THIS POST IS CONTINUED FROM PART 7, BELOW--
CAPT AJIT VADAKAYIL SAYS AI MUST MEAN “INTELLIGENCE AUGUMENTATION “ IN FUTURE ..
Let this be IA
Let this be IA
OBJECTIVE AI CANNOT HAVE A VISION,
IT CANNOT PRIORITIZE,
IT CANT GLEAN CONTEXT,
IT CANT TELL THE MORAL OF A STORY ,
IT CANT RECOGNIZE A JOKE, OR BE A JUDGE IN A JOKE CONTEST
IT CANT DRIVE CHANGE,
IT CANNOT INNOVATE,
IT CANNOT DO ROOT CAUSE ANALYSIS ,
IT CANNOT MULTI-TASK,
IT CANNOT DETECT SARCASM,
IT CANNOT DO DYNAMIC RISK ASSESSMENT ,
IT IS UNABLE TO REFINE OWN KNOWLEDGE TO WISDOM,
IT IS BLIND TO SUBJECTIVITY,
IT CANNOT EVALUATE POTENTIAL,
IT CANNOT SELF IMPROVE WITH EXPERIENCE,
IT CANNOT UNLEARN
IT IS PRONE TO CATASTROPHIC FORGETTING
IT DOES NOT UNDERSTAND BASICS OF CAUSE AND EFFECT,
IT CANNOT JUDGE SUBJECTIVELY TO VETO/ ABORT,
IT CANNOT FOSTER TEAMWORK DUE TO RESTRICTED SCOPE,
IT CANNOT MENTOR,
IT CANNOT BE CREATIVE,
IT CANNOT THINK FOR ITSELF,
IT CANNOT TEACH OR ANSWER STUDENTs QUESTIONS,
IT CANNOT PATENT AN INVENTION,
IT CANNOT SEE THE BIG PICTURE ,
IT CANNOT FIGURE OUT WHAT IS MORALLY WRONG,
IT CANNOT PROVIDE NATURAL JUSTICE,
IT CANNOT FORMULATE LAWS
IT CANNOT FIGURE OUT WHAT GOES AGAINST HUMAN DIGNITY
IT CAN BE FOOLED EASILY USING DECOYS WHICH CANT FOOL A CHILD,
IT CANNOT BE A SELF STARTER,
IT CANNOT UNDERSTAND APT TIMING,
IT CANNOT FEEL
IT CANNOT GET INSPIRED
IT CANNOT USE PAIN AS FEEDBACK,
IT CANNOT GET EXCITED BY ANYTHING
IT HAS NO SPONTANEITY TO MAKE THE BEST OUT OF SITUATION
IT CAN BE CONFOUNDED BY NEW SITUATIONS
IT CANNOT FIGURE OUT GREY AREAS,
IT CANNOT GLEAN WORTH OR VALUE
IT CANNOT UNDERSTAND TEAMWORK DYNAMICS
IT HAS NO INTENTION
IT HAS NO INTUITION,
IT HAS NO FREE WILL
IT HAS NO DESIRE
IT CANNOT SET A GOAL
IT CANNOT BE SUBJECTED TO THE LAWS OF KARMA
ON THE CONTRARY IT CAN SPAWN FOUL AND RUTHLESS GLOBAL FRAUD ( CLIMATE CHANGE DUE TO CO2 ) WITH DELIBERATE BLACK BOX ALGORITHMS, JUST FEW AMONG MORE THAN 60 CRITICAL INHERENT DEFICIENCIES.
HUMANS HAVE THINGS A COMPUTER CAN NEVER HAVE.. A SUBCONSCIOUS BRAIN LOBE, REM SLEEP WHICH BACKS UP BETWEEN RIGHT/ LEFT BRAIN LOBES AND FROM AAKASHA BANK, A GUT WHICH INTUITS, 30 TRILLION BODY CELLS WHICH HOLD MEMORY, A VAGUS NERVE , AN AMYGDALA , 73% WATER IN BRAIN FOR MEMORY, 10 BILLION MILES ORGANIC DNA MOBIUS WIRING ETC.
SINGULARITY , MY ASS !
Even if a machine can
accurately mimic human behaviour, it is not actually thinking. It is simply
following a set of rules and cannot be said to possess a consciousness. Strong AI usually refers to the question if
machines are able to have a consciousness, intentionality, self-awareness,
understanding or other vague philosophical concepts often ascribed as human
traits.
Machines do not have
the following abilities:--
1. The ability to learn
by example.
2. The ability to
improve the efficiency of performing a certain task by analysing your own behaviour
( swadyaya ) and modifying it appropriately.
3. The ability to
generalise solutions and so that they can be applied to varying situations, while
realising that using a generalised solution in a specific situation rarely is
as efficient as using a solution optimised for that specific situation.
4. The ability to
communicate the solution to a problem to another intelligent being in such a
way that the other intelligent being can accurately solve the problem.
5. The ability to learn
the solution of a problem by communicating with another intelligent being.
6. The ability to work
together with another intelligent being in order to accomplish a task that was
previously impossible (or simply difficult) to accomplish alone.
Artificial intelligence
is a tool humanity is wielding with increasing recklessness. We don’t have the code of ethics, laws,
government accountability, corporate transparency and capability of monitoring
the space to be able to achieve AI regulation as of now
AI is just a tool which
helps to free up our time spent in ordinary routine work so that we can focus
our time and energy in achieving bigger creative tasks. These machines would
save us from workaday drudgery
If AI is when a
computer can carry out a set of tasks based on instruction, ML is a machine's
ability to ingest, parse, and learn from that data itself in order to become
more accurate or precise about accomplishing that task
Unable to process high
dimensional data: Machine Learning can process only small dimensions of data
that contain a small set of variables. If you want to analyze data containing hundreds of variables, then Machine Learning
cannot be used.
AI systems thrive when
the machine learning algorithms used to train them are given massive amounts of
data to ingest, classify and analyze. The more precisely that data can be
classified according to specific characteristics, or features, the better the
AI will perform.
Here are some
limitations of Machine Learning:
Feature engineering is
manual: Consider a use case where you have 100 predictor variables and you need
to narrow down only the significant ones. To do this you have to manually study
the relationship between each of the variables and figure out which ones are
important in predicting the output. This task is extremely tedious and
time-consuming for a developer.
Not ideal for
performing object detection and image processing: Since object detection
requires high-dimensional data, Machine Learning cannot be used to process
image data sets, it is only ideal for data sets with a restricted number of
features.
The biggest limitation
of artificial intelligence is it’s only as smart as the data sets served AI’s
main limitation is that it learns from given data. There is no other way that knowledge can be
integrated, unlike human learning.
This means that any
inaccuracies in the data will be reflected in the results. a true AI system
objectively studies all available data and cannot lie. There is no Improvement with experience,
never mind the hype: Unlike humans,
artificial intelligence cannot be improved with experience. ...
There can never be any
original creativity , unless the creators are making an ass out of you ... AI
can never ever match human reasoning…
Now we know AI
contributes to the forgery of documents, pictures, audio recordings, videos,
and online identities which can and will occur with unprecedented ease. We are
unleashing an open-source toolkit of cybersecurity weapons that will complicate
our online interactions.
A world where the militarization of AI will mean
automated warfare that could increasingly be triggered by covert means of
cybersecurity threats.
AI-based forgery can be
used to create false information and commit identity theft. With the help of
AI-based forgery, influential people can be misrepresented, leading to a
drastic backlash against them. Hence, several internet users might find it
difficult to trust the internet as a reliable source of critical information.
Using AI-based forgery,
photorealistic videos of any person can be generated by collecting large
volumes of data such as video footage and audio samples. In a similar manner,
AI-based forgery is being used to generate fake porn videos of several
celebrities.
AI-based forgery can
also be used to generate synthetic images. For instance, a Twitter bot called
‘Smile Vector’ puts fake smiles on pictures of numerous celebrities. For this
purpose, the bot browses through the internet for pictures of celebrities and morphs
their expressions with the help of a neural network. Such tools can be used to
manipulate various details of different pictures and post them online with
malicious intent.
AI-based forgery can be
used to develop synthetic audio. For this purpose, AI systems can collect
various speech fragments in a database and reconstruct the audio to generate
words and sentences.
Alternatively, AI systems can also be trained using
waveforms of acquired audio samples. With this approach, AI systems can utilize
a model to predict sounds based on sounds that were generated before. Using
these techniques, AI systems can produce realistic audio recordings of people
saying controversial things.
Synthetic audio can be
used to fool voice-based security systems and generate spoof phone calls. In
case of phone calls, people would be unable to understand whether the voice on
the other end belongs to AI or a real human. Hence, AI-based audio forgery can
be used to make fake phone calls for illicit purposes.
Handwriting mimicking
can be used with malicious intentions. AI-powered handwriting mimicking can be
used to forge signatures on legal documents. Such AI-based forgery can lead to
legitimacy issues with documents and identity theft.
Phishing is a major
cybersecurity threat for several organizations as well as casual internet
users. Phishing involves sending fake emails to people for manipulating them
into sending confidential data or downloading infected software. However, one
of the significant challenges in phishing is generating convincing emails.
For
this purpose, AI systems can be trained with several legitimate emails. By
analyzing these emails, AI systems can generate convincing emails that can be
used for phishing. Also, AI can generate phishing emails automatically, making cyber
attacks more easily executable. Hence, AI-based forgery can give rise to
automated cyber attacks.
Bots can post
convincing tweets, pictures, and videos with the help of AI-based forgery.
These bots will be able to spread more manipulative propaganda, which can be
increasingly complicated for moderators to detect.
Currently, there are no
regulations to control the use of AI-powered forgery. Effective regulations can
prove to be a deterrent to use of AI for malicious activities. In addition to
regulations, law enforcement agencies and internet platforms can implement the
following methods to detect and curb AI-based forgery:
AI is poised to make
high-fidelity forgery inexpensive and automated, leading to potentially
disastrous consequences for democracy, security, and society.
A website, an e-mail
address, and even the origin of a phone call can be easily faked or “spoofed”.
Machine Learning based
algorithms - One uses historical data of the markets and feed
this to the machine learning algorithm that they have designed. The data is
divided into training data and testing data.
The machine learning algorithm
learns the patterns and features from the training data and trains itself to
take decisions like identifying, classifying or predicting new data or
outcomes. The algorithm continues to learn from the positive/negative outcomes,
to improve on accuracy & performance.
Training data, is
labeled data used to teach AI models (or) machine learning algorithms. Whereas,
the Test dataset is the sample of data used to provide an unbiased evaluation
of a final model fit on the training dataset.
Training data, is the
information used to train an algorithm. ... Testing data, on the other hand,
includes only input data, not the corresponding expected output
Any machine learning
model that we choose needs data to train its algorithm on. Without training
data, all the algorithm understands is how to approach the given problem, and
without proper calibration, so to speak, the results won’t be accurate enough.
Before training, the model is just a theorist, without the fine-tuning to its
settings necessary to start working as a usable tool.
While using datasets to
teach the model, training data needs to be of a large size and high quality.
All of AI’s learning happens only through this data. So it makes sense to have
as big a dataset as is required to include variety, subtlety, and nuance that
makes the model viable for practical use. Simple models designed to solve
straight-forward problems might not require a humongous dataset, but most deep
learning algorithms have their architecture coded to facilitate a deep
simulation of real-world features.
The other major factor
to consider while building or using training data is the quality of labeling or
annotation. If you’re trying to teach a bot to speak the human language or
write in it, it’s not just enough to have millions of lines of dialogue or
script. What really makes the difference is readability, accurate meaning,
effective use of language, recall, etc.
Similarly, if you are building a system
to identify emotion from facial images, the training data needs to have high
accuracy in labeling corners of eyes and eyebrows, edges of the mouth, the tip
of the nose and textures for facial muscles. High-quality training data also
makes it faster to train your model accurately. Required volumes can be
significantly reduced, saving time, effort (more on this shortly) and money.
Datasets are also used
to test the results of training. Model predictions are compared to testing data
values to determine the accuracy achieved until then. Datasets are quite
central to building AI – your model is only as good as the quality of your
training data.
Training data can be
defined as the initial set of data used to help AI & ML models understand
how to apply technologies such as neural networks to learn and produce accurate
results.
A training set that
accounts for all variations of the variables in the real world would result in
developing more accurate models. Just like in the case of a company collecting
survey data to know about their consumer, larger the sample size for the survey
is, more accurate the conclusion will be.
If the training set
isn’t large enough, the resultant system won’t be able to capture all
variations of the input variables resulting in inaccurate conclusions.
Training a system on a
poor dataset or a dataset that contains wrong data, the system will end up
learning wrong lessons, and generate wrong results. And eventually, not work
the way it is expected to. On the contrary, a basic algorithm using a
high-quality dataset will be able to produce accurate results and function as
expected.
The process of building
a training dataset can be classified into 3 simple steps: data collection, data
preprocessing, and data conversion.
The amount of training
data one needs depends on several factors — the task you are trying to perform,
the performance you want to achieve, the input features you have, the noise in
the training data, the noise in your extracted features, the complexity of your
model and so on.
Essentially, training
data is the textbook that will teach your AI to do its assigned task, and will
be used over and over again to fine-tune its predictions and improve its
success rate. Your AI will use training data in several different ways, all
with the aim of improving the accuracy of its predictions. It does this through
the variables contained in the data.
By identifying these and evaluating their
impact on the algorithm, data scientists can strengthen the AI through copious
adjustments. The best data will be extremely rich in detail, capable of
improving your AI after hundreds of training cycles by hinting at a wide range
of variables that affect your algorithm.
The majority of
training data will contain pairs of input information and corresponding labeled
answers, which are sometimes called the target. In some fields, it will also
have highly relevant tags, which will help your AI to make more accurate
predictions. However, since variables and relevant details are so important in
the training process, datasets for different machine learning tasks will often
look very different from each other
Training data is the
part of your data which you use to help your machine learning model make
predictions. Your model will be run on this set of data exhaustively, churning
out results which your data scientists can use to develop your algorithm. It’s
the largest part of your overall dataset, comprising around 70-80% of your
total data used in the project.
Validation data is a
second set of data, also containing input and target information, which the
machine learning model has never seen before. By running the model on
validation data, it’s possible to see whether it can correctly identify
relevant new examples. This is where it’s possible to discover new values that
are impacting the process.
Another common problem often identified during
validation is overfitting, where the AI has been wrongly trained to identify
examples that are too specific to the training data. As you can imagine, after
validation, data scientists will often go back to the training data and run
through it again, tweaking values and hyperparameters to make the model more
accurate.
Testing data comes into
play after a lot of improvement and validation. While validation data has tags
and target information left on as training wheels, testing data provides no
help to the model at all. Asking the model to make predictions based on this
data is meant to test whether it will work in the real world, where it won’t
have helpful tags scattered around. The final test is the moment of truth for
the model, to see if all the hard work has paid off.
Quite simply, without
training data there is no AI. The cleanliness, relevance and quality of your
data has a direct impact on whether your AI will achieve its goals. It’s best
to think of training data in parallel with a human example of learning. Give a
student an outdated textbook with half the pages missing and they won’t come
close to passing their course.
Similarly, without quality data, your AI will
learn to do its job haphazardly, if at all. In the same way that you want to
throw the weight of world-renowned professors behind your star pupil, your AI
deserves the best data you can find, bursting with detailed tags and relevant
annotations. Only then will your AI project catapult your business into the
next stage of development.
A weapon system
operating partially or wholly without human intervention is considered
autonomous… AI allows machines such as drones to make decisions and operate
themselves on the behalf of their human controllers.. This is one way the
kosher deep state can get rid of their enemies.
Blockchain in its ten years of existence has
done only one thing— allowed Jews to grab land in Israel and Georgia
Already, the decision
to use an offensive weapon frequently is made by a machine, with humans left to
decide only whether or not to pull the trigger.
In the case of
defensive weapons, machines often make autonomous decisions (to use the
defensive systems) without any human involvement at all.
THIS IS WHY WE SHOT
DOWN OUR OWN ARMY HELICOPTER ON BALAKOT RAID NIGHT
Today modern weaponry
relying on machine and deep learning can achieve a worrisome autonomy, although
the military officially claims that no contemporary armaments are fully
autonomous. However, it does admit that a growing proportion of arsenals meet
the technological criteria for becoming fully autonomous.
In other words, it’s
not a question of if weapons will be able to act without human supervision, it’s
a matter of when, and whether we allow them to choose targets to attack and
carry those attacks out.
Machine learning models
are trained using large datasets pertaining to the subject being learned about.
As an example, if an automotive company wanted to teach their automated car how
to identify a stop sign, then that
company may feed thousands of pictures of stop signs through a machine learning
algorithm.
A malicious attack such as adversarial machine learning could be
employed against that machine learning algorithm, exploiting the algorithms
input data (in this case images of stop signs) to misinterpret that data,
causing the overall system to then misidentify stop signs when deployed in
either practice or production.
Machine learning tools learn by finding relationships within training data and
applying that knowledge to real-life situations. In a perfect world, this
approach lets the system accurately interpret new information, but bad actors
can manipulate the process to sway its decisions in their favor.
Among the most
common techniques for corrupting AI are so-called poisoning attacks, in which
adversaries feed the tool rigged training data to alter its decisions. Bad
actors can also use inference attacks to figure out what data was used to train
existing tools—and thus how they can be manipulated.
By targeting the
machine learning process, cybercriminals will be able to train devices or
systems to not apply patches or updates to a particular device, to ignore
specific types of applications or behaviors, or to not log specific traffic to
evade detection. This will have an important evolutionary impact on the future
of machine learning and AI technology.
Machine learning
algorithms excel at finding complex patterns within big data, so researchers
often use them to make predictions.
But machine learning
methods are narrower and more specialized than humans. Machine learning is a
statistical modeling technique, like data mining and business analytics, which
finds and correlates patterns between inputs and outputs without necessarily
capturing their cause-and-effect relationships.
The ‘soul’ of any AI or
machine learning system remains the human mind that designed or manages it. AI
needs explicit and appropriate goals: algorithms do as they’re told. And if
they can identify patterns too subtle for human detection, generate accurate
insights and allow better, more informed decisions, they don’t explain why they
offer particular recommendations.
Nor does prediction
equal advice - this assumes a certain “socio-ethical value” dimension. So for
the foreseeable future, AI may be smart, but still need humans to set the right
goals and engage in creative interpretation. Human intelligence alone, and by
association, artificial intelligence, do not equal wisdom.
The main difference
between AI and ML is that AI includes all systems, methods, and robots
performing intelligent actions. ML only focuses on the AI methods and
applications that learn and change their decision patterns based on data. Machine Learning is the
science of getting machines to interpret, process and analyze data in order to
solve real-world problems.
One of the soft skills
that humans have that AI does not possess is critical thinking. While
technology has advanced to an extent that it can perform tasks with great speed
and precision, it is still by far incapable of employing critical thinking. AI
is often taught to perform tasks in routine, but it cannot make decisions when
faced by eventualities that go beyond what it has learned. For example, a human
can improvise or follow gut instinct, but a machine cannot.
Improving the
transparency and explainability of AI systems is one crucial goal AI developers
and researchers are zeroing in on. Especially in applications that could mean
the difference between life and death, AI shouldn’t advance without people
being able to trace how it’s making decisions and reaching conclusions.
TWO PASSENGER LINERS
CRASHED — BOEING HAS PUT THE BLAME ON AI AUTOMATION.. TWO THIRD WORLD NATIONS WERE USED AS GUINEA
PIGS..
WHY HAVE WE ALLOWED THIS?
Artificial general
intelligence (AGI) is the intelligence of a machine that can understand or
learn any intellectual task that a human being can. AGI is not possible because
it is not possible to model the human brain
No matter how smart a
machine becomes, it can never replicate a human. Machines are rational but,
very inhuman as they don’t possess emotions and moral values. They don’t know
what is ethical and what’s legal and because of this, don’t have their own judgment
making skills. They do what they are told to do and therefore the judgment of
right or wrong is nil for them. If they encounter a situation that is
unfamiliar to them then they perform incorrectly or else break down in such
situations.
Humans are sensitive
and intellectuals and they are very creative too. They can generate ideas, can
think out of the box. They see, hear, think and feel which machine can’t. Their
thoughts are guided by the feelings which completely lacks in machines. No
matter how much a machine outgrows, it can’t inherent intuitive abilities of
the human brain and can’t replicate it.
Mathematician Alan
Turing proposed what is now called “the Turing test” to define artificial
intelligence. Loosely speaking, place a computer in one secluded room and a
human in another secluded room. If an observer queried these two entities and
could not identify which entity was the computer, then the computer had
achieved intelligence on a par with a human.
With the Turing test,
you've ended up having loads of teams coming up with slimy canned rules to
trick you
Turing opted to replace
the question of “Can machines think?” or in this case “Is AI possible?” with a
test. A test no machine since has ever passed. The machine’s goal in this test
is to fool a human to think that the machine is human.
The purpose of the
Turing test is not specifically to determine whether a computer is able to fool
an interrogator into believing that it is a human, but rather whether a
computer could imitate a human.
We all know artificial
intelligence systems such as Alexa can tell jokes but can they understand them
.
Linguists and computer
scientists agree that humor is one aspect that makes humans special.
“Artificial
intelligence will never get jokes like humans do. In themselves, they have no need for humor.
They miss completely context.
Subjectivity and
creativity an genius emanates from the subconscious brain lobe
Creative language — and
humor in particular — is one of the hardest areas for computational
intelligence to grasp,
A computer doesn’t have
these real-world experiences to draw on. It only knows what you tell it and
what it draws from
AI “is not about
replacing humans, but interacting with them
COMPUTER CAN ONLY TELL
JOKES IN ITS DATABASE.. IT CAN NEVER
CREATE AN ORIGINAL JOKE ON THE SPOT, IN CONTEXT OF WHAT HAS HAPPENED .
Sometimes even we humans
don't know why a joke is funny,"
ARTIFICIAL INTELLEGNCE
IS JUST THE LEFT BRAIN LOVE—ALBEIT FASTER AND TIREESS.
HUMOR COMES FROM THE
RIGHT BRAIN LOBE ( SUBCONSCIOUS ) FOR A RIGHT HANDER..
FOR 30 YEARS AS SHIP
CAPTAIN I DID “HUMOR MANAGEMENT”..
NOBODY ON THIS PLANET HAD DARED TO DO THAT,
AS IT REQUIRED EXTREME INTELLIGENCE ( SORRY MENSA FOLKS ) AND THE ABILITY TO BE IN THE MOMENT
John McCarthy is one of
the "founding fathers" of artificial intelligence, together with Alan
Turing, Marvin Minsky, Allen Newell, and Herbert A. Simon. McCarthy coined the
term "artificial intelligence" in 1955, and organized the famous
Dartmouth conference in Summer 1956
AI can help chemists
crack the molecular structure of crystals much faster than traditional
modelling methods, a machine learning programme called ShiftML to predict how
the atoms in molecules shift when exposed to a magnetic field.
Nuclear magnetic
resonance (NMR) is commonly used to work out the structure of compounds. Groups
of atoms oscillate at a specific frequencies, providing a tell-tale sign of the
number and location of electrons each contains. But the technique is not good
enough to reveal the full chemical structure of molecules, especially complex
ones that can contain thousands of different atoms.
Another technique known
as Density functional theory (DFT) is needed. It uses complex quantum chemistry
calculations to map the density of electrons in a given area, and requires
heavy computation. ShiftML, however, can do the job at a much quicker rate
Scientists have
developed a machine-learning approach that can be combined with experiments to
determine, in record time, the location of atoms in powdered solids. Their
method can be applied to complex molecules containing thousands of atoms and
could be of particular interest to the pharmaceutical industry.
Many drugs today are
produced as powdered solids. But to fully understand how the active ingredients
will behave once inside the body, scientists need to know their exact
atomic-level structure. For instance, the way molecules are arranged inside a
crystal has a direct impact on a compound’s properties, such as its solubility.
Researchers are
therefore working hard to develop technologies that can easily identify the
exact crystal structures of microcrystalline powders.
Scientists has now
written a machine-learning program that can predict, in record time, how atoms
will respond to an applied magnetic field. This can be combined with nuclear
magnetic resonance (NMR) spectroscopy to determine the exact location of atoms
in complex organic compounds. This can be of huge benefit to pharmaceutical
companies, which must carefully monitor their molecules’ structures to meet
requirements for patient safety.
NMR spectroscopy is a
well-known and highly efficient method for probing the magnetic fields between
atoms and determining how neighboring atoms interact with each other. However,
full crystal structure determination by NMR spectroscopy requires extremely complicated,
time-consuming calculations involving quantum chemistry – nearly impossible for
molecules with very intricate structures.
To predict the NMR
signature of a crystal with nearly 1,600 atoms, the technique – ShiftML – requires about six
minutes; the same feat would have taken 16 years with conventional techniques
Optimization is a core
part of machine learning. Optimization is how learning algorithms minimize
their loss function. The loss function represents the difference between
predicted and actual values, so machine learning use optimization to minimize
this function leading to better ability to make predictions on new data.
You can think of
optimization as trying to find the lowest point on a “surface” defined by the
loss function. Often these surfaces have hills and valleys with more than one
low point, thus finding the lowest point is challenging.
An optimization
algorithm is a procedure which is executed iteratively by comparing various
solutions till an optimum or a satisfactory solution is found. ... There are
two distinct types of optimization algorithms widely used today. (a)
Deterministic Algorithms. They use specific rules for moving one solution to
other.
Artificial intelligence
(AI) is today support for different powerful data science and optimization
techniques. ... On the other hand, complex optimization problems that cannot be
tackled via traditional mathematical programming techniques are commonly solved
with AI-based optimization approaches such as the metaheuristics.
The difference is very
slim between machine learning (ML) and optimization theory. In ML the idea is
to learn a function that minimizes an error or one that maximizes reward over
punishment. ... The goal for ML is similarly to optimize the performance of a
model given an objective and the training data.
Optimization problems
goal is to find the maximum or minimum value of the objective function subject
to the constraints. The goal in optimization is to find the best decision
variable values that satisfy all constraints. Hence, the blanks are filled with
objective function and constraints.
The purpose of
optimization is to achieve the “best” design relative to a set of prioritized
criteria or constraints. These include maximizing factors such as productivity,
strength, reliability, longevity, efficiency, and utilization. ... This
decision-making process is known as optimization.
AI techniques is an
organized way and method to use the knowledge derived such that it can be
easily modified to correct errors, or useful in several circumstances. AI
techniques are models made from advanced forms of a statistical and
mathematical model
A branch of mathematics
which encompasses many diverse areas of minimization and optimization.
Optimization theory is the more modern term for operations research. ...
In mathematics and
computer science, an optimization problem is the problem of finding the best
solution from all feasible solutions. Optimization problems can be divided into
two categories depending on whether the variables are continuous or discrete
In computing,
optimization is the process of modifying a system to make some features of it
work more efficiently or use fewer resources.
Machine intelligence
depends on algorithms, processing power and memory. Processing power and memory
have been growing at an exponential rate. As for algorithms, until now we have
been good at supplying machines with necessary algorithms to use their
processing power and memory effectively.
AGI will simply be different not superior to
human intelligence.
This is true and human intelligence is also different than
animal intelligence. Some animals are capable of amazing mental feats like
squirrels remembering where they hid hundreds of nuts for months.
A new program-writing
AI, SketchAdapt, trained on tens of thousands of program examples, learns how
to compose short, high-level programs, while letting the second set of
algorithms find the right sub-programs to fill in the details. Unlike similar
approaches for automated program-writing, SketchAdapt knows when to switch from
statistical pattern-matching to a less efficient, but more versatile, symbolic
reasoning mode to fill in the gaps.
SketchAdapt is capable
of writing concise programs. The researchers don’t exaggerate the role of AI,
making it clear that the program is intended to complement programmers and not
replace them. Trained on tens of thousands of program examples, SketchAdapt
learns how to compose short, high-level programs, while letting a second set of
algorithms find the right sub-programs to fill in the details.
Unlike similar
approaches for automated program-writing, SketchAdapt knows when to switch from
statistical pattern-matching to a less efficient, but more versatile, symbolic
reasoning mode to fill in the gaps. SketchAdapt outperformed their
reimplemented versions of RobustFill and .Coder at their respective specialized
tasks.
SketchAdapt
outperformed the RobustFill-like program at string transformations; for
example, writing a program to abbreviate Social Security numbers as three digits,
and first names by their first letter.
SketchAdapt also did better than the
DeepCoder-like program at writing programs to transform a list of numbers.
Trained only on examples of three-line list-processing programs, SketchAdapt
was better able to transfer its knowledge to a new scenario and write correct
four-line programs.
In yet another task,
SketchAdapt outperformed both programs at converting math problems from English
to code, and calculating the answer.
Key to its success is
the ability to switch from neural pattern-matching to a rules-based symbolic
search SketchAdapt learns how much pattern recognition is needed to write
familiar parts of the program, and how much symbolic reasoning is needed to
fill in details which may involve new or complicated concepts.”
SketchAdapt is limited
to writing very short programs. Anything more requires too much computation.
Nonetheless, it’s intended more to complement programmers rather than replace
them
SketchAdapt has been
used to create programs that can manipulate strings, process lists, and convert
math problems into code. SketchAdapt won’t replace programmers but should be
able to assist them with writing mundane code. Indeed, rather than replacing programmers,
this technology should free them up to work on more complicated projects where
man-power is currently lacking.
AI cannot create safe
and moral self-driving cars. Automotive companies are all in the chase of
self-driven vehicles. A BI Intelligence report states that there will be 10
million self-driving cars on the road by 2020. But, they all come with human
overseers. Without this supervision, safety on the streets would not be
possible
AI helps us in reducing
the errors and the chance of reaching accuracy with a greater degree of
precision. It is applied in various studies such as exploration of space.
Intelligent robots are
fed with data and are sent to explore space. Since they are more resistant and
have a greater ability to endure the space and hostile atmosphere due to their
metal bodies. They are built and acclimatized in such a way that they cannot be
altered or get damaged or malfunction in a hostile environment.
.
Repetitive tasks are
monotonous in nature can be carried out with the help of machine intelligence.
Machines think faster than humans . Machine intelligence can be employed to
carry out dangerous tasks. Their parameters, unlike humans, can be adjusted.
Their speed and time are calculation based parameters only.
Artificial intelligence
and the science of robotics can be put to use in mining and other fuel
exploration processes. Not only that, these complex machines can be used for
exploring the ocean floor and hence overcome the human limitations.
Due to the programming
of the robots, they can perform more laborious and hard work with greater
responsibility. Moreover, they do not wear out easily. Hard cased robots can be used to defuse bombs
The complete absence of
the emotional side, makes the robots think logically and take the right objective
program decisions.
Unlike humans, machines
do not require frequent breaks and refreshments. They are programmed for long
hours and can continuously perform without getting bored or distracted or
tired.
The US Air Operations
Division (AOD) uses AI for the rule-based expert systems. The AOD has use for
artificial intelligence for surrogate operators for combat and training
simulators, mission management aids, support systems for tactical decision
making, and post-processing of the simulator data into symbolic summaries..
Most of the AI artworks
that have emerged over the past few years have used a class of algorithms
called generative adversarial networks (GANs).
Christie’s recently
sold its first piece of auctioned AI art—a blurred face titled “Portrait of
Edmond Belamy”—for $432,500. Garbage sold
for a high price.
JEWS ARE GOOD IN CONVERTING SHIT TO GOLD..
Professors at Rutgers
University have built a machine that autonomously produces “art” using an
algorithm called AICAN. The machine incorporates existing styles to generate
images on its own. ., AICAN’s work is not art because it has no feelings that
it has lived through to communicate. ..
If artificial
intelligence is used to create images, can the final product really be thought
of as art- which is meant to be poetry on canvas?
The algorithm might
create appealing images, but it lives in an isolated creative space that lacks
social context. Human artists, on the other hand, are inspired by people,
places, and politics. They create art to tell stories and make sense of the
world
Ai has no feelings at all. It has no mind. It
produces a counterfeit of art.
Art demands that a person evoke in his or her
mind a previous experience, and then transmit that feeling so that others
experience the same feeling. In fact, AICAN cannot feel at all.
Magic tricks and
circuses also give people pleasure, and those are not art, .
AI cannot produce art.
Instead, silicon chips with human-inscribed algorithms pass through a sequence
of events. There is a connection, a succession, a certain order; there is
activity, there is change. But there is no agency, there is no cause, there is
no mind, there is no feeling, there is no art. .
Can AI ever write
poetry ?
Balls !
AI has no sense of
belonging or togetherness or a human touch.
Humans and animals
alike have a feature called a neural network. The nerves responsible for all
the feelings, thoughts etc cannot be made for an AI. Human neural network has a certain trait called imagination. That
is something an AI won’t be able to do.
The irony is that AI solutionism is
possible due to human imagination and overestimation. The best AI can do is
make business processes streamlined, help in business strategies and military
fields but AI cannot solve problems that cannot be solved by humans.
AI is eventually a set
section of computer codes. It will perform tasks it has been created for. Those
tasks, it might perform better than any human can but doing something that
humans can’t is another story altogether.
AI could help lighten
the workload of classroom teachers, in areas like analysing students’ past
performance and optimising lessons accordingly; marking their tests and
quizzes, and correcting their homework and assignments. Robot teachers could
also deliver preprogrammed lessons and provide answers to frequently asked
questions.
