUDHANSHU TRIVEDI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
LAW MINISTER PRASAD
ATTORNEY GENERAL
LAW MINISTRY CENTRE/ STATES
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
sir watch this -
ReplyDeleteडिग्री जला दी तो हर जगह IIT Alumnus क्यूँ लिखता हूँ?
https://www.youtube.com/watch?v=UqxxiXAYLy0
For 40 years Congress and BJP have been letting in illegal immigrants and NOW they want to take action. Is this a sick joke?
ReplyDeleteThe real issue is Border Security. Otherwise every 10 years we will have to do this CAB/NRC exercise. All a got up game. BJP is clearly controlled by foreign powers!
CFR President:
ReplyDeletehttps://twitter.com/RichardHaass/status/1205163308644524035?s=19
dear captain, tweet sent in response to the below thread
ReplyDeletehttps://ajitvadakayil.blogspot.com/2019/12/what-artificial-intelligence-cannot-do.html?showComment=1576231877257#c5382920697119669631
https://twitter.com/rakeshsivan/status/1205661524150210560
I ASK MY READERS
DeleteTAKE THIS AS AN EXAMPLE OF HOW TO POST SCREEN SHOTS AND HOW TO REPORT BACK.
capt ajit vadakayil
..
https://timesofindia.indiatimes.com/india/wont-direct-kerala-to-enforce-womens-sabari-entry-sc/articleshow/72561437.cms
ReplyDeleteEVEN IF THE JUDICIARY AND KERALA CM ENFORCES IT-- WE THE PEOPLE WILL NOT OBEY.. ...
WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. ..
WE THE PEOPLE CANNOT BE STRAIT JACKETED BY A STAGNANT CONSTITUTION , AS WE ARE ABOVE IT AS PER THE PREAMBLE..
INDIA IS RUN BY RULE OF DHARMA AND LOVE FOR THE WATAN...
CONSTITUTION IS A DYNAMIC DOCUMENT.. WE ARE IN THE QUANTUM COMPUTER ERA , NOT THE CALCULATOR ERA...
AT SEA, THE SHIP CAPTAIN HAS TO FOLLOW 100 TIMES MORE REGULATIONS THAN WHAT EXISTS IN THE INDIAN CONSTITUTION... YET THE LOCAL LAWS AND LOCAL CULTURE TAKES PREPONDERANCE....
THESE ARE UNWRITTEN RULES......
go0gle for the blogpost below--.
http://ajitvadakayil.blogspot.com/2018/11/5900-year-old-sabarimala-this-planets.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteCJI BOBDE
CHANDRACHUD
NARIMAN
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL SUPREME COURT LAWYERS
LAW MINISTER/ MINISTRY CENTRE AND STATE
ALL HIGH COURT CHIEF JUSTICES
ALL COLLECTORS OF KERALA
PMO
PM MODI
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
E SREEDHARAN
MOHANLAL
SURESH GOPI
PGURUS
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Why don't these female protesters protest against Freemason lodges that don't allow women in India (or for that matter in the rest of the world)?
DeleteCaptain
DeleteOn Sabarimalai -- PMOPG/E/2019/0709930
Cheers Ravi KL
SOMEBODY CALLED ME UP AND SAID...
ReplyDeleteCAPTAIN , AMONG YOUR 10,000 REVELATIONS, I HAVE CHOSE ONE FOR THE NO 1 STATUS..
YOU ARE THE FIRST PERSON ON THE PLANET TO WRITE DOWN
###################
ALL HINDU GODS ARE COSMIC ALLEGORIES EXCEPT VIHNU AVATARS RAM/ KRISHNA / AYYAPPA WHO WERE MORTALS
#############################
INDEED !
WHY DID JEW DARLING MODI GIVE INDIAs SECOND HIGHEST AWARD PADMA VIBHUSHAN TO TWO ROGUE FAKE GURUS , WHO HAVE MILKED SANATANA DHARMA AND BECOME RICH , RUNNING VOTE BANKS ?
AAA- FAKE GURU STUPID FELLOW SADGURU JAGGI VASUDEV WROTE THAT SHIVA IS A MORTAL YOGI BORN 15,000 YEARS AGO.. HE MADE A HUGE STATUE AT COIMBATORE, AND GOT PM MODI TO INAUGURATE IT.. HE HAD PRESIDENT KOVIND AS CHIEF GUEST ON SHIVA RATRI DAY AND DANCED LIKE A CUNT IN HIS PRESENCE .. SADGURU JAGGI VASUDEV EVEN SAID ON YOU TUBE VIDEO THAT SHIVA IS LIKE SACHIN TENDULKAR WHO WAS GOOD AT DOING A PARTICULAR THING , SO PEOPLE LOVED HIM AND MADE HIM GOD..
