THIS POST IS CONTINUED FROM PART 6, BELOW--
CAPT AJIT VADAKAYIL SAYS AI MUST MEAN “INTELLIGENCE AUGUMENTATION “ IN FUTURE ..
Let this be IA
Let this be IA
OBJECTIVE AI CANNOT HAVE A VISION,
IT CANNOT PRIORITIZE,
IT CANT GLEAN CONTEXT,
IT CANT TELL THE MORAL OF A STORY ,
IT CANT RECOGNIZE A JOKE, OR BE A JUDGE IN A JOKE CONTEST
IT CANT DRIVE CHANGE,
IT CANNOT INNOVATE,
IT CANNOT DO ROOT CAUSE ANALYSIS ,
IT CANNOT MULTI-TASK,
IT CANNOT DETECT SARCASM,
IT CANNOT DO DYNAMIC RISK ASSESSMENT ,
IT IS UNABLE TO REFINE OWN KNOWLEDGE TO WISDOM,
IT IS BLIND TO SUBJECTIVITY,
IT CANNOT EVALUATE POTENTIAL,
IT CANNOT SELF IMPROVE WITH EXPERIENCE,
IT CANNOT UNLEARN
IT IS PRONE TO CATASTROPHIC FORGETTING
IT DOES NOT UNDERSTAND BASICS OF CAUSE AND EFFECT,
IT CANNOT JUDGE SUBJECTIVELY TO VETO/ ABORT,
IT CANNOT FOSTER TEAMWORK DUE TO RESTRICTED SCOPE,
IT CANNOT MENTOR,
IT CANNOT BE CREATIVE,
IT CANNOT THINK FOR ITSELF,
IT CANNOT TEACH OR ANSWER STUDENTs QUESTIONS,
IT CANNOT PATENT AN INVENTION,
IT CANNOT SEE THE BIG PICTURE ,
IT CANNOT FIGURE OUT WHAT IS MORALLY WRONG,
IT CANNOT PROVIDE NATURAL JUSTICE,
IT CANNOT FORMULATE LAWS
IT CANNOT FIGURE OUT WHAT GOES AGAINST HUMAN DIGNITY
IT CAN BE FOOLED EASILY USING DECOYS WHICH CANT FOOL A CHILD,
IT CANNOT BE A SELF STARTER,
IT CANNOT UNDERSTAND APT TIMING,
IT CANNOT FEEL
IT CANNOT GET INSPIRED
IT CANNOT USE PAIN AS FEEDBACK,
IT CANNOT GET EXCITED BY ANYTHING
IT HAS NO SPONTANEITY TO MAKE THE BEST OUT OF SITUATION
IT CAN BE CONFOUNDED BY NEW SITUATIONS
IT CANNOT FIGURE OUT GREY AREAS,
IT CANNOT GLEAN WORTH OR VALUE
IT CANNOT UNDERSTAND TEAMWORK DYNAMICS
IT HAS NO INTENTION
IT HAS NO INTUITION,
IT HAS NO FREE WILL
IT HAS NO DESIRE
IT CANNOT SET A GOAL
IT CANNOT BE SUBJECTED TO THE LAWS OF KARMA
ON THE CONTRARY IT CAN SPAWN FOUL AND RUTHLESS GLOBAL FRAUD ( CLIMATE CHANGE DUE TO CO2 ) WITH DELIBERATE BLACK BOX ALGORITHMS, JUST FEW AMONG MORE THAN 60 CRITICAL INHERENT DEFICIENCIES.
HUMANS HAVE THINGS A COMPUTER CAN NEVER HAVE.. A SUBCONSCIOUS BRAIN LOBE, REM SLEEP WHICH BACKS UP BETWEEN RIGHT/ LEFT BRAIN LOBES AND FROM AAKASHA BANK, A GUT WHICH INTUITS, 30 TRILLION BODY CELLS WHICH HOLD MEMORY, A VAGUS NERVE , AN AMYGDALA , 73% WATER IN BRAIN FOR MEMORY, 10 BILLION MILES ORGANIC DNA MOBIUS WIRING ETC.
SINGULARITY , MY ASS !
Local Interpretable
Model-Agnostic Explanation (LIME) is an algorithm that provides a novel
technique for explaining the outcome of any predictive model in an
interpretable and faithful manner.
It works by training an interpretable model
locally around a prediction you want to explain.
To better understand
how LIME works, let's consider two distinct types of interpretability:
Global
interpretability: Global interpretations help us understand the entire
conditional distribution modeled by the trained response function, but global
interpretations can be approximate or based on averages.
Local interpretability:
Local interpretations promote understanding of a single data point or of a
small region of the distribution, such as a cluster of input records and their
corresponding predictions, or decile of predictions and their corresponding
input rows.
Because small sections of the conditional distribution are more
likely to be linear, local explanations can be more accurate than global
explanations.
LIME is designed to
provide local interpretability, so it is most accurate for a specific decision
or result.
Locally faithful
explanations capture the classifier behavior in the neighborhood of the
instance to be explained. To learn a local explanation, LIME approximates the
classifier's decision boundary around a specific instance using an
interpretable model.
LIME is model-agnostic, which means it considers the model
to be a black-box and makes no assumptions about the model behavior. This makes
LIME applicable to any predictive model.
In order to learn the
behavior of the underlying model, LIME perturbs the inputs and sees how the
predictions change. The key intuition behind LIME is that it is much easier to
approximate a black-box model by a simple model locally than by a single global
model
Most Machine Learning
algorithms are black boxes, but LIME has a bold value proposition: explain the
results of any predictive model. The tool can explain models trained with text,
categorical, or continuous data
While the techniques
above offer practical steps that data scientists can take, LIME is an actual
method developed by researchers to gain greater transparency on what’s
happening inside an algorithm. The researchers explain that LIME can explain
“the predictions of any classifier in an interpretable and faithful manner, by
learning an interpretable model locally around the prediction.”
What this means in
practice is that the LIME model develops an approximation of the model by
testing it out to see what happens when certain aspects within the model are
changed. Essentially it’s about trying to recreate the output from the same
input through a process of experimentation.
As the ‘AI era’ of
increasingly complex, smart, autonomous, big-data-based tech comes upon us, the
algorithms that fuel it are getting under more and more scrutiny.
Whether you’re a data
scientist or not, it becomes obvious that the inner workings of machine
learning, deep learning, and black-box neural networks are not exactly
transparent.
In the wake of
high-profile news reports concerning user data breaches, leaks, violations, and
biased algorithms, that is rapidly becoming one of the biggest — if not the
biggest — sources of problems on the way to mass AI integration in both the
public and private sectors.
Here’s where the push
for better AI interpretability and explainability takes root.
By now, much more
justifiable apprehensions, grounded in the socio-economic reality, took place
in the public consciousness:--
● When AI is making
judgements and appraising risks, why and how does it come to the conclusions it
presents?
● What is considered
failure and success? Why?
● If there’s an error
or a biased logic, how do we know?
● How do we identify
and fix such issues?
● Are we sure we can
trust AI?
These are the questions
that need to be answered in order to be able to rely on AI, and be sure about
its accountability. Here’s where AI interpretability and explainability comes
into play.
AI Interpretability vs
Explainability
Interpretability is
about the extent to which a cause and effect can be observed within a system.
Or, to put it another way, it is the extent to which you are able to predict
what is going to happen, given a change in input or algorithmic parameters.
It’s being able to look at an algorithm and go yes-- I can see what’s happening
here.
Explainability,
meanwhile, is the extent to which the internal mechanics of a machine or deep
learning system can be explained in human terms. It’s easy to miss the subtle
difference with interpretability, but consider it like this: interpretability
is about being able to discern the mechanics without necessarily knowing why.
Explainability is being able to quite literally explain what is happening.
Where machine learning
and AI is concerned, “interpretability” and “explainability” are often used
interchangeably, though it’s not correct for 100% of situations. While closely
related, these terms denote different aspects of predictability and
understanding one can have of complex systems, algorithms, and vast sets of
data. See below:--
● Interpretability
refers to the ability to observe cause-and-effect situations in a system, and,
essentially, predict which changes will cause what type of shifts in the
results (without necessarily understanding the nitty-gritty of it all).
● Explainability is
basically the ability to understand and explain ‘in human terms’ what is
happening with the model; how exactly it works under the hood.
The difference is
subtle enough, but it’s there. While usually both can co-exist, some situations
might require one and not the other: for example, when explaining what’s behind
a predictive model to the higher-ups of the banking or the pharmaceutical
industry, demonstrating the measures taken to minimize or eliminate the
possibility of bias in the risk assessment models for their legal systems.
Important Properties Of
Explainability
Portability: It defines
the range of machine learning models where the explanation method can be used.
Expressive Power: It
defines as the structure of an explanation that a method is able to generate.
Translucency: This
describes as to how much the method of explanation depends on the machine
learning model. Low translucency methods tend to have higher portability.
Algorithmic Complexity:
It defines the computational complexity of a method where the explanations are
generated.
Fidelity: High fidelity
is considered as one of the important properties of an explanation as low
fidelity lacks in explaining the machine learning model.
Interpretability
Interpretability is
defined as the amount of consistently predicting a model’s result without
trying to know the reasons behind the scene. It is easier to know the reason
behind certain decisions or predictions if the interpretability of a machine
learning model is higher.
Evaluation Of
Interpretability
Application Level
Evaluation: This is basically the real-task. It means putting the explanation
into the product and the end user will do all the tests.
Human Level Evaluation:
This is a simple task or can be termed as a simplified application level
evaluation. In this case, the experiments are carried out by laypersons by
making the experiments cheaper and testers can be found easily.
Function level
evaluation: This is an approach where an anonymous person already evaluates the
class of model. This approach is also known as a proxy task.
Understanding The
Difference
You can distinguish the
difference between these two by a simple instance. For instance, a school
student doing a little experiment on titration, the result can be interpreted
as what will be the next step as far as it can be done until the outcome is
found out. This is interpretability. And the chemistry behind this experiment
is the definition of explainability.
Black box AI systems
for automated decision making, often based on machine learning over big data,
map a user's features into a class predicting the behavioural traits of
individuals, such as credit risk, health status, etc., without exposing the
reasons why.
Explainable AI (XAI) is
an emerging field in machine learning that aims to address how black box
decisions of AI systems are made. ... One way to gain explainability in AI
systems is to use machine learning algorithms that are inherently explainable.
Why Does Machine
Learning Need to Be Explainable?
Being able to present
and explain extremely complex mathematical functions behind predictive models
in understandable terms to human beings is an increasingly necessary condition
for real-world AI applications.
As algorithms become
more complicated, fears of undetected bias, mistakes, and miscomprehensions
creeping into decision-making grow among policymakers, regulators, and the
general public.
In such an environment, interpretability and explainability are
crucial for achieving fair, accountable and transparent (FAT) machine learning,
complying with the needs and standards for:---
1. Business adoption
It is paramount for any
business predictions to be easily explained to a boss, a customer, or a
commercial legal adviser. Simply speaking, when any justification for an
important business decision is reduced to “the algorithm made us do it,” you’ll
have a hard time making anyone — be it investors, CEOs, CIOs, end customers, or
legal auditors — buy the fairness, reliability, and business logic of this
algorithm.