However, AI is unlikely
to replace teachers in certain subjects
AI cannot provide the
emotional support of a human teacher. Students learn when they interact with
teachers and their peers. A good teacher can be a great influence, motivating
and inspiring students. I doubt whether AI would be able to do the same.
Also, AI can present
knowledge that human beings feed into them, so they still depend on humans to
add new data, as knowledge changes from year to year, and decade to decade.
Robots have to depend on human programmers
AI can complement human
teachers, but they won’t be able to replace them completely. Rather, robots
would need to work together with human teachers, in order to maximise the
effectiveness of the learning process.
While it cannot see how
humans do, AI can be used as machine vision to ‘see’ the world, analyse visual
data, and make informative decisions about what has been seen. There are plenty
of incredible ways machine vision is used today and it includes self-driving
cars, facial recognition, payments and more. In manufacturing, machine vision
is widely used to help in predictive maintenance and product quality control.
AI can also detect gun
shots by analysing the sound and alerting relevant agencies. This is by far one
of the most incredible things that AI can do when it merely hears and is able
to understand sounds.
AI researchers are in
the process of manufacturing AI tools that will be able to detect types of
illnesses by merely smelling a person’s breath. It can detect chemicals called aldehydes that
are associated with human illnesses and stress, including cancer, diabetes,
brain injuries, and detecting the "woody, musky odor" emitted from
Parkinson's disease even before any other symptoms are identified.
Also, AI bots are able to identify gas leaks
or other caustic chemicals. IBM is even using AI to produce new perfumes.
Using AI, there is now a robot that can identify the ripeness of fruit and even place them in a basket.
There are AI tools out
there that can track a person’s emotions as they watch videos. Artificial
Emotional Intelligence works by gathering data from an individual’s facial
expressions, body language, and more. It then analyses it against an emotions
database to predict what emotion is being expressed. It then determines an
action based on this information.
Researchers have found
a black-box algorithm which helped in predicting patient’s. This was done by
using ECG results to sort historical patient data into groups based on who
would die within the span of a year.
The inherent power of
AI lies in its ability to deliver the “science” of work, the computational
ability to rapidly analyse millions of calculations a second and present these
in an easy to consume fashion to humans. This ability to process vast data sets
augments human workers with superpowers they have never possessed. Through
collaboration with intelligent machines human ability is amplified through
augmented intelligence which opens up vast new pathways of value creation.
Apart from
communication, machine to man communication is tricky. We can industrial
“pick-and-place” robots in industrial contexts; can we have “give-and-take”
robots in customer service settings? Imagine a food serving robot in a fine
dining restaurant … how do we train the robot to read the moods and suggest the
right cuisine?
Most of the robots exhibit puppy-like behaviour, a far cry from
naturally intelligent human beings. Humans need friendliness, understanding,
and empathy in their social interactions, which are very complex to programme.
When presented with a
danger, different humans respond differently based on their psychologies and
personalities, most often, shaped from a series of prior experiences and
perceived self-efficacies. Robots still find it difficult to sense,
characterise, and respond to such interactions. Today’s social robots are
designed for short interactions with humans, not learning social and moral
norms leading to sustained long term relationships.
Reasoning is ability to
interpret something in a logical way in order to form a conclusion or judgment.
For instance, it is easy for a robot to pick up a screwdriver from a bin, but
quite something else to be able to pick it up in the right orientation and be
able to use it appropriately. It needs to be programmed to realise when the
tool is held in the wrong orientation and be able to self-correct it to the
right orientation for optimal use.
Even when we can train
the robot with a variety of sensors to develop logical reasoning through
detailed pattern-evaluations and algorithms, it would be difficult to train it
to make judgments. For instance, to make up what is good or evil.
AI is in fact a piece
of software that we people design. AI is not some kind of magic over which we
have no control. We people are the ones
that make AI happen. Putting it simply, AI is a term that refers to
computational techniques and artefacts that are able to perceive and react to
their context, and are able to make inferences about how that context evolves.
In the last few years, the algorithms, or ‘recipes’, that are behind these
calculations have become increasingly more effective and efficient at analysing
data about us and about our environment, and with it their impact on society is
also becoming much larger.
AI and autonomous systems have made human lives
easier, but there is no denying that if algorithms go wrong, the result can be
disastrous.
BELOW: THAMBI SUNDAR PICHAI DOES NOT HAVE BALLS
Project Maven is a
controversial artificial intelligence program that uses machine learning to
sort through millions of hours of drone footage to help systems distinguish
people from their surroundings. The project would help reduce the burden on
human analysts and improve the intelligence that's captured in cameras.
Optimization models use
machine learning, to simulate the electric system and the severity of various
problems. In a region with 1,000 electric power assets, such as generators and
transformers, an outage of just three assets can produce nearly a billion
scenarios of potential failure.
.
Graph convolutional
neural network can recommend optimal controls that would prevent transmission
lines from overloading if there were a problem with any of the lines. Machine
learning can quickly find a solution, with
far fewer errors than more conventional ones.
Machines are much
better and more cost-efficient than humans when it comes to handling huge
amounts of data and performing routine tasks. This is exactly what the cyber
security industry needs at the moment, especially with the large number of new
threats appearing every day. Human classification, especially in bulk, will be
error-prone due to boredom and distractions. .
AI uses machine
learning to detect similarities and differences within a data set and report
any anomalies.
Machine learning can
help in anti-malware, performing dynamic risk analysis and detecting anomaly.
AI techniques can be made to learn to remove the noise or unwanted data, and
facilitate security experts to understand cyber environment for detection of
any anomalous activity. AI can also benefit cyber security with automated
techniques to generate cyber courses of action (COAs) whenever cyber threats
are detected.
If it weren’t for
artificial intelligence and machine learning, the cybersecurity landscape would
be very different than it is right now.
As cyber threats
evolve, and the attacks become more complex and widespread, conventional
defense tools are often not enough to detect and stop them on time. Therefore,
security solutions that are powered by machine learning are the next big thing
in cybersecurity.
Due to their ability to
learn and adapt over time, such tools can promptly eliminate well-known
threats, as well as respond to new emerging risks before they do any harm, by
recalling and processing data from prior attacks.
AI has the ability to
perform specific tasks on its own, this way saving time and reducing the risk
of human error. Unlike people, AI systems don’t make mistakes as they handle
threats according to a standardized playbook, this way responding to each
threat in the most effective way.
With the AI systems on
their side, security experts can spend less time performing routine tasks and
focus on building a stronger defense that would allow stopping sophisticated
cyber-attacks before they even occur. Therefore, implementing machine learning
and AI systems is crucial to stay one step ahead of cybercriminals. And yet, no
technology is a silver bullet, and AI is just a tool, which can only do what
criminals or security experts command it to do.
AI and ML enable
predictive analytics to draw statistical inferences to mitigate threats with
fewer resources. Applications for automated network security include
self-encrypting and self-healing drives to protect data and applications.
Application of AI based
technologies into the existing systems will bring in much enhanced systems that
help in better decision making. Some of the key areas where in the
functionalities of AI makes a difference are:
Data Mining
Pattern Recognition
Fraud Detection
Analytics
Fuzzy Logic
Development of expert
Systems
Machine learning based
antivirus systems and tools can help in quickly and accurately identifying
malware like Polymorphic virus based on its continuous learning capabilities.
Such systems can detect suspicious files based on the behavioural or structural
analysis and it helps in detecting threats at an early stage. It can easily
determine the likelihood of a malicious virus attack by analysing and breaking
down the DNA of each file.
More than 95 % of all
malicious executables we encounter are polymorphic
Polymorphic refers to a
malware’s ability to continually change and adapt its features to avoid
detection. Polymorphic malware pairs a mutation engine with self-propagating
code to continually change its “appearance,” and it uses encryption (or other
methods) to hide its code.
A polymorphic virus is
a complicated computer virus that affects data types and functions. It is a
self-encrypted virus designed to avoid detection by a scanner. Upon infection,
the polymorphic virus duplicates itself by creating usable, albeit slightly
modified, copies of itself
A polymorphic virus is
a harmful, destructive or intrusive type malware that can change, making it
difficult to detect with anti-malware programs. A metamorphic virus is a virus
that is rewritten with every iteration so that every succeeding version of the
code is different from the proceeding one.
Metamorphic malware can
evade more conventional detection methods than polymorphic malware because of
its greater complexity and transformative capabilities
To a large extent,
cybersecurity relies on file signatures to detect malware, and rules-based
systems for detecting network abnormalities. Protection often stems from an
actual virus outbreak – as security experts isolate the malicious files and
identify unique signatures that help other systems become alert and immune.
The
same is true for the rules-based system: Rules are set based on experience of
potential malicious activity, or systems are locked down to restrict any access
to stay on the safe side. The only problem with these approaches is their
reactive nature. Hackers always find innovative ways to bypass the known rules.
Before a security expert discovers the breach, it’s often too late.
Hackers have started
using AI to accelerate polymorphic malware, causing code to constantly change
and make it undetectable. Advanced tactics allow hackers to work around
security to bypass facial security and spam filters, promote fake voice
commands, and bypass anomaly detection engines.
The good news is this
intelligence be used to protect the infrastructure as well. What makes AI
cybersecurity unique is its adaptability. Intelligent cybersecurity doesn’t
need to follow specific rules. Rather, it can watch patterns and learn. Even
better, AI can be directly integrated into everyday protection tools – such as
spam filters, network intrusion and fraud detection, multi-factor
authentication, and incident response.
Polymorphic malware
exists in many forms — Digital Guardian identifies some of these types of
malware as viruses, bots, trojans, worms, and keyloggers. Regardless of the
type, what makes this malware so effective is its complexity and speed.
Polymorphic malware uses polymorphic code to changes rapidly — as frequently as
every 15-20 seconds!
Because many anti-malware vendors use traditional
signature-based detection methods to detect and block malicious code, it means
that by the time they identify the new signature, the malware has already
evolved into something new. As a result, most security solutions simply can’t
keep up with or aren’t able to detect these threats.
Polymorphic malware
takes advantage of employee ignorance and unrecognized zero day vulnerabilities
to wreak havoc. If an employee clicks on an attachment in a phishing email or
provides information via a phishing website, they open your entire network,
company, and sensitive data to attack.
And when the threat is continually
evolving, it’s harder to identify let alone eliminate.
One of the things that
differentiates metamorphic from polymorphic malware is that it completely
re-writes its code so that each newly propagated version of itself no longer
matches its previous
iteration. This differs from polymorphic malware, which
alters part of its code but retains one part of its code that remains the same
(making it a bit easier to identify than metamorphic malware). To put it
simply, polymorphic malware is a leopard that changes its spots; metamorphic
malware is a tiger that becomes a lion.
The fight against
mutating malware is a race between hackers and cybersecurity experts. Each
side is doing their best to stay ahead of the other — the first by trying to
come up with new and more inventive (and invasive) threats; the other by trying
to create new detection capabilities and response methods. It’s a good ol’
fashion arms race in the cyber world. The good news, however, is that these
threats are not unstoppable.
Criminals ( sponsored
by deep state ) now poison machine learning-based defence systems by throwing
garbage data at them to subvert the machine learning.
Cyber attackers are
turning to machine learning to create smarter attacks and defenders will
require similar technology to detect them, But AI-enabled attacks are not the
only big threat on the horizon, – the proliferation of internet-connected
devices that make up the internet of things (IoT) is cause for concern.
IoT is the network of
interconnected things/devices which are embedded with sensors, software,
network connectivity and necessary electronics that enables them to collect and
exchange data making them responsive.
An IoT ecosystem
consists of web-enabled smart devices that use embedded processors, sensors and
communication hardware to collect, send and act on data they acquire from their
environments. ... Sometimes, these devices communicate with other related
devices and act on the information they get from one another.
Three years ago a major
cyber attack took place. Cyber-criminals attacked IoT devices, while several
attacks affected many websites. Amazon, Twitter, Reddit, Spotify and PayPal,
were all affected by this attack.
This means two things.
Firstly, that the world is vulnerable to cyber-attacks at the moment, and
secondly that IoT has entered for good in our lives, and plays a much bigger
role than we may have imagined.
Of course, shipping
forms a part of this web as well. In fact, IoT sensors are integrated into
almost everything in the shipping era, which means they collect everything.
Just two years ago, in
June 2017, A.P. Moller - Maersk fell victim to a major cyber-attack caused by
the NotPetya malware, which also affected many organisations globally. As a
result, Maersk’s operations in transport and logistics businesses were
disrupted, leading to unwarranted impact.
The attack reportedly
created huge problems to the world’s biggest carrier of seaborne freight which
transports about 15 per cent of global trade by containers. In particular, Maersk’s container ships stood
still at sea and its 76 port terminals around the world ground to a halt.
The
recovery was fast, but within a brief period the organisation suffered
financial losses up to USD300m covering, among other things, loss of revenue,
IT restoration costs and extraordinary costs related to operations.
It may sound naive, but
changing the default password on electronic devices is crucial. If the password
remains the same, then the device that is connected to the internet may be
infected.
The fact is that
cyber-attackers know many of the default passwords that are attributed to IoT
devices and they use them to affect them. Leaving the default password
unchanged is common. As a recent ESET research has shown, at least 15% of home
routers are unsecured, which is translated to around 105 million routers.
In the Maersk case, all
began when an employee in Ukraine responded to an email which featuring the
NotPetya Malware. The system affected and therefore operations practically had
to be on hold until system’s restoration.
Artificial Intelligence
does not depend on learning or feedback, rather it has directly programmed
control systems. The AI systems come up with the solutions to the problems on
their own by calculations.
ML is the use of
statistics to give computers the ability to learn from data. This
differentiation is key because fast advances in ML have led to the sudden
interest in AI worldwide. The initial set of improvements have been in the
underlying algorithms and data architectures, but the current key improvements
are just two: data and computation.
Most ML methods are
suited to tackling two key problems: prediction type problems and
classification type problems.
Prediction-type
problems include 'Can I predict when this equipment will fail?’ (If so, I can
deploy maintenance before failure to ensure the plant doesn’t grind to a halt,
while saving on unnecessary maintenance).
Classification-type
problems include 'Is this customer different from another, based on the data I
have from them?’ (If so, I can further study the differences and maybe deploy a
new marketing program to retain them).
Machine learning is a
continuation of the concepts around predictive analytics, with one key
difference: The AI system is able to make assumptions, test and learn
autonomously. AI is a combination of technologies, and machine learning is one
of the most prominent techniques utilized for hyper-personalized marketing.
Data Science is an
interdisciplinary field about processes and systems to extract knowledge or
insights from data in various forms. This means that data science helps AIs
figure out solutions to problems by linking similar data for future use. ...
But, machine learning is the branch of AI that works best with data science.
Banks and other
businesses in the financial industry use machine learning technology for two
key purposes: to identify important insights in data, and prevent fraud. The
insights can identify investment opportunities, or help investors know when to
trade
Machine learning is a fast-growing
trend in the health care industry, thanks to the advent of wearable devices and
sensors that can use data to assess a patient's health in real time. The
technology can also help medical experts analyze data to identify trends or red
flags that may lead to improved diagnoses and treatment.
Like statistical
models, the goal of ML is to understand the structure of the data – fit
theoretical distributions to the data that are well understood. So, with
statistical models there is a theory behind the model that is mathematically
proven, but this requires that data meets certain strong assumptions too.
The challenge for banks
and financial institutions then is to quickly identify and separate fraudulent
transactions from those that are legitimate, without impacting on customer
experience.
Traditionally, banks
and financial institutions have approached fraud detection with manual procedures,
or rule-based solutions, which have been limited in their success. A rule-based
approach means that a complex set of criteria for flagging suspicious
transactions has to be established and reviewed manually.
While this can be
effective in discovering anomalies which conform to known patterns, it is not
capable of detecting fraud which follows new, or unknown patterns. This gives
criminals the incentive to develop ever more sophisticated techniques to
circumnavigate the rules, and they themselves are leveraging new technologies
to achieve this. The solution that is helping banks and financial institutions
get one step ahead, is machine learning.
The high volume of
transactional and customer data readily available in the financial services
sector makes it ideal for the application of complex machine learning
algorithms. Banks and financial institutions are able to automate the analysis
of their customers’ behavioral patterns for any signs of abnormality, giving
them the ability to identify and flag fraudulent activity in real-time.
The increased accuracy
of machine learning provides financial firms with a significant reduction in
the number of false positives, where transactions are incorrectly flagged as
fraudulent and declined, and false negatives, where genuine incidences of fraud
are missed. Overall, firms are able to
mitigate financial losses, as well as protect their reputations, maintain
public confidence, and improve customer experience.
To more aggressively
stop criminal transactions, banks are shifting from a passive methodology of
“observe, react, and report” to a proactive approach of blocking fraud before
it occurs. However, this strategy risks producing higher rates of false
positives, and the system might mistakenly freeze a customer’s legitimate
transaction. Every time a legal transaction is blocked, the bank induces a
negative impact on customer satisfaction—and that increases the probability of
customer churn.
The challenge is to
maintain a balance of meticulous and rapid detection without interrupting
legitimate customer transactions. Banks face enormous pressures to satisfy the
customer experience with fraud detection. The new goal is precise, real-time
detection.
fraudulent transactions
do not occur randomly. So, a bank could find one transaction to be fraudulent,
but miss three more that were in sequential order. Therefore, sample detection
could miss some fraudulent transactions. In addition, sampling does not fully
account for multiple occurrences of fraud within the current populations of
transactions—hindering probability models or estimates. Banks could also omit
several much smaller, less frequent fraudulent transactions adding up to be
extremely large fraud losses in aggregate.
The business of fraud
detection is not easy. From the evolving forms of fraud to the growing
complexity of illegal transactions, banks are caught in the land of “no easy
answers.” There is no right or wrong answer to how to throttle fraud detection.
Every bank has different risk tolerances and variables beyond that one customer
transaction. However, leveraging cloud capabilities increases the capacity to
handle higher volumes of transactions, and ever-changing fraud tactics
For digital payments
fraud prevention strategies to be successful, the processes must integrate with
transaction processing systems. This integration enables real-time interdiction
and drives actions automatically. Automated systems can provide a comprehensive
view of customer behavior by leveraging analytic calculations and algorithms to
detect and flag suspicious payments activity. A core benefit of these new
technologies is their delivery of low false positives. False positives impact
revenue negatively
To keep up with this
growing threat, payment providers must evolve from the traditional, siloed
method of fraud detection to a proactive, analytic approach. The traditional
models were trained on historical data, frozen, then weighted or adjusted in
batches. This led to almost no co-operative learning and decision-making, as
well as harmful business outcomes, such as customer abandonment, payment
denial, fraud, missed cross-sell, and bad customer experience.
Modern systems of
engagement are incorporating a new generation of application architecture that
eliminates the wall between transaction processing and analytics. Many
companies are now building transactional analytics systems for fraud to
complement their existing architecture
Hybrid
Transaction/Analytical Processing (HTAP) is best enabled by in-memory computing
technology to allow analytical processing on the same in-memory data store used
to perform transaction processing.
Hybrid
transaction/analytical processing (HTAP) is an emerging application
architecture that "breaks the wall" between transaction processing
and analytics. It enables more informed and "in business real time"
decision making
By removing the latency
with moving data from operational databases to data warehouses and data marts
for analytical processing, this architecture enables real-time analytics and
situation awareness on live transaction data. The ability to run analytics on
live data and provide immediate feedback to the system is key to fraud
deterrence.
The amount of data that
needs to be processed or learned from can be massive. The data could consist
of: billions of historical payment data points; analysis of activity correlated
to hundreds of millions of devices; behavior and device mismatch across many
locations; user actions, preferences, and interactions; geo-policies,
dependencies, and myriad sets of third-party information; social and
third-party consumer information; and e-commerce transactions.
It is important to note
the efficiency and efficacy of the systems that prevent payment fraud depend on
their power to harness data, analyze, learn it, and act upon it – with a high
accuracy rate and at near-instant speed.
Probability is about a
finite set of possible outcomes, given a probability. Likelihood is about an
infinite set of possible probabilities, given an outcome
An unconditional
probability is the independent chance that a single outcome results from a
sample of possible outcomes. The term refers to the likelihood that an event
will take place independent of whether any other events take place or any other
conditions are present.
Probability is a
measure of uncertainty. Probability applies to machine learning because in the
real world, we need to make decisions with incomplete information. Hence, we
need a mechanism to quantify uncertainty – which Probability provides us.
Using
probability, we can model elements of uncertainty such as risk in financial
transactions and many other business processes. In contrast, in traditional
programming, we work with deterministic problems i.e. the solution is not
affected by uncertainty.
Probability forms the
basis of sampling. In machine learning, uncertainty can arise in many ways –
for example - noise in data. Probability provides a set of tools to model
uncertainty. Noise could arise due to variability in the observations, as a
measurement error or from other sources. Noise effects both inputs and
outputs.
Apart from noise in the
sample data, we should also cater for the effects of bias. Even when the
observations are uniformly sampled i.e. no bias is assumed in the sampling –
other limitations can introduce bias.
Typically, we are given
a dataset i.e. we do not have control on the creation and sampling process of
the dataset. To cater for this lack of control over sampling, we split the data
into train and test sets or we use resampling techniques. Hence, probability
(through sampling) is involved when we have incomplete coverage of the problem
domain.
Probability deals with
predicting the likelihood of future events, while statistics involves the
analysis of the frequency of past events.
Simply put, BIG DATA is
a large volume of data collected from various sources, which contains a greater
variety and increasing volume of data from millions of users.
Computers can be used
to store millions of records and data, but the power to analyze this data is
provided by the Big Data. Big data helps the organizations in analyzing their
existing data and in drawing meaningful insights from the same.
Big Data is the raw
input that needs to be cleaned, structured and integrated before it becomes
useful, while artificial intelligence is the output, the intelligence that
results from the processed data. That makes the two inherently different.
There are several AI
technologies that are used with Big Data and below-listed are a few of them:--
Anomaly Detection
For any dataset, if an
anomaly is not detected then Big Data analytics can be used. Here fault
detection, sensor network, eco-system distribution system health can be
detected with big data technologies.
Bayes Theorem
Bayes theorem is used
to identify the probability of an event based on the pre-known conditions. Even
the future of any event can also be predicted on the basis of the previous
event. For Big Data analysis this theorem is of best use and can provide a
likelihood of any customer interest in the product by using the past or
historical data pattern.
Pattern Recognition
Pattern recognition is
a technique of machine learning and is used to identify the patterns in a
certain amount of data. With the help of training data, the patterns can be
identified and are known as supervised learning.
Graph Theory
Graph theory is based
on graph study that uses various vertices and edges. Through node
relationships, the data pattern and relationship can be identified. This
pattern can be useful and help the big data analysts in pattern identification.
This study can be important and useful for any business.
AI’s ability to work so
well with data analytics is the primary reason why AI and Big Data are now
seemingly inseparable. AI machine learning and deep learning are learning from
every data input and using those inputs to generate new rules for future
business analytics. Problems arise, however, when the data being used is not
good data.
Data and AI are merging
into a synergistic relationship, where AI is useless without data and data is
insurmountable without AI.
Data is the lifeblood
of AI. An AI system needs to learn from data in order to be able to fulfill its
function. Unfortunately, organizations struggle to integrate data from multiple
sources to create a single source of truth on their customers. AI will not
solve these data issues – it will only make them more pronounced
AI enables us to make
sense of massive data sets, as well as unstructured data that doesn’t fit
neatly into database rows and columns. AI is helping organizations create new
insights from data that was formerly locked away in emails, presentations,
videos, and images
Big Data hoovers up
massive amounts of data and the wheat has to be separated from the chafe first
before anything can be done with it. Data used in AI and ML is already
“cleaned,” with extraneous, duplicate and unnecessary data already removed.
After that, AI can
thrive. Big Data can provide the data needed to train the learning algorithms.
There are two types of data learning: the initial training, which is a sort of
priming the pump, and routinely gathered data. AI apps never stop learning once
the initial training is done. They continue to take in new data and adjust
their actions along the way as the data changes. So data is needed initially
and continuously.
The two styles of
computing both use pattern recognition, but differently. Big Data analytics
finds patterns through sequential analysis, sometimes of cold data, or data
that is not freshly gathered. Hadoop, the basic framework for Big Data
analysis, is a batch process originally designed to run at night during low
server utilization.
Machine learning learns
from collected data and keeps collecting. Your self-driving car never stops
gathering data, and it keeps learning and honing its processes. Data is always
coming in fresh and always acted upon.
AI doesn’t deduce
conclusions like humans do. It learns through trial and error, and that
requires massive amounts of data to teach the AI.
The more data and more
variety, the better the accuracy of the Machine learning models trained on this
data. Although more data is good, it is not useful if it does not contain
variety.
There are the three
‘Vs’ of big data, namely:--
Volume: In simple
language, defined as the amount of data available.
Variety: Variety in big
data refers to all the structured and unstructured data that has the
possibility of being generated either by humans or by machines. Variety is
essential because it allows ML models trained on the data to be able to handle
a wider range of predictions.
Because with AI and big
data:--
Analysts will be able
to perform more thorough analysis.
Portfolio managers will
make better informed decisions.
No asset is more prized
in today's digital economy than data. It has become widespread to the point of
cliche to refer to data as "the new oil."
Indeed data is
"the world's most valuable resource and those who rule data will rule the world
REMEMBER, IT IS A PIECE
OF CAKE TO POISON DATA.
ISRAELIS SCREW PALESTINIANS WITH DELIBERATE BIASED DATA..
THE ONLY ACHIEVEMENT OF BLOCKCHAIN IN TEN YEARS OF ITS LIFE IS TO REGULARISE GRABBED LAND ( BY JEWS ) IN ISRAEL / GEORGIA..
ISRAELIS SCREW PALESTINIANS WITH DELIBERATE BIASED DATA..
THE ONLY ACHIEVEMENT OF BLOCKCHAIN IN TEN YEARS OF ITS LIFE IS TO REGULARISE GRABBED LAND ( BY JEWS ) IN ISRAEL / GEORGIA..
THE INDIAN GOVT WAS
GOING FOR BLOCKCHAIN IN A BIG WAY TILL THIS BLOGSITE SHOT IT DOWN.
CHANDRA BABU NAIDU WAS
DROOLING ALL OVER THE AMARAVATI CAPITAL LAND AQUIRED IN BENAMI NAMES..
WHO SHOT DOWN NAIDUs
DIL KA TAMANNA AMARAVATHI ? — EVERYBODY KNOWS !
FIRST I HAS TO WRITE A
13 PART BLOG SERIES..
FIRST 50% SAYING BLOCKCHAIN/ BITCOIN ZINDABAAD, AND THE LAST 50% SAYING BLOCKCHAIN/ BITCOIN MURDABAAD.. BRUTUS WAS A HONOURABLE MAN , INDEED !
http://ajitvadakayil.blogspot.com/2017/10/blockchain-for-land-registry-voter.html
https://ajitvadakayil.blogspot.com/2017/10/blockchain-smart-contracts-part-2-capt.html
http://ajitvadakayil.blogspot.com/2017/10/blockchain-smart-contracts-part-3-capt.html
http://ajitvadakayil.blogspot.com/2017/10/blockchain-smart-contracts-part-4-capt.html
http://ajitvadakayil.blogspot.com/2017/10/blockchain-smart-contracts-part-5-capt.html
http://ajitvadakayil.blogspot.com/2017/10/blockchain-smart-contracts-part-6-capt.html
http://ajitvadakayil.blogspot.com/2017/10/blockchain-smart-contracts-part-7-capt.html
http://ajitvadakayil.blogspot.com/2017/10/blockchain-smart-contracts-part-8-capt.html
https://ajitvadakayil.blogspot.com/2017/11/blockchain-smart-contracts-hashgraphs.html
https://ajitvadakayil.blogspot.com/2017/11/blockchain-smart-contracts-hashgraphs_5.html
https://ajitvadakayil.blogspot.com/2017/11/blockchain-smart-contracts-hashgraphs_7.html
https://ajitvadakayil.blogspot.com/2017/11/blockchain-smart-contracts-hashgraphs_11.html
https://ajitvadakayil.blogspot.com/2017/11/blockchain-bitcoins-ponzi-part-13-capt.html
Data storage
requirements for Big Data are substantial. One approach is to capture and
process the localized data and then forward the storage to a more extensive
storage system that is maintained in the cloud.
Another approach is to
use a “virtualized” data system that creates a virtual layer of the data. This
virtual layer knows where the data is stored on the network. When calculations
are being made using the AI algorithm in a virtual system, only the data needed
for that specific calculation is accessed. The original data storage remains
intact and in place, without the need for copying data files
This approach utilizes
a network-wide data management protocol. It reduces the need for data storage
memory as well as improves the computational processing speeds.
In the modern era,
enterprise data comes in many forms and is stored in many locations. There is
both structured and unstructured data, including rows and columns of data in a
traditional database, and data in formats like logs, email, and social media
content. Big Data in its many forms is stored in databases, log files, CRM,
SaaS, and other apps.
So how do you get an
overview of your far-flung data and manage it in all of its disparate forms?
You use data virtualization, an umbrella term to describe any approach to
master data management that allows for retrieval and manipulation of data
without knowing where it is stored or how it is formatted.
Data virtualization
integrates data from disparate sources without copying or moving the data, thus
giving users a single virtual layer that spans multiple applications, formats,
and physical locations. This means faster, easier access to data.
It is the ultimate in
modern data integration because it breaks down silos and formats, performing
data replication and federation in a real-time format, allowing for greater
speed and agility and response time. It helps with data mining, it enables
effective data analytics, and is critical for predictive analytics tools.
Effective use of machine learning and artificial intelligence is unlikely
without data virtualization.
It should be noted that
data virtualization is not a data store replicator. Data virtualization does
not normally persist or replicate data from source systems. It only stores
metadata for the virtual views and integration logic. Caching can be used to
improve performance but, by and large, data virtualization is intended to be
very lightweight and agile.
Data virtualization is
any approach to data management that allows an application to retrieve and
manipulate data without requiring technical details about the data, such as how
it is formatted at source, or where it is physically located, and can provide a
single customer view (or single view of any other entity) of the overall data.
Unlike the traditional
extract, transform, load ("ETL") process, the data remains in place,
and real-time access is given to the source system for the data. This reduces
the risk of data errors, of the workload moving data around that may never be
used, and it does not attempt to impose a single data model on the data (an
example of heterogeneous data is a federated database system).
The technology
also supports the writing of transaction data updates back to the source
systems. To resolve differences in source and consumer formats and semantics,
various abstraction and transformation techniques are used. This concept and
software is a subset of data integration and is commonly used within business
intelligence, service-oriented architecture data services, cloud computing,
enterprise search, and master data management.
Some ways that AI is
applied to Big Data Analytics include:--
Detecting Anomalies: AI
can analyze Big Data to detect anomalies (unusual occurrences) in the data set.
This can be applied to networks of sensors and parameters that have a
predefined appropriate range. Any node of the network that is outside of the
range is identified as a potential problem that needs attention.
Probabilities of Future
Outcomes: AI can analyze Big Data using Bayes theorem. The likelihood of an
event occurring can be determined using known conditions that have a certain
probability of influencing the future outcome.
Recognizing Patterns:
AI can analyze Big Data to look for patterns that might otherwise remain
undetected by human supervision.
Data Bars and Graphs:
AI can analyze Big Data to look for patterns in bars and graphs that are made
from the underlying data set.
Another key driver of
this trend is that Big Data is increasing through the explosion of connected
devices being deployed with the expansion of the Internet of Things (IoT).
The entire universe of
AI can be split into these two groups. A computer system that achieves AI
through a rule-based technique is called rule-based system. A computer system
that achieves AI through a machine learning technique is called a learning system.
It's easy to confuse
the two as they can look very similar. Both involve machines completing tasks,
seemingly on their own. The difference is that AI can determine the action to
take itself; it can learn and adapt. Meanwhile, rule-based systems do exactly
as instructed by a human.
A rule-based system is
like a human being born with fixed knowledge. The knowledge of that human being
doesn’t change over time. This implies that, when this human being encounters a
problem for which no rules have been designed, then this human gets stuck and
so won’t be able to solve the problem. In a sense, the human being doesn’t even
understand the problem.
In computer science, a
rule-based system is a set of "if-then" statements that uses a set of
assertions, to which rules on how to act upon those assertions are created. ...
Rule-based systems are also used in AI (artificial intelligence)programming and
systems.
Rule-based logic is at
the heart of most automated processes. The term refers to the way in which
automation software — like ThinkAutomation — works.
Rule-based systems rely
on explicitly stated and static models of a domain. Learning systems create
their own models.
A rule-based system is
a system that applies human-made rules to store, sort and manipulate data. In
doing so, it mimics human intelligence.
To work, rule-based
systems require a set of facts or source of data, and a set of rules for
manipulating that data. These rules are sometimes referred to as ‘If
statements’ as they tend to follow the line of ‘IF X happens THEN do Y’.
Automation software
like ThinkAutomation is a good example. It automates processes by breaking them
down into steps. First comes the data or new business event. Then comes the
analysis: the part where the system processes the data against its rules. Then
comes the automated action.
So, what is a
rule-based system? It’s a logical program that uses pre-defined rules to make
deductions and choices to perform automated actions.