BBB -- FAKE GURU STUPID FELLOW SRI SRI RAVISHANKAR WROTE THAT SHIVA SCREWED VISHNU ANALLY AND PRODUCED LORD AYYAPPA.. WE KNOW WHERE THIS IS COMING FROM AS SRI SRI RAVISHANKAR HAS A EFFIMINATE VOICE AND GIRLIE SLENDER FINGERS .. SO SO SO, TWO COSMIC ALLEGORIES HAD HOMOSEXUAL SEX AND PRODUCED MORAL AYYAPPA ?.... WHY IS THIS CUNT NOT IN JAIL ?....
https://www.firstpost.com/india/homosexuality-not-a-crime-in-hinduism-says-sri-sri-ravi-shankar-1283843.html
############################
WE THE PEOPLE WARN DEVDUTT PATTANAIK AND AMISH TRIPATI.. DO NOT DENIGRATE HINDUISM..
AND WE HAVE TWO DEEP STATE DARLING LIBERAL JUDGES CHANDRACHUD AND NARIMAN WANTING TO EQUATE WORLDs LARGEST PILGRIMAGE SABARIMALA TO WEE PARSI / BOHRA TEMPLES.. MIND YOU THESE ARE FOREIGN INVADER RELIGIONS.. WE HAVE TO PULL DOWN THE GREAT SANATANA DHARMA TO THIS LOW LEVEL ?
APPIDIYAAAAAA ?
WE WANT INSTANT JUDICIAL REFORMS .. WE MUST CREATE MILITARY COURTS TO QUICK TRY AND HANG DEEP STATE PAYROLL TRAITOR COLLEGIUM JUDGES..
read all 8 parts of this unfinished post..
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteNITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PUT ABOVE COMMENT IN WEBSITES OF--
CJI BOBDE
CHANDRACHUD
NARIMAN
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL SUPREME COURT LAWYERS
LAW MINISTER/ MINISTRY CENTRE AND STATE
ALL HIGH COURT CHIEF JUSTICES
ALL COLLECTORS OF KERALA
PMO
PM MODI
NALIN KOHLI
GVL NARASIMHA RAO
SAMBIT PATRA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
E SREEDHARAN
MOHANLAL
SURESH GOPI
PGURUS
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
SANJAY HEDGE
KAPILSIBAL
ABHI SEX MAANGTHA SINVI
DIG VIJAY SINGH
AK ANTONY
TEHSIN POONAWAALA
SANJAY JHA
AATISH TASEER
MANI SHANGARAN AIYYERAN
JOHN BRITAS
RAVISH KUMAR
TAREK FATAH
UDDHAV THACKREY
SHEKHAR GUPTA
KARAN THAPAR
SIDDHARTH VARADARAJAN
KUMAR KETKAR
NIKHIL WAGLE
NISHANT VERMA
SUMEET CHOPRA
ASHUTOSH
DEEPAK CHAURASIA
VINOD SHARMA
FARAH NAQVI
KIRAN MAJUMDAR SHAW
RAHUL BAJAJ
HARDH MANDER
MANISH TEWARI
PRIYANKA CHATURVEDI
RAJIV SHUKLA
SANJAY NIRUPAM
PAVAN KHERA
RANDEEP SURJEWALA
MJ AKBAR
ARUN SHOURIE
SHAZIA ILMI
CHANDAN MITRA
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
KAPIL SIBAL
ANAND SHARMA
ABHI SEX MAANGTHA SINGHVI
DIG VIJAY SINGH
ADHIR RANJAN CHOWDHURY
AK ANTONY
SANJAY HEGDE
SANJAY JHA
TEHSEEN POONAWAALA
SEHZAD POONAWALA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATI
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PRAKASH KARAT
SITARAM YECHURY
BRINDA KARAT
D RAJA
RANA AYYUB
DEVADUTT PATTANAIK
WENDY DONIGER
AUDREY TRUSCHKE
SHELDON POLLOCK
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Posted the screenshots:
Deletehttps://twitter.com/Avii02379630/status/1205688036610064384?s=19
Captain
DeleteOn push for urgent judicial reforms --PMOPG/E/2019/0709886
Cheers Ravi KL
https://twitter.com/dastardicious/status/1205407891399692288?s=20
ReplyDeletehttps://twitter.com/dastardicious/status/1205408087663710208?s=20
my reply to swamy on twitter, captain, who seems to be vehemently against the s400 but can't give a valid reason why we should not go ahead with it. Makes unfounded claims of chinese electronics on it which cannot be used against either pakistan or china. and then says usa will not grant us visas if we buy the s400.