2. Regulatory oversight
Applying regulations,
such as the GDPR, regional and local laws, to machine learning models can only
be fully achieved with the FAT principles at the core. For example, Article 22
Recital 71 of the GDPR specifically states: “The data subject shall have the
right not to be subject to a decision based solely on automated processing,
including profiling, which produces legal effects concerning him or her or
similarly significantly affects him or her.”
In turn, Articles 13
and 15 stress repeatedly that data subjects have a right to the disclosure of
“meaningful information about the logic involved” and of “the significance and
the envisaged consequences” of automated decision-making.
To make a
GDPR-compliant AI is to make an interpretable, explainable AI. In the world of
rapidly developing and spreading laws regarding data, that can soon mean “to
make any compliant AI is to make an interpretable, explainable AI.”
3. Minimizing bias
The problem of
algorithmic bias and the dangers it can harbor when allowed into machine
learning systems are well-known and documented. While the main reason behind
biased AI is the poor quality of data fed into it, the lack of transparency in
the proceedings and, as a result, inability to quickly detect bias are among
the key factors here, as well.
Imagine the times when
interpretable and explainable AI becomes the norm. Then the ability to
understand not only the fundamental techniques used in a model but also
particular cause-and-effect ties found in those specific algorithms would allow
for faster and better bias detection. This has a potential to eliminate the
problem itself, or at least to allow for a much quicker and more effective
solution to it, which is one of the main socio-economic reasons behind the current
push for both fair and ethical AI.
4. Model documentation
Regardless of the type
and scope of a software development project, probably no one has ever described
documentation keeping as fun. Yet it must be done, and predictive models are no
exception.
Where AI, machine
learning, and especially black-box deep learning are concerned, in some cases
this usually tedious task can become impossible altogether.
Basically speaking,
black-box modeling can be great for dealing with data regardless of a particular
mathematical structure of the model, but if you need to document the specifics
— be it for a commercial, educational, or other project — you’re out of luck.
This model would need to become both interpretable and explainable, in order
for an efficient documentation to be created.
While questions of
transparency and ethics may feel abstract for the data scientist on the ground,
there are, in fact, a number of practical things that can be done to improve an
algorithm’s interpretability and explainability.
When humans make
decisions, they have the ability to explain their thought process behind it.
They can explain the rationale; whether its driven by observation, intuition,
experience or logical thinking ability. Basic ML algorithms like decision trees
can be explained by following the tree path which led to the decision. But when
it comes to complex AI algorithms, the deep layers are often incomprehensible
by human intuition and are quite opaque.
Data scientists may
have trouble explaining why their algorithm gave a decision and the laymen
end-user may not simply trust the machine’s predictions without contextual
proof and reasoning.
There need to be three
steps which should be fulfilled by the system :---
1) Explained the intent
behind how the system affects the concerned parties
2) Explain the data
sources you use and how you audit outcomes
3) Explain how inputs
in a model lead to outputs.
Interpret means to
explain or to present in understandable terms. In the context of ML systems,
interpretability is the ability to explain or to present in understandable
terms to a human Interpretable AI, or
Transparent AI refer to techniques in artificial intelligence (AI) which can be
trusted and easily understood by humans.
It contrasts with the concept of the
"black box" in machine learning where even their designers cannot
explain why the AI arrived at a specific decision Interpretability is about the extent to
which a cause and effect can be observed within a system. ... Explainability,
meanwhile, is the extent to which the internal mechanics of a machine or deep
learning system can be explained in human terms
Explainability is
motivated due to lacking transparency of the black-box approaches, which do not
foster trust and acceptance of AI generally and ML specifically. Rising legal
and privacy aspects, e.g. with the new European General Data Protection
Regulations will make black-box approaches difficult to use in Business,
because they often are not able to explain why a machine decision has been
made.
The neural networks
employed by conventional AI must be trained on data, but they don’t have to
understand it the way humans do. They “see” data as a series of numbers, label
those numbers based on how they were trained and solve problems using pattern
recognition. When presented with data, a neural net asks itself if it has seen
it before and, if so, how it was labeled it previously.
In contrast, cognitive
AI is based on concepts. A concept can be described at the strict relational
level, or natural language components can be added that allow the AI to explain
itself. A cognitive AI says to itself: “I have been educated to understand this
kind of problem. You're presenting me with a set of features, so I need to
manipulate those features relative to my education.”
The more information
that is submitted to the model for regularity the better it gets. So dissimilar
to customary data management and cleaning systems, Machine learning algorithms
improve the situation with scale.
With regards to fueling
particular functions, AI can do a large portion of the work for us. By
concentrating on the machine learning deliberately getting cleverer about how
it uses, rates and analyzes data, we can diminish coding-hours as well as
stress less over the faulty data.
Machine learning
methods are often based on neural networks, which can be basically seen as
black boxes that turn input into output. Not being able to access the knowledge
within the machine is a constant headache for developers, and many times for
users as well
Researchers are
studying other significant variables, like how much the attacker actually knows
about the AI system. For example, in what we call “white-box” attacks, the
adversary knows the model and its features. In “gray-box” attacks, they don’t
know the model, but do know the features. In “black-box” attacks, they know
neither the model nor the features.
Even in a black-box scenario, adversaries
remain undaunted. They can persistently use brute-force attacks to break
through and manipulate the AI malware classifier. This is an example of what is
called “transferability”—the use of one model to trick another model.
Explainable AI (XAI)
refers to methods and techniques in the application of artificial intelligence
technology (AI) such that the results of the solution can be understood by
human experts. It contrasts with the concept of the "black box" in
machine learning where even their designers cannot explain why the AI arrived
at a specific decision. XAI is an implemention of the social right to
explanation.
Transparency rarely comes
for free and that there are often trade-offs between the accuracy and the explainability
of a solution
The technical challenge
of explaining AI decisions is sometimes known as the interpretability
problem. Another consideration is
info-besity (overload of information), thus, full transparency may not be
always possible or even required.
DeepLIFT (Deep Learning
Important Features)
DeepLIFT is a useful
model in the particularly tricky area of deep learning. It works through a form
of backpropagation: it takes the output, then attempts to pull it apart by
‘reading’ the various neurons that have gone into developing that original
output.
Essentially, it’s a way
of digging back into the feature selection inside of the algorithm (as the name
indicates).
Layer-wise relevance
propagation
Layer-wise relevance
propagation is similar to DeepLIFT, in that it works backwards from the output,
identifying the most relevant neurons within the neural network until you
return to the input (say, for example, an image).
DeepLIFT (Deep Learning
Important FeaTures), a method for decomposing the output prediction of a neural
network on a specific input by backpropagating the contributions of all neurons
in the network to every feature of the input.
DeepLIFT compares the activation
of each neuron to its 'reference activation' and assigns contribution scores
according to the difference. By optionally giving separate consideration to
positive and negative contributions, DeepLIFT can also reveal dependencies
which are missed by other approaches. Scores can be computed efficiently in a
single backward pass
Interpretability is the
degree to which a human can understand the cause of a decision
Boolean Decision Rules
via Column Generation: This algorithm provides access to classes which
implements a directly interpretable supervised learning method for binary
classification that learns a
Boolean rule in disjunctive normal form (DNF) or
conjunctive normal form (CNF) using column generation (CG). For classification
problems, Boolean Decision Rules tends to return simple models that can be
quickly understood.
Generalised Linear Rule
Models: Generalised Linear Rule Models are applicable for both classification
and regression problems. For classification problems, Generalised Linear Rule
Models can achieve higher accuracy while retaining the interpretability of a
linear model.
ProfWeight: This
algorithm can be applied to the neural networks in order to produce instance
weights that can be further applied to the training data to learn an
interpretable model.
Teaching AI to Explain
Its Decisions: This algorithm is an explainability framework that leverages
domain-relevant explanations in the training dataset to predict both labels and
explanations for new instances.
Contrastive
Explanations Method: This algorithm is the basic version for classification
with numerical features can be used to compute contrastive explanations for
image and tabular data.
Contrastive
Explanations Method with Monotonic Attribute Functions: This algorithm is a
Contrastive Image explainer which leverages Monotonic Attribute Functions. The
main idea behind this algorithm is to explain images using high level
semantically meaningful attributes that may either be directly available or
learned through supervised or unsupervised methods
Disentangled Inferred
Prior Variational Auto-Encoder (DIP-VAE): This algorithm is an unsupervised
representation learning algorithm which usually takes a given feature and
learns a new representation in a disentangled manner in order to make the
resulting features more understandable.
ProtoDash: This
algorithm is a way of understanding a dataset with the help of prototypes. It
provides exemplar-based explanations for summarising dataset as well as
explaining predictions made by an AI model. It employs a fast gradient-based
algorithm to find prototypes along with their (non-negative) importance
weights.
Explainability may not
be very important when you are classifying images of cats and dogs – but as ML
models are being used for the more extensive and critical problems, XAI becomes
extremely important if the ML model is predicting the presence of a disease
like diabetes from a patient’s test results, doctors need substantial evidence
as to why the decision was made before suggesting any treatment. .
Currently, AI models
are evaluated using metrics such as accuracy or F1 score on validation data.
Real-world data may come from a slightly different distribution than training
data, and the evaluation metric may be unjustifiable. Hence, the explanation,
along with a prediction, can transform an untrustworthy model into a
trustworthy one. .
There are three crucial
blocks to develop explainable AI system:--
.
Explanation interface
The explanation
generated by the explainable model should be shown to humans in
human-understandable formats. There are many state-of-the-art human-computer
interaction techniques available to generate compelling explanations. Data
visualization models, natural language understanding and generation,
conversational systems, etc. can be used for the interface.
Psychological model of
explanation--
Humans take most of the
decisions unconsciously for which they don’t have any explanations. Hence,
psychological theories can help developers as well as evaluators. More powerful
explanations will be generated by considering psychological requirements. E.g.
a user can rate on the clarity of the generated explanation, which will help to
understand user satisfaction. And the model can be continuously trained
depending on user rating.
Explainability can be a
mediator between AI and society. It is also a useful tool for identifying issues
in the ML models, artifacts in the training data, biases in the model, for
improving model, for verifying results, and most importantly for getting an
explanation. Even though explainable AI is complex, it will be one of the
focused research areas in the future.
Distrust, unfairness,
bias and ethical ramifications of automated ML decisions are now increasingly
common.
Imagine an advanced
fighter aircraft is patrolling a hostile conflict area and a bogie suddenly
appears on radar accelerating aggressively at them. The pilot, with the
assistance of an Artificial Intelligence co-pilot, has a fraction of a second
to decide what action to take – ignore, avoid, flee, bluff, or attack.
The costs associated with False Positive and
False Negative are substantial – a wrong decision that could potentially
provoke a war or lead to the death of the pilot. What is one to do…and why?
A false positive state
is when the IDS identifies an activity as an attack but the activity is
acceptable behavior. A false positive is a false alarm. A false negative state
is the most serious and dangerous state. This is when the IDS identifies an
activity as acceptable when the activity is actually an attack.
A false positive is an
outcome where the model incorrectly predicts the positive class. And a false
negative is an outcome where the model incorrectly predicts the negative class.
In application security
testing, false positives alone don’t determine the full accuracy. False
positives are just one of the four aspects that determine its accuracy – the
other three being ‘true positives,’ ‘true negatives,’ and ‘false negatives.’