Rule-based systems cause other problems. For
example, it’s tough (to nearly impossible) to add rules to an already large
knowledge base without introducing contradicting rules. The maintenance of
these systems then often becomes too time-consuming and expensive. As such,
rule-based systems aren’t very useful for solving problems in complex domains
or across multiple different but simple domains.
Rule-based systems,
unsurprisingly, work based on rules. These rules outline triggers and the
actions that should follow (or are triggered). For example, a trigger might be
an email containing the word “invoice”. An action might then be to forward the
email to the finance team.
These rules most often
take the form of if statements. ‘IF’ outlines the trigger, ‘THEN’ specifies the
action to complete. So, if you want to create a rule-based system capable of
handling 100 different actions, you’d have to write 100 different rules. If you
want to then update the system and add actions, then you would need to write
new rules.
In short, you use rules
to tell a machine what to do, and the machine will do exactly as you tell it.
From there, rule-based systems will execute the actions until you tell it to
stop. But remember: if you tell it to do something incorrectly, it will do it
incorrectly.
In contrast to
rule-based systems, learning systems have a very ambitious goal. The vision of
AI research, which turns out to be more a hope than a concrete vision, is to
implement general AI through the learning capability of these systems. Hence,
the hope is that a learning system is in principle unlimited in its ability to
simulate intelligence. It’s said to have adaptive intelligence.
The ability to learn
causes adaptive intelligence, and adaptive intelligence means that existing
knowledge can be changed or discarded, and new knowledge can be acquired.
Hence, these systems build the rules on the fly. That is what makes learning
systems so different from rule-based testing. A neural network is an instance
of a learning system.
Machine learning is the
study of algorithms that perform specific tasks without the need for explicit
instructions. The system relies on common patterns and interference. Good
machine learning systems should be able to prepare and interpret different
types of data, have intelligent algorithms, follow iterative and automated
processes and be scalable.
The key differences
between AI and machine learning
PROFORMA: S No. / MACHINE
LEARNING / ARTIFICIAL INTELLIGENCE
1/ Set of statistical data and techniques
that a machine uses to improve itself and learn about its environment with
experience. / Any technique that enhances a computer’s capacity to mimic
human intelligence using set of rules, decision trees and machine learning
logic.
2/ Focuses on more accuracy by improving
algorithms over time. / Focuses more on increasing the success
percentage rather than 100 percent accuracy.
3/ The machine takes facts and data,
analyses the data and learns from the data. This cycle goes on. / It
is a computer program that uses its own intelligence to think and perform like
a human would do.
4/The ultimate aim is
to maximize the performance of the machine for a particular task based on data. / The
main aim is to simulate human-like intelligence using neural networks to solve
complex problems.
5/The system learns
from data. It does not make its own decisions.
/ The system makes decisions.
6/Since the entire
derivation is from data, there is no behavioral learning. For example, the user
may have clicked on a few links by mistake, but the data will still be
interpreted as the user’s choice or interest. / AI leads to the development of a system that
mimics how a human would behave under certain circumstances. For example, a
driverless car would try to think and drive like a human.
7/ML is a center of
information and knowledge based on facts and data collected over time. /
AI is intelligence based on language processing, perception, motion and
manipulation, and social intelligence.
8/ML is one of the many
goals of AI. /AI has multiple
goals like reasoning, computer vision, robotics, machine learning, etc…
9/ Some examples include
–
Detection of spam
emails
The personalized online
shopping experience
Stock market analysis
/ Some
examples include –
Personal assistants
like Alexa, Siri, and Cortana
Driverless cars
Fraud detection and
prevention in online transactions
Language, pattern and
image recognition
From the differences,
we find that machine learning has evolved from AI just like many other goals of
AI. Consider AI as the huge cap which contains machine learning and many other
associated goals.
A rule-based system is
a system that applies human-made rules to store, sort and manipulate data. In
doing so, it mimics human intelligence. To work, rule-based systems require a
set of facts or source of data, and a set of rules for manipulating that data.
Artificial intelligence
(AI) has been described as a set of “prediction machines.” In general, the
technology is great at generating automated predictions. But if you want to use
artificial intelligence in a regulated industry, you better be able to explain
how the machine predicted a fraud or criminal suspect, a bad credit risk, or a
good candidate for drug trials.
The strength of rule
engines is their interpretability; a human with reasonable levels of expertise
can look at the rules, see if they make sense, and modify them relatively
easily. (This is handy in a court-room situation.) They are well-suited to
small to medium-complexity decisions; above a few hundred rules, they can
develop interactions that are difficult for humans to understand, and
maintaining them is challenging.
Historically, rules
relied more on logic than large amounts of data. Rather than learning from
data, they learn from human experts. The process of extracting domain expertise
from experts has been called “knowledge engineering.” Constructing a rule set
for a simple knowledge domain is easy, and many non-technical experts can do
it.
Rule based AI overcomes
the challenge of building models when there aren’t large sets of structured or
unstructured data sets to test and refine the software. This is easier in
fields such as reading medical images, where there might be tens of millions of
examples of relevant MRI’s or CAT scans.
For many other fields and any new knowledge domain, there are just not
enough large data sets available to train or maintain the software’s
accuracy.
Rule based approaches solve
that problem.
Rule-based chatbots are
also referred to as decision-tree bots. As the name suggests, they are powered
through a series of defined rules. These rules are the basis for the types of
problems the chatbot is familiar with and can deliver solutions for.
Like a flowchart,
conversations are mapped out to anticipate what a customer might ask, and how
the chatbot should respond.
Rule-based chatbots can
be built with very simple or complicated rules. They can’t, however, answer any
questions outside of the defined rules. These chatbots do not learn through
interactions and only perform and work with the scenarios they are trained for.
In comparison, AI
chatbots that use machine learning are built to understand the context and
intent of a question before formulating a response.
These chatbots generate
their own answers to more complicated questions using natural-language
responses. The more these bots are used and trained, the more they learn and
the better they operate with the user.
Advantages of a
rule-based chatbot
While rule-based bots
have a less flexible conversational flow, these guard rails are also an
advantage. You can better guarantee the experience they will deliver, whereas
chatbots that rely on machine learning are a bit less predictable.
Some other advantages
of a rule-based chatbot are that they:--
are generally faster to
train (less expensive)
integrate easily with legacy
systems
streamline the handover
to a human agent
are highly accountable
and secure
can include interactive
elements and media
are not restricted to
text interactions
Advantages of AI
chatbots--
AI Bots can be seen as
a more sophisticated cousin of chatbots. They work well for companies that will
have a lot of data. Although they take longer to train initially, AI chatbots
save a lot of time in the long run.
AI chatbots:--
learn from information
gathered
continuously improve as
more data comes in
understand patterns of
behavior
have a broader range of
decision-making skills
can be programmed to
understand many languages
A knowledge-based
system (KBS) is a computer program that reasons and uses a knowledge base to
solve complex problems. The term is broad and refers to many different kinds of
systems. The one common theme that unites all knowledge based systems is an
attempt to represent knowledge explicitly and a reasoning system that allows it
to derive new knowledge. Thus, a knowledge-based system has two distinguishing
features: a knowledge base and an inference engine.
A knowledge-based
system (KBS) is a form of artificial intelligence (AI) that aims to capture the
knowledge of human experts to support decision-making. ... Some systems encode
expert knowledge as rules and are therefore referred to as rule-based systems.
Another approach, case-based reasoning, substitutes cases for rules.
Neural networks are
extremely susceptible to something called adversarial examples. Adversarial
examples are inputs to a neural network that result in an incorrect output from
the network.
Adversarial examples
are inputs to a neural network that result in an incorrect output from the
network.
Adversarial example are
not model or architecture specific. Adversarial examples generated for one
neural network architecture will transfer very well to another architecture. In
other words, if you wanted to trick a model you could create your own model and
adversarial examples based off of it. Then these same adversarial examples will
most probably trick the other model as well.
It is possible to
create adversarial examples for a completely black box model where we have no
prior knowledge of the internal mechanics.
As we move toward a
future that incorporates more and more neural networks and deep learning
algorithms in our daily lives we have to be careful to remember that these
models can be fooled very easily.
Despite the fact that neural networks are to
some extent biologically inspired and have near human capabilities in a wide
variety of tasks, adversarial examples teach us that their method of operation
is nothing like how real biological creatures work. As we’ve seen neural
networks can fail quite easily and catastrophically, in ways that are
completely alien to us humans.
We do not completely
understand neural networks and to use our human intuition to describe neural
networks would be unwise..
The thing is a neural
network does not “think” in the sense that humans “think.” They are fundamentally
just a series of matrix multiplications with some added non-linearities. And as
adversarial examples show us, the outputs of these models are incredibly
fragile. We must be careful not to attribute human qualities to neural networks
despite the fact that they have human capabilities. That is, we must not
anthropomorphize machine learning models.
Adversarial examples
are typically created by adding a small amount of carefully calculated noise to
a natural image.
Adversarial examples
don’t depend much on the specific deep neural network used for the task — an
adversarial example trained for one network seems to confuse another one as
well. In other words, multiple classifiers assign the same (wrong) class to an
adversarial example.
This “transferability” enables attackers to fool systems
in what are known as “black-box attacks” where they don’t have access to the
model’s architecture, parameters or even the training data used to train the
network.
One of the easiest and
most brute-force way to defend against these attacks is to pretend to be the
attacker, generate a number of adversarial examples against your own network,
and then explicitly train the model to not be fooled by them.
This improves the
generalization of the model but hasn’t been able to provide a meaningful level
of robustness — in fact, it just ends up being a game of whack-a-mole where
attackers and defenders are just trying to one-up each other.
Adversarial examples
are imperceptible to human but can easily fool deep neural networks in the
testing/deploying stage. The vulnerability to adversarial examples becomes one
of the major risks for applying deep neural networks in safety-critical
environments. Therefore, attacks and defenses on adversarial examples draw
great attention
Adversarial
perturbations are imperceptible to human but can easily fool DNNs ( deep neural
networks ) in the testing/deploying
stage. The vulnerability to adversarial examples becomes one of the major risks
for applying DNNs in safety-critical environments.
Creating adversarial
samples is remarkably simple and is closely related to the way neural networks
are trained i.e. gradient descent. The principle of gradient descent is simple.
To find the minimum of an unknown function, first start at a random point then
take a small step in the direction of the gradient of that function.
Gradient descent is an
optimization algorithm used to minimize some function by iteratively moving in
the direction of steepest descent as defined by the negative of the gradient.
In machine learning, we use gradient descent to update the parameters of our
model
.A neural network is, in essence, an attempt to simulate the brain. Neural network theory revolves around the idea that certain key properties of biological neurons can be extracted and applied to simulations, thus creating a simulated (and very much simplified) brain ..
Neural networks are a
set of algorithms, modeled loosely after the human brain, that are designed to
recognize patterns. They interpret sensory data through a kind of machine
perception, labeling or clustering raw input..
A neural network is a
machine learning algorithm based on the model of a human neuron. The human
brain consists of millions of neurons. The key difference is that neural
networks are a stepping stone in the search for artificial intelligence.
Artificial intelligence is a vast field that has the goal of creating
intelligent machines, something that has been achieved many times depending on
how you define intelligence
The mathematical model
that is used in order to predict as well as classify the results from a given
data set is referred to as the neural networks. They are even called as the
artificial neural networks.
The neural network
classifies these inputs by the process which is called as the learning. Like I said, the first artificial neural
network was invented in 1958 by psychologist Frank Rosenblatt. Called
Perceptron, it was intended to model how the human brain processed visual data
and learned to recognize objects.
Neural networks follow
a dynamic computational structure, and do not abide by a simple process to derive
a desired output. ... Similarly, in neural networks, different inputs are
processed and modified by a weight, or a sort of equation that changes the
original value.
Convolution neural networks thus allow neural
networks to be feasible for large data sets, or for complex images, since it
reduces the computational power needed for the analysis. There are many
applications for machine learning methods such as neural nets. Most of these
applications focus on classification of images
Neural networks can be
used for either regression or classification. Under regression model a single
value is outputted which may be mapped to a set of real numbers meaning that
only one output neuron is required An Artificial Neural Network is an
information processing model that is inspired by the way biological nervous
systems, such as the brain, process information.
Today, neural networks
are used for solving many business problems such as sales forecasting, customer
research, data validation, and risk management. For example, at Statsbot we
apply neural networks for time series predictions, anomaly detection in data,
and natural language understanding A neural network is an artifical network or
mathematical model for information processing based on how neurons and synapses
work in the human brain.
Adversarial AI is the
malicious development and use of advanced digital technology and systems that
have intellectual processes typically associated with human behaviour
An adversarial example
is an instance with small, intentional feature perturbations that cause a
machine learning model to make a false prediction. Adversarial examples are
inputs to deep learning models that another network has designed to induce a
mistake
Adversarial machine
learning is a technique employed in the field of machine learning which
attempts to fool models through malicious input. This technique can be applied for a variety
of reasons, the most common being to attack or cause a malfunction in standard
machine learning models.
Machine learning
techniques were originally designed for stationary and benign environments in
which the training and test data are assumed to be generated from the same
statistical distribution.
However, when those
models are implemented in the real world, the presence of intelligent and
adaptive adversaries may violate that statistical assumption to some degree,
depending on the adversary. This technique shows how a malicious adversary can
surreptitiously manipulate the input data so as to exploit specific
vulnerabilities of learning algorithms and compromise the security of the
machine learning system
Examples include
attacks in spam filtering, where spam messages are obfuscated through the
misspelling of “bad” words or the insertion of “good” words; attacks in
computer security, such as obfuscating malware code within network packets or
to mislead signature detection; attacks in biometric recognition where fake
biometric traits may be exploited to impersonate a legitimate user;or to
compromise users' template galleries that adapt to updated traits over time.
For as smart as
artificial intelligence systems seem to get, they’re still easily confused by
hackers who launch so-called adversarial attacks — cyberattacks that trick
algorithms into misinterpreting their training data, sometimes to disastrous
ends. AI “vaccine” that trains algorithms on weak adversaries so they’re better
prepared for the real thing — not entirely unlike how vaccines expose our
immune systems to inert viruses so they can fight off infections in the future.
AI systems have an
additional vulnerability: inputs can be manipulated in small ways that can
completely change decisions. A credit score, for example, might rise
significantly if one of the data points used to calculate it were altered only
slightly.
That’s because computer systems classify each bit of input data in a
binary manner, placing it on one side or the other of an imaginary line called
a classifier. Perturb the input—say, altering the ratio of debt to total
credit—ever so slightly, but just enough to cross that line, and that changes
the score calculated by the AI system.
The stakes for making
such systems resistant to manipulation are obviously high in many domains, but
perhaps especially so in the field of medical imaging.
The core benefit of the
new generation of neural networks is a capacity to deal with the visual world.
AI-based image analysis software can drive vehicles, analyze medical imaging,
recognize faces, carry out safety inspections, empower robots, categorize image
databases, create spaces in augmented reality, analyze and interpret video
footage for events and language, and even assist in surgical procedures.
To accomplish this, an
image-based machine learning system needs two resources. The first is a training
set of still images or video, which allows it to gain a suitably accurate
understanding of objects and events that it might later need to recognize. The
second is actionable imagery, such as CCTV footage.
All known machine
learning algorithms are vulnerable to adversarial examples — inputs that an
attacker has intentionally designed to cause the model to make a mistake. While
previous research on adversarial examples has mostly focused on investigating
mistakes caused by small modifications in order to develop improved models,
real-world adversarial agents are often not subject to the “small modification”
constraint.
Furthermore, machine
learning algorithms can often make confident errors when faced with an
adversary, which makes the development of classifiers that don’t make any
confident mistakes, even in the presence of an adversary which can submit
arbitrary inputs to try to fool the system, an important open problem.
Adversarial AI causes
machine learning models to misinterpret inputs into the system and behave in a
way that’s favorable to the attacker.
To produce the
unexpected behavior, attackers create “adversarial examples” that often
resemble normal inputs, but instead are meticulously optimized to break the
model’s performance.
Attackers typically
create these adversarial examples by developing models that repeatedly make
minute changes to the model inputs.
Eventually these
changes stack up, causing the model to become unstable and make inaccurate
predictions on what appear to be normal inputs.
What makes adversarial
AI such a potent threat? In large part, it’s because if an adversary can
determine a particular behavior in a model that’s unknown to developers, they
can exploit that behavior. There’s also the risk of “poisoning attacks,” where
the machine learning model itself is manipulated.
The reliability of a
machine learning model is assessed based on how erroneous it is. Lesser the
number of errors, better the prediction. In theory, ML models should be able to
predict, classify and recommend right every single time. However, when deployed
in the real world, the model has a very good chance of running into information
that has never appeared during training. To prepare the model for such untimely
adversities, adversarial techniques have been developed.
Adversarial examples
are inputs to machine learning models that an attacker has intentionally
designed to cause the model to make a mistake.
For instance, attackers
could target autonomous vehicles by using stickers or paint to create an adversarial
stop sign that the vehicle would interpret as a ‘yield’ or other sign. A
confused car on a busy day is a potential catastrophe packed in a 2000 pound
metal box.
Nevertheless, extreme
cases need not only be scenarios of life and death but also can be a flawed
facial recognition system installed at a money lending machine or a smart door
system that doesn’t recognise its owner.
The whole idea of
introducing adversarial examples to a model during training is to ensure AI
safety. In short, avoid misclassification.
In an attempt to
fortify a model’s defense strategy to avoid misclassification, researchers at
Open AI introduce a new metric, UAR (Unforeseen Attack Robustness), which
evaluates the robustness of a single model against an unanticipated attack, and
highlights the need to measure performance across a more diverse range of
unforeseen attacks.
Simply put,
“adversarial examples” are small image modifications designed to fool an image
classifier.
New techniques for
probing and manipulating machine-learning systems—known in the field as
“adversarial machine learning” methods—could cause big problems for anyone
looking to harness the power of AI in business.
Adversarial machine
learning is a technique employed in the field of machine learning which
attempts to fool models through malicious input. This technique can be
applied for a variety of reasons, the most common being to attack or cause a
malfunction in standard machine learning models.
Adversarial AI is the
malicious development and use of advanced digital technology and systems that
have intellectual processes typically associated with human behaviour.
Machine learning
techniques were originally designed for stationary and benign environments in
which the training and test data are assumed to be generated from the same
statistical distribution.
However, when those
models are implemented in the real world, the presence of intelligent and
adaptive adversaries may violate that statistical assumption to some degree,
depending on the adversary. This technique shows how a malicious adversary can
surreptitiously manipulate the input data so as to exploit specific
vulnerabilities of learning algorithms and compromise the security of the
machine learning system
An adversarial example
is an instance with small, intentional feature perturbations that cause a
machine learning model to make a false prediction.
Adversarial AI is the
malicious development and use of advanced digital technology and systems that
have intellectual processes typically associated with human behaviour. These
include the ability to learn from past experiences, and to reason or discover
meaning from complex data.
“Poisoning attacks:
machine learning algorithms are often re-trained on data collected during
operation to adapt to changes in the underlying data distribution. For
instance, intrusion detection systems (IDSs) are often re-trained on a set of
samples collected during network operation.
Within this scenario,
an attacker may poison the training data by injecting carefully designed
samples to eventually compromise the whole learning process. Poisoning may thus
be regarded as an adversarial contamination of the training data.”
“Adversarial attacks
have proven capable of tricking a machine learning model into incorrectly
labelling a traffic stop sign as a speed sign, which could have disastrous
effects in the real world,”
Protecting deep
learning algorithms against adversarial perturbation will be key to deploying
AI in more sensitive settings.
Adversarial machine learning
involves experimentally feeding input into an algorithm to reveal the
information it has been trained on, or distorting input in a way that causes
the system to misbehave. By inputting lots of images into a computer vision
algorithm, for example, it is possible to reverse-engineer its functioning and
ensure certain kinds of outputs, including incorrect ones.
Unsurprisingly,
adversarial machine learning is also of huge interest to the defense community.
With a growing number of military systems—including sensing and weapons
systems—harnessing machine learning, there is huge potential for these
techniques to be used both defensively and offensively.
This year, the
Pentagon’s research arm, DARPA, launched a major project called Guaranteeing AI
Robustness against Deception (GARD), aimed at studying adversarial machine
learning.
AI models need specific
cyber security defense and protection technologies to combat adversarial
machine learning, preserve privacy in machine learning, secure federated
learning, etc.
Machine learning
algorithms work with numbers, so objects like images, documents, or emails are
converted into numerical form through a step called feature engineering, which,
in traditional machine learning methods, requires a significant amount of human
effort..
Neural networks can
learn their weights and biases using the gradient descent algorithm.
Machine learning (ML),
the de facto approach to achieve artificial intelligence, provides a convenient
way for AI practitioners to rapidly implant intelligence to machines, with the
help of labeled data, and without needing to make clear the logics and theory
behind data. All in a sudden, the convenient approach was acquired by
professionals in nearly every fields.
People continually collect data from
their users, train machine learning models using the collected data and pack
the trained models to their products to provide better service to their users.
The intelligent service, in turn, attracts more users and usages, and
simultaneously provides more data to refine the machine learning models,
resulting in a virtuous circle that absorbing users and practitioners.
Deep neural networks
(DNN), an algorithm class for machine learning with breakthrough in accuracy,
gained a great success in fields like image processing, natural language
processing etc, however has security risks. For a lot of problems, solutions
employing DNN outperform human beings , making DNNs so popular.
A key factor of such an
achievement is that DNN features a cascade of many layers, which makes the
neurons inside the network very hard to be understood even by their designers.
Though the indigestibility does not affect its wide application, it indeed
increased the difficulty for researchers to analyze the vulnerabilities of DNN
models and fortify the security. What’s worse, adversaries may make use of
those vulnerabilities to attack DNN models.
A huge risk results
from crafted malicious inputs. An assumption of DNN is that the test data fall
to the same distribution of the training data. Therefore, it is not surprising
that the output of a model for data from a deviated distribution is prone to be
unpredictable, especially when the model is not specially treated for security
protections. This observation was be exploited by adversaries to craft
artificially generated inputs that mislead DNN models to targeted outputs, in
which case the inputs were called adversarial examples
Adversarial examples were
firstly noticed , when they found that the mappings of DNNs are so
discontinuous. They designed an optimization approach to search perturbations
such that a natural input adding a small perturbation together can lead the
model to output differently from when the input is the natural input only. The
perturbation can be small enough, so human beings can barely notice the
existence of the perturbation.
Research around
adversarial examples developed from different directions, including defenses
against adversarial examples or attacks with the examples. Some works focus on
the defense mechanism to avoid the generation of adversarial examples, while
some others aim at designing algorithms to generate examples satisfying all
kinds of requirements.
Researchers defend adversarial examples mainly by
masking the gradient, through which adversaries’ optimizers are expected to
fail to move toward malicious. However, this mechanism was proven to be null
and void, as a bunch of works got around this kind of protection and
successfully generated effective examples, mainly by training substitutional
models to remove the mask.
There are still
technical barriers between a generated adversarial example and a successful
exploit to a system. Even for commercially deployed models, it is not difficult
for an attacker to generate effective adversarial examples with the help of
gradient descending optimizers.
However, there are only several works where
real world systems were cracked because of adversarial examples, mainly because
that only little research concerned how an example can be input to the target
model, which usually resides inside the target system without direct interface
to attackers. To have a successful and practical attack, attackers must mount
the worked out perturbation to construct an example, which is usually difficult
for different scenarios.
The largest challenge
for practical adversarial example attackers lie in that the input interface of
the target model does not expose to adversaries. The adversarial examples
calculated by adversaries require pixel modifications to input images. However,
in a lot of practical cases, it is impossible for the attacker to find an
interface to inject the perturbed image to the model inside the target system,
so the adversarial examples though can be generated while cannot be directly
used for attacks.
For example, one can calculate perturbation of only some
pixels for a face image, but an attacker does not know how to make up herself
to feed such an pixel level modified image to the target face authentication
system. It is obviously less practical to find an interface to directly inject
the image to the model behind the face authentication system.
In white box attacks
the attacker has access to the model’s parameters, while in black box attacks,
the attacker has no access to these parameters, i.e., it uses a different model
or no model at all to generate adversarial images with the hope that these will
transfer to the target model.
White-box attack methods assume the adversary has
direct access to a model, i.e. the adversary has local access to the code, the
model’s architecture, and the trained model’s parameters. In some cases, the
adversary may also have access to the data set that was used to train the
model. White-box attacks are commonly used in academia to demonstrate
attack-crafting methodologies.
Black box attacks
assume no direct access to the target model (in many cases, access is limited
to performing queries, via a simple interface on the Internet, to a service
powered by a machine learning model), and no knowledge of its internals,
architecture, or the data used to train the model. Black box attacks work by
performing iterative queries against the target model and observing its
outputs, in order to build a copy of the target model. White box attack
techniques are then performed on that copy.
Techniques that fall
between white box and black box attacks also exist. For instance, a standard
pre-trained model similar to the target can be downloaded from the Internet, or
a model similar to the target can be built and trained by an attacker. Attacks
developed against an approximated model often work well against the target
model, even if the approximated model is architecturally different to the
target model, and even if both models were trained with different data
(assuming the complexity of both models is similar).
The aim of non-targeted
attacks is to enforce the model to misclassify the adversarial image, while in
the targeted attacks the attacker pretends to get the image classified as a
specific target class, which is different from the true class.
Most successful attacks
are gradient-based methods. Namely the attackers modify the image in the
direction of the gradient of the loss function with respect to the input image.
There are two major approaches to perform such attacks: one-shot attacks, in
which the attacker takes a single step in the direction of the gradient, and
iterative attacks where instead of a single step, several steps are taken.
Three of the most common attacks are briefly described next. The first two are
examples of one-shot attacks, and the last one is an iterative attack.
Attacks against machine
learning models can be divided into four main categories based on the motive of
the attacker.
Confidentiality attacks
expose the data that was used to train the model. Confidentiality attacks can
be used to determine whether a particular input was used during the training of
the model. An adversary obtains publicly available information about a
politician (such as name, social security number, address, name of medical
provider, facilities visited, etc.), and through an inference attack against a
medical online intelligent system, is able to ascertain that the politician has
been hiding a long-term medical disorder. The adversary blackmails the
politician. This is a confidentiality attack.
Integrity attacks cause
a model to behave incorrectly due to tampering with the training data. These
attacks include model skewing (subtly retraining an online model to
re-categorize input data), and supply chain attacks (tampering with training
data while a model is being trained off-line).
Adversaries employ integrity
attacks when they want certain inputs to be miscategorised by the poisoned
model. Integrity attacks can be used, for instance, to avoid spam or malware
classification, to bypass network anomaly detection, to discredit the model /
SIS owner, or to cause a model to incorrectly promote a product in an online
recommendation system.
An adversary employs a
Sybil attack to poison a web browser’s auto-complete function so that it
suggests the word “fraud” at the end of an auto-completed sentence with a
target company name in it. The targeted company doesn’t notice the attack for
some time, but eventually discovers the problem and corrects it. However, the
damage is already done, and they suffer long-term negative impact on their
brand image. This is an integrity attack (and is possible today).
Availability attacks
refer to situations where the availability of a machine learning model to
output a correct verdict is compromised. Availability attacks work by subtly
modifying an input such that, to a human, the input seems unchanged, but to the
model, it looks completely different (and thus the model outputs an incorrect
verdict).
Availability attacks can be used to ‘disguise’ an input in order to
evade proper classification, and can be used to, for instance, defeat parental
control software, evade content classification systems, or provide a way of
bypassing visual authentication systems (such a facial or fingerprint
recognition). From the attacker’s goal point of view, availability attacks are
similar to integrity ones, but the techniques are different: poisoning the
model vs. crafting the inputs.
An adversary introduces
perturbations into an environment, causing self-driving vehicles to misclassify
objects around them. This is achieved by, for example, applying stickers or
paint to road signs, or projecting images using light or laser pointers. This
attack may cause vehicles to ignore road signs, and potentially crash into
other vehicles or objects, or cause traffic jams by fooling vehicles into
incorrectly determining the colour of traffic lights. This is an availability
attack.
An attacker forges a
‘leaked’ phone call depicting plausible scandalous interaction involving
high-ranking politicians and business people. The forged audio contains
embedded hidden voice commands. The message is broadcast during the evening
news on national and international TV channels. The attacker gains the ability
to issue voice commands to home assistants or other voice recognition control
systems (such as Siri) on a potentially massive scale. This is an availability
attack.
Fake news detection is
a relatively difficult problem to solve with automation, and hence, fake news
detection solutions are still in their infancy. As these techniques improve and
people start to rely on verdicts from trusted fake news detection services,
tricking such services infrequently, and at strategic moments would be an ideal
way to inject false narratives into political or social discourse.
In such a
scenario, an attacker would create a fictional news article based on current
events, and adversarially alter it to evade known respected fake news detection
systems. The article would then find its way into social media, where it would
likely spread virally before it can be manually fact-checked. This is an
availability attack.
By use of an
adversarial attack against a reinforcement learning model, autonomous military
drones are coerced into attacking a series of unintended targets, causing
destruction of property, loss of life, and the escalation of a military
conflict. This is an availability attack.
By use of a
strategically timed policy attack, an attacker fools an autonomous delivery
drone to alter course and fly into traffic, fly through the window of a
building, or land (such that the attacker can steal its cargo, and perhaps the
drone itself). This is an availability attack.
Over an extended period
of time, an attacker publishes and promotes a series of adversarially created
social media messages designed to trick sentiment analysis classifiers used by
automated trading algorithms. One or more high-profile trading algorithms trade
incorrectly over the course of the attack, leading to losses for the parties
involved, and a possible downturn in the market. This is an availability
attack.
Replication attacks
allow an adversary to copy or reverse-engineer a model. One common motivation
for replication attacks is to create copy (or substitute) models that can then
be used to craft attacks against the original system, or to steal intellectual
property.
An adversary employs a
replication attack to reverse-engineer a commercial machine-learning based
system. Using this stolen intellectual property, they set up a competing
company, thus preventing the original company from earning all the revenue they
expected to. This is a replication attack.
Classifiers are a type
of machine learning model designed to predict the label of an input (for
instance, when a classifier receives an image of a dog, it will output a value
indicative of having detected a dog in that image).
Classifiers are some of the
most common machine learning systems in use today, and are used for a variety
of purposes, including web content categorization, malware detection, credit
risk analysis, sentiment analysis, object recognition (for instance, in
self-driving vehicles), and satellite image analysis. The widespread nature of
classifiers has given rise to a fair amount of research on the susceptibility
of these systems to attack, and possible mitigations against those attacks.
Classifier models often
partition data by learning decision boundaries between data points during the
training process.
Adversarial samples can
be created by examining these decision boundaries and learning how to modify an
input sample such that data points in the input cross these decision
boundaries. In white box attacks, this is done by iteratively applying small
changes to a test input, and observing the output of the target model until a
desired output is reached.
Reinforcement learning
is the process of training an agent to perform actions in an environment.
Reinforcement learning models are commonly used by recommendation systems,
self-driving vehicles, robotics, and games. Reinforcement learning models
receive the current environment’s state (e.g. a screenshot of the game) as an
input, and output an action (e.g. move joystick left).
Two distinct types of
attacks can be performed against reinforcement learning models.
A strategically timed
attack modifies a single or small number of input states at a key moment,
causing the agent to malfunction. For instance, in the game of pong, if a
strategic attack is performed as the ball approaches the agent’s paddle, the
agent will move its paddle in the wrong direction and miss the ball.
An enchanting attack
modifies a number of input states in an attempt to “lure” the agent away from a
goal. For instance, an enchanting attack against an agent playing Super Mario
could lure the agent into running on the spot, or moving backwards instead of
forwards.
Transferability attacks
are used to create a copy of a machine learning model (a substitute model),
thus allowing an attacker to “steal” the victim’s intellectual property, or
craft attacks against the substitute model that work against the original
model. Transferability attacks are straightforward to carry out, assuming the
attacker has unlimited ability to query a target model.
In order to perform a
transferability attack, a set of inputs are crafted, and fed into a target
model. The model’s outputs are then recorded, and that combination of inputs
and outputs are used to train a new model. It is worth noting that this attack
will work, within reason, even if the substitute model is not of absolutely
identical architecture to the target model.
It is possible to
create a ‘self-learning’ attack to efficiently map the decision boundaries of a
target model with relatively few queries. This works by using a machine
learning model to craft samples that are fed as input to the target model. The
target model’s outputs are then used to guide the training of the sample
crafting model. As the process continues, the sample crafting model learns to
generate samples that more accurately map the target model’s decision
boundaries.
Inference attacks are
designed to determine the data used during the training of a model. Some
machine learning models are trained against confidential data such as medical
records, purchasing history, or computer usage history. An adversary’s motive
for performing an inference attack might be out of curiosity – to simply study
the types of samples that were used to train a model – or malicious intent – to
gather confidential data, for instance, for blackmail purposes.
A black box inference
attack follows a two-stage process. The first stage is similar to the
transferability attacks described earlier. The target model is iteratively
queried with crafted input data, and all outputs are recorded. This recorded
input/output data is then used to train a set of binary classifier ‘shadow’
models – one for each possible output class the target model can produce.