Hi Captain,
ReplyDeleteThese days i dont regularly visit your blog as i dont find enough time.
I dont know how to congratulate you or to express my gratitude.
Most of the people think that BJP is so patriotic/nationalistic and has struck down Article 370, Got rid off China in Doklam,Got RamMandir, Passed CAB etc, but all these things are whole n sole hardwork of yours over the past Ten years, else by this time Modi would have sold off Bharatmata to his Jewish masters.
U always showed the Mirror to the BJP Stalwarts, that is why things are in place.
U are the only reason i feel the world is not hooked on to WWIII by G7 beggar nations to wave off their debts.
You are so big Captain.
Regards,
Santhosh.
WHAT IS THE MODUS OPERANDI OF THE G6 NATIONS ??..
DeleteHAVE INFLATED GDP.. SHOWCASE THEMSELVES AS RICH NATIONS.. LATER CAUSE WARS AND STEAL..
GDP DOES NOT FACTOR IN EXTERNAL DEBT... WHAT A FUCKIN' JOKE..
CHECK OUT THE TOP LEFT HAND CORNER OF THE LINK BELOW-- USA IS 23.1 TRILLION USD IN DEBT...
AND INDIA IS STRUGGLING TO BE A 5 TRILLION ECONOMY..
https://www.usdebtclock.org/
CAPT AJIT VADAKAYIL IS THE ONLY MAN ON THE PLANET TO DECLARE THAT MODERN ECONOMICS IS 100% BULLSHIT
READ QUESTIONS TO QUORA FROM 686 TO 820.. EVEN A SCHOOL BOY CAN UNDERSTAND..
https://ajitvadakayil.blogspot.com/2019/06/archived-questions-to-quora-from-capt.html
WHAT WAS MY MISSION STATEMENT TEN YEARS AGO BEFORE I STARTED MY FIRST BLOG POST?
This blogsite will transform your mind . You yourself, are the teacher, the pupil, the messiah, the seeker, the traveller and the destination . It is no measure of health to be well adjusted to this profoundly sick society . I am from INDIA, the mother of all civilizations . I will be re-writing world history , and this will surely not gratify the evil hijackers of human history . Awaken your inner voice . Your own conscience is the best interpreter . In a time of universal deceit, telling the truth is a revolutionary act . The naked truth can never be hate speech or defamation. This blog site does not sacrifice truth on the altar of political correctness . Do not enter this blog site if you cannot handle the truth . Capt Ajit Vadakayil leads the only silent revolution on this planet .. STRENGTH AND HONOR - ALWAYS !.
capt ajit vadakayil
..
another place which was populated by headhunter tribes is borneo who claim they're indigenous but i suspect they were brought here when dutch/spanish/portuguese were ruling the roost and killed off lots of bornean [kalimantan] hindus....this also happened in sumatra......most converted to christianity later on
ReplyDeleteTHE HINDUS OF BORNEO WERE MASSACRED ENMASSE.
DeleteTHERE WERE HUNDREDS OF HINDU TEMPLES IN BORNEO.. ALL BOMBED FROM THE SKY.. SOME TEMPLES HAVE BEEN CONVERTED..
https://www.youtube.com/watch?v=72nAt5EfhDA
IN CALICUT WE KNEW BORNEO IN ANCIENT TIMES AS KARPURA DWEEPAM ( LAND OF CAMPHOR )
sir i wanted to know more about the arunachal pradesh hindus who were ethnically cleansed 250 years ago by rothschild. i wonder what was the population of arunachal 250 years back
ReplyDeletehttps://en.wikipedia.org/wiki/Chutia_people are they original hindu inhabitants of arunachal?
ReplyDeleteNO
DeleteTHE ORIGINAL HINDUS LOOKED LIKE CURRENT DAY BENGALIS .. PLUS SOME HINDU TRIBALS..
https://en.wikipedia.org/wiki/Moamoria_rebellion
ReplyDeletehttps://timesofindia.indiatimes.com/videos/news/cab-protests-footage-of-crpf-cops-beating-up-tv-news-journalists-in-guwahati-emerges/videoshow/72504499.cms
ReplyDeleteWHEN THERE IS A SERIOUS INCIDENT ON MY SHIP, I BAN CAMERAS FROM THE SITE..
NO CREW DARES TO DISOBEY MY ORDERS..
WHERE THERE ARE CAMERAS OPPORTUNISTIC MICE BEHAVE LIKE LIONS..
THE CHAIN IS AS GOOD AS THE WEAKEST LINK..
THE WEAKEST LINK IS THE SELFISH FELLOW PLAYING TO THE GALLERY.