False Positives (FP):
Tests with fake vulnerabilities that were incorrectly reported as vulnerable
True Positives (TP):
Tests with real vulnerabilities that were correctly reported as vulnerable
False Negatives (FN):
Tests with real vulnerabilities that were not correctly reported as vulnerable
True Negatives (TN):
Tests with fake vulnerabilities that were correctly not reported as vulnerable
Therefore, a true
positive rate (TPR) is the rate at which real vulnerabilities were reported,
correctly. A false positive rate (FPR) is the rate at which fake
vulnerabilities were reported as real, incorrectly.
Explainable Artificial
Intelligence (XAI) is critical for physicians, engineers, technicians, physicists,
chemists, scientists and other specialists whose work is governed by the
exactness of the model’s results, and who simply must understand and trust the
models and modeling results. XAI is a legal mandate in regulated verticals such
as banking, insurance, telecommunications and others. For AI to take hold in
healthcare, it has to be explainable. .
There is no mature
auditing framework in place for AI, nor any AI-specific regulations, standards
or mandates. Precedents don’t exist. Auditability, explainability, transparency
and replicability (reproducibility) are often suggested as means of avoiding
bias.
Explainability is
intrinsically challenging because explanations are often incomplete because
they omit things that cannot be explained understandably. Algorithms are
inherently challenging to explain. Take, for instance, algorithms using
“ensemble” methodologies. Explaining how one model works is hard enough.
Explaining how several models work both individually and together is
exponentially more difficult.
Transparency is usually
a good thing. However, it if it requires disclosing source code or the
engineering details underpinning an AI application, it could raise intellectual
property concerns. And again, transparency about something that may be
unexplainable in laymen’s terms would be of limited use.
Many AI algorithms are
really black boxes: partially, or not understood both by those who create them
and those who interact with them. Obviously, this is problematic: there are
risks both for the companies and organizations that deploy these AIs, and the
people who interact with them. More explainable AIs seem to be in everyone's
best interests. Nevertheless, good intentions and practice often clash: there
are real, pragmatic reasons why many AIs are not engineered in such a way that
they are easily explained.
A model can be a black
box for one of two reasons: (a) the function that the model computes is far too
complicated for any human to comprehend, or (b) the model may in actual fact be
simple, but its details are proprietary and not available for inspection.
Machine learning is a
subset of Artificial Intelligence (AI) that focuses on getting machines to make
decisions by feeding them data.
It is paramount for any
business predictions to be easily explained to a boss, a customer, or a
commercial legal adviser. Simply speaking, when any justification for an
important business decision is reduced to “the algorithm made us do it,” you’ll
have a hard time making anyone — be it investors, CEOs, CIOs, end customers, or
legal auditors — buy the fairness, reliability, and business logic of this
algorithm.
Users need to know the
“whys” behind the workings, such as why an algorithm reached its
recommendations—from making factual findings with legal repercussions to
arriving at business decisions, such as lending, that have regulatory
repercussions—and why certain factors (and not others) were so critical in a
given instance.
As domains like
healthcare look to deploy artificial intelligence and deep learning systems,
where questions of accountability and transparency are particularly important,
if we’re unable to properly deliver improved interpretability, and ultimately
explainability, in our algorithms, we’ll seriously be limiting the potential
impact of artificial intelligence.
There are 8 underlying
reasons why an AI solution can become hard or impossible to explain.
Reason 1: The way data
is generated is not understood
The base resource that
machine learning engineers work with is data. However, the exact meaning and
source of this data is often nebulous, and prone to misinterpretation. Data
might come from a CRM, be self-reported and collected through a survey,
purchased from a third-party provider, ... To make matters worse, machine
learning engineers often only have a label to work with, and no further
details. For example, we could have a dataset that contains a user for each
row, and one column named post_count. A seasoned machine learning engineer will
immediately start asking questions: count of posts since when? Does this
include deleted posts? What is the exact definition of a post? Sadly, while
answering this for a single column is often doable (but resource-intensive),
answering it for thousands of columns is both extremely time-consuming and
complex.
This brings us to our
second underlying reason...
Reason 2: The data
given to an algorithm is feature-rich
In a quest to have more
predictive power, and thanks to the ever growing computational power of our
computers, most machine learning practicioners tend to work with very large,
very feature rich datasets. With feature-rich, we mean that for every
observation (e.g. a person whose personality we want to predict, our row in our
previous example), we have many different types of data (e.g. timestamped
posts, their interactions with other users, their signup date, ..., our columns
in our previous example). It's quite common to have thousands (and many, many
more) different types of data in many machine learning problems.
Reason 3: The way data
is processed is complex
Machine learning
engineers often don't just take the data as such and feed it to an algorithm,
the process it ahead of time. Data can be enriched (creating additional data
types from existing ones: such as turning a date into another variable that
says if it's a national holiday or not), combined (such as reducing the output
of many sensors to just a few signals) and linked (by getting data from other
data sources). Each of these operations bring additional complexity in
understanding and explaining the base data the algorithm is learning from.
Reason 4: The way
additional training data is generated (augmentation) is complex
Many use cases of
machine learning allow for the generation of additonal training data, called
augmentation. Homever, these generative approaches to getting more and better
training data can often be complex, and modify the learnings of the algorithm
in subtle, unintuitive ways.
Reason 5: The
algorithms that are used don't balance complexity and explanatory power
(regularization)
It's often difficult to
balance the predictive explanatory power of a model and the complexity of a
model. Luckily, there are a slew of techniques available today to do just that
for machine learning engineers, called "regularization" techniques.
These techniques weigh the cost of adding complexity versus the additional
explanatory power that this complexity bring, and attempt to strike a good
balance. The under- or mis-application of regularization in models can lead to
very, very complex models.
Reason 6: The algorithms
that are used are allowed to learn unintuitive relationships (non-linearity)
Linear relationships
are ones where an increase in one variable causes a set increase (or decrease)
in another variable. For example, the relationship between signups to a new
service and profits could be linear: for every new signup, your profit
increases by a set amount. Some machine learning models can only learn linear
relationships (such as the aptly named "linear regression"). These
models tend to be easier to explain, but also miss out on a lot of nuance. For
example, your profits might initially increase with every signup, but then
decrease after a certain number of signups, because you need additional support
staff for your service. While some models can learn these relationships, they
are often much trickier to explain.
Reason 7: The
algorithms that are used are combined (ensembling)
Many complex AI
applications don't rely on a single algorithm, but a whole host of algorithms.
This "chaining" of algorithms is called "ensembling". This
practice is extremely common in machine learning today, but adds complexity: if
a single algorithm is hard to explain, imagine having to explain the combined
output of 50-100 algorithms working together.
Reason 8: There is no
additional explanatory layer used
Rather than trying to
make models explainable through simplicity (and as such, often sacrificing the
explanatory power), another approach has emerged in the last couple of years
that aim to add a glass layer on top of black-box models, that figuratively
allow to peer inside the models. These models, such as Shapely Additive
Explanations (SHAP), use both the data and the black box model to explain the
prediction generated by the model in question.
Neural networks are, by
design, non-deterministic. Like human minds, though on a much more limited
scale, they can make inferences, deductions, or predictions without revealing
how. That's a problem for an institution whose algorithms determine whether to
approve an applicant's request for credit.
Laws in the U.S. and elsewhere
require credit reporting agencies to be transparent about their processes. That
becomes almost impossible if the financial institutions controlling the data on
which they report can't explain what's going on for themselves.
So if an individual's
credit application is turned down, it would seem the processes that led to that
decision belong to a mechanism that's opaque by design.
Machine learning:
Improved ML through faster structured prediction. Examples include Boltzmann
machines, quantum Boltzmann machines, semi-supervised learning, unsupervised
learning and deep learning;
Again, Explainable AI
(XAI), Interpretable AI, or Transparent AI refer to techniques in artificial
intelligence (AI) which can be trusted and easily understood by humans. It
contrasts with the concept of the "black box" in machine learning
where even their designers cannot explain why the AI arrived at a specific
decision
Explainable AI (XAI)
refers to methods and techniques in the application of artificial intelligence
technology (AI) such that the results of the solution can be understood by
human experts. It contrasts with the concept of the "black box" in
machine learning where even their designers cannot explain why the AI arrived
at a specific decision.
XAI is an implemention of the social right to explanation. Some claim that transparency rarely comes for free and that there are often trade-offs between the accuracy and the explanaibility of a solution.
XAI is an implemention of the social right to explanation. Some claim that transparency rarely comes for free and that there are often trade-offs between the accuracy and the explanaibility of a solution.
Left unchecked, lack of
transparency can lead to biased outcomes that put people and businesses at
risk. The answer to this is explainable AI.
As AI algorithms
increase in complexity, it becomes more difficult
to make sense of how they work. In some cases, Interpretable and explainable AI
will be essential for business and the
public to understand, trust and effectively manage ‘intelligent’ machines.
Organisations that design and use
algorithms need to take care in producing models that are as simple as
possible, to explain how complex machines work.
To benefit from AI,
businesses have to consider not just the mechanics of production ML but also
managing any customer and/or community concerns. Left unaddressed, these
concerns can materialize in customer churn, corporate embarrassment, brand
value loss, or legal risk.
Trust is a complex and
expansive topic, but at its core, there is a need to understand and explain ML
and feel confident that the ML is operating correctly, within expected
parameters and free from malicious intrusion. In particular, the decisions made
by the production ML should be explainable - i.e. a human-interpretable
explanation must be provided.
This is becoming needed in regulations such as
the GDPR’s Right to Explanation Clause . Explainability is closely tied to
fairness - the need to be convinced that the AI is not accidentally or
intentionally rendering biased decisions.
Employed across
industries, AI applications unlock smartphones using facial recognition, make
driving decisions in autonomous vehicles, recommend entertainment options based
on user preferences, assist the process of pharmaceutical development, judge
the creditworthiness of potential homebuyers, and screen applicants for job
interviews.
AI automates, quickens, and improves data processing by finding
patterns in the data, adapting to new data, and learning from experience. In
theory, AI is objective—but in reality, AI systems are informed by human
intelligence, which is of course far from perfect. Algorithmic Accountability
Act The Potential for Bias in AI
As AI becomes
ubiquitous in its applications across industries, so does its potential for
bias and discrimination. Understanding the inherent biases in underlying data
and developing automated decision systems with explainable results will be key
to addressing and correcting the potential for unfair, inaccurate, biased, and
discriminatory AI systems.
Facebook says it
performs a public service by mining digital traces to identify people at risk
for suicide. Google says its smart home can detect when people are getting
sick. Though these companies may have good intentions, their explanations also
serve as smoke screens that conceal their true motivation: profit.
Informing and
influencing consumers with traditional advertising is an accepted part of
commerce. However, manipulating and exploiting them through behavioral ads that
leverage their medical conditions and related susceptibilities is unethical and
dangerous. It can trap people in unhealthy cycles of behavior and worsen their
health. Targeted individuals and society suffer while corporations and their
advertising partners prosper.
Emergent medical data
can also promote algorithmic discrimination, in which automated decision-making
exploits vulnerable populations such as children, seniors, people with
disabilities, immigrants, and low-income individuals. Machine learning
algorithms use digital traces to sort members of these and other groups into
health-related categories called market segments, which are assigned positive
or negative weights.
For instance, an algorithm designed to attract new job
candidates might negatively weight people who use wheelchairs or are visually
impaired. Based on their negative ratings, the algorithm might deny them access
to the job postings and applications. In this way, automated decision-making
screens people in negatively weighted categories out of life opportunities
without considering their desires or qualifications.