For
instance, an inference attack against an image classifier than can identify ten
different types of images (cat, dog, bird, car, etc.) would create ten shadow
models – one for cat, one for dog, one for bird, and so on. All inputs that
resulted in the target model outputting “cat” would be used to train the “cat”
shadow model, and all inputs that resulted in the target model outputting “dog”
would be used to train the “dog” shadow model, etc.
The second stage uses
the shadow models trained in the first step to create the final inference
model. Each separate shadow model is fed a set of inputs consisting of a 50-50
mixture of samples that are known to trigger positive and negative outputs. The
outputs produced by each shadow model are recorded. For instance, for the “cat”
shadow model, half of the samples in this set would be inputs that the original
target model classified as “cat”, and the other half would be a selection of
inputs that the original target model did not classify as “cat”.
All inputs and
outputs from this process, across all shadow models, are then used to train a
binary classifier that can identify whether a sample it is shown was “in” the
original training set or “out” of it.
So, for instance, the data we recorded
while feeding the “cat” shadow model different inputs, would consist of inputs
known to produce a “cat” verdict with the label “in”, and inputs known not to
produce a “cat” verdict with the label “out”. A similar process is repeated for
the “dog” shadow model, and so on. All of these inputs and outputs are used to
train a single classifier that can determine whether an input was part of the
original training set (“in”) or not (“out”).
This black box
inference technique works very well against models generated by online
machine-learning-as-a-service offerings, such as those available from Google
and Amazon. Machine learning experts are in low supply and high demand.
Many
companies are unable to attract machine learning experts to their
organizations, and many are unwilling to fund in-house teams with these skills.
Such companies will turn to machine-learning-as-a-service’s simple turnkey
solutions for their needs, likely without the knowledge that these systems are
vulnerable to such attacks.
Anomaly detection
algorithms are employed in areas such as credit card fraud prevention, network
intrusion detection, spam filtering, medical diagnostics, and fault detection.
Anomaly detection algorithms flag anomalies when they encounter data points
occurring far enough away from the ‘centers of mass’ of clusters of points seen
so far. These systems are retrained with newly collected data on a periodic
basis. As time goes by, it can become too expensive to train models against all
historical data, so a sliding window (based on sample count or date) may be
used to select new training data.
Poisoning attacks work
by feeding data points into these systems that slowly shift the ‘center of
mass’ over time. This process is often referred to as a boiling frog strategy.
Poisoned data points introduced by the attacker become part of periodic retraining
data, and eventually lead to false positives and false negatives, both of which
render the system unusable.
Federated learning is a
machine learning setting where the goal is to train a high-quality centralized
model based on models locally trained in a potentially large number of clients,
thus, avoiding the need to transmit client data to the central location. A
common application of federated learning is text prediction in mobile phones.
Each phone contains a local machine learning model that learns from its user
(for instance, which recommended word they clicked on). The phone transmits its
learning (the phone’s model’s weights) to an aggregator system, and
periodically receives a new model trained on the learning from all of the other
phones participating.
Attacks against
federated learning can be viewed as poisoning or supply chain (integrity)
attacks. A number of Sybils, designed to poison the main model, are inserted
into a federated learning network. These Sybils collude to transmit incorrectly
trained model weights back to the aggregator which, in turn, pushes poisoned
models back to the rest of the participants.
For a federated text prediction
system, a number of Sybils could be used to perform an attack that causes all
participants’ phones to suggest incorrect words in certain situations. The
ultimate solution to preventing attacks in federated learning environments is
to find a concrete method of establishing and maintaining trust amongst the
participants of the network, which is clearly very challenging.
The understanding of
flaws and vulnerabilities inherent in the design and implementation of systems
built on machine learning and the means to validate those systems and to
mitigate attacks against them are still in their infancy, complicated – in
comparison with traditional systems – by
the lack of explainability to the user, heavy dependence on training data, and
oftentimes frequent model updating.
This field is attracting the attention of
researchers, and is likely to grow in the coming years. As understanding in
this area improves, so too will the availability and ease-of-use of tools and
services designed for attacking these systems.
As
artificial-intelligence-powered systems become more prevalent, it is natural to
assume that adversaries will learn how to attack them. Indeed, some
machine-learning-based systems in the real world have been under attack for
years already.
As we witness today in conventional cyber security, complex
attack methodologies and tools initially developed by highly resourced threat
actors, such as nation states, eventually fall into the hands of criminal
organizations and then common cyber criminals. This same trend can be expected
for attacks developed against machine learning models.
Data management is an
administrative process that includes acquiring, validating, storing,
protecting, and processing required data to ensure the accessibility,
reliability, and timeliness of the data for its users
By 2025 more than 150
billion devices will be connected across the world, according to IDC, many of
them sensors and other Internet of Things devices at the edge of networks. The
market research firm predicts those billions of devices will be generating more
than 90 zettabytes of data that year.
That will create data
management and data analysis challenges and opportunities. Collecting, managing
and analyzing the huge volumes of data generated by edge devices—much of it
real-time streaming data—will require the use of new technologies and computing
processes.
One solution is edge
computing where data will be processed and analyzed in real time by distributed
systems at or near where the data is generated—even within the edge devices
themselves—with the results sent to central IT systems
Edge computing is the practice
of processing data near the edge of your network, where the data is being
generated, instead of in a centralised data-processing warehouse.
Edge computing
optimizes internet devices and web applications by bringing computing closer to
the source of the data. This minimizes the need for long distance
communications between client and server, which reduces latency and bandwidth
usage.
Data has traditionally
been locked up in data stores designed for access by specific applications. As
with Software-as-a-Service applications, Data as a Service utilizes cloud
technology to provide people and applications with on-demand access to data no
matter where the people or applications may be.
Prescriptive analytics,
which is often linked to data analytics automation, incorporates a range of
technologies including artificial intelligence and machine learning,
computational modeling, neural networks and graph analysis.
Business analysts are
asking increasingly complex queries across structured and unstructured data, often
combining data from multiple applications and sources. Conducting such complex
analytics at scale using traditional query tools and languages is a significant
challenge.
Graph databases,
analytics software and visualization tools are designed to overcome that
complexity by showing how entities such as people, places and things relate to
each other.
- POWER GENERATORS ARE CURRENTLY CONTROLLED DIGITALLY, AND THE GRID OVERALL HAS GROWN VASTLY MORE COMPLEX AND EXPANSIVE AS OUR ENERGY NEEDS HAVE EXPANDED.
INDIA DOES NOT EVEN HAVE A FABLAB TO MANUFACTURE CHIPS..
JEWISH DEEP STATE DARLINGS MODI / AJIT DOVAL HAS DELIBERATELY IGNORED THIS ASPECT DESPITE BEING TOLD AT LEAST 30 TIMES BY THE BLOGSITE..
PAKISTAN HAS HUNDREDS OF TACTICAL NUKES TO DO EMP ATTACK AND TAKE DOWN OUR ELECTRICAL GRID
WE MUST HAVE ANALOG BACKUP SYSTEMS WERE OUR ELECTRIC GRIDS ARE DIGITAL. SMART CITY DOES NOT MEAN DIVING OFF THE DEEP END IN A MINDLESS MANNER.
ANALOG BACKUPS ARE ESSENTIALLY SWITCHES THAT MUST BE FLIPPED BY A HUMAN OPERATOR. DIGITAL BACKUPS ARE CONTROLLED BY AUTOMATED COMPUTER SYSTEMS.
A SOPHISTICATED ENOUGH CYBER-ATTACK COULD KNOCK OUT THE BROADER POWER SUPPLY WHILE ALSO PREVENTING THE AUTOMATED SYSTEM FROM RECOVERING QUICKLY. AN ANALOG BACKUP WOULD PROVIDE A MECHANICAL STOPGAP MEASURE IN CASE OF AN EMERGENCY.
ALL THIS PUSH BY THE DEEP STATE TO ARM TWIST INDIA INTO SOLAR AND WIND POWER IS ALSO TO FORCE US TO MAKE OUR ELECTRIC GRID DIGITAL.
WITH A CREDIT CARD THEFT, YOU MIGHT HAVE TO PAY A SMALL AMOUNT AND GET A NEW CREDIT CARD.. BUT WITH INFRASTRUCTURE ATTACKS, REAL PHYSICAL DAMAGE CAN OCCUR, AND RECOVERY CAN TAKE WEEKS OR MONTHS.
FUTURE NUCLEAR SUBMARINES INDIA BUYS MUST HAVE THE CAPABILITY TO ALSO POWER AT LEAST THE MILITARY INFRASTRUCTURE AND CRITICAL SECTORS OF THE COASTAL CITY WHILE UNDERWATER.
Capt ajit vadakayil
..
- At the heart of AI applications is the multiply accumulate function (MAC) or dot product operation. This takes two numbers, multiplies them together, and adds the result to an accumulator. The numbers are fetched from and stored to memory. Those operations are repeated many times and account for the vast majority of the time and power consumed by both learning and inferencing.
One reason for the rapid growth in machine learning was the availability of GPUs. These devices, although initially intended for graphics processing, have large numbers of MACs and high-speed memory interfaces. They can perform the necessary computations much faster than a general-purpose CPU. The downside is that GPUs tend to utilize floating-point arithmetic, which is well beyond the needs of AI algorithms.
It is possible to produce a chip that follows the digital architectures but uses analog circuitry. Toshiba has produced a chip that performs MAC operations using phase-domain analog technology. It uses the phase domain of an oscillator circuit by dynamically controlling oscillation time and frequency.
They claim that the technology makes it possible to collectively process multiplication, addition, and memory operations that are conventionally processed by individual digital circuits, using one-eighth of the power of digital circuits with the same area.
One of the issues with analog is that they have limited precision, basically defined by the noise floor. Digital circuitry has no such limitation, but as the need for precision is reduced, it is becoming in the realm of what analog circuitry is capable of providing.
Digital data is easy to copy and attack, but analog is not.
When digital goes wrong, it can go catastrophically wrong, whereas analog is able to tolerate errors much better.
If you have seen the emergence of adversarial networks and how you can inject noise into the system to fool it into classifying an image or fooling it into how it detects language of a transcription, this tells you the fragility that is inherent in these systems. You can go from something looking like a bus and after noise injections it says it a zebra. You can poison neural networks and they are subject to all sorts of attacks.
AI is basically a statistical process.. AI is basically a statistical process.. Researchers do not fully understand what is happening within a neural network. DARPA has a program to create more explainable AI systems, arguing that if you cannot explain the actions a system is taking, it is impossible to trust it.
Others believe that such a goal is not feasible, and three laws of AI have been defined. The third law states that “any system simple enough to be understandable will not be complicated enough to behave intelligently, while any system complicated enough to behave intelligently will be too complicated to understand
If you can take the whole idea of signal processing and do an analog arithmetic logic unit (ALU) or mixed signal ALU, you can increase the performance by orders of magnitude, and at the same time reduce the power dissipation by orders of magnitude. And the only problem with that is that youI have an issue with dynamic range, with accuracy and with linearity.
https://www.youtube.com/watch?v=EsIm1PObDgc
The whole area of AI and deep learning will be better addressed once the relationship between performance, power dissipation and size will be understood to the point that people can do on their smartphones in real-time the magnitude of computing that occurs only in the cloud today.
IT IS TIME FOR INDIA TO
HAVE A RISK ASSESSMENT OF ALL CRITICAL DIGITAL SYSTEMS IN INDIA.. IS THERE AN ANALOGUE / MANUAL BACKUP? THIS MUST BE SIGNED ON A PRINTOUT..
RESULT IN ADVANCE ?
NOTHING WILL HAPPEN.. “GREASE
AND TACKLE MINDSET ” NSA AJIT DOVAL SURVIVES BY GIVING EGO MASSAGE TO MODI.
Common Cyber Attacks
and their Impacts Type Impact Malware (ransomware, spyware, viruses, worms)
Malicious software used by attackers to breach a network through a vulnerability,
such as clicking a link, that automatically downloads the software to the
computer.
• Blocks legitimate access to components of
the network
• Installs additional
harmful software
• Obtains information
by transmitting data from the hard drive
• Disrupts components and makes the system
inoperable Phishing Fake communications (typically through email) appearing to
be from a trustworthy source that allow hackers to obtain login information or
install malware on a computer when someone interacts with their message.
• Obtains a person’s
confidential information for financial gain
• Obtains employee
log-in credentials to attack a specific company
• Installs malware onto
a computer Man-in-the-middle attack (MitM) Attackers insert themselves into a
two-party transaction. Common points of entry include unsecure public Wi-Fi
networks and computers affected with malware.
• Interrupts a
transaction to steal personal data Denial-of-service attack (DoS) Attackers
flood a site host or network with digital traffic until the target site/service
cannot respond or crashes completely. A distributed denial of service attack
(DDoS) is when multiple machines are used to attack a single target. Botnets,
which are networks of devices that are infected with malware, are often used in
DDoS attacks.
• Legitimate users
cannot access websites, online services, or devices
• Slows down network
performance Structured Query Language (SQL) injection Attackers use malicious
code on vulnerable servers to force the server to reveal .. the attacker adds Structured Query Language
(SQL) code to a Web form input box in order to gain access to unauthorized
resources or make changes to sensitive data.
• Obtains contents of
an entire database, including sensitive information
• Allows attackers to
modify and delete records in a database Can
be done by submitting malicious code into vulnerable search boxes on websites.
Zero-day exploit Attackers hack a network vulnerability before it is noticed
and fixed by a patch or permanent solution. Used by nation-state actors and
sophisticated hackers.
• Allows attacker to
plant malware into a system without the victim knowing
As the name itself
implies, the purpose of the SQL Injection attack is to inject the malicious SQL
code.
SQL Injection can be
considered as one of the most serious attacks, as it influences the database
and can make serious damage to your data and the whole system.
Each and every field of
a website is like a gate to the database. In the login form, the user enters
the login data, in the search field the user enters a search text, in the data
saving form the user enters data to be saved. All these indicated data goes to
the database.
Instead of correct
data, if any malicious code is entered, then there are possibilities for some
serious damage to happen to the database and the whole system.
SQL Injection is
performed with the SQL programming language. SQL (Structured Query Language) is
used for managing the data held in the database. Therefore during this attack,
this programming language code is being used as a malicious injection.
This is one of the most
popular attacks, as databases are used for almost all the technologies.
Many applications use
some type of Database. An application under test might have a user interface
that accepts user input that is used to perform the following tasks:
#1) Show the relevant
stored data to the user e.g. the application checks the credentials of the user
using the login information entered by the user and exposes only the relevant
functionality and data to the user
#2) Save the data
entered by the user to the database e.g. once the user fills up a form and
submits it, the application proceeds to save the data to the database; this
data is then made available to the user in the same session as well as in
subsequent sessions
Risks Of SQL Injection--
Nowadays, a database is
being used for almost all the systems and websites, as data should be stored
somewhere.
As sensitive data is
being stored in the database, there are more risks involved in the system’s
security. If any personal website or blog’s data would be stolen, then there
won’t be much damage when compared to the data that would be stolen from the
banking system.
The main purpose of
this attack is to hack the system’s database, therefore this attack’s
consequences can really be harmful.
The following things
might result from SQL Injection---
Hacking other person’s
account.
Stealing and copying
website’s or system’s sensitive data.
Changing the system’s
sensitive data.
Deleting system’s
sensitive data.
The user could log in
to the application as another user, even as an administrator.
The user could view
private information belonging to other users e.g. details of other users’
profiles, transaction details, etc.
The user could change
application configuration information and the data of the other users.
The user could modify
the structure of the database; even delete tables in the application database.
The user could take
control of the database server and execute commands on it at will.
The above-listed risks
can really be considered serious, as restoring a database or its data can cost
a lot. It can cost your company a reputation and money to restore the lost data
and system.
Therefore it is highly recommended to protect your system against
this type of attack and consider Security Testing as a good investment in your
product’s and company’s reputation.
A targeted attack –
such as a phishing, spear-phishing, advanced persistent threat or zero day
attack – focuses on a specific company in order to gain unauthorized access to
sensitive information and financial accounts
Proofpoint Targeted
Attack Protection (TAP) helps you stay ahead of attackers with an innovative
approach that detects, analyzes and blocks advanced threats before they reach
your inbox. This includes ransomware attacks and other advanced email threats
delivered through malicious attachments and URLs. And zero-day threats,
polymorphic malware, weaponized documents and phishing attacks. TAP also
detects threats and risks in cloud apps, connecting email attacks related to
credential theft or other attacks.
Targeted Attack
Protection (TAP) protects against ransomware and advanced threats that target
people and their data via the tools they use to conduct business. TAP features
multiple machine learning engines spanning threat classification, composite
multistage threats, relationship and communication classification, key employee
classification, and evolving page design classification to not only detect new
and emerging threats, but also leverage that data to inform future detection
Anti-evasion technology, in the dynamic analysis, tricks malware into revealing itself by creating virtual environments that accurately reproduce real system and real user behavior and interactions.
Anti-evasion technology, in the dynamic analysis, tricks malware into revealing itself by creating virtual environments that accurately reproduce real system and real user behavior and interactions.
This process provides comprehensive detection
analysis that determines whether the destination URL or an attachment under
suspicion is malicious, even finding malware that is sophisticated enough to
conceal itself from detection leveraging techniques, e.g., IP rotation, mouse
movement simulation, real browser sessions, time-delayed analysis.
- A HACKATHON IS AN EVENT, USUALLY HOSTED BY A TECH COMPANY , WHERE PROGRAMMERS ( CODERS ) GET TOGETHER FOR USUALLY UNINTERRUPTED 24 HOURS TO DO SOMEBODY ELSE’S JOB.
WHEN A HACKATHON IS OF 48 HOURS, CODERS BRINGS THEIR OWN PILLLOWS AND BLANKETS TO OFFICE.
SOME HACKATHONS HAVE A THEME ( LIKE FIXING BUGS ), OTHERS ARE MORE OPEN-ENDED
IN MY ELDER SONs LAST COMPANY HACKATHON, HE AUTOMATED MANY MANUAL FEATURES..
BEFORE THAT HE PRUNED THE COMPANYs SYSTEM DELECTING THOUSAND OF LINES OF REDUNADANT CODE AND HE GOT REWARDED FOR THAT..
YESTERDAY HIS COMPANY HAD A HACKATHON.. HIS PAST TWO PROJECTS WERE REJECTED BY THE SYSTEM.. I ASKED HIM TO BACK HIMSELF , THE WAY I DID AT SEA
IN THE POST BELOW, I SCREWED THE PLANETs NO 1 CHEMICAL TESTING LAB
http://ajitvadakayil.blogspot.com/2012/05/wall-wash-ptt-without-tears-chemical.html
MY SON FIXED THE BUGS IN THE SYSTEM, AND BOTH HIS PROJECTS WERE ABSORBED BY THE SYSTEM LIKE MAGIC
UNLIKE THEIR DAY JOBS WHERE RISK-TAKING MAY BE FROWNED UPON, IN A HACKATHON THERE IS A LOW COST OF FAILURE.. CODERS ARE ENCOURAGED TO THINK OUTSIDE THE BOX AND TAKE RISKS.
SOMETIMES IN HACKATHONS CODERS FORM TEAMS OF THEIR OWN .. HERE THE GROUND RULE- “BUILD FROM SCRATCH” IS NEVER COMPROMISED. HACKATHON IS THE PLACE WHERE DIVERSIFIED MINDS AND IDEAS COME TOGETHER TO CREATE SOLUTIONS
HACKATHONS ARE FOCUSED, COOPERATIVE, INNOVATIVE AND HIGHLY STIMULATIVE. HACKATHONS ARE A GREAT WAY OF BUILDING A WORK CULTURE AND CREATING PROFESSIONAL BONDING AMONG EXISTING EMPLOYEES.
HACKATHONS ARE ONE-WAY COMPANIES CAN TARGET THE EMPLOYEE’S COMPETENCIES.. WHEN TEAMS WORK ON PROBLEMS AND PUT EFFORTS TO SEARCH FOR A SOLUTION, THERE ARE SOME OUT OF THE BOX THINKERS WHO APPLY ALL THE LEARNINGS AND HIT THE RIGHT CHORD WHILE OTHERS FOLLOW .
IN THIS INNOVATION FEST , CODERS WHO DO WELL ARE PROMOTED FAST AND GET HANDSOME BONUSES..
AT SEA, I ASK MY CREW TO FIND THEIR OWN WORK ( CREATIVE / FIXING MACHINERY ) , DO IT AND REPORT BACK.. PEOPLE WHO YOU THOUGHT WERE CUNTS PROVED THAT THEY ARE ASSETS.
Capt ajit vadakayil
..
- http://ajitvadakayil.blogspot.com/2019/06/record-heat-wave-europe-2019-root-cause.html
NONSENSE !
OUR MAIN STREAM MEDIA IS IN JEWISH DEEP STATE PAYROLL ...WE KNOW THE TRAITORS IN OUR MINISTRIES ....
WE KNOW WHY ENVIRONMENT MINISTER PRAKASH JAVEDEKAR AND PM MODI ARE DARLINGS OF THE JEWISH DEEP STATE....
go0gle for the blogpost below---
http://ajitvadakayil.blogspot.com/2019/06/record-heat-wave-europe-2019-root-cause.html
http://ajitvadakayil.blogspot.com/2018/12/poland-katowice-cop-24-global-warming.html
http://ajitvadakayil.blogspot.com/2019/02/america-caused-global-warming-with_9.html
WE KNOW HOW MODI BECAME CHAMPION OF THE PLANET..
INDIA WILL NOT MOTHBALL OUR ENORMOUS RESERVES OF COAL..LET MODI / MACRON TRY.. WE SHALL SEE...
capt ajit vadakayil
..
THIS POST IS NOW CONTINUED TO PART 9, BELOW--
https://ajitvadakayil.blogspot.com/2019/12/what-artificial-intelligence-cannot-do_94.html
CAPT AJIT VADAKAYIL
..
SOMEBODY ASKED ME
ReplyDeleteCAPTAIN, HOW DO YOU KNOW THAT NITYANANDA READS YOUR BLOGS..
I WAS THE FIRST ON THE PLANET TO SAY THAT BRAHMAN IS THE EMPTY SPACE BETWEEN THE ELECTRONS IN AN ATOM..
TODAY ALL FAKE ROGUE GURUS REPEAT IT,..
http://ajitvadakayil.blogspot.com/2016/12/perpetual-motion-of-orbiting-electrons.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteNITYANANDA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
REPUBLIC TV
MIRROR NOW TV
TANVI SHUKLA
ARNAB GOSWAMI
RAJEEV CHANDRA SHEKHAR
RSS
MOHAN BHAGWAT
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
MOHANDAS PAI
DILIP SHANGHVI
GAUTAM ADANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
AVBP
VHP
RAM MADHAV
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SHELDON POLLOCK
WENDY DONIGER
AUDREY TRUSCHKE
ENTIRE BBC GANG
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
EVERY MLA/ MP OF INDIA
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
ASADDUDIN OWAISI
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDHI
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
FAZAL GAFOOR (MES )
E SREEDHARAN
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
TODAY THE WHOLE DAY MIRROR NOW TV AND REPUBLIC TV WERE RIDICULING NITYANANDA FOR WIPING IMAGINARY SWEAT FROM HIS FOREHEAD AND FLINGING IT INTO THE CROWD..
ReplyDelete#####################################
I STAYED IN MANIPAL FOR 3 YEARS .BECAUSE MY YOUNGER SON STUDIED THERE..
MANIPAL IS A UNIVERSITY CAMPUS TOWN.. FULL OF STUDENTS IN THE AGE GROUP 19 TO 24..
MOST STUDENTS ARE RICH AND COME FROM USA/ CANADA/ UK/EUROPE.. THESE INDIAN GIRLS ARE NOT VIRGINS
ONCE I AND MY WIFE WENT TO A FAST FOOD JOINT TO EAT-- IT WAS FULL OF STUDENTS..
WHEN THE TIME CAME TO PAY THE BILL, THE OWNER ( A NORTH INDIAN ) CAME AND SAID HE CANNOT CHARGE ME...
HE SAID HE CAN CHARGE ONLY NORMAL HUMANS , BUT HE CONSIDERED ME TO BE AN EVOLVED HUMAN..
THEN HE EXPLAINED-- WITH MANY STUDENTS OVERHEARING..
HE WAS THERE AT MY FLAT COMPLEX, WHEN A 21 YEAR OLD MALE STUDENT DROWNED..
THERE WERE HUNDREDS OF ONLOOKERS ..
YOU CAME WALKING SURE AND CONFIDENT..
YOU SAID-- ALL ASIDE , AND ALL GAVE WAY BY THE BRUTE FORCE OF YOUR PERSONALITY..
THEN YOU ADMINISTERED CPR.. THERE WAS NO PULSE AND BREATH
HAVING FAILED- YOU THEN DID YOUR OWN BRAND OF CPR..
RURING THIS PERIOD AN AMBULANCE FROM MANIPAL HOSPITAL CAME WITH A DOCTOR.. YOU REFUSED TO RELEASE THE DROWNED BOY..SAYING THAT IF YOU DO SO THE BOY WILL HAVE BRAIN DAMAGE..
THEN YOU GOT HIS PULSE AND BREATHING WORKING.. BUT THE BOY DID NOT OPEN HIS EYES.
THEN YOU PROPPED HIM UP, USING YOUR KNEE , AND THEN GAVE A RESOUNDING SLAP ON THE BACK OF HIS NECK AND FLUNG AWAY SOMETHING AS IF IT WAS MUD..
WITHIN SECONDS THE BOY REVIVED , LOOKED AT YOU AND STARTED CRYING LOUD..
HIS PARENTS CAME AFTER THREE DAYS AND TOOK THEIR ONLY SON AWAY.. HE LEFT THE UNIVERSITY.. HE WAS NORMAL..
AFTER YOU REVIVED THE BOY YOU TOLD THE AMBULANCE TO TAKE HIM TO MANIPAL HOSPITAL, AND ADMINISTER OXYGEN ON THE WAY..
HOW MANY NORMAL HUMANS CAN DO THIS?.. HE ASKED..
WE NEVER WENT BACK TO THAT EATING JOINT AFTER THAT.. BUT THE WORD SPREAD AROUND, AND MANY GIRLS USED TO GIVE ME THE GLAD EYE..
##########################
NOW-- I AM NOT SAYING THAT NITYANANDA IS NOT A CONMAN..
THERE IS A YOUTUBE VIDEO WHERE HE CLAIMED TO HAVE DELAYED THE SUN FROM RISING-- BUT HE WAS SMILING WITH A TWINKLE IN HIS EYE AND HIS AUDIENCE WERE IN SPLITS..
IT WAS NOT LIKE THIS CONMAN CUNT BRO ANIL KUMAR , HUSBAND OF JAGAN MOHAN REDDYs SISTER, WHO CONVERTS HINDUS INTO CHRISTIANITY....
https://www.youtube.com/watch?v=A3ORZqWVwKk
BY THE WAY WHEN THE BOY WAS DROWNING, I WAS SLEEPING AFTER LUNCH ..
FROM MY BED WE COULD SEE THE POOL. MY WIFE WOKE ME UP AND COMMANDED " GO AND GIVE LIFE TO THAT BOY, ONLY YOU CAN DO IT ".
INDEED !
AFTER THE INCIDENT I GOT LOOSE MOTIONS FOR 24 HOURS.. LIP LOCK DID THIS TO ME .
http://ajitvadakayil.blogspot.com/2012/11/cpr-ambu-bag-and-oxygen-resuscitation.html
http://ajitvadakayil.blogspot.com/2010/05/hibernation-with-hydrogen-sulphide-gas_9313.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteNITYANANDA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
REPUBLIC TV
MIRROR NOW TV
TANVI SHUKLA
ARNAB GOSWAMI
RAJEEV CHANDRA SHEKHAR
RSS
MOHAN BHAGWAT
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
MOHANDAS PAI
DILIP SHANGHVI
GAUTAM ADANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
AVBP
VHP
RAM MADHAV
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SHELDON POLLOCK
WENDY DONIGER
AUDREY TRUSCHKE
ENTIRE BBC GANG
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
EVERY MLA/ MP OF INDIA
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
ASADDUDIN OWAISI
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDHI
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
FAZAL GAFOOR (MES )
E SREEDHARAN
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Captain,
DeleteIn earlier comment you said "flinging aura like pranic healers".can you please say a little more about this pranic healing?I guess nityananda is a pranic healer.
MY WIFE IS A REIKI GRANDMASTER..
DeleteREIKI WAVES ARE SCALAR WAVES WHICH TRAVEL FASTER THAN LIGHT AND CAN PENETRATE ANY BARRIER..
REIKI HEALERS ARE CHANNELS ( TRANSDUCERS ). THEY DONT HAVE PERSONAL POWERS..
PRANIC HEALERS HAVE PERSONAL POWERS .. ALL MAHARISHIS WITH 12 STRAND DNA WERE PRANIK HEALERS ..
99.99% PRANIC HEALERS TODAY ARE CHARLATANS..
PRANIC HEALERS CAN SEE YOUR AURA AND REMOVE BLACK SPOTS..
AURA CLEANSING OPENS UP BLOCKED CHANNELS AND DOES AWAY WITH DISEASED ENERGY SO THAT THE HEALING PRANA ENERGY CAN WORK WITH SPEED AND FLUIDITY.
KIRLIAN PHOTOGRAPHY IS SCIENTIFIC PROOF OF THE EXISTENCE OF OUR ETHERIC BODY. IT IS THROUGH THE ETHERIC BODY THAT PRANA OR LIFE ENERGY CAN BE ABSORBED INTO AND DISTRIBUTED THROUGH THE PHYSICAL BODY.
http://ajitvadakayil.blogspot.com/2019/08/kathiawari-jain-jew-gandhi-and-kayastha.html
http://ajitvadakayil.blogspot.com/2018/02/sanatana-dharma-hinduism-exhumed-and_3.html
https://www.youtube.com/watch?v=rlPMENCh8Y4
DeleteIF YOU HAVE ROCK SALT NEXT TO YOU IN A CONTAINER , YOU DONT HAVE TO FLING THE AURA BLACK SPOTS AWAY..
PRANA IS A SANSKRIT / MALAYALAM WORD..
amazing,unbelievable...I guess our loving captain is a pranic healer.our ancient indian healing practices and knowledge is infallible .
DeleteI AM WATCHING REPUBLIC TV..
ReplyDeleteIN FIVE MINUTES THIS CHANNEL HAS CALLED NITYANANADA "RAPIST" MORE THAN 30 TIMES..
GET THIS CLEAR -- NITYANANDA IS NOT A RAPIST..
THERE WAS A HIDDEN CAM VIDEO SHOWING TAMIL ACTRESS RANJITHA ADMINISTERING ORAL SEX TO NITYANANDA WHERE HE SEEMS LEAST INTERESTED IN HER ..
BOTH ARE ADULTS-- SO WHAT ?
SANATANA DHARMA DOES NOT ALLOW GURUS TO BE "BRAHMACHARIS"..
NTYANANDA READS MY BLOGPOSTS.. I KNOW..
I MUST CONCEDED THAT HE GOT CARRIED AWAY IN IMPRESSING HIS DEVOTEES ( LEVITATION BY BOUNCING ON ASS MUSCLES , IMITATING OSHO / FLINGING HIS AURA LIKE PRANIC HEALERS ).
NITYANANDAs ROOTLESS FOLLOWERS WILL NOW BE SWALLOWED BY CHRISTIAN EVANGELISTS WHO ARE IN THE BUSINESS OF CONVERSION..( LIKE ASARAMs FOLLOWERS )..
ARNAB GOSWAMI IS A CLOSET COMMIE..
NITYANANDA KNOWS BETTER SANATANA DHARMA THAN CONMEN SRI SRI RAVISHANKAR AND SADGURU JAGGI VASUDEV-- WHOM MODI GAVE PADMA VIBHUSHAN.. BOTH WERE BORN PAUPERS WHO BECAME MILLIONAIRES WITH KOSHER DEEP STATE SUPPORT.
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteNITYANANDA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
REPUBLIC TV
ARNAB GOSWAMI
RAJEEV CHANDRA SHEKHAR
RSS
MOHAN BHAGWAT
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
MOHANDAS PAI
DILIP SHANGHVI
GAUTAM ADANI
ALL MPs OF INDIA
ALL MLAs OF INDIA
AVBP
VHP
RAM MADHAV
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SHELDON POLLOCK
WENDY DONIGER
AUDREY TRUSCHKE
ENTIRE BBC GANG
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
EVERY MLA/ MP OF INDIA
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
ASADDUDIN OWAISI
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
SONIA GANDHI
RAHUL GANDHI
PRIYANKA GANDHI
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
FAZAL GAFOOR (MES )
E SREEDHARAN
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
mailed to-
Deletewebmaster@nithyananda.org,
Gurudev@artofliving.org,
info@ishayoga.org,
iam@amritapuri.org,
divyayoga@divyayoga.com,
contact@amitshah.co.in,
contact@republicworld.com,
info@vhp.org,
rajeev@rajeev.in,
narendramodi1234@gmail.com,
swamy39@gmail.com
Your Registration Number is : PMOPG/E/2019/0698143
DeleteDear Captain,
ReplyDeleteGreetings,
From the timing w.r.t this issue Nithyananda being targeted - arrest warrant and now being called rapist.. looks like a sinister plan ... They're targeting all Hindu religious groups.,
100% sure, this is triggered immediately after the Hyd rape case.. to malign Hindus.