Because emergent medical
data are mined secretly and fed into black-box algorithms that increasingly
make important decisions, they can be used to discriminate against consumers in
ways that are difficult to detect. On the basis of emergent medical data,
people might be denied access to housing, jobs, insurance, and other important
resources without even knowing it
In recent years,
advances in computer science have yielded algorithms so powerful that their
creators have presented them as tools that can help us make decisions more
efficiently and impartially. But the idea that algorithms are unbiased is a
fantasy; in fact, they still end up reflecting human biases. And as they become
ever more ubiquitous, we need to get clear on what they should — and should not
— be allowed to do.
We need an algorithmic
bill of rights to protect us from the many risks AI is introducing into our
lives .. Algorithmic Accountability Act.
If passed, it would require companies to audit their algorithms for bias and
discrimination.
Transparency: We have
the right to know when an algorithm is making a decision about us, which
factors are being considered by the algorithm, and how those factors are being
weighted.
Explanation: We have
the right to be given explanations about how algorithms affect us in a specific
situation, and these explanations should be clear enough that the average
person will be able to understand them.
Related to transparency
is the demand for explainability. All algorithmic systems should carry
something akin to a nutritional label laying out what went into them
Consent: We have the
right to give or refuse consent for any AI application that has a material
impact on our lives or uses sensitive data, such as biometric data.
A demand for the right
to consent has been gathering steam as more people realize that images of their
faces are being used to power facial recognition technology. NBC reported that
IBM had scraped a million photos of faces from the website Flickr — without the
subjects’ or photographers’ permission. The news sparked a backlash.
People may
have consented to having their photos up on Flickr, but they hadn’t imagined
their images would be used to train a technology that could one day be used to
surveil them. Some states, like Oregon and Washington, are currently
considering bills to regulate facial recognition.
Imagine you’re applying for a
new job. Your prospective bosses inform you that your interview will be
conducted by a robot — a practice that’s already in use today. Regardless of
what they tout as the benefits of this AI system, you should have the right to
give or withhold consent, Permission must be granted,” not taken for granted.”
Freedom from bias: We
have the right to evidence showing that algorithms have been tested for bias
related to race, gender, and other protected characteristics — before they’re
rolled out. The algorithms must meet standards of fairness and
nondiscrimination and ensure just outcomes.
THIS BIAS HAS NOTHING TO DO WITH VARIANCE..
SO I WILL CALL IT BIAS2 ..
AI Bias vs. Human Bias
– highlights how artificial intelligence (AI), just like humans, is subject to
bias2. This is not because AI determines something to be true or false for any
illogical reasons. It’s because latent human bias2 may exist in machine
learning, starting with the creation of an algorithm to the interpretation of
data and subsequent interactions.
As algorithms become
more complicated, fears of undetected bias2, mistakes, and miscomprehensions
creeping into decision-making grow among policymakers, regulators, and the
general public
When one examines a
data sample, it is imperative to check whether the sample is representative of
the population of interest. A non-representative sample where some groups are
over- or under-represented inevitably introduces bias2 in the statistical
analysis. A dataset may be non-representative due to sampling error and
non-sampling errors.
Whereas error makes up
all flaws in a study’s results, bias2 refers only to error that is systematic
in nature. Whenever a researcher conducts a probability survey they must
include a margin of error and a confidence level. This allows any person to
understand just how much effect random sampling error could have on a study’s
results.
Bias2, cannot be measured using statistics due to the
fact that it comes from the research process itself. Because of its systematic
nature, bias2 slants the data in an artificial direction that will provide
false information to the researcher. For this reason, eliminating bias2 should
be the number one priority of all researchers.
Sampling errors refer to the difference
between a population value and a sample estimate that exists only because of
the sample that happened to be selected. Sampling errors are especially
problematic when the sample size is small relative to the size of the
population. For example, suppose we sample 100 residents to estimate the
average US household income
Non-sampling errors are
typically more serious and may arise from many different sources such as errors
in data collection, non-response, and selection bias2.
Typical examples include
poorly phrased data-collection questions, web-only data collection that leave out
people who don’t have easy access to the internet, over-representation of
people that feel particularly strongly about a subject, and responses that may
not reflect one’s true opinion.
In theory, AI is
objective—but in reality, AI systems are informed by subjective human
intelligence.. ML models are opaque and
inherently biased .. A
machine learning algorithm gets its knowledge from data, and if data are
somehow biased then the decisions made by the algorithm will be biased as well.
Machine learning
systems are, by design, not rule-based. Indeed, their entire objective is to
determine what the rules are or might be, when we don't know them to begin
with. If human cognitive biases actually can imprint themselves upon machine
learning, their only way into the system is through the data.
While algorithm bias2
occurs at the development stage, there are other places where it could affect
the ML process as a whole, wherein established techniques can make a major
difference. Once such touchpoint is the data sampling stage. In short, when the
machine model interacts with a data sample, the intent is for that sample to
fully replicate the problem space that the machine will ultimately operate
within.
However, there are
instances where the sample does not fully convey the entire environment and as
such, the model is not entirely prepared to accommodate its new settings with
optimal flexibility. Consider, for example, a bicycle that is designed to
perform on both mountainous terrains and roadways with equal ease. Yet, it is
only tested in mountainous conditions. In this case, the training data would
have sample bias2 and the resulting model might not operate in both
environments with equal optimization because its training was incomplete and
incomprehensive.
To avoid this,
developers can follow myriad techniques to ensure that the sample data they
utilize is congruent with the realistic population at hand. This will require
taking multiple samples from said populations and testing them to gauge their
representativeness before using them at the sampling stage..
For example, if you
want to use AI to make recommendations on who best to hire, feed the algorithm
data about successful candidates in the past, and it will compare those to
current candidates and spit out its recommendations.
Whether the AI
algorithms are themselves biased is also an open question. Machine-learning
algorithms haven’t been optimized for any definition of fairness . They have been optimized to do a task.
Algorithmic bias
describes systematic and repeatable errors in a computer system that create
unfair outcomes, such as privileging one arbitrary group of users over others.
Bias can emerge due to many factors, including but not limited to the design of
the algorithm or the unintended or unanticipated use or decisions relating to
the way data is coded, collected, selected or used to train the algorithm.
Algorithmic bias is found across platforms, including but not limited to search
engine results and social media platforms, and can have impacts ranging from
inadvertent privacy violations to reinforcing social biases of race, gender,
sexuality, and ethnicity.
The study of algorithmic bias is most concerned with
algorithms that reflect "systematic and unfair" discrimination. This
bias has only recently been addressed in legal frameworks, such as the 2018
European Union's General Data Protection Regulation.
In statistics, sampling
bias is a bias in which a sample is collected in such a way that some members
of the intended population have a lower sampling probability than others. It
results in a biased sample, a non-random sample of a population (or non-human
factors) in which all individuals, or instances, were not equally likely to
have been selected. If this is not accounted for, results can be erroneously
attributed to the phenomenon under study rather than to the method of sampling.
While you may think of
machines as objective, fair and consistent, they often adopt the same
unconscious biases as the humans who built them. That’s why it’s vital that
companies recognize the importance of normalizing data—meaning adjusting values
measured on different scales to a common scale—to ensure that human biases
aren’t unintentionally introduced into the algorithm.
Take hiring as an
example: If you give a computer a data set with 10 Palestinian Muslim candidates
and 300 white Jews candidates and ask it to predict the best person for the
job, we all know what the results will be.. Building technology that is fair
and equitable may be challenging but will ensure that the algorithms informing
our decisions and insights are not perpetuating the very biases we are trying
to undo as a society.
Medical sources sometimes
refer to sampling bias as ascertainment bias
NEW VACCINES AND NEW
GMO FOOD ARE FIRST TRIED OUT IN THIRD WORLD NATIONS, USING THE POPULATION AS
GUINEA PIGS ..USING SOME ARTIFICIAL INTELLIGENCE BIASED ALGORITHMS...
KILL OFF PALESTINIANS AND ROMA GYPSIES –DON’T WASTE MONEY ON THEM..
Data sets about
CONSCIOUS humans are particularly susceptible to bias, while data about the
physical world are less susceptible.
Human-generated data is the biggest source of bias
Neural networks use
deep learning algorithms, creating connections organically as they evolve. At
this stage, AI programs become far more difficult to screen for traces of bias,
as they are not running off a strict set of initial data parameters.
Data provides the
building blocks in the learning phase of AI. Neural networks, machine learning,
deep learning – they all have one thing in common: They need huge amounts of
data to become better. AI can only outgrow itself if fed with enormous amounts
of data
Humans typically select
the data used to train machine learning algorithms and create parameters for
the machines to "learn" from new data over time. Even without
discriminatory intent, the training data may reflect unconscious or historic
bias. For example, if the training data shows that people of a certain gender
or race have fulfilled certain criteria in the past, the algorithm may
"learn" to select those individuals at the exclusion of others.
Four factors drive
public distrust of algorithmic decisions:--
Amplification of
Biases: Machine learning algorithms amplify biases – systemic or unintentional
– in the training data.
Opacity of Algorithms:
Machine learning algorithms are black boxes for end users. This lack of
transparency – irrespective of whether it’s intentional or intrinsic6 –
heightens concerns about the basis on which decisions are made.
Dehumanization of
Processes: Machine learning algorithms increasingly require minimal-to-no human
intervention to make decisions. The idea of autonomous machines making
critical, life-changing decisions evokes highly polarized emotions.
Accountability of
Decisions: Most organizations struggle to report and justify the decisions
algorithms produce and fail to provide mitigation steps to address unfairness
or other adverse outcomes. Consequently, end-users are powerless to improve
their probability of success in the future.
What happens with all
that data? Tech companies feed our digital traces into machine learning algorithms
and, like modern day alchemists turning lead into gold, transform seemingly
mundane information into sensitive and valuable health data.
Machine learning finds
patterns in data. ‘AI Bias’ means that it might find the wrong patterns - a
system for spotting skin cancer might be paying more attention to whether the
photo was taken in a doctor’s office. ML doesn’t ‘understand’ anything - it just
looks for patterns in numbers, and if the sample data isn’t representative, the
output won’t be either.
Meanwhile, the mechanics of ML might make this hard to
spot The most obvious and immediately concerning place that this issue can come
up is in human diversity, and there are plenty of reasons why data about people
might come with embedded biases
AI bias’ or ‘machine
learning bias’ problem: a system for finding patterns in data might find the
wrong patterns, and you might not realise.
Questions persist on
how to handle biased algorithms, our ability to contest automated decisions,
and accountability when machines make the decisions. In
reality, machine learning models reproduce the inequalities that shape the data
they’re fed.
Being able to present
and explain extremely complex mathematical functions behind predictive models
in understandable terms to human beings is an increasingly necessary condition
for real-world AI applications.
The problem of
algorithmic bias and the dangers it can harbor when allowed into machine
learning systems are well-known and documented. While the main reason behind
biased AI is the poor quality of data fed into it, the lack of transparency in
the proceedings and, as a result, inability to quickly detect bias are among
the key factors here, as well.
Imagine the times when
interpretable and explainable AI becomes the norm. Then the ability to
understand not only the fundamental techniques used in a model but also
particular cause-and-effect ties found in those specific algorithms would allow
for faster and better bias detection.