Grace & peace,
JTA
Captain,
ReplyDelete"..... WITH A DEER WATCHING OUTDOORS.."
i think it means more than it says. i hope it is not silly of me to ask for a bit more detail
the natural first thing comes to mind is 'it' was filmed along with the curious deer by the window (munching on a creeper maybe).
more, only you know
SEX WAS OUTDOORS , IN THE PRESIDENTIAL PALACE GROUNDS..
Deletetruth is always more amazing than fiction!
DeleteTHERE ARE SEVERAL READERS ( EXAMPLE DHARMAPADA / ABCINDIAGOGO ETC) WHO HAVE NEVER PARTICIPATED IN ANY OF MY CAMPAIGNS, YET COME HERE TO MAKE FAALTHU COMMENTS..
ReplyDeleteFUCK OFF FROM HERE..
DHARMAPADA GOES TO THE EXTENT OF ABUSING , MY FAITHFUL READERS.. YET HE RUNS A TWITTER HANDLE , USING NUGGETS FROM THIS BLOGSITE, BUT NEVER MENTIONED THE NAME VADAKAYIL EVEN ONCE, OR DISPLAYED A BLOG POST LINK ..
Apologies Ajit Sir,
DeleteI didn't see this
I Apologize again; I didn't read this from morning but kept commenting.
Again what happened
Pardon me
I have saved this Twitter account for not getting suspended
Again I reiterate that having mentioned your name Vadakayil got one account permanently suspended.
Here in ODISHA they are seeking my Twitter help for taking up Odisha state issue.
I only RT & LIKE if anyone tags me to the Tweet where he/she has posted your screenshot.
I have been keeping eye on various handles.
Atleast assign me the task to keep an eye.
In your absence so many handles who never participated asked about you after a Twitter handle highlighted that there is no blogging happening by Captain.
Also some asked that what has happened to you, coz they might have not visited blogs for months.
Many Twitter handles operate without participating here in this comments section.
To them you have got nothing to say.
But asking me to get out.
I have been following you for years.
Won't feel at all good if you ask me to leave.
Operating 3 different accounts itself locks the other two accounts coz Twitter is asking phone number & sending OTP.
I wanted to put screenshot from 3rd account but navigating across has locked my all accounts.
Didnot try again.
Plz trust me I have been doing so many tweets on current political issues & keep relaying it.
I have never mailed to any Government office nothing.
Atleast assign me the task of keeping an eye on what's happening on Twitter platform.
Still if you ask me to totally leave, I will leave.
This is second time.
I don't want to upset you.
Ajit Sir,
DeleteI am in or out???
Plz kindly reply
Why always upset on me!!!
I promise you that once I reach Govardhan Mutt, I will tell Shri Shankaracharya ji that I have been following you & also that the Mutt needs to check with your blogs.
All this bcoz others who are pretending scholars on popular platform are doing blunder.
That's in my mind & I am aiming for that auspicious day.
It's not that I am trying to buttress you here but I have been seeking channels to reach Shri Shankaracharya ji.
Also Got the proper channel after asking here & there.
I just need an appropriate time to reach the Seer & discuss. Hope that date arrives soon.
Atleast assign me this task to keep eye on everyone.
But I can't give 100% efficiency.
Will try to give whatever possible from my side.
DHARMAPADA - IN !
DeleteThank you Dear Ajit Sir!!!
DeleteI quit
DeleteIt's painful.
Can't scroll through & see the conversation while something very lewd is shot on me.
This F**k **f is hitting me hard, over & over again.
It's the second time & I can't take this pain.
Whatever has happened has happened.
I don't know how you define Faithfulness.
Can't a person do from behind the screen?
Asking about POC...
It takes time, then I would have mentioned your name.
In my eyes no one is as erudite as you are.
This is the faith I hold on you!
On someone's behalf you have done my character assassination.
I did show him the mirror, what is dedication?!!!
In your absence from blog what was that fellow doing & what was I doing?
Someone coming on my comment & being over-smart, not acceptable!
Everyone is reading here.
If I have taken on a Reader, I did with an intention that he/she still can do me.
Never expected that a reader will exchange sugar coated conversation & that will be acknowledged while I am ambushed.
A person who has operated almost as a Whistleblower, what will that fellow gain?
No one has seen me as person, though many have asked me to meet them, I reserved my identity not to be disclosed worrying my security.
There is no space for personal shine nor making a single penny.
Last time I got compared with a fellow "Dhruv" coz he opened a site for earning.
I have no idea how money is made as such.
I can't stop myself reading your blog.
I declare!
Hope I am not called a peeping Tom.
Before I quit:
I have my appreciation for Shriram Hegde, he remained unfazed to my whips.
He is dedicated.
Charishma is doing good, she is even dedicated.
My best wishes to R.N.Murthy, he expressed his desire to join politics.
The promise I made here, I will fulfil it.
There are 2 promises.
Also Ajit Sir,
If you miss from limelight as it happened last month, I will ask about you.
For so many years I have been following you, it comes naturally to ask about the person.
DHARMAPADA-- IT IS BETTER YOU QUIT..
DeleteNamaste Captain Ajitji,
DeleteI have tasted DHARMAPADA recently.
I didn't want to get carried away making it personal here. I was more annoyed with NJAC and Hyderabad incident. I know how much my father has struggled with this judicial system.
But since you have raised concerns with dharmapada, I would like to show what I faced.
https://twitter.com/biswajit002/status/1201781406713532416
https://twitter.com/biswajit002/status/1201783442221846529
https://timesofindia.indiatimes.com/india/rafales-must-fly-in-with-meteor-air-to-air-missiles-india-tells-france/articleshow/72375495.cms
ReplyDeleteMODI HAS BOUGHT USELESS AND EXPENSIVE RAFAKE JETS , TO GET A NOBEL PRIZE..
I HAVE KEPT A TRACK OF ALL AIRFORCE OFFICERS AND CHIEF WHO PRAISED RAFALE.. WE KNOW THEIR PERSONAL AGENDA ..
JUST 4 LATEST RUSSIAN JETS CAN SPLASH ALL 36 RAFALE JETS IN A FIGHT ..
WE WANT TO KNOW-- DID RAFALE MAKE ANY POLITICAL CONTRIBUTION TO BJPs ELECTION FUNDS USING A SHELL COMPANY ?
WE WATCH..
MOSSAD DARLING SWAMY WANTS MODI TO BUY RAFALE COMPANY JEWISH DASSAULT, WHICH IS SINKING , AS THEY PRODUCE USELESS AND EXPENSIVE JET FIGHTERS..
WE THE PEOPLE DEMAND THAT NSA AJIT DOVAL MUST RESIGN AND GO... HE HAS OUTLIVED HIS UTILITY..
ReplyDeleteALL 300 CRITICAL COMMENTS FOR THE SECURITY OF BHARATMATA SENT TO MODI HAS BEEN SENT TO AJIT DOVAL TOO.. IT IS AJIT DOVALs JOB TO ADVISE MODI..
THE LINK BELOW HAS BEEN SENT TO PMO AND MODI DOZENS OF TIME.. INDIA WASTED 40% OF OUR VEGGIES/ FRUITS/ FOOD GRAINS IN OUR STORAGE GODOWNS.
ON SHIPS WE HAVE VEG ROOM ( + 4 DEG C ) , MEAT ROOM ( -15 DEG C ) AND FISH ROOM ( - 20 DEG C ) ... THESE ARE LARGE ROOMS .. THE VEG ROOM IS EQUIPPED WITH A OZONATOR DESPITE REFRIGERATION..
http://ajitvadakayil.blogspot.com/2013/06/unsung-ozone-for-instant-prevention-and.html
HAVING OZONE GENERATOR IS NOT EXPENSIVE..
http://ajitvadakayil.blogspot.com/2011/08/nitrogen-plant-with-stencher-and.html
WE ASK.. WHY DO WE HAVE USELESS IITs WITH USELESS PROFESSORS WHO CHURN OUT USELESS STUDENTS --WITH KOTA CRAM AND VOMIT MINDSET..
STOP THIS KOTA NONSENSE ..CHANGE THE PATTERN OF IIT ENTRANCE EXAM QUESTIONS, SO THAT CRAM AND VOMIT DIMWITS CANNOT PASS.
MY ELDER SON WHO RECRUITS SOFTWARE ENGINEERS IN USA, SAYS IIT PRODUCTS ARE USELESS -- CHILDREN COMING FROM LOW GRADE ENGINEERING COLLEGES IN INDIA ARE BETTER WHEN IT COMES TO THINKING OUTSIDE THE BOX ..
WE NEED A TOTAL REVAMP OF OUR EDUCATION SYSTEM.. AND PLEASE DONT USE USELESS PRAKASH JAVEDEKAR TO DO THIS..
http://ajitvadakayil.blogspot.com/2010/11/my-son-at-cornell-university-capt-ajit_25.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteNCERT
EDUCATION MINISTER/ MINISTRY
FOOD MINISTER / MINISTRY-- CENTRAL AND STATES
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
E SREEDHARAN
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Your Registration Number is : PMOPG/E/2019/0698138
DeleteWHEN YOU MAKE A COMMENT IN TIMES OF INDIA POSTS, FOR THE BENEFIT OF BHARATMATA
ReplyDeleteSEVERAL READERS WILL SLAM YOU WITH INSINUATION THAT YOUR ARE MAD AND NOT TAKING MENTAL MEDICINES ..
THIS IS IN THE BLUE BOOK OF ISRAELI HASBARAS.. THE MOMENT YOU CRITICIZE RAFALE, THESE TYPE OF JEWISH COMMENTS SLAM YOU..
http://ajitvadakayil.blogspot.com/2013/10/hasbara-jewish-propaganda-on-social.html
This happens almost always with me on instagram, when backing India. All the western insta intellectuals are totally racist and ll be concerned about the grammer of the language. They ll be like you can't even frame a sentence properly, but won't bother about the point stated.
Deletehttps://www.financialexpress.com/india-news/ban-on-ro-systems-to-continue-in-delhi-supreme-court-declines-to-stay-ngt-order/1772112/
ReplyDeleteON SHIPS I HAVE FOR 4 DECADES DRANK DEMINERALISED WATER.. WE TAKE SALT WATER FROM THE SEA, WARM IT UP USING THE RUNNING ENGINE.. THEN THIS WARM WATER IS FLASHED IN A VACCUM CHAMBER AND THE STEAM CONDENSED..
DeleteTHIS DISTILLED WATER HAS ZERO MINERALS..
ON SOME LATER SHIPS WE HAD A "MINERALISER " ( DOLOMITE ) AFTER I RAISED THIS HEALTH MATTER..
AT HOME I HAVE AN LG RO FILTER WITH INBUILT MINERALISER..
BOTH DISTILLED AND REVERSE OSMOSIS WATER ARE DEVOID OF MINERALS, BUT INGESTING MINERAL-FREE PURIFIED WATER IS NOT HARMFUL TO YOUR BODY PROVIDED YOU CONSUME FRESH “ORGANIC” VEGETABLES..
REVERSE OSMOSIS PROCESS REMOVES 92- 99% OF BENEFICIAL CALCIUM AND MAGNESIUM. .. HAVE A2 MILK OF HUMPED COWS FOR CALCIUM..
MAGNESIUM IS A CO-FACTOR FOR HUNDREDS OF ENZYME REACTIONS WITHIN THE BODY. THESE ENZYMES ARE VITAL FOR A VARIETY OF IMPORTANT PROCESSES SUCH AS THE CONVERSION OF ENERGY FROM CARBOHYDRATES, FATS AND PROTEIN, NOT TO MENTION HEALTHY DNA SYNTHESIS, BLOOD SUGAR BALANCE, BONE HEALTH AND A CALM NERVOUS SYSTEM. WE REQUIRED MAGNESIUM FOR REM SLEEP.
FOODS WHICH CONTAIN MAGNESIUM:--
GREEN LEAFY VEGETABLES (E.G. SPINACH )
FRUIT ( BANANA )
NUTS AND SEEDS
LEGUMES (BLACK BEANS, CHICKPEAS AND KIDNEY BEANS)
VEGETABLES (PEAS, BROCCOLI, CABBAGE, GREEN BEANS)
SEAFOOD
WHOLE GRAINS (BROWN RICE AND OATS)
http://ajitvadakayil.blogspot.com/2011/02/quantum-drink-coconut-water-capt-ajit.html
Thank you Captain _/\_
Deletehttps://www.newsclick.in/apco-kotler-artificial-glossing-modis-image
ReplyDelete.....Modi is the first mainstream Indian politician who has carefully tried to build his image rather assiduously. More than a decade ago, when he was still Chief Minister of Gujarat, he had embarked on building his image by roping in a US lobbying firm, APCO Worldwide, at a monthly cost of $25,000 (2007). A lobbying firm which in its own words [o]ffers “professional and rare expertise” to governments, politicians and corporations, and is always ready to help clients to sail through troubled waters in the complex world of both international and domestic affairs.’.....
https://timesofindia.indiatimes.com/india/sc-frowns-on-hc-judge-for-sealed-cover-jurisprudence/articleshow/72375763.cms
ReplyDeleteIDIOTS LIKE KATJU , WHEN HE WAS SUPREME COURT JUDGE USED TO INCLUDE URDU COUPLETS OF JEW FAIZ AHMED FAIZ IN HIS JUDGEMENT.. TO APPEAR AS A LEARNED GENIUS..
THERE WAS A SUPREME COURT JUDGE WHO USED TO QUOTE MAD JEW SIGMUND FREUD IN HIS RULINGS ABOUT "MILK OF COMPASSION"..
WHAT IS ALL THIS?
WHY DO WE HAVE A USELESS LAW MINISTER LIKE RAVI SHANKAR PRASAD?
ACCORDING TO GERMAN JEW SIGMUND FREUD , ANTI-SEMITISM WAS A UNIVERSAL PATHOLOGY WHICH HAD ITS ROOTS IN SEXUAL REPRESSION. ITS CURE LAY IN “SEXUAL LIBERATION”.
THE THEORY, IN ITS CRUDEST AND SIMPLEST FORM, AMOUNTED TO THIS: INSTEAD OF PICKING ON THE JEWS, WHY NOT JUST CHILL OUT AND HAVE SEX?
THE SAME TYPE OF ARGUMENT IS BEING USED BY DEEP STATE DARLING CHETAN BHAGAT , WITH HINDU BHAKTS .
http://www.indiatimes.com/news/india/chetan-bhagat-says-indian-modi-bhakts-on-twitter-are-sexually-frustrated-single-men-234670.html
THE UNDERLYING FREUDIAN ASSUMPTION HERE IS THAT SEX IS THE GREAT LIBERATOR AND THAT ALL FRUSTRATIONS CAN BE ALLEVIATED BY SEXUAL ACTIVITY—PARTICULARLY BY DEVIANT, OBSESSIVE AND ADDICTIVE SEX.
JEW SIGMUND FREUD WHO WAS OBSESSED WITH THE ANUS COMMITTED SUICIDE BY MORPHINE INJECTION ..
THE JEWISH PSEUDO-SCIENCE OF PSYCHOANALYSIS IS ALSO LOADED WITH FECAL-MINDED PERSONALITIES.
THE COKE-SNIFFING JEW WHO INVENTED IT, SIGMUND FREUD, WAS HIMSELF BORDERLINE OBSESSED WITH BATHROOM BEHAVIOR AND DESCRIBED THE SECOND STAGE OF HIS THOROUGHLY DISTURBING “PSYCHOSEXUAL DEVELOPMENT” THEORY AS THE “ANAL STAGE,” IN WHICH, AROUND THE AGE OF TWO, PLEASURABLE SENSATIONS BECOME CENTERED ON THE ANUS, AND CHILDREN BECOME FASCINATED BY THEIR OWN FECES.
THIS IS THE STAGE OF LIFE WHERE “ANAL PERSONALITIES” COULD DEVELOP, HE CLAIMED.
THE FIRST OF HIS “PSYCHOSEXUAL DEVELOPMENT” STAGES IS THE “ORAL STAGE” AND THE THIRD IS THE “PHALLIC STAGE,” BY THE WAY—JUST TO GIVE YOU AN IDEA OF HOW SICK THE MAN WAS.
GERMAN JEWS SIGMUND FREUD WAS CROWNED A “ THE FATHER OF PSYCHOANALYSIS” BY ROTHSCHILD’S MEDIA.
THE MIND CONTROL TAVISTOCK INSTITUTE FOUNDED BY ROTHSCHILD AGENTS AFTER WW2 TO DO NWO SOCIAL ENGINEERING AND TO PROPAGATE THE FAKE THEORIES OF MAD MAN JEW SIGMUND FREUD –HIS SEXED UP PSYCHOANALYSIS AND THE PSYCHODYNAMIC THEORIES .
THE AGENTS OF TAVISTOCK HAS INFILTRATED EVERY POSSIBLE BRANCH OF LIVING ON THIS PLANET.- JUDICIARY, LEGISLATURE, MEDIA, POLICE, ARMY, CHURCHES, SCHOOLS, SPORTS, ART, MUSIC, ETC. EVERY ELITE CORPORATION, UNIVERSITY, THINK TANK OR FOUNDATION IS INFILTRATED BY TAVISTOCK. THEY WORKED IN TANDEM WITH THE FAMILY ( PRAYER BREAKFAST OF DOUG COE).
SIGMUND FREUD WAS TAVISTOCK'S FIRST DIRECTOR, FOLLOWED BY HIS DAUGHTER, ANNA.
MK ULTRA MIND CONTROL?? – MK ARE THE INITIALS OF ROTHSCHILDs AGENTS GANDHI AND KING…
http://ajitvadakayil.blogspot.com/2018/07/martin-luther-king-jr-had-125-white.html
WHAT DO WE SEE ON OUR BENAMI INDIAN MEDIA TODAY? PROPAGANDA DISGUISED AS NEWS. THE WHOLE OF YESTERDAY REPUBLIC TV AND MIRROR NOW TV WERE SCREAMING THAT NITYANAANDA IS A RAPIST ( HE IS INCAPABLE -- ASK RANJITHA )
CAPT AJIT VADAKAYIL WHO HAS READ HIS BOOKS SAYS – “ SIGMUND FREUD WAS NO INTELLECTUAL . HE WAS AN IDIOT “ !
SUDDENLY THE WHOLE WORLD IS ABUZZ WITH THE NEWS OF A DROWNED SYRIAN CHILD. ANGELA MERKEL WITH HITLERS EYES AND CHIN FLOODED EUROPE WITH SYRIAN REFUGEES.
CONTRARY TO WHAT PEOPLE THINK NIXON WAS A GOOD PRESIDENT . IF YOU DON’T TOE THE TAVISTOCK LINE , THEY MAKE AN EXAMPLE OUT OF YOU.
IT WAS PRESIDENT NIXON WHO FINALLY HALTED THE MOST FOUL WAR TACTIC OF SPRAYING DEADLY TOXIN ON VIETNAMESE PEOPLE FROM THE AIR.
http://ajitvadakayil.blogspot.com/2015/11/pol-pot-of-khmer-rouge-great-cambodian.html
WHO IS GRETA THUNBERG ( LIVE VERSION OF THE DROWNED SYRIAN CHILD )..
https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteKATJU BABY
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
SOLI BABY
FALI BABY
SALVE BABY
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SHELDON POLLOCK
WENDY DONIGER
AUDREY TRUSCHKE
ENTIRE BBC GANG
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
NITYANANDA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
REPUBLIC TV
MIRROR NOW TV
TANVI SHUKLA
ARNAB GOSWAMI
E SREEDHARAN
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Your Registration Number is : PMOPG/E/2019/0698124
DeleteSir, sent emails to Law minister, PMO, Modi, Amit shah, supreme court, armed forces and few Journalists.
DeletePEDOPHILE KATHIAWARI JEW GANDHI IS DEAD..
ReplyDeleteBUT WE THE PEOPLE DEMAND THAT GANDHI MUST BE TRIED IN ABSENTIA .
TRY ROTHSCHILDs AGENT GANDHI FOR FOUL SEX CRIMES ( WHEN HE WAS ALIVE ) AND ATTACH THE JUDGEMENT TO HIS LEGACY..
http://ajitvadakayil.blogspot.com/2017/01/mahatma-gandhi-and-his-endless.html
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
IF INDIA HAS TO BE THIS PLANETs NO 1 SUPERPOWER IN 14 YEARS , WE NEED TO SURGICALLY EXTRACT AND DISCARD GANDHI FROM OUR COLLECTIVE MINDS..
CHANAKYA IS THE FATHER OF OUR NATION-- NOT GANDHI..
http://ajitvadakayil.blogspot.com/2014/08/chanakya-taxila-university-professor.html
I ASK MY READERS TO HOLD A POLL IN THEIR WEBSITES-- WHO SHOULD BE FATHER OF OUR NATION GANDHI / CHANAKYA / ADI SHANKARACHARYA ..
BOTH CHANAKYA AND ADI SHANKARACHARYA ARE KERALA NAMBOODIRIS..
capt ajit vadakayiil
..
PUT ABOVE COMMENT IN WEBSITES OF-
SOUTH AFRICAN PRESIDENT
AMBASSADOR TO FROM SOUTH AFRICA
TRUMP
PUTIN
PM OF UK
AMBASSADORS TO FROM USA/ RUSSIA/ UK
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
ENTIRE BBC GANG
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
NITYANANDA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
REPUBLIC TV
MIRROR NOW TV
ARNAB GOSWAMI
E SREEDHARAN
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Your Registration Number is : PMOPG/E/2019/0698121
DeleteSir, President of South Africa acknowledged your above comment.
DeleteWe acknowledge with thanks, receipt of your correspondence addressed to the President of the Republic of South Africa, His Excellency, President Cyril Ramaphosa.
pranam captain,
Deletepoll on twitter:
https://twitter.com/prashantjani777/status/1202985011558916097
https://www.cnbc.com/2019/12/04/trump-abruptly-cancels-nato-press-conference-after-summit-turns-sour.html
ReplyDeleteNATO IS THE PRIVATE ARMY OF THE JEWISH DEEP STATE !
http://ajitvadakayil.blogspot.com/2017/05/nato-bombing-of-yugoslavia-in-1999-and_25.html
http://ajitvadakayil.blogspot.com/2017/05/nato-bombing-of-yugoslavia-in-1999-and.html
What did you do when you flung away the mud like action from the drowning youths throat? Any hints at the most lowest denominator will be mist welcome.
ReplyDeleteOr is it magicians never tell?!
https://www.theyouth.in/2019/12/04/all-accused-of-hyderabad-rape-were-muslims-police-admit-to-change-their-names-says-swami-narhari/
ReplyDelete?????
Police claims 3 out of 4 are minors. Coincidentally 3 out of 4 are Hindus too. To avoid getting caught and claim that they are minors, one would need to change names or else anyone can catch with actual names.
DeleteThey have accepted their crimes.. But Still no justice...
Our Kayastha minister Ravi Shankar Prasad and Modi keep mum as usual
hi captain,,,,
ReplyDeletewhat kind of people comes in 2nd and 3rd layer of moksha?
SOME ONE ASKED ME
ReplyDeleteCAPTAIN, WHY IS IT THAT THE MOMENT A JEWISH WOMAN HONEY TRAP INFILTRATES THE ROYAL BLOODLIE, LOYALTIES CHANGE ?
JEWS HAVE NEVER IENTIFIED THEMSLEVES WITH ANY LAND BEFORE JEW ROTHSCHILD CREATED ISRAEL..
NOT A SINGLE JEW IN ISRAEL TODAY HAS ANY MORAL CLAIM TO PALESTINE.. THESE JEWS DO NOT HAVE THE DNA OR LOOKS OF NEIGHBOURING NATIONs PEOPE..
THIS IS LIKE NIGERIAN MUSLIM CONVERTS LAYING CLAIM TO MECCA AND SAUDI OIL FIELDS JUST BECAUSE THEY CONVERTED TO ISLAM..
AN INDIAN JEW WILL LET DOWN HIS WATAN, IF HE CAN HELP ANY JEW IN ANY OTHER NATION..
CHRISTIANE AMANPOUR IS AN IRANIAN JEWESS.. SHE HAS NO LOYALTIES TO HER MOTHERLAND IRAN..
http://ajitvadakayil.blogspot.com/2017/04/the-most-evil-journalist-capt-ajit.html
ALL JEWISH HEROES LIKE ABRAHAM/ MOSES/ JESUS WERE COOKED UP IN 325 AD BY JEWESS HELENA..
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
ISRAEL'S LAW OF RETURN STIPULATES THAT A JEW IS SOMEONE WITH A JEWISH MOTHER OR SOMEONE WHO HAS CONVERTED TO JUDAISM AND IS NOT A MEMBER OF ANOTHER RELIGION..
THE ISRAELI CHIEF RABBINATE REQUIRES DOCUMENTS PROVING THE JEWISHNESS OF ONE’S MOTHER, GRANDMOTHER, GREAT-GRANDMOTHER AND GREAT-GREAT-GRANDMOTHER WHEN APPLYING FOR MARRIAGE.
THE OFFICE OF THE CHIEF RABBI (OCR) HAS UNDERLINED THE BASIC PRINCIPLE THAT A CHILD IS NOT RECOGNISED BY THE OCR AND OTHER BODIES AS JEWISH UNLESS THEIR MOTHER IS JEWISH, OR THEY UNDERWENT A CONVERSION RECOGNIZED BY THE BODY.
BUT HEY, THE JEWISH STATUS OF A PERSON IN ISRAEL IS CONSIDERED A MATTER OF "NATIONALITY".
JEWISH HERO KING SOLOMON HAD A KERALA NAMBOODIRI HINDU MOTHER BATH SHEBA AND A KERALA THIYYA HINDU WIFE QUEEN OF SHEBA…
HIS OWN SON WITH SHEBA ( MENELIK ) CAME BACK TO KERALA AFTER A BRIEF VISIT TO PALESTINE TO SEE HIS FATHER SOLOMON WHEN HE BECAME ADULT AGED 19, ALONG WITH THE ARK OF THE COVENENT, WHICH WAS BASICALLY A SHIVA LINGAM BLACK METEORITE STONE AND A COPPER DRIPPER POT INSIDE A STURDY WOODEN BOX WITH FOUR LONG HANDLES .. THERE WERE TWO OLDEN IDOLS OF SHIVA AND SHAKTI ON THE COVER OF THIS BOX..
ROTHSCHILD HISTORAINS HAVE LIED THAT KERALA THIYYA QUEEN SHEBA IS FROM ETHIOPIA..
ROTHSCHILD MADE ETHIOPIAN RULER HAILE SELASSIE LIE THAT HE IS A DESCENDANT OF SOLOMON AND SHEBAs SON MENELIK..
FOR SUCH A TERRIFIC LIE ROTHSCHILD MADE HAILE SELASSIE EMPEROR OF ETHIOPIA FROM 1930 TO 1974.
HAILE SELASSIE – BORN TAFARI MEKONNEN – IN HIS AUTOBIOGRAPHY, MY LIFE AND ETHIOPIA'S PROGRESS 1892-1937, WRITTEN IN AMHARIC, THE OFFICIAL LANGUAGE OF ETHIOPIA, SELASSIE SET OUT HIS CLAIM TO NOBILITY.
"THUS WE OURSELVES, BY VIRTUE OF OUR DESCENT FROM THE QUEEN OF SHEBA AND KING SOLOMON, EVER SINCE WE ACCEPTED IN TRUST ... FIRST THE REGENCY OF THE ETHIOPIAN REALM AND LATER THE IMPERIAL DIGNITY, RIGHT UP TO THE PRESENT- BLAH BLAH FUCKIN’ BLAH “
HAILE SELASSIE IS REVERED AS THE RETURNED MESSIAH OF THE BIBLE, GOD INCARNATE.. HIS ANCESTOR KING YEKUNO AMLAK NEVER EXISTED ..
THE SEVEN CANDLE GOLDEN MENORAH IS NONSENSE .. THE BIG LIES IS THAT THIS SEVEN PRONGED LAMP WAS LIT EVERY DAY IN THE TABERNACLE, AND THEN THE HOLY TEMPLE IN JERUSALEM
MOSES ( WHO NEVER EXISTED ) STATED WHAT THE MENORAH SHOULD LOOK LIKE. “ HAMMERED OUT OF A SINGLE CHUNK OF PURE GOLD, IT COMPRISES A SINGLE STEM FROM WHICH SIX BRANCHES EXTEND ON AN UPWARD SLANT. ON THE TIP OF EACH OF THE BRANCHES, AS WELL AS ON THE CENTRAL STEM, ARE CUPS INTO WHICH OLIVE OIL AND WICKS ARE TO BE PLACED. BLAH BLAH FUCKIN’ BLAH )
THE REAL MENORAH WAS CARVED AT NAZCA PERU 12,000 YEARS AGO. IT IS THREE PRONGED SHIVA’S FLAMING TRIDENT..
I HAVE PUT A PICTURE IN THE POST BELOW—
http://ajitvadakayil.blogspot.com/2019/07/secrets-of-12000-year-old-machu-picchu_29.html
THE FLAMING TRIDENT CAN ALSO BE SEEN IN THE BRITANNICA POST BELOW
https://www.britannica.com/place/Nazca-Lines
KOSHER LIES WONT WORK !
CAPT AJIT VADAKAYIL
..
SEND ABOVE COMMENT TO THE
DeleteIRANIAN / ETHIOPIAN AMBASSADOR TO INDIA
INDIAN AMBASSADOR TO IRAN / ETHIOPIA
EXTERNAL AFFAIRS MINISTER/ MINISTRY
PMO
PM MODI
AJIT DOVAL
RAW
NCERT
EDUCATION MINISTER
I&B MINISTER/ MINISTRY
MaiLed To
Deletehoc.tehran@mea.gov.in
iranconsulate.hyd@mfa.gov.ir
ambassador.newdelhi@mfa.gov.et
indiamajd@yahoo.com
delethem@yahoo.com
hoc.addisababa@mea.gov.in
eam@mea.gov.in
connect@mygov.nic.in
info.nia@gov.in
pd.ncert@nic.in
secy.ncert@nic.in
minister.hrd@gov.in
minister.inb@gov.in
jspna-moib@gov.in
PMOPG/E/2019/0697332
MOIAB/E/2019/04384
DOSEL/E/2019/05254
DSEHE/E/2019/07560
Sir sent to -
DeleteIranemb.del@mfa.gov.ir
Iranemb.del@mfa.gov.ir
cons.tehran@mea.gov.in
jsxp@mea.gov.in
Guruji,
DeleteThis mail id has blocked the above comment mail I sent...
ambassador.newdelhi@mfa.gov.et
WE KNOW THE DEEP STATE PAYROLL TRAITORS IN OUR VARIOUS MINISTRIES..
DeleteTHEY ARE ALL SHITTING IN THEIR PANTS TODAY
Akbar ordered a converted Brahmin to write Allopanishad. This book was then fraudulently inserted in genuine copies of Atharva Veda. One verse of Allopanishad reads-"Allo Rasula Mahamad Akbarasya allam" Until early 20th century, many Atharvaveda manuscripts had Allopanishad
ReplyDeletehttps://twitter.com/TIinExile/status/1201397437459357696?s=20
https://timesofindia.indiatimes.com/india/breaking-news-live-december-5/liveblog/72376715.cms
ReplyDeletePOOR CHID
HE DOES NOT KNOW THAT INDIA IS THE ONLY ROARING ECONOMY ON THE PLANET TODAY
THROW SOME STALE PULIYODHARAI IN HIS GENERAL DIRECTION..
https://youtu.be/0_zVm0c6ckI
ReplyDeleteThere is this man claiming US president Trump will be last president of US , ....Etc etc etc...
Doom and gloom ..3rd world war...
Indian people to stash away dome amount to India...etc
https://www.youtube.com/watch?v=4U6j9qcJUyw
ReplyDeleteWHAT IS NATO?
AN ALLIANCE OF JEWISH DEEP STATE CONTROLLED NATIONS.. THE PRIVATE ARMY OF THE DEEP STATE..
https://www.youtube.com/watch?v=6tonNJdudYk
ReplyDeletePOOR ROTHSCHILDs MEDIA ..
Your Registration Number is : PMOPG/E/2019/0697712
ReplyDeleteRef:ALL THIS EVIL PROPAGANDA IS CAUSED BY DEEP STATE CONTROLLED NCW AND BENAMI MEDIA..,
https://youtu.be/lsJBGvyiAHI
ReplyDeleteThis is the level of our future civil servants. See the mock interview.
Your Registration Number is : PMOPG/E/2019/0697813
ReplyDeleteRef: IDIOTS LIKE KATJU , WHEN HE WAS ....
https://timesofindia.indiatimes.com/india/verdict-allowing-women-into-sabarimala-not-final-word-as-matter-referred-to-larger-bench-supreme-court/articleshow/72381098.cms
ReplyDeleteEVEN IF IT THE THE FINAL WORD OF COLLEGIUM JUDICIARY WE THE PEOPLE DO NOT CARE...
WE THE PEOPLE ARE ABOVE THE CONSTITUTION..
THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..