When the data are
incomplete, incorrect, or outdated-- if there is insufficient data to make
certain conclusions, or the data are out
of date, results will naturally be inaccurate. Unfortunately, biased data and
biased parameters are the rule rather than the exception. Because data are
produced by humans, the information carries all the natural human bias within
it.
Researchers have begun trying to figure out how to best deal
with and mitigate bias, including whether it is possible to teach ML systems to learn without bias; however, this research is still in its
nascent stages. For the time being,
there is no cure for bias in AI systems.
The use of historical
data that is biased-- because ML systems use an existing body of data to
identify patterns, any bias in that data is naturally reproduced.
When developers choose
to include parameters that are proxies for known bias-- for example, although
developers of an algorithm may intentionally seek to avoid racial bias by not
including race as a parameter, the algorithm will still have racially biased results
if it includes common proxies for race, like
income, education, or postal code.
When developers allow
systems to conflate correlation with causation. Take credit scores as an
example. People with a low income tend to have lower credit scores, for a variety
of reasons. If an ML system used to
build credit scores includes the credit scores of your Facebook friends as a
parameter, it will result in lower scores among those with low-income
backgrounds, even if they have otherwise strong financial indicators, simply
because of the credit scores of their friends.
Today, algorithmic
decision-making is largely digital. In many cases it employs statistical
methods. Before AI, algorithms were deterministic—that is, pre-programmed and
unchanging. Because they are based in statistical modeling, these algorithms suffer from the same
problems as traditional statistics, such as poorly sampled data, biased data,
and measurement errors.
Bias can be perpetuated through a feedback loop if the
model’s own biased predictions are repeatedly fed back into it, becoming its
own biased source data for the next round of predictions. In the machine
learning context, we no longer just face the risk of garbage in, garbage
out—when there’s garbage in, more and more garbage may be generated through the
ML pipeline if one does not monitor and address potential sources of bias.
One key to de-biasing
data is to ensure that a representative sample is collected in the first place.
Bias from sampling errors can be mitigated by collecting larger samples and
adopting data collection techniques such as stratified random sampling.
Bias from non-sampling
errors are much more varied and harder to tackle, but one should still strive
to minimize these kinds of errors through means such as proper training,
establishing a clear purpose and procedure for data collection, and conducting
careful data validation.
Companies think AI is a
neutral arbitrator because it’s a creation of science, but it’s not, It
is a reflection of humans — warts, beauty, and all. This is a high-consequence
problem. Most AI systems need to see
millions of examples to learn to do a task.
But using real-world data to train
these algorithms means that historical and contemporary biases against
marginalized groups get baked into the programs.. It’s
humans that are biased and the data that we generated that is training the AI
to be biased. It’s a human problem that humans need to take ownership of.
There are ways,
however, to try to maintain objectivity and avoid bias with qualitative data
analysis:--
Use multiple people to
code the data. ...
Have participants
review your results. ...
Verify with more data
sources. ...
Check for alternative
explanations. ...
Review findings with
peers.
AI is a two-edged
sword. It can be used by the good and the bad. Biases can be amplified. Data
biases that exist in the data that is piled up will lead to biases in
understanding and outcomes of the AI systems .They don't have common sense yet.
Computers are super intelligent, but in narrow areas They can create fake news,
and can churn out fake images and fake narratives..
IN REALITY G6 NATIONS ARE BEGGARS—AI CONVERTS THEM INTO SUPER RICH NATIONS.
We are beginning to
understand both the repercussions of using selective datasets and how AI
algorithms can incorporate and exacerbate the unconscious biases of their
developers. We are creating algorithms that are used to detect patterns in
data, and we often use a top-down approach AI is not able to intuit to solve
certain problems or explain how it reached a conclusion. Furthermore, if that
data is flawed by systematic historical biases, those biases will be replicated
at scale.
To borrow a phrase:
bias in, bias out.
We have approached AI
development from the top-down, largely dictated by the viewpoints of developed
nations and first-world cultures. No surprise then that the biases we see in
the output of these systems reflect the unconscious biases of these
perspectives.
Bias2 can be thought of
as errors caused by incorrect assumptions in the learning algorithm. Bias can
also be introduced through the training data, if the training data is not
representative of the population it was drawn from.
Diversifying data is
certainly one step to alleviate those biases, as it would allow for more
globalized inputs that may hold very different priorities and insights. But no
amount of diversified data will fix all the issues if it is fed into a model
with inherent biases,.
Rather than top-down
approaches that seek to impose a model on data that may be beyond its contexts,
we should approach AI as an iterative, evolutionary system. If we flip the
current model to be built-up from data rather than imposing upon it, then we
can develop an evidence-based, idea-rich approach to building scalable
AI-systems. The results could provide insights and understanding beyond our
current modes of thinking.
A “top-down” approach
recommends coding values in a rigid set of rules that the system must comply
with. ... The other approach is often called “bottom-up,” and it relies on
machine learning (such as inverse reinforcement learning) to allow AI systems
to adopt our values by observing human behavior in relevant scenarios.
The other advantage to
such a bottom-up approach is that the system could be much more flexible and
reactive. It could adapt as the data changes and as new perspectives are
incorporated.
Consider the system as
a scaffold of incremental insights so that, should any piece prove inadequate,
the entire system does not fail. We could also account for much more
diversified input from around the globe, developing iterative signals to
achieve cumulative models to which AI can respond.
Biased AI systems are
likely to become an increasingly widespread problem as artificial intelligence
moves out of the data science labs and into the real world. Researchers at IBM
are working on automated bias-detection algorithms, which are trained to mimic
human anti-bias processes we use when making decisions, to mitigate against our
own inbuilt biases.
This includes
evaluating the consistency with which we (or machines) make decisions. If there
is a difference in the solution chosen to two different problems, despite the
fundamentals of each situation being similar, then there may be bias for or
against some of the non-fundamental variables. In human terms, this could
emerge as racism, xenophobia, sexism or ageism.
While this is
interesting and vital work, the potential for bias to derail drives for
equality and fairness runs deeper, to levels which may not be so easy to fix
with algorithms.
A "top-down"
approach may not produce solutions to every problem, and may even stifle
innovation.
Biased algorithms could
make it easier to mask discriminatory lending, hiring or other unsavory
business practices. Algorithms could be designed to take advantage of seemingly
innocuous factors that can be discriminatory. Employing existing techniques,
but with biased data or algorithms, could make it easier to hide nefarious
intent.
Biased data could also
serve as bait. Corporations could release biased data with the hope competitors
would use it to train artificial intelligence algorithms, causing competitors
to diminish the quality of their own products and consumer confidence in them.
Algorithmic bias
attacks could also be used to more easily advance ideological agendas. If hate
groups or political advocacy organizations want to target or exclude people on
the basis of race, gender, religion or other characteristics, biased algorithms
could give them either the justification or more advanced means to directly do
so. Biased data also could come into play in redistricting efforts that
entrench racial segregation (“redlining”) or restrict voting rights.
Injecting deliberate
bias into algorithmic decision making could be devastatingly simple and
effective. This might involve replicating or accelerating pre-existing factors
that produce bias. Many algorithms are already fed biased data. Attackers could
continue to use such data sets to train algorithms, with foreknowledge of the
bias they contained.
The plausible deniability this would enable is what makes
these attacks so insidious and potentially effective. Attackers would surf the
waves of attention trained on bias in the tech industry, exacerbating
polarization around issues of diversity and inclusion.
The idea of “poisoning”
algorithms by tampering with training data is not wholly novel. Top U.S.
intelligence officials have warned (PDF) that cyber attackers may stealthily
access and then alter data to compromise its integrity. Proving malicious
intent would be a significant challenge to address and therefore to deter.
Bias is a systemic
challenge—one requiring holistic solutions. Proposed fixes to unintentional
bias in artificial intelligence seek to advance workforce diversity, expand
access to diversified training data, and build in algorithmic transparency (the
ability to see how algorithms produce results).
As with technological
advances throughout history, we must continue to examine how we implement
algorithms in society and what outcomes they produce. Identifying and
addressing bias in those who develop algorithms, and the data used to train
them, will go a long way to ensuring that artificial intelligence systems
benefit us all, not just those who would exploit them.
However, because
machines can treat similarly-situated people and objects differently, research
is starting to reveal some troubling examples in which the reality of
algorithmic decision-making falls short of our expectations. Given this, some
algorithms run the risk of replicating and even amplifying human biases,
particularly those affecting protected groups.
For example, automated
risk assessments used by U.S. judges to determine bail and sentencing limits
can generate incorrect conclusions, resulting in large cumulative effects on
certain groups, like longer prison sentences or higher bails imposed on people
of color.
Pre-existing human
biases may creep in at different stages – framing of the problem, selection and
preparation of input data, tuning of model parameters and weights,
interpretation of the model outputs, etc. - either intentionally or
unintentionally making the algorithms for decision-making biased
Algorithms and data
must be externally audited for bias and made available for public scrutiny
whenever possible. Workplace must be made more diverse to detect and prevent
blind spots. Cognitive bias training must be required.
Regulations must be
relaxed to allow use of sensitive data to detect and alleviate bias. Effort
should be made to enhance algorithm literacy among users. Research on
algorithmic techniques for reducing human bias in models should be encouraged.
Bias is the difference
between a model’s estimated values and the “true” values for a variable.
Machine learning bias,
also known as algorithm bias or AI bias,
occurs when an algorithm produces results that are systematically
prejudiced due to erroneous assumptions in the machine learning process. Three
types of bias can be distinguished: information bias, selection bias, and
confounding.
Three keys to managing bias when building AI--
Choose the right
learning model for the problem. ...
Choose a representative
training data set. ...
Monitor performance
using real data.
Sample Bias/Selection
Bias: This type of bias rears its ugly
head when the distribution of the training data fails to reflect the actual
environment in which the machine learning model will be running.
If the training data
covers only a small set things you're interested in,and then you test it on
something outside that set, it will get it wrong. It'll be 'biased' based on
the sample it's given. The algorithm isn't wrong; it wasn't given enough
different types of data to cover the space it's going to be applied in. That's
a big factor in poor performance for machine learning algorithms. You have to
get the data right.
Algorithmic bias is
shaping up to be a major societal issue at a critical moment in the evolution
of machine learning and AI. If the bias lurking inside the algorithms that make
ever-more-important decisions goes unrecognized and unchecked, it could have
serious negative consequences, especially for poorer communities and minorities
Bias of an estimator is
the difference between this estimator's expected value and the true value of
the parameter being estimated.
AI algorithms are built
by humans; training data is assembled, cleaned, labeled and annotated by
humans. Data scientists need to be acutely aware of these biases and how to
avoid them through a consistent, iterative approach, continuously testing the
model, and by bringing in well-trained humans to assist.
A “top-down” approach
recommends coding values in a rigid set of rules that the system must comply
with. It has the benefit of tight control, but does not allow for the
uncertainty and dynamism AI systems are so adept at processing.
The other
approach is often called “bottom-up,” and it relies on machine learning (such
as inverse reinforcement learning) to allow AI systems to adopt our values by
observing human behavior in relevant scenarios. However, this approach runs the
risk of misinterpreting behavior or learning from skewed data.
Top-Down is inefficient
and slow but with a tight reign
Bottom-Up is flexible
but risky and bias-prone.
Solution: Hybridise – Top-Down for Basic Norms,
Bottom-Up for Socialization
We often shorthand our
explanation of AI bias by blaming it on biased training data. The reality is
more nuanced: bias can creep in long before the data is collected as well as at
many other stages of the deep-learning process.