WE WILL SOON FORM MILITARY COURTS TO HANG TRAITOR JUDGES ON DEEP STATE PAYROLL WHO CREATED THE RED NAXAL CORRIDOR, WHO ALLOWED ETHNIC CLEANING OF KASHMIRI PANDITS, WHO HAVE GVEN PRIORITY FOR "STARE DECICIS " MADE OUT OF CONTEXT OVER THE CONSTITUTION , AND WHO HAS STRUCK DOW NJAC, DESPITE BEING PASSED UNANIMOUSLY BY BOTH LOK SABHA , RAJYA SABHA WITH SIGNATURE OF PRESIDENT...
ENOUGH IS ENOUGH....
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..
JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...
JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…
PRESIDENT AND STATE GOVERNORS ARE NOT RUBBER STAMPS AS CONTENDED BY BENAMI MEDIA AND ILLEGAL COLLEGIUM JUDICIARY..
INDIA IS NOT A DEMOCRACY..
INDIA IS A BANANA REPUBLIC CONTROLLED BY DEEP STATE WHITE JEWS FROM ABROAD….
Read all 8 parts of the post below--
Go0gle for the blogpost below--
…………………………….. JUSTICE BE DAMNED , ENFORCE THE LAW ! .. NOT ANY MORE, IN FREE INDIA !! Vadakayil …………………
POWER GENERATORS ARE CURRENTLY CONTROLLED DIGITALLY, AND THE GRID OVERALL HAS GROWN VASTLY MORE COMPLEX AND EXPANSIVE AS OUR ENERGY NEEDS HAVE EXPANDED.
ReplyDeleteINDIA DOES NOT EVEN HAVE A FABLAB TO MANUFACTURE CHIPS..
JEWISH DEEP STATE DARLINGS MODI / AJIT DOVAL HAS DELIBERATELY IGNORED THIS ASPECT DESPITE BEING TOLD AT LEAST 30 TIMES BY THE BLOGSITE..
PAKISTAN HAS HUNDREDS OF TACTICAL NUKES TO DO EMP ATTACK AND TAKE DOWN OUR ELECTRICAL GRID
WE MUST HAVE ANALOG BACKUP SYSTEMS WERE OUR ELECTRIC GRIDS ARE DIGITAL. SMART CITY DOES NOT MEAN DIVING OFF THE DEEP END IN A MINDLESS MANNER.
ANALOG BACKUPS ARE ESSENTIALLY SWITCHES THAT MUST BE FLIPPED BY A HUMAN OPERATOR. DIGITAL BACKUPS ARE CONTROLLED BY AUTOMATED COMPUTER SYSTEMS.
A SOPHISTICATED ENOUGH CYBER-ATTACK COULD KNOCK OUT THE BROADER POWER SUPPLY WHILE ALSO PREVENTING THE AUTOMATED SYSTEM FROM RECOVERING QUICKLY. AN ANALOG BACKUP WOULD PROVIDE A MECHANICAL STOPGAP MEASURE IN CASE OF AN EMERGENCY.
ALL THIS PUSH BY THE DEEP STATE TO ARM TWIST INDIA INTO SOLAR AND WIND POWER IS ALSO TO FORCE US TO MAKE OUR ELECTRIC GRID DIGITAL.
WITH A CREDIT CARD THEFT, YOU MIGHT HAVE TO PAY A SMALL AMOUNT AND GET A NEW CREDIT CARD.. BUT WITH INFRASTRUCTURE ATTACKS, REAL PHYSICAL DAMAGE CAN OCCUR, AND RECOVERY CAN TAKE WEEKS OR MONTHS.
FUTURE NUCLEAR SUBMARINES INDIA BUYS MUST HAVE THE CAPABILITY TO ALSO POWER AT LEAST THE MILITARY INFRASTRUCTURE AND CRITICAL SECTORS OF THE COASTAL CITY WHILE UNDERWATER.
Capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
Sent to-
Deletepresidentofindia@rb.nic.in
proiaf.dprmod@nic.in
webmaster.indianarmy@nic.in
proiaf.dprmod@nic.in
Rajnath Singh <38ashokroad@gmail.com>,
ambuj.sharma38@nic.in
information@cbi.gov.in
info.nia@gov.in
contact@amitshah.co.in,
narendramodi1234 ,
Nirmala Sitharaman ,
mos-defence@gov.in,
ombirlakota@gmail.com,
vch-niti@nic.in,
vch-niti@gov.in
mcitoffice@gov.in
ravis@sansad.nic.in,
secylaw-dla@nic.in
mcitoffice@gov.in
supremecourt@nic.in,
nalsa-dla@nic.in
alokmittal.nia@gov.in
dgp.pol@kerala.gov.in,
dgp@keralapolice.gov.in,
igpekmrange.pol@kerala.gov.in
dgp@tspolice.gov.in,
dgp-rj@nic.in,
dgp.punjab.police@punjab.gov.in,
dgp-mnp@nic.in,
dgp@jhpolice.gov.in
dgpmp@mppolice.gov.in,
dgpms.mumbai@mahapolice.gov.in,
meghpol@hotmail.com,
dgofpoliceorissa@sify.com,
dgp.pon@nic.in
dgofpoliceorissa@sify.com,
dgp.pon@nic.in,
phq@tn.nic.in,
dgp@up.nic.in,
dgp-hp@nic.in,
dgp-gs@gujarat.gov.in,
digp-daman-dd@nic.in,
police-chd@nic.in,
dgp-bih@nic.in,
dgp@appolice.gov.in
dgp@and.nic.in,
police@hry.nic.in,
our Registration Number is : PMOPG/E/2019/0699912
DeleteHello Sir,
In the name of Smart Cities i feel they ll spread 5G kind of technology and WIFI every where.
Smart Meters are reality abroad, and the yanks are being made a guneapig.
I read that Smart Meter is cause of lot of fires.
All major mumbai railway stations have free google WIFI.
Smart Cities will need good think tanks to build them.
I TOOK DELIVERY OF A NEW CHEMICAL TANKER FROM A EUROPEAN SHIP YARD..
DeleteEVERY MACHINERY WAS TOTALLY AUTOMATED ANDDIGITAL ( PLCs / MICROPROCESSORS )..
THERE WAS NO MANUAL BACKUP FOR AUTOMATION FAILURE..
IMAGINE GETTING STUCK IN A HIGHLY AUTOMATED LIFT FOREVER.. WITH NO MANUAL EMERGENCY RELEASE..
THIS IS HOW I BECAME AN EXPERT IN "JUMPER WIRE TECHNOLOGY"..
I WAS AN EXPERT IN BYPASSING AUTOMATED INTERLOCKS USING A 6 INCH PIECE OF WIRE..
READ ITEM 553 OF THE POST BELOW-- WHERE I AM WARNING THAT I WILL BE CONSTRAINED TO USE "JUMPER TECHNOLOGY"..
http://ajitvadakayil.blogspot.com/2011/02/naive-sailor-ship-construction-capt.html
THE SHIPYARD / MACHINERY EXPERTS USED TO MARVEL HOW A BROWN SKINNED INDIAN CAPTAIN COULD FIND OUT INSTANT FAULTS IN HIGHLY COMPLICATED MACHINERY , EVEN WITHOUT STARTING IT..
SO WHEN VADAKAYIL SAYS-- INDIAN THINK TANS HAVE SHIT FOR BRAINS-- OR IIT 95% PROFESSORS ARE USELESS--PAY HEED..
I HAVE EARNED MY SPURS ..
capt ajit vadakayil
..
Hi captain
DeleteSent the emails to addresses shared by Sri ram hegde
At the heart of AI applications is the multiply accumulate function (MAC) or dot product operation. This takes two numbers, multiplies them together, and adds the result to an accumulator. The numbers are fetched from and stored to memory. Those operations are repeated many times and account for the vast majority of the time and power consumed by both learning and inferencing.
ReplyDeleteOne reason for the rapid growth in machine learning was the availability of GPUs. These devices, although initially intended for graphics processing, have large numbers of MACs and high-speed memory interfaces. They can perform the necessary computations much faster than a general-purpose CPU. The downside is that GPUs tend to utilize floating-point arithmetic, which is well beyond the needs of AI algorithms.
It is possible to produce a chip that follows the digital architectures but uses analog circuitry. Toshiba has produced a chip that performs MAC operations using phase-domain analog technology. It uses the phase domain of an oscillator circuit by dynamically controlling oscillation time and frequency.
They claim that the technology makes it possible to collectively process multiplication, addition, and memory operations that are conventionally processed by individual digital circuits, using one-eighth of the power of digital circuits with the same area.
One of the issues with analog is that they have limited precision, basically defined by the noise floor. Digital circuitry has no such limitation, but as the need for precision is reduced, it is becoming in the realm of what analog circuitry is capable of providing.
Digital data is easy to copy and attack, but analog is not.
When digital goes wrong, it can go catastrophically wrong, whereas analog is able to tolerate errors much better.
If you have seen the emergence of adversarial networks and how you can inject noise into the system to fool it into classifying an image or fooling it into how it detects language of a transcription, this tells you the fragility that is inherent in these systems. You can go from something looking like a bus and after noise injections it says it a zebra. You can poison neural networks and they are subject to all sorts of attacks.
AI is basically a statistical process.. AI is basically a statistical process.. Researchers do not fully understand what is happening within a neural network. DARPA has a program to create more explainable AI systems, arguing that if you cannot explain the actions a system is taking, it is impossible to trust it.
Others believe that such a goal is not feasible, and three laws of AI have been defined. The third law states that “any system simple enough to be understandable will not be complicated enough to behave intelligently, while any system complicated enough to behave intelligently will be too complicated to understand
If you can take the whole idea of signal processing and do an analog arithmetic logic unit (ALU) or mixed signal ALU, you can increase the performance by orders of magnitude, and at the same time reduce the power dissipation by orders of magnitude. And the only problem with that is that youI have an issue with dynamic range, with accuracy and with linearity.
https://www.youtube.com/watch?v=EsIm1PObDgc
The whole area of AI and deep learning will be better addressed once the relationship between performance, power dissipation and size will be understood to the point that people can do on their smartphones in real-time the magnitude of computing that occurs only in the cloud today.
http://ajitvadakayil.blogspot.com/2010/05/hibernation-with-hydrogen-sulphide-gas_9313.html
ReplyDeleteSOMEBODY CALLED ME UP AND CRIED
CAPTAIN CAN YOU TELL A WEE BIT MORE ABOUT H2S AND HUMAN HIBENATION-- CHAATVE KE VAASTE?
WOKAY !
HYDROGEN SULFIDE (H2S) IS A MEMBER OF A GROUP OF SIGNALING MOLECULES TERMED 'GASOTRANSMITTERS'.
HYDROGEN SULFIDE—ALONG WITH NITRIC OXIDE IS CENTRAL TO A WIDE RANGE OF KEY CELLULAR FUNCTIONS.
HYDROGEN SULPHIDE (H2S) IS ENDOGENOUSLY PRODUCED IN MAMMALIAN TISSUES AND FUNCTIONS AS A NEUROMODULATOR IN THE BRAIN
HIBERNATION IS CONTROLLED BOTH BY THE CENTRAL NERVOUS SYSTEM (CNS) AND ENDOCRINE SYSTEM.
THE HUMAN NERVOUS SYSTEM IS COMPOSED OF TWO PARTS: THE CENTRAL NERVOUS SYSTEM, WHICH INCLUDES THE BRAIN AND SPINAL CORD, AND THE PERIPHERAL NERVOUS SYSTEM, WHICH IS COMPOSED OF NERVES AND NERVE NETWORKS THROUGHOUT THE BODY.
THE CENTRAL NERVOUS SYSTEM (CNS) IS MADE UP OF THE BRAIN AND SPINAL CORD. THE PRIMARY FORM OF COMMUNICATION IN THE CNS IS THE NEURON.
THE ENDOCRINE SYSTEM IS ALSO ESSENTIAL TO COMMUNICATION. THIS SYSTEM UTILIZES GLANDS LOCATED THROUGHOUT THE BODY, WHICH SECRETE HORMONES THAT REGULATE A VARIETY OF THINGS SUCH AS METABOLISM, DIGESTION, BLOOD PRESSURE AND GROWTH. WHILE THE ENDOCRINE SYSTEM IS NOT DIRECTLY LINKED TO THE NERVOUS SYSTEM, THE TWO INTERACT IN A NUMBER OF WAYS.
ENTRANCE TO HIBERNATION INVOLVES: (1) ACTIVATION OF HYPOTHALAMIC REGIONS, AND (2) INHIBITION OF CORTICAL REGIONS.
HIBERNATION IS AN ADAPTATION MAINLY FOUND IN MAMMALS AND BIRDS THAT OCCURS AT PHYSIOLOGICAL, BEHAVIOURAL AND MOLECULAR LEVELS TO SUSTAIN LIFE DURING WINTER MONTHS WHEN RESOURCES ARE INSUFFICIENT OR UNPREDICTABLE.
IT IS GENERALLY ASSOCIATED WITH A PROFOUND REDUCTION IN CORE BODY TEMPERATURE TO THE LEVEL OF AMBIENT TEMPERATURE AND A REDUCTION IN METABOLIC RATE TO A FRACTION OF BASAL METABOLIC RATE (BMR), PARALLELED WITH BRADYPNEA AND REDUCED HEART RATE
LIKE HIBERNATION, TORPOR IS A SURVIVAL TACTIC USED BY ANIMALS TO SURVIVE THE WINTER MONTHS. IT ALSO INVOLVES A LOWER BODY TEMPERATURE, BREATHING RATE, HEART RATE, AND METABOLIC RATE. BUT UNLIKE HIBERNATION, TORPOR APPEARS TO BE AN INVOLUNTARY STATE THAT AN ANIMAL ENTERS INTO AS THE CONDITIONS DICTATE
DOLPHINS GO TO SLEEP WITH ONLY ONE SIDE OF THEIR BRAIN SO THAT THEY USE THE OTHER SIDE OF THEIR BRAIN FOR SWIMMING AND TO WATCH OUT FOR PREDATORS. ...
PSSSSSTT-- JELLYFISH, TURRITOPSIS DOHRNII IS 'BIOLOGICALLY IMMORTAL'.. THESE SMALL, TRANSPARENT ANIMALS HANG OUT IN OCEANS AROUND THE WORLD AND CAN TURN BACK TIME BY REVERTING TO AN EARLIER STAGE OF THEIR LIFE CYCLE.
HTTPS://WWW.YOUTUBE.COM/WATCH?V=DDOEBNPBIDI
GETTING BACK—
SIMILAR TO HIBERNATION, TORPOR IS A SURVIVAL TACTIC INVOLVING A REDUCTION IN BODY TEMPERATURE AND METABOLIC RATE. THE PHYSIOLOGICAL DEFINITIONS OF TORPOR AND HIBERNATION REMAIN UNCLEAR BUT THEY ARE USED IN THE SCIENTIFIC LITERATURE TO EXPRESS DIFFERENT DURATIONS AND AMPLITUDES OF HYPOMETABOLIC STATE.
HIBERNATION GENERALLY HAS A LONGER DURATION OF UP TO 9 MONTHS WHEREAS TORPOR LASTS <24 H AND IS COMMONLY REFERRED TO AS DAILY TORPOR. THE MEAN MINIMUM METABOLIC RATE WAS OBSERVED TO REACH 6% OF BMR DURING HIBERNATION BUT 35% OF BMR DURING TORPOR
BASAL METABOLIC RATE (BMR) IS THE RATE OF ENERGY EXPENDITURE PER UNIT TIME BY ENDOTHERMIC ANIMALS AT REST. ... BASAL METABOLIC RATE IS THE AMOUNT OF ENERGY PER UNIT TIME THAT A PERSON NEEDS TO KEEP THE BODY FUNCTIONING AT REST.
DURING HIBERNATION OR TORPOR, ANIMALS ENTER A HYPOMETABOLIC AND HYPOTHERMIC STATE
BY ENTERING HIBERNATION, HIBERNATORS CAN PRODUCE A REMARKABLE SAVING IN ENERGY CONSUMPTION. IN WINTER, YELLOW-BELLIED MARMOTS ARE ABLE TO SAVE UP TO 85% OF THEIR ENERGY, WHICH WILL GREATLY ENHANCE WINTER SURVIVAL
NATURAL HIBERNATORS ARE ABLE TO SUPPRESS THE APOPTOTIC RESPONSE.. APOPTOSIS IS A FORM OF PROGRAMMED CELL DEATH THAT OCCURS IN MULTICELLULAR ORGANISMS. THE AVERAGE ADULT HUMAN LOSES BETWEEN 50 AND 70 BILLION CELLS EACH DAY DUE TO APOPTOSIS..
CONTINUED TO 2--
CONTINUED FROM 1--
DeleteAPOPTOSIS IS MEDIATED BY PROTEOLYTIC ENZYMES CALLED CASPASES, WHICH TRIGGER CELL DEATH BY CLEAVING SPECIFIC PROTEINS IN THE CYTOPLASM AND NUCLEUS. APOPTOSIS MAINTAINS THE BALANCE OF CELLS IN THE HUMAN BODY AND IS PARTICULARLY IMPORTANT IN THE IMMUNE SYSTEM
APART FROM SUPPRESSION OF APOPTOSIS, OXIDATIVE STRESS AND INFLAMMATORY RESPONSE, HIBERNATORS ALSO HAVE TO AVOID BLOOD CLOTTING AS REDUCED BLOOD FLOW COULD LEAD TO DEEP VEIN THROMBOSIS, STROKE OR PULMONARY EMBOLISM.
HYDROGEN SULFIDE PUTS SERIOUS BRAKES ON THE PROCESS BY WHICH CELLS USE OXYGEN TO MAKE THE ENERGY SOURCE ADENOSINE TRIPHOSPHATE (ATP), SOMETHING THAT HAPPENS IN THEIR POWERHOUSE, THE MITOCHONDRIA.
I WILL TELL MORE HWEN MY REVELATIONS REACH 98%
INDUCTION OF HIBERNATION IN ASTRONAUTS COULD SIGNIFICANTLY REDUCE RESOURCE REQUIREMENTS AND ASSOCIATED MEDICAL CHALLENGES DURING INTERSTELLAR SPACE TRAVEL..
capt ajit vadakayil
..
https://www.opindia.com/2019/12/rana-ayyub-new-yorker-dexter-filkins-kashmir/
ReplyDeleteHEY RANA AYYUB..
DO YOU KNOW THAT MOST OF THE AYYUBS IN PAKISTAN ARE CRYPTO JEWS ?..
DO YOUR KNOW WHY YOUR FATHER WAS INCLUDED IN THE PROGRESSIVE WRITERs MOVEMENT?
EVER HEAD OF JOB ( IYOB AMONG MALAYALI JEWS )?
ISLAM TREATS JEW JOB AS A PROPHET ..
AYYŪB (JOB) IS FIRST MENTIONED IN THE QURAN IN THE FOLLOWING VERSE:
WE HAVE SENT THEE INSPIRATION, AS WE SENT IT TO NOAH AND THE MESSENGERS AFTER HIM: WE SENT INSPIRATION TO ABRAHAM, ISHMAEL, ISAAC, JACOB AND THE TRIBES, TO JESUS, JOB, JONAH, AARON, AND SOLOMON, AND TO DAVID WE GAVE THE PSALMS.
— QURAN, SURA 4 (AN-NISA), AYAH 163[4]
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
JESUS DID NOT EXIST.. BUT JOB EXISTED..
HIS GRAVE IS IN SALALAH ( OMAN ) , I HAVE SEEN IT.. THE CALICUT KING CHERAMAN PERUMAL WHO WENT TO MEET MOHAMMAD THE PROPHET AT MECCA IS ALSO BURIED HERE.. I HAVE SEEN HIS GRAVE TOO.
EVEN AFTER THE BIRTH OF ISLAM , DHOFAR ( SOUTH OF OMAN /NORTH OF YEMEN ) KINGDOM WAS OWNED BY THE CALICUT KING.
POOR RANA BABY !
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
RANA AYYUB
ROMILA THAPAR
PMO
PM MODI
PMOPG/E/2019/0698252
DeleteSent to Romila and PMO
https://twitter.com/rakeshsivan/status/1202631415856107521
DeletePosted on Rana Ayyub's FB comment section. sent email to others.
Deletehttps://twitter.com/Shehla_Rashid/status/1202122547891855365?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Etweet
ReplyDeleteGET USED TO IT BABY
THE RETIRED COLLEGIUM JUDGES WHO SPONSORED ETHNIC CLEANSING OF KASHMIRI PANDITS ARE NOW SCARED THAT THEY WILL BE HUNG BY MILITARY COURTS..
SHEHLA RASHID-- I HAVE DUG INTO YOUR PAST -- DO YOU KNOW THAT YOUR ANCESTORS WERE CRYPTO JEWS..
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
SHEHLA RASHID
ROMILA THAPAR
PMO
PM MODI
PMOPG/E/2019/0698184
Deleteshehla.shora@gmail.com
Romila Thapar • romilathapar@gmail.com
connect@mygov.nic.in
https://twitter.com/rakeshsivan/status/1202632085682343936
DeleteSir, sent to them.
DeleteDebdoot Bhai, thanks for Shehla Rashids email id.
Hello Sir.
ReplyDeletehttps://techaeris.com/2019/12/03/sundar-pichai-promoted-to-ceo-of-alphabet/
It is pretty interesting how larry page and sergey brin stepped down at the same time and making Mr Pichai at the helm.
Is he just promoted to become No1 Scapegoat for the ongoing lawsuits???
https://timesofindia.indiatimes.com/world/us/us-house-to-draft-impeachment-charges-against-donald-trump-nancy-pelosi/articleshow/72387736.cms
ReplyDeleteEVER SINCE TRUMP BECAME PRESIDENT
ROTHSCHILD MEDIA HAS UTTERED THE WORD "IMPEACH" MORE THAN A MILLION TIMES
TEE HEEEEEEE
DOES TRUMP LOSE SLEEP ?
BALLS !
https://twitter.com/the_hindu/status/1202621165719695361
ReplyDeleteKAYASTHA JOKER IS NOW MOVING HIS BACKSIDE ? HE DOES NOT EVEN KNOW HIS OWN POWERS !..
http://ajitvadakayil.blogspot.com/2019/07/we-never-heard-words-kayastha-and.html
AS A SHIP CAPTAIN I KNEW MY POWERS.. MY SHORE BOSSES WERE SCARED OF ME..
http://ajitvadakayil.blogspot.com/2019/06/record-heat-wave-europe-2019-root-cause.html
ReplyDeleteNONSENSE !
OUR MAIN STREAM MEDIA IS IN JEWISH DEEP STATE PAYROLL ...WE KNOW THE TRAITORS IN OUR MINISTRIES ....
WE KNOW WHY ENVIRONMENT MINISTER PRAKASH JAVEDEKAR AND PM MODI ARE DARLINGS OF THE JEWISH DEEP STATE....
go0gle for the blogpost below---
http://ajitvadakayil.blogspot.com/2019/06/record-heat-wave-europe-2019-root-cause.html
http://ajitvadakayil.blogspot.com/2018/12/poland-katowice-cop-24-global-warming.html
http://ajitvadakayil.blogspot.com/2019/02/america-caused-global-warming-with_9.html
WE KNOW HOW MODI BECAME CHAMPION OF THE PLANET..
INDIA WILL NOT MOTHBALL OUR ENORMOUS RESERVES OF COAL..LET MODI / MACRON TRY.. WE SHALL SEE...
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF-
DeleteTRUMP
PUTIN
AMBASSADORS TO FROM USA/ RUSSIA
PRAKASH JAVEDEKAR
ENVIRONMENT MINISTRY CENTRE AND STATE
PMO
PM MODI
NGT
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
ENTIRE BBC GANG
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Sent emails..
DeleteYour Registration Number is : PMOPG/E/2019/0699913
DeleteSOMEBODY CALLED ME UP AND ASKED ME..
ReplyDeleteCAPTAIN HOW DO YOU KNOW THAT DOUGLAS COE ( FAMILY/ FELLOWSHIP/ PRAYER BREAKFAST ) VISITED INDIA.. HIS VISITS WERE SECRET..
WELL, COE BABYs PHOTOS IN FRONT OF TAJ MAHAL ARE NOT EXACTLY PHOTO SHOPPED..
DOUG COE HAD COME TO INDIA TO MEET SOME TRAITOR MEMBERS OF NAC IN SECRET..
https://en.wikipedia.org/wiki/National_Advisory_Council
WE ASK MODI TO FORM MILITARY COURTS AND TRY DESH DROHIS WITHIN INDIA WHO MADE UNCONSTITUTIONAL NAC POSSIBLE.. WE WANT CAPITAL PUNISHMENT FOR SEDITION..
THE SYSTEM AND CONSTITUTION WAS HIJACKED BY TRAITORS IN FOREIGN PAYROLL.
AN 100 % WHITE DNA ITALIAN MAINO JEWESS WHO WAS A WAITRESS BECAME EMPRESS OF INDIA..
IS THIS POSSIBLE ANYWHERE ELSE ON THE PLANET??
SOME FOREIGN PAYROLL COLLEGIUM JUDGES AND MAIN STREAM MEDIA KINGPINS PLAYED BALL.
THE ILLEGAL COLLEGIUM JUDICIARY ALSO WERE INSTRUMENTAL IN CREATING THE NAXAL RED CORRIDOR AND ETHNIC CLEANING OF KASHMIRI PANDITS..
THORIUM WAS STOLEN WHOLESALE FROM COASTAL AREAS OF TAMIL NADU AND KERALA..
THE NATIONAL PRAYER BREAKFAST FAMILY / FELLOWSHIP IS RESPONSIBLE FOR CONVERTING FISHERMEN AND THEIR FAMILIES ENMASSE TO CHRISTIANITY.
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
TODAY WHEN SRI LANKA RELEASES ARRESTED TAMIL FISHERMEN ,THEIR NAMES SOUND LIKE A BRAZILIAN CATHOLIC SOCCER TEAM.. IF THERE IS A MUNIYANDI WITH HINDU NAME, EVEN HE IS A CHRISTIAN CONVERT..
THE LARGEST SCAM IN INDIA IS THE THORIUM SCAM.. IT HAS NEVER BEEN UNEARTHED , DUE TO CONNIVANCE OF POLITICIANS / JUDGES/ POLICE / MEDIA..
THERE WILL BE RETRIBUTION FOR BLEEDING BHARATMATA..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF-
DeleteTRUMP
PUTIN
AMBASSADORS TO FROM USA/ RUSSIA
EXTERNAL AFFAIRS MINISTER/ MINISTRY
I&B MINISTER/ MINISTRY
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
ENTIRE BBC GANG
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
ALSO SEND TO THE FOLLOWING PEOPLE..
DeleteMihir Shah - Member, Planning Commission[2]
Narendra Jadhav - former bureaucrat & Member, Planning Commission
Ashis Mondal - Director of Action for Social Advancement (ASA), Bhopal[3]
Prof. Pramod Tandon - Vice Chancellor, North Eastern Hill University
Deep Joshi - social activist
Farah Naqvi - social activist
Dr. N. C. Saxena - former bureaucrat
Anu Aga - businessperson
A. K. Shiva Kumar - economist[4]
Mirai Chatterjee - Coordinator, SEWA, Ahmedabad
Virginius Xaxa - Deputy Director, TISS, Guwahati Campus
The members who served on the NAC and later resigned are
Aruna Roy - former bureaucrat
Prof. M.S. Swaminathan - agricultural scientist and MP
Dr. Ram Dayal Munda - MP
Jean Dreze - development economist AND HIS URBAN NAXAL WIFE BELA BHATIA
Harsh Mander - former bureaucrat
Madhav Gadgil - ecologist
Jayaprakash Narayan (Lok Satta)- former bureaucrat[5]
https://twitter.com/rakeshsivan/status/1202851307167420416
DeleteMailed to-
Deletecontact@amitshah.co.in
narendramodi1234@gmail.com
38ashokroad@gmail.com
ombirlakota@gmail.com
amitabh.kant@nic.in
prakash.j@sansad.nic.in
ravis@sansad.nic.in
alokmittal.nia@gov.in
information@cbi.gov.in
presidentofindia@rb.nic.in
fmo@nic.in
intra-mines@nic.in
aruniyer.1991@sansad.nic.in
contact@drnarendrajadhav.info
mihir.shah@nic.in
info@asabhopal.org
ceo@biotechpark.org.in
xaxasws@tezu.ernet.in
mail@sewa.org
aaga@thermaxindia.com
arunaroy@jpl.dot.net.in
swami.ms@sansad.nic.in
jean@econdse.org
madhav.gadgil@gmail.com
jp@loksattaparty.com
swamy39@gmail.com
Sent DM on FB -
Deletehttps://www.facebook.com/mkss.arunaroy/
https://www.facebook.com/Dr-Ram-Dayal-Munda-266292690068739/
mirai_chatterjee@yahoo.co.in,
miraichatterjee@sewa.org
dr.ndj@nic.in,
Thanks Charishma, sent them again.
Your Registration Number is : PMOPG/E/2019/0699915
DeleteCaptain, sent the message to the email ids shared by Charishma and Shriram Hegde
DeleteHyderabad rapists shot dead while trying to flee from police custody .
ReplyDeleteVery strangely came across a muslim college student whose wa dp showed
Nithyananda alleged rapists buys an island to make a country called Kailas of Equador...
Propaganda?
"We are the supreme Lords of all we survey and our word is the law" this collegium edifice has crumbled...
Pathalagadi movement covered in today's broadsheet. Someone has educated them about PESA, gram sabha laws ...
Internet providers must be targeted for allowing porn to spread by strict fines and or cancellation of licences.
ReplyDeleteUsers who upload must find their mobile number sim card suspended for a few years with inability to buy a new number sim for that duration.
Capt sir,
ReplyDeleteCould you please enlighten us about Sat Karma and Dush Karma and how to do pursue Sat Karma to neutralize and nullify Dush Karma(Karmic Baggage) .
Pranamams,
Sriganesh
FOUR RAPISTS HAVE BEEN SHOT DEAD
ReplyDeleteFOREIGN PAYROLL COLLEGIUM JUDGES WILL NOW TARGET POLICE. NGOs WILL CRAWL OUT OF THE WOODWORK
WE WATCH...
WE KNOW THE JUDGES WHO SUPPORTED DREADED CRIMINAL ( ISI AGENT ) SOHRABUDDIN AND PUT HOME MINISTER AMIT SHAH IN JAIL..
LET TRAITOR JUDGES NOT THINK THEY ARE SAFE AND FORGIVEN AFTER THEY RETIRE..
DISPLAY THE DEAD BODIES ON THE STREET BY HANGING THEM UP USING TALL BOOM TRUCK CRANES
WE THE PEOPLE DO NOT TRUST OUR INDIAN JUDICIARY
DeleteA TOTAL REVAMP IS REQUIRED
THIS CANNOT BE DONE BY USELESS KAYASTHA LAW MINISTER RAVI SHANKAR PRASAD.. WE KNOW WHAT THIS FELLOW DID IN 1976 ALONG WITH CIA SPOOK KAYASTHA JP..
READ ALL 8 PARTS OF THE POST BELOW--
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
WE NEED MILITARY COURTS TO HANG TRAITOR JUDGES IN DEEP STATE PAYROLL WHO HAVE ENGAGED IN SEDITION AND INFLICTED SEVERE CUTS ON BHARATMATA..
THE INDIAN BENAMI MEDIA AND ILLEGAL COLLEGIUM JUDICIARY HAVE ALWAYS BEEN IN CAHOOTS WHEN BLEEDING BHARATMATA .. WE THE PEOPLE ARE FED UP..
Namaste Capt Ajitji
DeleteSwati Maliwal can now break hunger strike... Hmmm... We watch..
ReplyDeleteS RajeshDecember 5, 2019 at 7:51 PM
Guru ji, once freind close to my brother told me sri sri & ramdev want to finish nityanand & keep themselves as hindu representative in north south , people like mohandas pai openly promote sri sri & many hindu fake leader dont want any hindu guru to rise high specially if he is promoting hindusim they are fine with secular like sadguru etc . even cast system play imp role mostly guru, mutt in india are brahmin & they were against asaram bapu reason they never supported him even in good cause these backstabbing hindu leaders are behind hindu dont get united .
WE THE PEOPLE DO NOT TRUST OUR INDIAN JUDICIARY
ReplyDeleteA TOTAL REVAMP IS REQUIRED
THIS CANNOT BE DONE BY USELESS KAYASTHA LAW MINISTER RAVI SHANKAR PRASAD.. WE KNOW WHAT THIS FELLOW DID IN 1976 ALONG WITH CIA SPOOK KAYASTHA JP..
READ ALL 8 PARTS OF THE POST BELOW--
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
WE NEED MILITARY COURTS TO HANG TRAITOR JUDGES IN DEEP STATE PAYROLL WHO HAVE ENGAGED IN SEDITION AND INFLICTED SEVERE CUTS ON BHARATMATA..
THE INDIAN BENAMI MEDIA AND ILLEGAL COLLEGIUM JUDICIARY HAVE ALWAYS BEEN IN CAHOOTS WHEN BLEEDING BHARATMATA .. WE THE PEOPLE ARE FED UP..
WE THE PEOPLE WANT IMMEDIATE POLICE REFORMS..
WE DONT WANT POLICE TO BE SLAVES OF ILLEGAL COLLEGIUM JUDICIARY.. WHAT MAKES YOU THINK A USELESS LAWYER TURNED JUDGE IS MORE LOYAL TO BHARATMATA ?