Many of the standard
practices in deep learning are not designed with bias detection in mind.
Deep-learning models are tested for performance before they are deployed,
creating what would seem to be a perfect opportunity for catching bias.
But in practice, testing usually looks like this:
computer scientists randomly split their data before training into one group
that’s actually used for training and another that’s reserved for validation
once training is done. That means the data you use to test the performance of
your model has the same biases as the data you used to train it. Thus, it will
fail to flag skewed or prejudiced results.
The best way to detect
bias in AI is by cross-checking the algorithm you are using to see if there are
patterns that you did not necessarily intend. Correlation does not always mean
causation, and it is important to identify patterns that are not relevant so
you can amend your dataset.
One way you can test for this is by checking if
there is any under- or overrepresentation in your data. If you detect a bias in
your testing, then you must overcome it by adding more information to
supplement that underrepresentation.
While AI systems can
get quite a lot right, humans are the only ones who can look back at a set of
decisions and determine whether there are any gaps in the datasets or oversight
that led to a mistake
The use of AI in areas
like criminal justice can also have devastating consequences if left unchecked.
AI is currently used in
a black-box manner. In layman’s terms, this means the only thing of value is
its output and not its decision making process. The reason for this is simple:
the decision making of most AI model boils down to mathematical optimization
over a set of probabilities.
“I optimized a mathematical function” is a
bullshit explanation.
Things have gotten
so opaque that even seminal experts in a field are unable to explain why an AI
model work.. The field has taken a toll for the worse when physicists are
attempting to explain AI models with quantum mechanics.
One practical
compromise between the needs of XAI and realities of current AI models is
through the glass box algorithm. The glass box algorithm is a unique creature;
it quantifies some sort of uncertainty in its predictions, so that the user may
understand when its predictions are unreliable.
Investors using black
box methods conceal their true risk under the guise of proprietary technology,
leaving regulators, and investors without a true picture of operations which is
needed to assess risk accurately.
Hedge funds and some of
the world’s largest investment managers now routinely use a black box or black
box like model to manage their complicated investment strategies.
Depending on what
algorithms are used, it is possible that no one, including the algorithm’s
creators, can easily explain why the model generated the results that it did
The same problem is
relevant in the banking industry as well. If regulators pose a question: how AI
has reached at a conclusion with regard to a banking problem, banks should be
able to explain the same.
For example, if an AI solution dealing with
anti-money laundering compliance comes up with an anomalous behaviour or suspicious
activity in a transaction, the bank using the solution should be able to
explain the reason why the solution has arrived at that decision. Such an audit
is not possible with a black box AI model
The main problem with a
black box model is its inability to identify possible biases in the machine
learning algorithms. Biases can come through prejudices of designers and faulty
training data, and these biases lead to unfair and wrong decisions. Bias can
also happen when model developers do not implement the proper business context
to come up with legitimate outputs.
AI-powered algorithms
are increasingly used for decisions that affect our daily lives. Therefore, if
an algorithm runs awry, the consequences can be disastrous. For a company it
can cause serious reputational damage and lead to fines of tens of millions of dollars
In the banking
industry, which is subject to stricter regulatory oversight across the globe,
an incorrect decision can cost billions of dollars for an institution. If a
bank wants to employ AI, it is imperative for it to subject the particular
solution to rigorous, dynamic model risk management and validation.
The bank
must ensure that the proposed AI solution has the required transparency
depending on the use case.
Worst of all, it may
hurt customers, for instance by unintentionally treating them unfairly if there
are biases in the algorithm or training data. This may lead to a serious breach
of trust, which can take decades to rebuild.
Black box AI
complicates the ability for programmers to filter out inappropriate content and
measure bias, as developers can't know which parts of the input are weighed and
analyzed to create the output.
Explainable AI or
interpretable AI or transparent AI deals with techniques in artificial
intelligence which can make machine learning algorithms trustworthy and easily
understandable by humans. Explainability has emerged as a critical requirement
for AI in many cases and has become a new research area in AI.
It is mandatory that
banks should take the necessary oversight to prevent their AI models from being
a black box. As of now, the AI use cases are mostly in low-risk banking
environments, where human beings still take the final decision with machines
just providing valuable assistance in decision making.
In future, banks will be
under pressure to remove some of the human oversight for cost savings amid
increasing scale of operations. At that point, banks cannot run with risky
black box models that can lead to inefficiencies and risks.
They need to ensure
that their AI solutions are trustworthy and have the required transparency to
satisfy internal and external audits. In short, the bright future of AI in
banking could be assured only through explainable AI.
The first challenge in
building an explainable AI system is to create a bunch of new or modified
machine learning algorithms to produce explainable models. Explainable models
should be able to generate an explanation without hampering the performance.
The best way to do so
is to ensure levels of transparency in the algorithm’s innate structure. In
particular, algorithms must be intrinsically traceable to give enough
visibility without impairing its performance. With visibility, at the very
least, humans will be able to stop and redirect AI decisions if the situation
presents itself.
Many of the XAI
algorithms developed to date are relatively simple, like decision trees, and
can only be used in limited circumstances.
Imperative programming.
All programming can be understood in the abstract sense as a kind of
specification. Imperative programming is a specification that tells a computer
the exact and detailed sequence of steps to perform. These also will include
conditions to test, processes to execute and alternative paths to follow (i.e.
conditions, functions and loops). All of the more popular languages we have
heard of (i.e. JavaScript, Java, Python, C etc) are all imperative languages.
When a programmer writes an imperative program, he formulates in his mind the
exact sequence of task that need to be composed to arrive at a solution.
Declarative
programming. This kind of programming does not burden the user with the details
of the exact sequence of steps that must be performed. Rather, a user only
needs to specify (or declare) the form of the final solution. The burden of
figuring out the exact steps to execute to arrive at the specified solution is
algorithmically discovered by the system. Spreadsheets are an example of this
kind of programming. With Spreadsheets, you don’t specify how a computer should
compute its results, rather you only need to specify the dependencies between
the cells to compute a final result.
You could have a long chain of
dependencies and the spreadsheet will figure out which to calculate first. The
query language SQL is also a well known example of declarative programming. A
SQL processor optimizes the kinds of retrievals it needs to execute to arrive
at table of data that satisfies the user specified query. Other examples of
declarative programming is Haskell (i.e. functional programming) and Prolog
(i.e. logic programming). Mathematics, of the symbolic computation kind, can
also be classified as declarative programming.
Imperative code is
where you explicitly spell out each step of how you want something done,
whereas with declarative code you merely say what it is that you want done
Imperative - you instruct
a machine what to do step by step. Example: assembly language.
Declarative - you
instruct a machine what you want to get and it supposes to figure it how to do
it. Example: SQL.
Generative programming
is used to describe program generators) or alternatively “organic programming”.
This kind of programming has at its origins methods in connectionist inspired
artificial intelligence. It derives from methods coming from Deep Learning,
evolutionary algorithms and reinforcement learning. This kind of programming is
best visually demonstrated by what is known as Generative Adversarial Networks
Constraint programming,
differential programming (i.e. Deep Learning) and generative programming share
a common trait. The program or algorithm that discovers the solution is fixed.
In other words, a programmer does not need to write the program that translates
the specification into a solution. Unfortunately though, the fixed program is
applicable only in narrow domains. This is known as the “No Free Lunch” theorem
in machine learning. You can’t use a linear programming algorithm to solve an
integer programming problem. Deep Learning however has a unique kind of general
capability that the same kind of algorithm (i.e. stochastic gradient descent)
appears to be applicable to many problems.
- https://timesofindia.indiatimes.com/india/500-indians-alerted-about-government-backed-phishing-google/articleshow/72285551.cmsReplyDelete
THE MAIN MOTTO OF PHISHING EMAILS IS: TRICKING USERS TO CLICK EMAILS OR LINKS AND CAUSE MONETARY LOSS TO THEM.
PHISHING ATTACKS ARE MADE BY CYBERCRIMINALS TO GRAB SENSITIVE INFORMATION (I.E. BANKING INFORMATION, CREDIT CARD INFORMATION, STEALING OF CUSTOMER DATA AND PASSWORDS) AND MISUSE THEM.
HACKERS SPREAD THEIR PHISHING NET TO CATCH DIFFERENT TYPES OF PHISH. BE IT A SMALL PHISH OR A BIG WHALE, THEY ARE ALWAYS AT A PROFIT.
PHISHING ATTACKS ARE DONE BY CYBERCRIMINALS, WHO TRICK THE VICTIM, BY CONCEALING THEIR IDENTITY BY MASKING THEMSELVES AS A TRUSTED IDENTITY AND LURING THEM INTO OPENING DECEPTIVE EMAILS FOR STEALING SENSITIVE INFORMATION. THESE ATTACKS ARE SUCCESSFUL BECAUSE OF LACK OF SECURITY KNOWLEDGE, AMONGST THE MASSES. IN SHORT, PHISHING ATTACK IS A DISGUISED ATTACK MADE BY HACKER IN A VERY SOPHISTICATED WAY.
ON THE CONTRARY PHISHING SCAMS ARE THOSE WHEREIN THOUSANDS OF USERS ARE TARGETED AT A TIME BY CYBERCRIMINALS. FOR E.G. FAKE GOOGLE MAIL’S LOGIN PAGE IS CREATED AND EMAILS ARE SENT STATING TO CHECK THEIR ACCOUNTS. HUGE SCAMS LEAD TO HUGE LOSSES. SURVEYS SHOW A PHISHING INCREASE OF 250 PER CENT APPROXIMATELY, AS PER MICROSOFT. CHECK OUT THE DETAILS.
THERE ARE MANY TYPES OF PHISHING ATTACKS AND PHISHING SCAMS CARRIED OUT BY HACKERS. A FEW OF THEM ARE:
EMAIL PHISHING:
MANY BUSINESS OWNERS ARE UNAWARE ABOUT THE INSECURE AND FRAUD LINKS AND EMAILS. FOR E.G. THE VICTIM GETS AN E-MAIL FROM THE HACKER TO CHECK SOME UNKNOWN TRANSACTIONS IN THEIR BUSINESS BANK ACCOUNT, WITH A FAKE LINK ATTACHED TO A SITE WHICH IS ALMOST AS GOOD AS REAL. WITHOUT THINKING FOR A SECOND, THE VICTIM OPENS THE FAKE LINK AND ENTERS THE ACCOUNT DETAILS AND PASSWORDS. THAT’S IT. YOU ARE ATTACKED.
SPEAR PHISHING:
SPEAR PHISHING IS AN EMAIL ATTACK DONE BY A FOE PRETENDING TO BE YOUR FRIEND. TO MAKE THEIR ATTACK SUCCESSFUL, THESE FRAUDSTERS INVEST IN A LOT OF TIME TO GATHER SPECIFIC INFORMATION ABOUT THEIR VICTIMS; I.E. VICTIM’S NAME, POSITION IN COMPANY, HIS CONTACT INFORMATION ETC.
THEY LATER CUSTOMISE THEIR EMAILS, WITH THE GATHERED INFORMATION, THUS TRICKING THE VICTIM TO BELIEVE THAT THE EMAIL IS SENT FROM A TRUSTWORTHY SOURCE.