READ ALL 12 PARTS OF THE POST BELOW ( ONLY 55% COMPLETE )
https://ajitvadakayil.blogspot.com/2017/07/police-reforms-in-india-much-more-with.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF-
DeleteI&B MINISTER/ MINISTRY
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
ENTIRE BBC GANG
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
https://twitter.com/rakeshsivan/status/1202848174190161920
Deletehttps://twitter.com/rakeshsivan/status/1202848257556144128
tweeted sir
DeleteCapt, sent emails to the following people at the ministry of home affairs:
Deletehshso@nic.in,
secy-ol@nic.in,
sois-mha@nic.in,
asfah@nic.in,
ascs-mha@nic.in,
aspolice@mha.gov.in,
jsk@nic.in,
jsut@nic.in,
jspm@nic.in,
jsf@nic.in,
dharitri.panda@nic.in,
jsffr@nic.in,
jsadmin-mha@nic.in,
jsctcr-mha@gov.in,
jsne@mha.gov.in,
jslwe-mha@nic.in,
js-is2@mha.gov.in,
jsbm@nic.in,
jsbm2-mha@gov.in,
jscis-mha@nic.in,
anuj.sharma@nic.in,
jsis@mha.gov.in,
js.police1@mha.gov.in,
jsp2-mha@nic.in,
jsdm@nic.in,
jscpg-mha@nic.in,
jsic-mha@gov.in,
jscs@mha.gov.in,
jsjudl-mha@nic.in,
jsol@nic.in,
spal@nic.in,
jsws-mha@gov.in
Also sent to the following governors and cms:
lg@and.nic.in,
cm@wb.gov.in,
hgovup@gov.in,
cm-skm@hub.nic.in,
govodisha@nic.in,
cm@maharashtra.gov.in,
cmo@rajasthan.gov.in,
rajbhavan@maharashtra.gov.in,
cm@mp.nic.in,
chiefminister@kerala.gov.in,
keralagovernor@gmail.com,
nnvohra@nic.in,
cm-hp@nic.in,
governor@rajbhavangoa.org,
cmbihar-bih@nic.in,
governorbihar@nic.in,
cs-assam@nic.in
Your Registration Number is : PMOPG/E/2019/0699916
Deletehttps://twitter.com/kkarthikeyan09/status/1203192170196291584
DeleteCaptain, received email from cm of maharashtra regarding above message. The reply was:
Deleteमाननिय श्री / श्रीमती
धन्यवाद,
आपला "ईमेल" मुख्यमंत्री कार्यालयास प्राप्त झाला असून तो पुढील कार्यवाहीसाठी विधी व न्याय विभागास पाठविण्यात आला आहे.
नोंदणी शाखा,
मुख्यमंत्री कार्यालय.
The person this email was forwarded to is Rajesh N Laddha
https://twitter.com/fayedsouza/status/1202783418557140993
ReplyDeleteWE NEED MILITARY COURTS TO TRY THE TRAITOR JUDGES AND JOURNALISTS IN FOREIGN PAYROLL, WHO HAVE TRIED TO KILL BHARATMATA ..
capt ajit vadakayil
..
PUT THIS COMMENT IN FAYE DSOUZAs WEBSITE
ALSO --
PMO
PM MODI
AMIT SHAH
HOME MINISTRY
RAJNATH SINGH
DEFENCE MINISTRY
AJIT DOVAL
RAW
NIA
ED
IB
CBI
https://twitter.com/rakeshsivan/status/1202840577991032832
Deletehttps://twitter.com/rakeshsivan/status/1202846756309831681
Sent to fayedsouza@gmail.com & others.
DeleteYour Registration Number is : PMOPG/E/2019/0699917
Deletehttps://twitter.com/kkarthikeyan09/status/1203196341607813121
Deletehttps://twitter.com/DrGPradhan?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
ReplyDeleteCHECK OUT THIS BASTARD
https://twitter.com/ndtv/status/1202200854171811840
ReplyDeleteBABY, GO TO PAKISTAN.. IF INDIA IS UNSAFE
https://en.wikipedia.org/wiki/Writers_of_Guru_Granth_Sahib
ReplyDeleteNONE OF THE BHAGATS EXISTED.. THEY ALL WERE COOKED UP BY JEW ROTHSCHILD..
http://ajitvadakayil.blogspot.com/2013/07/unknown-history-of-sikhs-and-sikhism.html
GURU GRANTH SAHIB BOOK WAS COMPILED BY A WHITE JEW WHO WORE A TURBAN AND 5K-- MAX ARTHUR MACAULIFFE
Plenty of messages circulating
ReplyDeleteMost over 90 percent congratulate the Hyderabad police for their prompt action .
Rest blithering about how and why we shouldn't take law in our own hands...Blah blah..
A conspiracy theory doing rounds
Vet ...Cow smuggling...Big honchos involved ...wanted the perpetrators silenced angle...
Propaganda against Nityanand ...As a counterfoil....
LAWYER VRINDA GROVER SAYS THAT TELENGANA COPS SHOULD BE SUSPENDED FOR KILLING THE 4 RAPISTS..
ReplyDeleteTHIS PATHETIC CREATURE VRINDA GROVER IS ONE OF THE MOST HATED WOMEN IN INDIA ALONG WITH LAWYER INDIRA JAISING..BOTH ARE DEEP STATE DARLINGS..
THE PEOPLE OF INDIA ARE SHOWERING ROSE PETALS ON THE BRAVE COPS..
IT ALSO MEANS THAT THE PEOPLE OF INDIA ARE SPITTING ON THE FACE OF THE ILLEGAL COLLEGIUM JUDICIARY..THE WORST ON THE PLANET ..
https://en.wikipedia.org/wiki/Vrinda_Grover
https://en.wikipedia.org/wiki/Indira_Jaising
capt ajit vadakayil
..
https://www.newyorker.com/magazine/2019/12/09/blood-and-soil-in-narendra-modis-india
ReplyDeleteMUSLIMS OF INDIA HAVE BEEN PAMPERED..
THERE ARE MORE MUSLIMS IN INDIA THAN IN PAKISTAN,, NOT A SINGLE INDIAN MUSLIM WOULD LIKE TO GO TO PAKISTAN..
NAC OF THE ITALIAN WAITRESS TRIED TO MAKE THEM PROTECTED SPECIES-- LIKE PENGUINS..
CAPT AJIT VADAKAYIL SAYS THAT DEXTER FILKINS IS A LIAR... YOU GET PULITZER PRIZE FOR LYING....
PULITZER IS A PRIZE AWARDED BY COLUMBIA UNIVERSITY USA, WHICH IS THE MENTOR OF INDIA’S COMMIE UNIVERSITY JNU. COLUMBIA UNIVERSITY WAS MADE WITH OPIUM DRUG MONEY BY ROTHSCHILD.
ROTHCHILD WAS THE OWNER OF BRITISH EAST INDIA COMPANY, WHO GREW OPIUM IN INDIA AND SOLD IT IN CHINA.
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
MIND YOU THIS LYING BASTARD DEXTER FILKINS ENJOYED OUR HOSPITALITY FOR 3 YEARS IN DELHI.
QUOTE: Rana Ayyub told me over the phone that she was heading to Kashmir. Ayyub, thirty-six years old, is one of India’s best-known investigative reporters :UNQUOTE
TEE HEEEEEEEE ...THIS MAKES MY DAY !
LIAR PRAISING LIAR..
CAPT AJIT VADAKAYIL ASKS PM MODI-- WE THE PEOPLE WANTS THIS LYING BASTARD DEXTER TO BE BANNED FROM INDIA..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteDEXTER FILKINS
RANA AYYUB
NEW YORKER EDITOR
NEW YORK TIMES EDITOR
PULITZER PRICE FOUNDATION
PMO
PM MODI
INDIAN AMBASADOR TO USA
EXTERNAL AFFAIRS MINISTER/ MINISTRY
I&B MINISTER/ MINISTRY
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
ROMILA THAPAR
COLUMBIA UNIVERSITY DEAN
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Subject:Captain Ajit Vadakayil Says Dexter Filkins Is A Liar
Deletethemail@newyorker.com
letters@nytimes.com
pulitzer@pulitzer.org
connect@mygov.nic.in
hoc.washington@mea.gov.in
eam@mea.gov.in
minister.inb@gov.in
jspna-moib@gov.in
minister.hrd@gov.in
ravis@sansad.nic.in
info.nia@gov.in
ed-del-rev@nic.in
information@cbi.gov.in
contact@amitshah.co.in
jscpg-mha@nic.in
Romila Thapar • romilathapar@gmail.com
jjv1@columbia.edu
------------
PMOPG/E/2019/0699134
MINHA/E/2019/09240
DEPOJ/E/2019/04548
MOIAB/E/2019/04394
MEAPD/E/2019/05471
Captain, sent email to the ids shared by Debdoot Sarkar
DeleteCaptain Sahib,
DeleteWhat to expect when Joseph Pulitzer himself is the father of yellow journalism.
G. Rawat
https://timesofindia.indiatimes.com/city/agra/taj-mahal-earns-rs-200-crore-but-gets-only-rs-13-crore/articleshow/72392783.cms
ReplyDeleteTAJ MAHAL WAS A HINDU MONUMENT BEFORE..
SHAH JEHAN WAS A JEW ...
http://ajitvadakayil.blogspot.com/2014/09/qutab-minar-was-dhruv-stambh-vishnu.html
The Mughals never had the expertise even for the administration of the land they conquered. Their only asset was their sword. Their only qualification was day light robbery. Even in day to day arithmetic, they were not experts. Initially, the Mughals followed the local system of ruling. The administration of Babur was run by local natives. In return they respected the Hindu way of living. But things changed after Akbar and Jehangir. The Armenian merchants and European traders had a lot of influence.
DeleteROTHSCHILDs HONEY TRAP JEWESS ANARKALI WAS FUCKING PAPA JEW AKBAR AND BETA JEW JEHANGIR..
Deletehttps://www.theguardian.com/books/2019/dec/06/impeach-case-against-donald-trump-neal-katyal-review
ReplyDeleteDONALD TRUMP LISTEN UP AND LISTEN GOOD
NIXON WAS FOOLED INTO RESIGNING ..
http://ajitvadakayil.blogspot.com/2017/02/richard-m-nixon-greatest-american.html
TRUMP CAN NEVER BE IMPEACHED-- CAPT AJIT VADAKAYIL GIVES 100 % GUARANTEE. THERE IS NO WAY TRUMP WILL BE CONVICTED BY THE SENATE..
THE PRESIDENT, UNDER THE US CONSTITUTION, CAN BE REMOVED FROM OFFICE FOR "TREASON, BRIBERY, OR OTHER HIGH CRIMES AND MISDEMEANORS."
DEMOCRATS CONTROL THE HOUSE. THE HOUSE COMPRISES 431 MEMBERS AT PRESENT, 233 OF WHOM ARE DEMOCRATS. AS A RESULT, THE DEMOCRATS COULD IMPEACH THE REPUBLICAN TRUMP WITH NO REPUBLICAN SUPPORT.
IF THE HOUSE ( LOWER CHAMBER ) APPROVES ARTICLES OF IMPEACHMENT, A TRIAL IS THEN HELD IN THE SENATE. HOUSE MEMBERS ACT AS THE PROSECUTORS; THE SENATORS AS JURORS; THE CHIEF JUSTICE OF THE UNITED STATES PRESIDES
THE SENATE NOW HAS 53 REPUBLICANS, 45 DEMOCRATS AND TWO INDEPENDENTS WHO USUALLY VOTE WITH THE DEMOCRATS. CONVICTION AND REMOVAL OF A PRESIDENT WOULD REQUIRE A TWO-THIRDS MAJORITY.
A CONVICTION WILL REMAIN A PIPE – NAY—WET DREAM
capt ajit vadakayil
..
The elected legislators in India are forced to obey the whip of the party high command only because of the anti defection law enacted by Rajiv Gandhi. There is no anti defection law in USA. The 233 democrats in the HOUSE can vote according to their free will. The same is true for Republican house members.
DeleteALL VOTING IN THE PARLIAMENT/ ASSEMBLY MUST BY SECRETIVE BALLOT
DeleteTHIS IS TO PREVENT BLACK MAIL/ KIDNAPPING OF CHILDREN/ HOTEL RESORT CHARADE ETC
WHEN PARTY WHIP DECIDES WHAT TO DO, DEMOCRACY IS KILLED
DID ANY HINDU MARATHA VOTE FOR THE ITALIAN WAITRESS/ AHMED PATEL ?
Modi must use this upsurge in national sentiments against rapists to launch his judicial reforms.
ReplyDeleteThe people s power has voted against navel gazing hair splitting pontificating,blithering judiciary riddled with delays in the system.
It is said that rights and duties are 2 sides of the same coin .
ReplyDeleteFailure to abide by the law is a failure of duty.
Such rapists /scamsters etc are not worth mentioning their human rights.
It is high time we put our foot down.
Human rights can not exist in isolation from human duties.
Your Registration Number is : PMOPG/E/2019/0699441
ReplyDeleteRef : MUSLIMS OF INDIA HAVE BEEN PAMPERED ...
SOMEBODY CALLED ME UP AND CRIED..
ReplyDeleteCAPTAIN, YOU ARE THE FIRST AND ONLY MAN ON THIS PLANET TO WRITE THAT THE SOLAR ECLIPSE DURING MAHABHARATA WAR WAS CAUSED BY KRISHNAs SUDARSHAN CHAKRA..
I WANT ALL MY READERS TO WATCH THE VIDEO BELOW
https://www.youtube.com/watch?time_continue=3&v=R-Lacu0VG3Y&feature=emb_logo
I HAVE SEEN FLYING SHIPS TOP UP, AND TOP DOWN IN RED SEA.. FIRST TIME IT WAS HARD TO BELIEVE..
IN THE POST BELOW --READ THE PASSAGE "JAYADRATA SLAIN"..
http://ajitvadakayil.blogspot.com/2011/11/mahabharata-and-bhagawat-gita-4000-bc.html
STUPID CUNTS HAVE BEEN TRYING TO DATE THE MAHABHARATA WAR OF 4000 BC, BY A WILD GOOSE CHASE OF A NON-EXISTENT SOLAR ECLIPSE IN THE EVENING OF THE WAR.
IT WAS NOT A SOLAR ECLIPSE BUT A SUDDEN TEMPERATURE INVERSION ( SUDARSHANA CHAKRA ON SCALAR INTERFEROMETRY MODE ) WHICH CAUSED THE ATMOSPHERIC REFRACTION TO REVERSE, CAUSING THE SUN TO DIP BELOW THE HORIZON, AND CAUSE SUDDEN DARKNESS ON THE EVENING OF THE 13TH DAY OF THE WAR. THIS WAS AN OPTICAL ILLUSION..
AFTER BEHEADING JAYADRATA, HIS HEAD WAS DELIVERED TO THE LAP OF HIS FATHER MEDITATING THOUSANDS OF MILES AWAY, IN THE CRUISE MISSILE DRONE MODE.
AS SOON AS JAYADRATA WAS KILLED KRISHNA USED REVERSE INTERFEROMETRY AND CAUSED THE SUN TO GO BACK ABOVE THE HORIZON.
ARJUNAs ASTRAS WERE NOT ARROWS BY CRUISE MISSILES WHICH COULD LOITER AND STRIKE..
KARNA HAD BETTER ASTRAS THAN ARJUNA..
https://en.wikipedia.org/wiki/Karna
AFTER SAMUDRA MANTHAN BY VISHNU’S KURMA AVATAR, LORD DHANWANTAI ROSE FROM THE COSMIC OCEAN WITH SCALAR FIELD GENERATORS IN THREE OF HIS FOUR HANDS.. 1) SUDARSHANA CHAKRA INTERFEROMETRY DISC WITH WHICH KRISHNA CAUSES SUN TO DRIP DOWN THE HORIZON TO FOOL JAYADRATA..2) A CONCH 3) A AMRIT KUMBAM POT INFUSED WITH IRIDIUM..
THE FOURTH ITEM WAS A LEECH ( VACCINATION )
http://ajitvadakayil.blogspot.com/2019/09/onam-our-only-link-to-planets-oldest.html
TITANIC WATCHKEEPERS WERE LOOKING AT A LARGE ICEBERG IN THE SKY-- AN OPTICAL ILLUSION, WHEN THEY SLAMMED INTO A REAL ONE..
https://www.youtube.com/watch?v=fiNZcV0TjNc&feature=emb_logo
MY REVELATIONS NOW JUMP TO 60.12%
capt ajit vadakayil
..
Truly amazing to know the illusion from the one who breaks it..... Just like a magician reveal tricks and illusions to dumbfounded novices...
DeleteI AM WATCHING INDIA WEST INDIES T20 MATCH ON TV
ReplyDeleteTHERE IS A WOMAN COMMENTATOR WHO WEARS MINI SKIRT
SHE HAS UGLY FAAT FUCKIN' LEGS
HERE IS SOME LEG LOTION FOR HER
AAARRRGGGHH PPTTHHEEEOOYYYYYYYYYY
A HACKATHON IS AN EVENT, USUALLY HOSTED BY A TECH COMPANY , WHERE PROGRAMMERS ( CODERS ) GET TOGETHER FOR USUALLY UNINTERRUPTED 24 HOURS TO DO SOMEBODY ELSE’S JOB.
ReplyDeleteWHEN A HACKATHON IS OF 48 HOURS, CODERS BRINGS THEIR OWN PILLLOWS AND BLANKETS TO OFFICE.
SOME HACKATHONS HAVE A THEME ( LIKE FIXING BUGS ), OTHERS ARE MORE OPEN-ENDED
IN MY ELDER SONs LAST COMPANY HACKATHON, HE AUTOMATED MANY MANUAL FEATURES..
BEFORE THAT HE PRUNED THE COMPANYs SYSTEM DELECTING THOUSAND OF LINES OF REDUNADANT CODE AND HE GOT REWARDED FOR THAT..
YESTERDAY HIS COMPANY HAD A HACKATHON.. HIS PAST TWO PROJECTS WERE REJECTED BY THE SYSTEM.. I ASKED HIM TO BACK HIMSELF , THE WAY I DID AT SEA
IN THE POST BELOW, I SCREWED THE PLANETs NO 1 CHEMICAL TESTING LAB
http://ajitvadakayil.blogspot.com/2012/05/wall-wash-ptt-without-tears-chemical.html
MY SON FIXED THE BUGS IN THE SYSTEM, AND BOTH HIS PROJECTS WERE ABSORBED BY THE SYSTEM LIKE MAGIC
UNLIKE THEIR DAY JOBS WHERE RISK-TAKING MAY BE FROWNED UPON, IN A HACKATHON THERE IS A LOW COST OF FAILURE.. CODERS ARE ENCOURAGED TO THINK OUTSIDE THE BOX AND TAKE RISKS.
SOMETIMES IN HACKATHONS CODERS FORM TEAMS OF THEIR OWN .. HERE THE GROUND RULE- “BUILD FROM SCRATCH” IS NEVER COMPROMISED. HACKATHON IS THE PLACE WHERE DIVERSIFIED MINDS AND IDEAS COME TOGETHER TO CREATE SOLUTIONS
HACKATHONS ARE FOCUSED, COOPERATIVE, INNOVATIVE AND HIGHLY STIMULATIVE. HACKATHONS ARE A GREAT WAY OF BUILDING A WORK CULTURE AND CREATING PROFESSIONAL BONDING AMONG EXISTING EMPLOYEES.
HACKATHONS ARE ONE-WAY COMPANIES CAN TARGET THE EMPLOYEE’S COMPETENCIES.. WHEN TEAMS WORK ON PROBLEMS AND PUT EFFORTS TO SEARCH FOR A SOLUTION, THERE ARE SOME OUT OF THE BOX THINKERS WHO APPLY ALL THE LEARNINGS AND HIT THE RIGHT CHORD WHILE OTHERS FOLLOW .
IN THIS INNOVATION FEST , CODERS WHO DO WELL ARE PROMOTED FAST AND GET HANDSOME BONUSES..
AT SEA, I ASK MY CREW TO FIND THEIR OWN WORK ( CREATIVE / FIXING MACHINERY ) , DO IT AND REPORT BACK.. PEOPLE WHO YOU THOUGHT WERE CUNTS PROVED THAT THEY ARE ASSETS.
Capt ajit vadakayil
..
TODAY , THE BENAMI MEDIA IS SHOUTING OVER THE ROOF TOPS THAT THE TEN TELENGANA POLICEMEN WHO SHOT THE FOUR RAPISTS ARE UNDER “JUDICIAL LENS”…
ReplyDeleteBALLS TO THE JUDICIAL LENS OF ILLEGAL COLLEGIUM JUDICIARY— THE WORST ON THIS PLANET..
PEOPLE HAVE SHOWERED ROSE PETALS ON POLICE AND SPAT OF JUDICIARY TODAY.
THE ILLEGAL COLLEGIUM JUDICIARY CREATED THE NAXAL RED CORRIDOR AND CAUSED ETHNIC CLEANSING OF KASHMIRI PANDITS..
BREAK THIS FUCKIN’ JUDICIAL LENS..
WE DON’T WANT JUDICIARY TO SAVA BHARATMATA..
WE DON’T WANT OUR POLICE/ CRPF / ARMY TO BE SLAVES OF BHARATMATA..
WE ASK FOR INSTANT JUDICIAL AND POLICE REFORMS..
THE ASK MODI, FORM MILITARY COURTS AND HANG THE FOREIGN PAYROLL TRAITOR JUDCIARY AND BENAMI MEDIA.
TO START OFF IMPRISON THE JUDGES AND CJI WHO SAT ON THE BENCH WHICH STRUCK DOWN NJAC..
THE NJAC WOULD HAVE REPLACED THE ILLEGAL COLLEGIUM SYSTEM FOR THE APPOINTMENT OF JUDGES AS INVOKED BY THE SUPREME COURT VIA JUDICIAL FIAT ..
ALONG WITH THE CONSTITUTION AMENDMENT ACT, THE NATIONAL JUDICIAL APPOINTMENTS COMMISSION ACT, 2014, WAS PASSED BY THE PARLIAMENT OF INDIA..
THE NJAC BILL AND THE CONSTITUTIONAL AMENDMENT BILL, WAS RATIFIED BY 20 OF THE STATE LEGISLATURES IN INDIA, AND SUBSEQUENTLY ASSENTED BY THE PRESIDENT OF INDIA PRANAB MUKHERJEE ON 31 DECEMBER 2014.
THE GOVERNMENT HAD SOUGHT TO REPLACE THE EXISTING SYSTEM, WHICH CRITICS SAID WAS OPAQUE, WITH A SIX-MEMBER NJAC COMPRISING THE CHIEF JUSTICE OF INDIA (CJI), TWO SENIOR-MOST SUPREME COURT JUDGES, THE LAW MINISTER AND TWO EMINENT PERSONS.
THE EMINENT PERSONS WOULD BE CHOSEN BY A SELECTION COMMITTEE INCLUDING THE CHIEF JUSTICE OF INDIA, THE PRIME MINISTER AND THE LEADER OF THE OPPOSITION.. IN NJAC, MEMBERS HAVE VETO POWER. IF TWO MEMBERS VETO A NOMINATION OR DECISION, THE MATTER IS DROPPED..
THE NJAC ACT AND THE CONSTITUTIONAL AMENDMENT ACT IS IN FORCE FROM 13 APRIL 2015 AND IS STILL IN FORCE..
ON 16 OCTOBER 2015, THE CONSTITUTION BENCH OF SUPREME COURT BY 4:1 MAJORITY UPHELD THE COLLEGIUM SYSTEM BY A JUDICIAL REVIEW AND STRUCK DOWN THE NJAC AS UNCONSTITUTIONAL..
JUDICIARY HAS NO SUCH POWERS OF JUDICIAL REVIEW..
THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN..
JUSTICES J. S. KHEHAR, MADAN LOKUR, KURIAN JOSEPH AND ADARSH KUMAR GOEL HAD DECLARED THE 99TH AMENDMENT AND NJAC ACT UNCONSTITUTIONAL .. THESE FOUR JUDGES AND EX-CJI CL DATTU MUST BE TRIED BY THE MILITARY COURT FOR SEDITION…
WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..
JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE.
PARAMOUNT CLAUSE : WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. THE CONSTITUTION CANNOT BE USED AS A FRANKENSTEIN TO STRAIT-JACKET "WE THE PEOPLE" BY STUPID JUDICIARY ..
JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…
PRESIDENT AND STATE GOVERNORS ARE NOT RUBBER STAMPS AS CONTENDED BY BENAMI MEDIA AND ILLEGAL COLLEGIUM JUDICIARY..
INDIA IS NOT A DEMOCRACY.. INDIA IS A BANANA REPUBLIC CONTROLLED BY DEEP STATE WHITE JEWS FROM ABROAD….
http://ajitvadakayil.blogspot.com/2018/11/the-indian-constitution-does-not-allow.html
http://ajitvadakayil.blogspot.com/2018/10/we-people-declare-that-all-laws-created.html
http://ajitvadakayil.blogspot.com/2018/10/judiciary-in-contempt-of-we-people-capt.html
Read all 8 parts of the post below--
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteTHE IG OF TELENGANA WHO KILLED THE 4 RAPISTS
DGP OF TELENGANA
CM OF TELENGANA
HIGH COURT CHIEF JUSTICE OF TELENGANA
GOVERNOR OF TELENGANA
I&B MINISTER/ MINISTRY
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Captain, sent email to the following authority in Telangana
Deleteprlsecy_hmfw@telangana.gov.in
collector_wgl@telangana.gov.in,
collector-ydr@telangana.gov.in,
Jc_wgl@telangana.gov.in,
jc_wglr@telangana.gov.in,
collector-wglr@telangana.gov.in,
sp@wnp.tspolice.gov.in,
jc-wnp@telangana.gov.in,
collector-wnp@telangana.gov.in,
sp@vkb.ts.gov.in,
jc-vkb@telangana.gov.in,
collector-vkb@telangana.gov.in,
sp@spt.tspolice.gov.in,
jc-srpt@telangana.gov.in,
collector-srpt@telangana.gov.in,
jc-sdpt@telangana.gov.in,
collector-sdpt@telangana.gov.in,
jc-srd@telangana.gov.in,
collector-srd@telangana.gov.in,
jc_rr@telangana.gov.in,
collector_rr@telangana.gov.in,
spsircilla@gmail.com,
jc-rsl@telangana.gov.in,
collector-rsl@telangana.gov.in,
jcpeddapalli@gmail.com,
collector-pdpl@telangana.gov.in,
cp@nzb.tspolice.gov.in,
sp@nzb.ts.gov.in,
jc_nzbd@telangana.gov.in,
collector_nzbd@telangana.gov.in,
jc-nml@telangana.gov.in,
collector-nml@telangana.gov.in,
collector-nrpt@telangana.gov.in,
jc_nlgd@telangana.gov.in,
collector_nlgd@telangana.gov.in,
sp@nkl.tspolice.gov.in,
jc-ngkl@telangana.gov.in,
collector-ngkl@telangana.gov.in,
sp-mulugu@tspolice.gov.in,
collector-mlg@telangana.gov.in,
jc-mdl@telangana.gov.in,
collector-mdl@telangana.gov.in,
sp@mdk.tspolice.gov.in,
jc_mdk@telangana.gov.in,
collector_mdk@telangana.gov.in,
jc-mncl@telangana.gov.in,
collector-mncl@telangana.gov.in,
jc_mbnr@telangana.gov.in,
collector_mbnr@telangana.gov.in,
sp@mbd.tspolice.gov.in,
jc-mbd@telangana.gov.in,
collector-mbd@telangana.gov.in,
jc-kb@telangana.gov.in,
collector-kb@telangana.gov.in,
cp@kmm.tspolice.gov.in,
jc_kmm@telangana.gov.in,
collector_kmm@telangana.gov.in,
dcp_cz@hyd.tspolice.gov.in,
jc_krmn@telangana.gov.in,
collector_krmn@telangana.gov.in,
jc-kmr@telangana.gov.in,
collector-kmr@telangana.gov.in,
spjlmb@jlmb.tspolice.gov.in,
jc-gdwl@telangana.gov.in,
collector-gdwl@telangana.gov.in,
jc-jsk@telangana.gov.in,
collector-jsk@telangana.gov.in,
jc-jgn@telangana.gov.in,
collector-jgn@telangana.gov.in,
sp@jgl.tspolice.gov.in,
jc-jgtl@telangana.gov.in,
collector-jgtl@telangana.gov.in,
cp@hyd.tspolice.gov.in,
jc_hyd@telangana.gov.in,
collector_hyd@telangana.gov.in,
collector-bdd@telangana.gov.in,
jc_adbd@telangana.gov.in,
collector_adbd@telangana.gov.in
Your Registration Number is : PMOPG/E/2019/0699920
DeleteSent DM on FB - https://www.facebook.com/dgptelangana/
Deleteemails sent to-
rajbhavan-hyd@gov.in
cm@telangana.gov.in
dgp@tspolice.gov.in,
secy_home@telangana.gov.in
telenganaslsa@gmail.com,
ravis@sansad.nic.in
secylaw-dla@nic.in
gn.raju@nic.in
secy-jus@gov.in
presidentofindia@rb.nic.in,
supremecourt@nic.in,
supremecourt@hub.nic.in,
contact@amitshah.co.in,
Rajnath Singh <38ashokroad@gmail.com>,
ravis@sansad.nic.in,
Ravi Shankar Prasad ,
narendramodi1234 ,
webmaster.indianarmy@nic.in,
proiaf.dprmod@nic.in,
pronavy.dprmod@nic.in,
mos-defence@gov.in
dgp.pol@kerala.gov.in,
dgp@keralapolice.gov.in,
igpekmrange.pol@kerala.gov.in
dgp@tspolice.gov.in,
dgp-rj@nic.in,
dgp.punjab.police@punjab.gov.in,
dgp-mnp@nic.in,
dgp@jhpolice.gov.in
dgpmp@mppolice.gov.in,
dgpms.mumbai@mahapolice.gov.in,
meghpol@hotmail.com,
dgofpoliceorissa@sify.com,
dgp.pon@nic.in
dgofpoliceorissa@sify.com,
dgp.pon@nic.in,
phq@tn.nic.in,
dgp@up.nic.in,
dgp-hp@nic.in,
dgp-gs@gujarat.gov.in,
digp-daman-dd@nic.in,
police-chd@nic.in,
dgp-bih@nic.in,
dgp@appolice.gov.in
dgp@and.nic.in,
police@hry.nic.in and many others.
ReplyDeletePrashantDecember 6, 2019 at 9:47 PM
pranam captain,
poll on twitter:
https://twitter.com/prashantjani777/status/1202985011558916097
https://edition.cnn.com/2019/12/06/politics/nancy-pelosi-donald-trump-impeachment/index.html
ReplyDeleteNANCY PELOSI IS A DOUBLE AGENT
SHE HAS PAVED THE WAY FOR TRUMPs SECOND TERM.
TEE HEEEEEEEEE
https://timesofindia.indiatimes.com/city/hyderabad/telangana-rape-and-murder-case-nhrc-to-conduct-spot-inquiry-into-encounter-deaths/articleshow/72399217.cms
ReplyDeleteWE DONT CARE FOR DESH DROHI NHRC ...
WE KNOW THE FOREIGN PAYROLL TRAITORS..
It seems to be a real audio, but maybe when it went viral ArcelorMittal took it back.
ReplyDeleteIt does sound like him.
when you search on youtube "laxmi mittal on hinduism" ..... youtube immediately fact checks as topmost search, which it never does on video searches.
Fake audio claiming to be Lakshmi Mittal’s commentary on Indian politics viral on WhatsApp
https://www.altnews.in/fake-audio-claiming-to-be-lakshmi-mittals-commentary-on-indian-politics-viral-on-whatsapp/
Viral Audio Clip On Religion And Politics Is Not Of Lakshmi Mittal: ArcelorMittal
https://www.youtube.com/watch?v=mc9vp8PX3uo
readers check out this beautiful recreational video of desi cow and a small girl
ReplyDeletehttps://www.instagram.com/p/B5vhyEBpMZN/?igshid=xz6gkgmsfe1p
dear captain, facebook spammed your blogpost urls posted 2 days back. to educate my friends on various subjects, i used to post blogpost urls quite often without issues, but these blogpost references (in the attached image url) are spammed which were posted under 'mohanan vaidyar's discussion with a media team. i submitted the spammed comments for facebook review. thanks.
ReplyDeletehttps://drive.google.com/open?id=1UL_BHkzZxcXT4tGIT_bLFjzW4TU2xW-G
COMPLAIN TO--
DeletePMO
PM MODI
I&B MINISTER/ MINISTRY
LAW MINISTER/ MINISTRY
CJI BOBDE
ATTORNEY GENERAL
ASK FOR ACK
Captain,
ReplyDeleteHad posted in FB your comment on judiciary . FB deleted it stating that it is misleading.
DEEP STATE AGENT JEW MARK ZUCKERBERG WILL DECIDE WHAT IS THE GOSPEL FOR BHARATMATA ?