FAKE URL AND EMAIL LINKS ARE ATTACHED IN THE EMAIL ASKING FOR PRIVATE INFORMATION. SPEAR PHISHING EMAILS ARE TARGETED TOWARDS INDIVIDUALS AS WELL AS COMPANIES TO STEAL SENSITIVE INFORMATION FOR MAKING MILLIONS.
DOMAIN SPOOFING:
HERE THE ATTACKER FORGES THE DOMAIN OF THE COMPANY, TO IMPERSONATE ITS VICTIMS. SINCE THE VICTIM RECEIVES AN EMAIL WITH THE SAME DOMAIN NAME OF THE COMPANY, THEY BELIEVE THAT IT’S FROM TRUSTED SOURCES, AND HENCE ARE VICTIMISED.
BEFORE A FEW YEARS THERE WERE ONLY 2 TYPES OF PHISHING ATTACKS.
EMAIL PHISHING & DOMAIN SPOOFING. EITHER THE EMAIL NAME WAS FORGED, OR THE DOMAIN NAME WAS FORGED TO ATTACK VICTIMS. BUT AS TIME FLIES, CYBERCRIMINALS COME UP WITH VARIOUS TYPES OF ATTACKS WHICH ARE MENTIONED BELOW:
WHALING:
WHALING PHISHING ATTACK OR CEO FRAUD AS THE NAME SUGGESTS ARE TARGETED ON HIGH PROFILE INDIVIDUALS LIKE CEO, CFO, COO OR SENIOR EXECUTIVES OF A COMPANY. THE ATTACK IS ALMOST LIKE SPEAR PHISHING; THE ONLY DIFFERENCE IS THAT THE TARGETS ARE LIKE WHALES IN A SEA AND NOT FISH. HENCE THE NAME “WHALING” IS GIVEN FOR THESE PHISHING ATTACKS.
FRAUDSTERS TAKE MONTHS TO RESEARCH THESE HIGH VIPS, THEIR CONTACTS AND THEIR TRUSTED SOURCES, FOR SENDING FAKE EMAILS TO GET SENSITIVE INFORMATION, AND LATER STEAL IMPORTANT DATA AND CASH THUS HAMPERING THE BUSINESS. SINCE THEY TARGET SENIOR MANAGEMENTS, THE BUSINESS LOSSES CAN BE HUGE WHICH MAKES WHALING ATTACKS MORE DANGEROUS.
VISHING:
VOIP (VOICE) + PHISHING = VISHING.
TILL NOW PHISHING ATTACKS WERE MADE BY SENDING EMAILS. BUT WHEN ATTACKS ARE DONE BY TARGETING MOBILE NUMBERS, IT’S CALLED VISHING OR VOICE PHISHING.
CONTINUED TO 2-
- THE HONGKONG PROTESTS ARE FUNDED AND CONTROLLED BY THE JEWISH OLIGARCHY..
EVEN CHINESE DO NOT KNOW THAT JEW MAO AND JEW MAURICE STRONG WERE DEEP STATE AGENTS...
JEWS WHO HAVE MONOPOLISED THE MAFIA AND CRIME IN HONGKONG DO NOT WANT TO BE EXTRADITED TO THE CHINESE MAINLAND..
MACAU GAMBLING IS FAR MORE THAN LAS VEGAS.. DRUG MONEY IS LAUNDERED HERE.
ROTHSCHILD CONTROLLED PORTUGAL LEGALIZED GAMBLING IN MACAU IN 1850..
ROTHSCHILD RULED INDIA..NOT THE BRITISH KING OR PARLIAMENT.. HE GREW OPIUM IN INDIA AND SOLD IT IN CHINA.. HIS DRUG MONEY WAS LAUNDERED IN HONGKONG HSBC BANK.
KATHIAWARI JEW GANDHI WAS ROTHSCHILDs AGENT WHEN IT CAME TO SUPPORTING OPIUM CULTIVATION IN INDIA..
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
INDIAN FARMERS WHO REFUSED TO CULTIVATE OPIUM WERE SHIPPED OFF ENMASSE AS SLAVES ABROAD WITH FAMILY..
http://ajitvadakayil.blogspot.com/2010/04/indentured-coolie-slavery-reinvented.html
INDIAN AND AMERICAN OLIGARCHY ( CRYPTO JEWS ) WERE ALL DRUG RUNNERS OF JEW ROTHSCHILD..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
http://ajitvadakayil.blogspot.com/2010/12/dirty-secrets-of-boston-tea-party-capt.html
DRUG CARTELS OF COLOMBIA/ MEXICO USE HONGKONG TO LAUNDER THEIR DRUG MONEY..
GAMBLING TOURISM IS MACAU'S BIGGEST SOURCE OF REVENUE, MAKING UP MORE THAN 54% OF THE ECONOMY. VISITORS ARE MADE UP LARGELY OF CHINESE NATIONALS FROM MAINLAND CHINA AND HONG KONG.
HONGKONG IS NOW FLOODED WITH DRUGS .. DUE TO HIGH STRESS AT WORK, PEOPLE ARE ADDICTED .. HOUSE RENT IN HONGKONG IS VERY HIGH DUE TO THE JEWISH OLIGARCHS WHO CONTROL HONGKONG.
IN 2012, HSBC HOLDINGS PAID US$ 1.9 BILLION TO RESOLVE CLAIMS IT ALLOWED DRUG CARTELS IN MEXICO AND COLOMBIA TO LAUNDER PROCEEDS THROUGH ITS BANKS. HSBC WAS FOUNDED BY ROTHSCHILD.
CHINA'S EXCESSIVELY STRICT FOREIGN EXCHANGE CONTROLS ARE INDIRECTLY BREEDING MONEY LAUNDERING, PROVIDING A HUGE DEMAND FOR UNDERGROUND KOSHER MAFIA BANKS.
FACTORY MANUFACTURERS CONVERT HONG KONG DOLLARS AND RENMINBI WITH UNDERGROUND BANKS FOR CONVENIENCE WHILE CASINOS IN MACAU OFFER RECEIPTS TO GIVE LEGITIMACY TO SUSPECT CURRENCY FLOWS.
INDIA WAS NO 1 EXPORTED OF PRECURSOR CHEMICALS LIKE EPHEDRINE TO MEXICO FOR PRODUCING METH.. TODAY CHINA ( GUANGDONG ) HAS TAKEN OVER POLE POSITION..
http://ajitvadakayil.blogspot.com/2017/02/breaking-bad-tv-serial-review-where.html
EL CHAPO AND HIS DEPUTY IGNACIO "NACHO" CORONEL VILLARREAL USED HONG KONG TO LAUNDER BILLIONS OF DOLLARS..TO GET SOME IDEA WATCH NETFLIX SERIES “NARCOS MEXICO” AND “EL CHAPO”.
BALLS TO THE DECOY OF "FREEDOM " FOR HONGKONG CITIZENS.. IT IS ALL ABOUT FREEDOM FOR JEWISH MAFIA TO USE HONGKONG TO LAUNDER DRUG MONEY.
JEW ROTHSCHILD COULD SELL INDIAN OPIUM IN CHINA ONLY BECAUSE THE CHINESE MAFIA AND SEA PIRATES WAS CONTROLLED BY HIM AND JEW SASSOON.
COLOMBIAN/ MEXICAN DRUG CARTEL KINGS FEAR EXTRADITION TO USA.. SAME NOW WITH HONGKONG MONEY LAUNDERING MAFIA..
https://ajitvadakayil.blogspot.com/2019/11/paradox-redemption-victory-in-defeat.html
THE 2019 HONG KONG PROTESTS HAVE BEEN LARGELY DESCRIBED AS "LEADERLESS".. BALLS, IT IS 100% CONTROLLED BY JEWS
PROTESTERS COMMONLY USED LIHKG, ( LIKE REDDIT ) AN ONLINE FORUM, AN OPTIONALLY END-TO-END ENCRYPTED MESSAGING SERVICE, TO COMMUNICATE AND BRAINSTORM IDEAS FOR PROTESTS AND MAKE COLLECTIVE DECISIONS ..
THE KOSHER WEBSITE IS WELL-KNOWN FOR BEING THE ULTIMATE PLATFORM FOR DISCUSSING THE STRATEGIES FOR THE LEADERLESS ANTI-EXTRADITION BILL PROTESTS IN 2019..
CONTINUED TO 2- - POOR AJIT DOVAL AND RAW
THESE ALICES IN WONDERLAND DONT EVEN KNOW THAT URBAN NAXALS/ KASHMIRI SEPARATISTS / SPONSORING DEEP STATE NGOs ARE USING TELEGRAM FOR THEIR DESH DROHI PURPOSES..
TELEGRAM WITH 210 MILLION ACTIVE USERS IS A CLOUD-BASED INSTANT MESSAGING AND VOICE OVER IP SERVICE. TELEGRAM CLIENT APPS ARE AVAILABLE FOR ANDROID, IOS, WINDOWS PHONE, WINDOWS NT, MACOS AND LINUX. USERS CAN SEND MESSAGES AND EXCHANGE PHOTOS, VIDEOS, STICKERS, AUDIO AND FILES OF ANY TYPE.
THE DEEP STATE USES TELEGRAM FOR REGIME CHANGE.. TELEGRAM IS DUBBED AS A "JIHADI MESSAGING APP".
ISIS WHICH WAS FUNDED ARMED AND CONTROLLED BY JEWISH DEEP STATE USED TELEGRAM..
https://en.wikipedia.org/wiki/Blocking_Telegram_in_Russia
LAUNCHED IN 2013, BY A ANTI-PUTIN RUSSIAN JEW , TELEGRAM COMPANY HAS MARKETED THE APP AS A SECURE MESSAGING PLATFORM IN A WORLD WHERE ALL OTHER FORMS OF DIGITAL COMMUNICATION SEEM TRACKABLE.
IT HAS FEATURES SUCH AS END-TO-END ENCRYPTION (WHICH PREVENTS ANYONE EXCEPT THE SENDER AND RECEIVER FROM ACCESSING A MESSAGE), SECRET CHATROOMS, AND SELF-DESTRUCTING MESSAGES.
USERS ON TELEGRAM CAN COMMUNICATE IN CHANNELS, GROUPS, PRIVATE MESSAGES, OR SECRET CHATS. WHILE CHANNELS ARE OPEN TO ANYONE TO JOIN (AND THUS USED BY TERRORIST GROUPS TO DISSEMINATE PROPAGANDA), SECRET CHATS ARE VIRTUALLY IMPOSSIBLE TO CRACK BECAUSE THEY’RE PROTECTED BY A SOPHISTICATED FORM OF ENCRYPTION.
THE COMBINATION OF THESE DIFFERENT FUNCTIONS IN A SINGLE PLATFORM IS WHY GROUPS LIKE ISIS USE TELEGRAM AS A “COMMAND AND CONTROL CENTER”.. THEY CONGREGATE ON TELEGRAM, THEN THEY GO TO DIFFERENT PLATFORMS. THE INFORMATION STARTS IN THE APP, THEN SPREADS TO TWITTER, FACEBOOK.
SECRET CHATS ARE PROTECTED BY END-TO-END ENCRYPTION. HOW THIS WORKS IS THAT EVERY USER IS GIVEN A UNIQUE DIGITAL KEY WHEN THEY SEND OUT A MESSAGE. TO ACCESS THAT MESSAGE, THE RECEIVER HAS TO HAVE A KEY THAT MATCHES THE SENDER’S EXACTLY, SO THAT MESSAGES FROM ANY ONE USER CAN ONLY BE READ BY THE INTENDED RECIPIENT.