DeleteALL THIS IS ALLOWED BY KAYASTHA PRAKASH JAVEDEKAR, KAYASTHA RAVI SHANKAR PRASAD AND JEW DARLING MODI , WHO IS WAITING FOR NOBEL PRIZE..
http://ajitvadakayil.blogspot.com/2019/07/we-never-heard-words-kayastha-and.html
FB Spammed me after posting your blog message to Rana Ayyub. They spammed blog link. If you post message with blog link they will delete entire post. Readers can leave a message and ask for Google x blogs.
DeleteUSE SCREEN SHOT
Delete"VADAKAYIL" IS A BANNED WORD ON TWITTER/ FACEBOOK/ QUORA ETC.. ORDERS ARE FROM THE JEWISG DEEP STATE
ReplyDeleteRamas December 7, 2019 at 2:05 AM
https://youtu.be/WtXvXlIolEw
Bhusandeswar temple balasore odisha. Shiv ling is
12 feet tall and 15 feet in circumference. Pls validate if it is genuine. I have been there.
Story is that Ravan was transporting it from kailash to Lanka. For a reason he had to abandon it at the current spot.
It is just too huge. Is it real meteroite stone or just some ordinary stone?
ReplyDelete
Replies
Capt. Ajit Vadakayil December 7, 2019 at 9:37 AM
IT LOOKS REAL..
https://www.youtube.com/watch?v=aGS51haP94I
THE REAL TEST OF A SHIVA LINGAM IS ITS WEIGHT-- IT IS BLACK AND AS HEAVY AS STEEL..
THE BLACK STONE AT KAABA MECCA IS FAKE.. THERE ARE SEVEN PIECES OF PUMICE STONE , CEMENTED ... PUMICE STONE FLOATS ON WATER..
MUSLIMS HAVE STOPPED GOING TO MECCA.. THEY WOULD RATHER WORSHIP A REAL BLACK SHIVA LINGAM STONE AT KEDARNATH OR HAMPI..
http://ajitvadakayil.blogspot.com/2013/06/6000-year-old-kedarnath-temple-highest.html
http://ajitvadakayil.blogspot.com/2011/01/ruined-city-of-hampi-capt-ajit.html
SHIVA LINGAM IS THE COSMIC PHALLUS,, PROVIDER OF THE SEED ( DNA )..
http://ajitvadakayil.blogspot.com/2019/07/shiva-lingam-meterorite-hit-65-million.html
ENERGY SENSITIVE PEOPLE LIKE MY WIFE CAN SENSE SCALAR ENERGY EMANATING FROM A SHIVA LINGAM..
capt ajit vadakayil
..
https://timesofindia.indiatimes.com/india/hyderabad-encounter-cop-had-led-similar-operation-in-2008/articleshow/72408396.cms
ReplyDeleteWE THE PEOPLE SHOWER FLOWERS ON TELENGANA POLICE IG VISHWANATH CHENNAPPA SAJJANAR ....
WE THE PEOPLE SPIT ON THE FACE OF ILLEGAL COLLEGIUM JUDICIARY....
THESE LWYER TURNED JUDGES WERE IMPOVERISHED LAWYERS WITHOUT MONEY..
THEY EARNED MONEY BY THE TAAREQ PAH TAREEQ PEH TAREEQ SYSTEM, WHERE EVERY THREE MONTHS YOU ARE FORCED TO SHELL OUT FULL DAY APPEARANCE FEES TO A LAWYER TO FIND OUT THE NEXT DATE OF HEARING..
USUALLY HE GETS IT BY SMS FROM A BRIBED COURT CLERK... THIS NONSENSE GOES ON FOR 15 TO 20 YEARS ...
ALL THIS HAS THE SANCTION OF THE CJI BECAUSE ONCE UPON A TIME HE HIMSELF EARNED MONEY THIS WAY..
WE WANT IMMEDIATE POLICE AND JUDICIAL REFORMS..
WE DONT WANT A STUPID SYSTEM WHERE ONLY A JUDGE CAN ELIMINATE A TERRORIST OR CHILD RAPIST..
WHAT IS THE MEANING OF EXTRA-JUDICIAL KILLING?
AMIT SHAH , HOME MINISTER WAS PUT IN JAIL FOR DREADED ISI PAYROLL TERRORIST SOHRABUDDIN , WHO WAS SPONSORED BY NAC MEMBER TEESTA SETALVAD....
ILLEGAL COLLEGIUM JUDICIARY CREATED THE NAXAL RED CORRIDOR AND SPONSORED ETHNIC CLEANING OF KASHMIRI PANDITS...
POLICE DOES NOT NEED THE SANCTION OF A STUPID CORRUPT JUDGE TO DEAL WITH TERRORISTS, NAXALS AND CHILD RAPISTS..
WE TRUST THE POLICE NOT THE JUDGES ..
A LOT OF COLLEGIUM JUDGES ARE IN DEEP STATE PAYROLL..….
WE THE PEOPLE DEMAND IMMEDIATE REFORMS IN JUDICIARY-- WHICH IS THE MOST ROTTEN ENTITY IN INDIA...
WHAT MAJESTY OF JUDICIARY IS RANJAN GOGOI TALKING ABOUT..
BOTTOM DREGS OF THE SCHOOL CEREBRAL BARREL AND BOTTOM DREGS OF THE LAWYER POOL BECOME JUDGES..
THESE BRAIN DEAD JUDGES CANNOT EVEN APPLY BODMAS TO THE CONSTITUTION, WHILE A 12 YEAR OLD SCHOOL BY CAN ..
AND THESE JUDGES PLAY GOD.....
MODI ALLOWED LAW MINISTER PRASAD A NEW TERM AFTER 5 YEARS OF DOING NOTHING.. ALL PRASAD DID WAS TO BE SERVILE TO MODI....
OUR COLLEGIUM JUDICIARY BURNT MIDNIGHT OIL TO OPEN CHAMIYA BARS ( WH#RE HOUSES IN MUMBAI ) BREAD WINNERS OF ENTIRE FAMILIES HAVE BEEN ROTTING IN JAIL WITHOUT A TRIAL FOR THREE DECADES .. ALL BECAUSE THEY CANNOT AFFORD BAIL OR GET SOMEONE TO PROVIDE SURETY..
WHEN DESH DROHIS ABUSE PM MODI, JUDGES SAY IT IS FREEDOM OF SPEECH.. BUT HEY THESE SAME JUDGES WILL PUT YOU IN JAIL, IF YOU TELL THE TRUTH ABOUT HOW IGNORANT/ CORRUPT / INEFFICIENT THEY ARE ..
NO OTHER NATION HAS SUCH STRINGENT CONTEMPT OF COURT NAY JUDGE NONSENSE....
TRUTH CANNOT BE BRANDED AS VILIFICATION OR DEFAMATION ...
CITIZENS HAVE RIGHT OF FREE SPEECH AGAINST JUDICIARY ....
READ ALL 12 PARTS OF THE POST BELOW ( ONLY 55% COMPLETE )
https://ajitvadakayil.blogspot.com/2017/07/police-reforms-in-india-much-more-with.html
read all 8 parts of the post below ( 60% complete )--
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePOLICE IG VISHWANATH CHENNAPPA SAJJANAR
DGP TELENGANA POLICE
CM OF TELENGANA
HOME MINISTER OF TELENGANA
CHIEF JUSTICE OF TELENGANA HIGH COURT
GOVERNOR OF TELENGANA
I&B MINISTER/ MINISTRY
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Mail Sent To
Deletecp@cyb.tspolice.gov.in-- commissioner Of Police Telengana
governor.ap@nic.in
governor-mh@nic.in
governor.goa@gov.in
governorbihar@nic.in
governor@hry.nic.in
governor-wb@nic.in
Raj Bhavan Agartala • rajbhavanagt@gmail.com
rajbhavan.cg@nic.in
rajbhavankohima@nic.in
Raj Bhavan • rajbhavan.karnataka@gmail.com
connect@mygov.nic.in
info.nia@gov.in
info@vifindia.org
jspna-moib@gov.in
jscpg-mha@nic.in
secy.president@rb.nic.in
jsp@rb.nic.in
s_mahajan@nic.in
mvnaidu@sansad.nic.in
contact@amitshah.co.in
amitabh.kant@nic.in
as-niti@gov.in
vch-niti@nic.in
info@vhp.org
Abvp Kendra • abvpkendra@gmail.com
contact@republicworld.com
barkha Dutt • barkha.dutt@gmail.com
office@tharoor.in
cc@cpim.org
svaradarajan@gmail.com
N Ram • nram.thehindu@gmail.com
mani shankar • msaiyar@hotmail.com
Romila Thapar • romilathapar@gmail.com
nivedita@jnu.ac.in
Ayesha Kidwai • ayesha.kidwai@gmail.com
Shobhaa De • de.shobhaa@gmail.com
Office of Sri Sri Ravi Shankar • secretariat@artofliving.org
bangalore@isha.sadhguru.org
Bhakti Bhat • bhakti@chetanbhagat.com
Devdutt Pattanaik • devdutt.pattanaik@gmail.com
pavan.varma@sansad.nic.in
ramachandraguha@yahoo.in
lk.advani@sansad.nic.in
murli@sansad.nic.in
ravis@sansad.nic.in
jp.nadda@sansad.nic.in
dr.mahesh@sansad.nic.in
ramvilas.paswan@sansad.nic.in
dr.harshvardhan@sansad.nic.in
Nirmala Sitharaman • nsitharaman@gmail.com
NGT Administration • ngt.admn@gmail.com
secy-moef@nic.in
minister.hrd@gov.in
don8@midway.uchicago.edu
audrey.truschke@rutgers.edu
minister-agri@nic.in
gandhim@sansad.nic.in
nitin.gadkari@nic.in
vc@mail.jnu.ac.in
vc@du.ac.in
pd.ncert@nic.in
information@cbi.gov.in
mail@rajdeepsardesai.net
sagarika.ghosh@springer.com
annavetticad@hotmail.com
hoc.washington@mea.gov.in
chiefminister@kerala.gov.in
law.dept@rajasthan.gov.in
lladbho@mp.nic.in
secy-jus@gov.in
sadhwani.dd@nic.in
rajinder.kashyap@gov.in
raghavender.gr@nic.in
jsst-doj@gov.in
dirj1-doj@nic.in
ks.jayachandran@gov.in
giridhar.pai@nic.in
dc.pathak@nic.in
minlawtpt.delhi@nic.in
mos-legal@gujarat.gov.in
stmin.homeurban@maharashtra.gov.in
lawsec@tn.gov.in
lawmin.od@nic.in
ed-del-rev@nic.in
Faye D'Souza • fayedsouza@gmail.com
vineet.jain@timesgroup.com
supremecourt@nic.in
governor@rbi.org.in
minister.inb@gov.in
ms-ncw@nic.in
registrar-nhrc@nic.in
chairman-ncm@nic.in
rusembindija@mid.ru
amb.moscow@mea.gov.in
banerjee@mit.edu
eduflo@mit.edu
tuli@mit.edu
anantha@mit.edu
raghuram.rajan@chicagobooth.edu
iqbald@mit.edu
mihir.sharma@orfonline.org
knramdas@gmail.com
gopinath@harvard.edu
sadhvipragyabjp@gmail.com
pro-ncw@nic.in
sro-ncw@nic.in
Swati Maliwal • livingpositive@gmail.com
ideas@scroll.in
editor@thequint.com
editorial@thewire.in
cm@mp.nic.in
cm@telangana.gov.in
cm@assam.gov.in
cm-ua@nic.in
cm.goa@nic.in
cmbihar@nic.in
cmcg@nic.in
cmharyana@nic.in
cmodisha@nic.in
cmoffice-arn@gov.in
cmrajasthan@nic.in
cmup@nic.in
secretarytocmjharkhand@gmail.com
basnetprysecy@gmail.com
dgp-bih@nic.in
dgp-rj@nic.in
dgp.pol@kerala.gov.in
dgp@jhpolice.gov.in
dgp@assampolice.gov.in
dgp@up.nic.in
sambitswaraj@gmail.com
trivedi.sudhanshu@gmail.com
dr.bsshastri@gmail.com
kohli_nalin@yahoo.com
nraobjp@gmail.com
gopal.agarwal@bjp.org
mrs.mlekhi@gmail.com
dgpms.mumbai@mahapolice.gov.in
dgp@appolice.gov.in
igpadmin.pol@kerala.gov.in
chiefminister@kerala.gov.in
chiefminister@karnataka.gov.in
amarinder.singh@sansad.nic.in
igp.tsspbns@gmail.com
ravis@sansad.nic.in
amitabh.kant@nic.in
jp.nadda@sansad.nic.in
cm@wb.gov.in
drhrshvardhan@gmail.com
PMOPG/E/2019/0700130
MINHA/E/2019/09260
DEPOJ/E/2019/04560
MOIAB/E/2019/04397
DPLNG/E/2019/01005
MOSJE/E/2019/02631
DLGLA/E/2019/01524
DOWCD/E/2019/02762
MINPA/E/2019/00556
LGVED/E/2019/00420
Thanks to Dineshkumr kanesan, Sent above message to Telangana authorities. Sent email to following ids.
Deleteravis@sansad.nic.in
secylaw-dla@nic.in
gn.raju@nic.in
secy-jus@gov.in
narendramodi1234@gmail.com
contact@amitshah.co.in
nalsa-dla@nic.in,
sclc@nic.in,
apslsauthority@rediffmal.com,
apslsauthority@yahoo.com,
apslsa2013@rediffmail.com,
assamslsa@gmail.com,
bslsa_87@yahoo.in,
cgslsa.cg@nic.in,
rajnishshrivastav@gmail.com,
reg-high.goa@nic.in,
msguj.lsa@nic.in,
hslsa.haryana@gmail.com,
mslegal-hp@nic.in,
jhalsaranchi@gmail.com,
karslsa@gmail.com,
kelsakerala@gmail.com,
mplsajab@nic.in,
mslsa-bhc@nic.in,
legalservices@maharashtra.gov.in,
maslsa.imphal@gmail.com,
megshillong@gmail.com,
mizoramslsa@gmail.com,
nslsa.nagaland@yahoo.in,
oslsa@nic.in,
ms@pulsa.gov.in,
rslsajp@gmail.com,
sikkim_slsa@live.com,
telenganaslsa@gmail.com,
tnslsa@dataone.in,
tnslsa@gmail.com,
salsatripura@gmail.com,
upslsa@up.nic.in,
slsa-uk@nic.in,
wbstatelegal@gmail.com,
andslsa2013@gmail.com,
secylaw2016@gmail.com,
slsa_utchd@yahoo.com,
reg.slsa-dnh@gov.in,
dlsathebest@gmail.com,
veebhaskr@gmail.com,
lslsa-lk@nic.in,
msutplsa@gmail.com
supremecourt@nic.in
ReplyDeleteAron December 7, 2019 at 8:52 AM
Captain,
Had posted in FB your comment on judiciary . FB deleted it stating that it is misleading.
###############
Capt. Ajit Vadakayil
December 7, 2019 at 10:16 AM
DEEP STATE AGENT JEW MARK ZUCKERBERG WILL DECIDE WHAT IS THE GOSPEL FOR BHARATMATA ?
ALL THIS IS ALLOWED BY KAYASTHA PRAKASH JAVEDEKAR, KAYASTHA RAVI SHANKAR PRASAD AND JEW DARLING MODI , WHO IS WAITING FOR NOBEL PRIZE..
http://ajitvadakayil.blogspot.com/2019/07/we-never-heard-words-kayastha-and.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteI&B MINISTER/ MINISTRY
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
ENTIRE BBC GANG
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Dear Captain,
ReplyDeleteI am 21 years old and i suffer from stammering. Is there any cure for this?
SING OUT YOUR INTENDED CONVERSATION
DeleteJEW JOSEPH PULITZER WAS ROTHSCHILDs AGENT.
ReplyDeleteIT WAS ROTHSCHILDs MOTTO “ IF YOU WANT TO CONTROL THE POOSITION LEAD THEM YOURSELF ”..
HOW WAS ROTHSCHILD BLOOD JEW STALIN CATAPULTED TO POWER?.. EVEN PUTIN DOES NOT KNOW..
GEORGAN JEW STALIN LED A STRIKE IN ROTHSCHILDs OIL REFINERY AT BAU ON HIS FORST DAY OF EMPLOYMENT.. HE PULLED A GUN ON ROTHSCHILD—BUT ALAS—THE GUN DIDN’T FIRE.. THE GUN GOT STUCK… TOBA TOAHBAAAHHH ..
STALIN THEN SET A USELESS PART OF THE BAKU REFINERY ON FIRE.. ALL WERE AMAZED AT HIS DARE DEVIL ATTITUDE AND THEY CHOSE HIM LEADER OF THE OPPRESSED WORKERS, THE PROLETARIAT ( TEE HEEE ) ….
STALIN NEVER LOOKED BACK AFTER THAT..
http://ajitvadakayil.blogspot.com/2015/04/lawrence-of-arabia-part-two-capt-ajit.html
SAME WITH JEW WINSTON CHURCHILL WHO WAS ROTHSCHILDs AGENT..
I ASK MY READERS TO WATCH BBC TV SERIAL “PEAKY BLINDERS”..
HERE YOU CAN SEE JEW CHURCHILL USING GYPSY MAFIA DON, THOMAS SHELBY TO “LEAD THE OPPOSITION” TO KILL THE STRIKE CALLED BY COMMIES.. IMAGINE ROTHSCILD CREATED COMMUNISM.. HE LED THE INDUSTRY OWNERS AS WELL AS THE LABOUR UNION ..
JEW CHURCHILL WAS EXTABLISHED BY ROTHSCHILD AS A DARE DEVIL AND A TOUGH GUY ( NEVER MIND HE HAS A GARGANTUAN BELLY/ ASS AND TUFT TITTIES..
ROTHSCHILD ENGINEERED (BY PAYING A FORTUNE IN BRIBES) A GREAT DRAMA IN SOUTH AFRICA, WHERE JEW CHURCHILL BABY WAS IMPRISONED AND MADE A MOST DARING ESCAPE FROM BOERS CUSTODY—EVEN JUMPING OUT OF A SPEEDING EXPRESS TRAIN, WHICH EVEN JAMES BOND COULD NOT DO...
http://ajitvadakayil.blogspot.com/2011/07/winston-churchill-henchman-or-hero-capt.html
ALL GANDHIs STRIKES WERE ENGINEERED BY ROTHSCHILD HIMSELF.. INITIALLY ROTHSCHILD USED CHITPAVAN JEW GOPAL KRISHNA GOKHALE AS THE MIDDLEMAN..
KING EDWARD VII WITH GERMAN JEW ROTHSCHILD BLOOD IN HIM, WAS THE REASON WHY WW1 TOOK PLACE— AND THE FOUNDATIONS FOR CARVING OUT THE STATE OF ISRAEL ..
THE KING MAKER IN ENGLAND FOR WINSTON CHURCHILL AND FOR EVERY AMERICAN PRESIDENT FROM WILSON TO JEW EISENHOVER ( IKE ) WAS JEW BERNARD BARUCH, THE BILLIONAIRE ZIONIST FINANCIER, WHO WAS ROTHCHILD’S AGENT IN USA AND ALSO A ROTHSCHILD BLOODLINE CLONE.
EDWARD VII OPENLY CHEATED ON HIS WIFE AND HE WOULD BRING GIRLS AS YOUNG AS 14 TO HAVE SEX IN FRONT OF HIS WIFE. ONE OF THESE WOMEN WAS THE JEWESS LADY RANDOLPH JENNIE JEROME.. THE MOTHER OF WINSTON CHURCHILL..
http://ajitvadakayil.blogspot.com/2016/01/of-honey-traps-and-pots-capt-ajit.html
THE BRITISH ROYALY IS GERMAN JEW.. EVEN BBC DOES NOT KNOW THIS..
ACTRESSES JEWESS SARAH BERNHARDT WHO MADE NIKOLA TESLA AND SWAMI VIVEKANANDA MEET AT HER PARTY , WAS A MISTRESS OF EDWARD VII
JEW ROTHSCHILD GAVE WINSTON CHURCHILL THE NOBEL PRIZE FOR LITERATURE..
Capt ajit vadakayil
..
SEND ABOVE COMMENT TO--
DeleteTHE ENTIRE BBC GANG
https://en.wikipedia.org/wiki/List_of_BBC_newsreaders_and_reporters
https://en.wikipedia.org/wiki/List_of_former_BBC_newsreaders_and_journalists
TRUMP
PUTIN
PM OF UK
AMBASSADORS TO FROM USA/ RUSSIA/ UK
I&B MINISTER/ MINISTRY
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Sir, ln the series Peaky Blinders , Tommy Shelby could not assasinate Facist leader Mosley in the end and Tommy says that he was outwitted by a higher force unknown to him..It seems he is insinuating the Rothschilds and that those higher forces wanted Fascism under Mosley to contine...
Deletehttps://www.youtube.com/watch?v=oUd4WxjoHKY
ReplyDeleteBERNOULLIE / VENTURI ETC LIFTED THEIR THEORIES FROM YOGA
A YOGI EXPELS MUCUS FROM HIS SINUS AT DAWN
HE DRINKS SALTY WARM WATER THOUGH HIS NOSE AND EXPELS THROUGH HIS NOSE..( WITHOUT A SPOUT)
IS HE AN IDIOT ?
https://www.youtube.com/watch?v=0vkPfW96CjM
http://ajitvadakayil.blogspot.com/2011/01/ships-squat-bernoulli-and-under-keel.html
ARREST SWATI MALIWAL
ReplyDeleteWE DONT WANT THIS DEEP STATE AGENT TO SAVE BHARATMATA
Dear Capt Ajit sir,
ReplyDeleteNow, FB is not allowing to post any of your blogpost links....they are sinking your blogs posting...we need to follow your old trick 'Google Vadakayil blah blah' or do send snapshots.
https://www.newindianexpress.com/cities/chennai/2019/dec/05/raw-sewage-leads-to-toxic-foaming-of-beaches-tnpcb-2071735.html
ReplyDeletefinally these people got some wisdom from your blog.you are the first one to write in detail that phospates are responsible for foaming in bellandur lake.
https://twitter.com/PritishNandy/status/1203181719819390976
ReplyDeleteEVIDENCE IN COURTS IS THE GREATEST JOKE IN INDIA.
MILLIONAIRE LAWYERS KNOW HOW TO COOK UP FALSE EVIDENCE..
THEY PRODUCE FAKE WITNESSES FROM THIN AIR..
IF THESE EVIL LAWYER GET CAUGHT ( THEY WORK IN LEAGUE WITH THE CORRUPT JUDGES ) THEN THE SAME JUDGES SAVE THEM..
LAWYERS KEEP LYING EYE WITNESS IN ADVANCE IN SAFE HOUSES.. FAKE WITNESS KULKARNI IN THE LINK BELOW WAS STAYING IN LAWYER RK ANANDs HOUSE AND GAVE THE SAME ADDRESS FOR HIS DRIVING LICENCE
https://www.legallyindia.com/the-bench-and-the-bar/rk-anand-avoids-jail-accepts-supreme-court-offer-to-work-for-free-a-bci-donation-20120926-3136
https://www.hindustantimes.com/india/bmw-case-tv-claims-a-new-expose/story-qqmxUP1ylxJ1RSgH1gYoLO.html
BMW CASE SANJEEV NANDAs FATHER SURESH NANDA WAS A DEEP STATE MIDDLEMAN FOR JEWISH ARMS..
https://en.wikipedia.org/wiki/Suresh_Nanda
EVERY UBER RICH LAWYER IN INDIA MUST BE INVESTIGATED FOR HIDDEN LINKS WITH CORRUPT JUDGES , WHO MYSTERIOUSLY SIT IN THE RULING BENCH.. MOST OF THESE CORRUPT JUDGES ARE IN FOREIGN PAYROLL-- INCLUDING PAKISTANI ISI PAYROLL..
IF PAKISTANI ISI WANTS TO FIX A CASE IN INDIA THEY USE A NGO, WHO WILL FILE PIL..
THIS PIL IS GIVEN TOP PRIORITY .
HOW WAS HOME MINISTER AMIT SHAH THROWN INTO JAIL FOR ISI PAYROLL TERRORIST SOHRABUDDIN?
OUR COLLEGIUM JUDICIARY BURNT MIDNIGHT OIL TO OPEN CHAMIYA BARS ( WH0RE HOUSES IN MUMBAI ) BY PIL ROUTE …..
BREAD WINNERS OF ENTIRE FAMILIES HAVE BEEN ROTTING IN JAIL WITHOUT A TRIAL FOR THREE DECADES .. .
ARE WE TO BELIEVE THAT A COUPLE OF DOZEN ATTRACTIVE YOUNG GIRLS WITH GOOD FIGURE CANT GET A DECENT JOB?
READ ALL 7 PARTS OF THE POST BELOW--
http://ajitvadakayil.blogspot.com/2016/03/foreign-funded-trojan-horse-ngos-pil.html
SACK OUR USELESS LAW MINISTER RAVI SHANKAR PRASAD..
capt ajit vadakayil
..
SEND ABOVE COMMENT TO--
DeletePMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
http://ajitvadakayil.blogspot.com/2017/04/revamp-indian-technical-education.html
ReplyDeleteINDIA MUST REVAMP OUR EDUCATION SYSTEM..
RECENTLY I ASKED JEW WALTER LEWIN A DOUBT , ABOUT CHNDRAYAAN 2 VIKRAM LANDER DISASTER.. I SENT HIM THE POST BELOW..
https://ajitvadakayil.blogspot.com/2019/10/isro-must-master-dzhanibekov-effect.html
INSTEAD OF GIVING A PROPER REPLY THIS CUNT TELLS ME " READ YOUR INDIAN NEWSPAPERS"..
I WROTE BACK " CAPT AJIT VADAKAYIL WILL WRITE YOUR LEGACY"..
IMAGINE , I HAD SENT HIM A DIGITALIZED ATHARVA VEDA MANTRA FOR KEEPING HIS BRAIN SHARP IN HIS OLD AGE.. I HAVE WITHDRAWN IT, AS HE DOES NOT DESERVE IT .. HE WILL FEEL THE EFFECT..
MY CHIEF ENGINEER WAS A STUDENT OF IGOR IRODOV.. HE WOULD NEVER TELL OFF SOMEBODY LIKE THAT CUNT WALTER LEWIN..
IRODOV WAS A BRAVE MAN AND A MAN OF CHARACTER..
FOR HIS BRAVERY IE IRODOV WAS AWARDED THE ORDERS OF THE PATRIOTIC WAR (II DEGREE, 1945) AND RED STAR (1944), AND THE MEDALS FOR COURAGE (1943), BATTLE MERIT (1944) AND THE VICTORY OVER GERMANY (1946).
WHO IS THIS OVER HYPED WALTER LEWIN ?..
FAIZA HARBI ACCUSED WALTER BABY OF BEING A SEXUAL PREDATOR..
https://thetech.com/2015/01/27/lewin-v134-n64
KNOWLEDGE IS POWER ONLY IF YOUR CHARACTER CAN GIVE YOU RESPECT..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
RAMESH POKHRIYAL
WALTER LEWIN
PMO
PM MODI
EDUCATION MINISTRY
AJIT DOVAL
RAW
AMIT SHAH
HOME MINISTER
PUTIN
AMBASSADOR TO FROM RUSSIA
Captain, sent to:
Deleteminister.hrd@gov.in (Ramesh Pohriyal)
rusembindija@mid.ru (Russian embassy in India)
amb.moscow@mea.gov.in,(Ambassador to Russia)
amboffice.moscow@mea.gov.in (Ambassador to Russia)
dcm.moscow@mea.gov.in (Deputy Chief of Mission to Russia)
principalkvm@mail.ru (Principle of Kendriya Vidyalaya in Moscow)
I also posted message in the video of Walter Lewin below:
https://www.youtube.com/watch?v=W0CSBGyrVKQ
but I can't see it after logging out, youtube has blocked it
WE DONT CARE FOR FOREIGN PAYROLL NHRC WHOSE MISSIONS IS TO SAVE DESH DROHIS AND TRAITORS..
ReplyDeletehttps://twitter.com/ANI/status/1203253619493093376
ReplyDeleteTELL THIS STUPID CJI BOBDE THAT POLICE PREEMPTED "WE THE PEOPLE" FROM TAKING LAW INTO OUR OWN HANDS.
WHERE IS IT WRITTEN THAT POLICE / CRPF/ ARMY REQUIRES JUDICIAL SANCTION BEFORE KILLING TERRORISTS / SEPARATISTS/ TRAITORS/ EXTREME CRIMINALS WHO HAVE BEEN IDENTIFIED BY HIDDEN CAMS ?..
GUNS GIVEN TO THESE UNIFORMED MEN ARE FOR SHOW?..
POLICE / ARMY ARE NOT THE SLAVES OF THE JUDICIARY..THEY HAVE SWORN OATHS TO PROTECT THE WATAN AND GOOD CITIZENS ..
WE THE PEOPLE DO NOT TRUST " LAWYERS TURNED JUDGES" THE LOWEST SCUM BORN IN THIS WATAN AND THEIR USELESS "JUDICIAL LENS" WHICH CREATED THE NAXAL RED CORRIDOR IN INDIA AND ETHNICALLY CLEANSED KASHMIRI PANDITS..
EVERY UBER RICH LAWYER IN INDIA MUST BE INVESTIGATED FOR HIDDEN LINKS WITH CORRUPT JUDGES , WHO MYSTERIOUSLY SIT IN THE RULING BENCH.. MOST OF THESE CORRUPT JUDGES ARE IN FOREIGN PAYROLL-- INCLUDING PAKISTANI ISI PAYROLL..
IF PAKISTANI ISI WANTS TO FIX A CASE IN INDIA THEY USE A NGO, WHO WILL FILE PIL..
THIS PIL IS GIVEN TOP PRIORITY .
HOW WAS HOME MINISTER AMIT SHAH THROWN INTO JAIL FOR ISI PAYROLL TERRORIST SOHRABUDDIN?
OUR COLLEGIUM JUDICIARY BURNT MIDNIGHT OIL TO OPEN CHAMIYA BARS ( WH0RE HOUSES IN MUMBAI ) BY PIL ROUTE …..
BREAD WINNERS OF ENTIRE FAMILIES HAVE BEEN ROTTING IN JAIL WITHOUT A TRIAL FOR THREE DECADES .. .
ARE WE TO BELIEVE THAT A COUPLE OF DOZEN ATTRACTIVE YOUNG GIRLS WITH GOOD FIGURE CANT GET A DECENT JOB?
WE WANT IMMEDIATE POLICE AND JUDICIAL REFORMS..
WE DONT WANT A STUPID SYSTEM WHERE ONLY A JUDGE CAN ELIMINATE A TERRORIST OR CHILD RAPIST..
WHAT IS THE MEANING OF EXTRA-JUDICIAL KILLING?
AMIT SHAH , HOME MINISTER WAS PUT IN JAIL FOR DREADED ISI PAYROLL TERRORIST SOHRABUDDIN , WHO WAS SPONSORED BY NAC MEMBER TEESTA SETALVAD....
WE TRUST THE POLICE NOT THE JUDGES ..
A LOT OF COLLEGIUM JUDGES ARE IN DEEP STATE PAYROLL..….
WE THE PEOPLE DEMAND IMMEDIATE REFORMS IN JUDICIARY-- WHICH IS THE MOST ROTTEN ENTITY IN INDIA...
WHAT MAJESTY OF JUDICIARY IS CJI TALKING ABOUT..
BOTTOM DREGS OF THE SCHOOL CEREBRAL BARREL AND BOTTOM DREGS OF THE LAWYER POOL BECOME JUDGES..
THESE BRAIN DEAD JUDGES CANNOT EVEN APPLY BODMAS TO THE CONSTITUTION, WHILE A 12 YEAR OLD SCHOOL BY CAN ..
AND THESE JUDGES PLAY GOD.....
MODI ALLOWED LAW MINISTER PRASAD A NEW TERM AFTER 5 YEARS OF DOING NOTHING.. ALL PRASAD DID WAS TO BE SERVILE TO MODI....
CITIZENS HAVE RIGHT OF FREE SPEECH AGAINST JUDICIARY ....
READ ALL 12 PARTS OF THE POST BELOW ( ONLY 55% COMPLETE )
https://ajitvadakayil.blogspot.com/2017/07/police-reforms-in-india-much-more-with.html
read all 8 parts of the post below ( 60% complete )--
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
capt ajit vadakayil
..
SEND ABOVE COMMENT TO--
DeletePMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
I ASK MY READERS
DeleteSHOW THE MIRROR TO THE JUDICIARY
IT IS NOW OR NEVER
https://twitter.com/realmofchaos7/status/1203313174784573442?s=20
Deletehttps://twitter.com/kkarthikeyan09/status/1203317498302455809
Deletehttps://twitter.com/kkarthikeyan09/status/1203318152152547328
https://twitter.com/kkarthikeyan09/status/1203318470953189383
Posted on Twitter to more than ७०
DeletePeople.
With link and screenshot
Mandar
Deletehttps://twitter.com/AghastHere/status/1203355062166327301?s=20
Pipeline of Justice
*******************
Legislators pass law >> Judiciary interprets them >> Executives enforce them
What do you do when there is a clog in the pipeline? Simply bypass so that justice is served piping hot.
This technology is much older than you would imagine. Even there are the myths of Mechanical men in Ancient Greek and Egyptian Myths.
ReplyDeletehttp://todayssimpleaiformarketing.com/