THIS MAKES IT ALMOST IMPOSSIBLE FOR MIDDLEMEN SUCH AS POLICE OR INTELLIGENCE AGENCIES TO ACCESS THE FLOW OF INFORMATION BETWEEN THE SENDER AND RECEIVER.
EVEN IF POLICE CAN IDENTIFY WHO IS SPEAKING TO WHOM, AND FROM WHERE, THEY HAVE NO WAY OF KNOWING WHAT THEY’RE SAYING TO EACH OTHER. IN FACT, BECAUSE THE ENCRYPTION HAPPENS DIRECTLY BETWEEN THE TWO USERS, EVEN TELEGRAM ( BALLS , THEY KNOW ) ITSELF HAS NO WAY OF KNOWING WHAT’S IN THESE MESSAGES
BEFORE A USER SENDS A MESSAGE IN A SECRET CHAT, THEY CAN CHOOSE TO SET A SELF-DESTRUCT TIMER ON IT, WHICH MEANS THAT SOME TIME AFTER THE MESSAGE HAS BEEN READ, IT AUTOMATICALLY AND PERMANENTLY DISAPPEARS FROM BOTH DEVICES.
COMPARED WITH OTHER SOCIAL MEDIA PLATFORMS, TELEGRAM HAS EXTREMELY LOW BARRIERS TO ENTRY. ALL USERS HAVE TO DO TO SET UP AN ACCOUNT IS PROVIDE IS A CELLPHONE NUMBER, TO WHICH THE APP THEN SENDS AN ACCESS CODE.
IT’S COMMON PRACTICE FOR TERRORISTS TO SUPPLY ONE CELLPHONE NUMBER TO SET UP THEIR ACCOUNT BUT USE ANOTHER TO ACTUALLY OPERATE THE ACCOUNT.
THE SIM CARD YOU USE TO OPEN YOUR TELEGRAM ACCOUNT AND THE SIM CARD YOU ACTUALLY USE ON THE PHONE WITH THE APPLICATION DON’T HAVE TO THE SAME.
NOT ONLY DOES THIS MAKE IT HARDER FOR LAW ENFORCEMENT OFFICIALS TO TRACK DOWN TERRORISTS THROUGH TELEGRAM, IT ALSO MAKES IT EASIER FOR TERRORISTS TO SET UP A NEW ACCOUNT ONCE THEY DISCOVER THEIR PREVIOUS ONE HAS BEEN EXPOSED TO THE POLICE.
ANOTHER ATTRACTIVE FEATURE OF THE APP IS THAT IT’S REALLY QUITE HARD TO GET BOOTED OFF IT.
TELEGRAM’S MESSAGING SERVICE IS POPULAR BECAUSE IT OFFERS A “SECRET CHAT” FUNCTION ENCRYPTED WITH TELEGRAM’S PROPRIETARY MTPROTO PROTOCOL.
capt ajit vadakayil
..
- What has happened in Hong kong will be studied refined and applied globally. Chilling scenarios. Hope GOI also learns from this.
TOP MILITARY BOSSES AND
NATIONAL SECURITY ADVISORS CANNOT BE BRAIN DEAD ANY MORE.. MOST
OF THEM CANNOT ABSORB NEW DIGITAL TECHNOLOGY..
THE GREASE AND TACKLE
AGE OF GEN PATTON / FIELD MARSHALL MANEKSHAW TYPE BLUSTER AND SWAGGER IS NOW OVER..
WARS MUST BE WON BEFORE
THEY ARE FOUGHT..
AJIT DOVAL CANNOT
REST ON HIS PAST LAURELS SECURED BY BEING A DEEP ASSET INSIDE PAKISTAN..
WE DONT GET IMPRESSED BY THE FACT THAT HE SITS BESIDES MODI, WHEN HE HAS HIS ENDLESS FOREIGN JAUNTS..
AJIT DOVAL HAS FAILED TO ADVISE MODI THAT HE MUST HEED MORE THAN 300 CRITICAL SUGGESTIONS SENT BY BLOGGER CAPT AJIT VADAKAYIL, AFTER DROPPING HIS FAALTHU HUMONGOUS EGO.
DONT MAKE ME SAY ANYTHING MORE ..
PAKISTAN IS MERRILY
HACKING ISRO/ DRDO AND KUDANKULAM NUCLEAR PLANT.
Visual cryptography
(VC) is a process where a secret image is encrypted into shares which refuse to
divulge information about the original secret image. ... Encryption provides
security by hiding the content of secret information; while watermarking hides
the existence of secret information.
Visual cryptography is
an algorithm used for encrypting digital media like images, text etc in which
the decryption can be performed by visual mechanical operations rather than
using a computer. VC allows visual information (pictures, text,
etc.) to be encrypted in such a way that the decrypted information appears as a
visual image.
The basis of the
technique is the superposition (overlaying) of two semi-transparent layers.
Imagine two sheets of transparency covered with a seemingly random collection
of black pixels. Individually, there is no discernable message printed on
either one of the sheets.
Overlapping them creates addition interference to the
light passing through (mathematically the equivalent of performing a Boolean OR
operation with the images), but still it just looks like a random collection of
pixels. Mysteriously, however, if the two grids are overlaid correctly, at just
the right position, a message magically appears! The patterns are designed to
reveal a message.
One image contains
random pixels and the other image contains the secret information. It is
impossible to retrieve the secret information from one of the images. Both
transparent images or layers are required to reveal the information. The
easiest way to implement Visual Cryptography is to print the two layers onto a
transparent sheet.
When the random image
contains truely random pixels it can be seen as a one-time pad system and will
offer unbreakable encryption. In the overlay animation you can observe the two
layers sliding over each other until they are correctly aligned and the hidden
information appears.
To try this yourself, you can copy the example layers 1
and 2, and print them onto a transparent sheet or thin paper. Always use a
program that displays the black and white pixels correctly and set the printer
so that all pixels are printed accurate (no diffusion or photo enhancing etc).
You can also copy and past them on each other in a drawing program like paint
and see the result immediately, but make sure to select transparent drawing and
align both layers exactly over each other.
Each pixel of the
images is divided into smaller blocks. There are always the same number white
(transparent) and black blocks. If a pixel is divided into two parts, there are
one white and one black block. If the pixel is divided into four equal parts,
there are two white and two black blocks. The example images from above uses
pixels that are divided into four parts.
If Visual Cryptography
is used for secure communications, the sender will distribute one or more
random layers 1 in advance to the receiver. If the sender has a message, he
creates a layer 2 for a particular distributed layer 1 and sends it to the
receiver.
The receiver aligns the two layers and the secret information is
revealed, this without the need for an encryption device, a computer or
performing calculations by hand. The system is unbreakable, as long as both
layers don't fall in the wrong hands. When one of both layers is intercepted
it's impossible to retrieve the encrypted information.
Visual cryptography
(VC) is an optical image encryption technique allowing the secret image to be
recovered when multiple visual key images are overlapped. Conventionally, the
visual key images are printed on transparent sheets and they have to be placed
at the same location for overlapping.
Image encryption can be
defined in such a way that it is the process of encoding secret image with the
help of some encryption algorithm in such a way that unauthorized users can't access
it.
Encryption is a process
which uses a finite set of instruction called an algorithm to convert original
message, known as plain text, into cipher text, its encrypted form.
Cryptographic algorithms normally require a set of characters called a key to
encrypt or decrypt data
"Watermarking"
is the process of hiding digital information in a carrier signal; the hidden
information should, but does not need to, contain a relation to the carrier
signal. Digital watermarks may be used to verify the authenticity or integrity
of the carrier signal or to show the identity of its owners
A digital watermark is
a kind of marker covertly embedded in a noise-tolerant signal such as audio,
video or image data. It is typically used to identify ownership of the copyright
of such signal.
Like traditional
physical watermarks, digital watermarks are often only perceptible under
certain conditions, i.e. after using some algorithm. If a digital watermark
distorts the carrier signal in a way that it becomes easily perceivable, it may
be considered less effective depending on its purpose
The digital
watermarking is defined as the marker which can be enclosed within a signal
that can bear the noise. It is used to be aware with the copyright. Invisible
modification of the least significant bits in the file can be the other way of
digital watermarking
There are two types of
digital watermarking:--
Visible Digital
Watermarking: Visible data is embedded as the watermark. This can be a logo or
a text that denotes a digital medium's owner.
Invisible Digital
Watermarking: The data embedded is invisible or, in case of audio content,
inaudible.
What is the difference
between watermarking and steganography?
These signals could be
either videos or pictures or audios; steganography is changing the image in a
way that only the sender and the intended recipient are able to detect the
message sent through it. Watermarking is of two types; visible watermarking and
invisible watermarking. Steganography is typically invisible.
Downtime: Any technical
glitch due to any reason like a power outage, low internet speed or
connectivity, maintenance of data centres can result in downtime which can be
really taxing for the business.
Vendor lock-in:
Shifting between clouds can be challenging due to the inherent differences in
the vendor platform requirements. Migration can also lead to issues related to
support, complexities of configuration and other additional costs. Such transfers
often also make the data vulnerable to different security concerns due to
compromises and changes made to facilitate the migration.
Limited Control: As
your data is on remote servers managed by service providers, your control over
it becomes limited especially for businesses which seek enhanced control over
their back-end infrastructure.
Since the cloud is
available through a shared responsibility model, your vendor won’t handle every
single aspect of security. Not even the most sophisticated cloud vendor is
completely resistant to data breaches
Most public cloud
hosting services won’t be able to guarantee protection, particularly those that
host all kinds of websites..
Every time your cloud
computing service provider experiences a technical glitch, you might find
yourself locked out from accessing your own information.
Hackers and malware are
not the only ones who may target a cloud service provider. Cloud computing
risks are also presented by insider threats.
The risk of government
intrusion also increases when you use a cloud service. Ask yourself, if big
brother is more likely to snoop on your email server or an email server used by
a hundred companies and maintained by Microsoft?
Saying you store your
data “on the cloud” compared to “on a server” isn’t exactly true. Cloud-based
storage systems still use servers to hold data, but users don’t physically
access them. Cloud storage providers don’t build specific servers for each user;
the server space is shared between different customers as needed. You may be
putting your data at risk if others using your servers upload potentially
anomalous or hazardous information..
Data loss is an event
where information is either temporarily unavailable or permanently lost or
destroyed. This can occur through accidental deletion, overwriting, or
malicious actions by users or external hackers who purposely delete data.
EXAMPLE: Code Spaces was a company that offered source
code and project management services to developers. It was built mostly on
Amazon Web Services (AWS) using server and storage instances. In June 2014, a
hacker gained access to the company’s AWS control panel and demanded ransom
payment. When Code Spaces didn’t comply, the hacker deleted important files
including EBS snapshots, S3 buckets, and more. Code Spaces was forced to shut
down.
Though cloud service
providers have improved their security controls in the last few years,
ransomware attacks, such as the one described above, have also grown stronger
and have doubled year-over-year, leaving businesses vulnerable.
Attackers today can
easily evade network perimeter security and perform internal reconnaissance to
locate and encrypt shared network files. By encrypting files that are accessed
by many business applications across the network, attackers achieve an economy
of scale faster and far more damaging than encrypting files on individual
devices.
The Vectra 2019
Spotlight Report on Ransomware finds that the most significant ransomware threat
— in which hackers steal your data and hold it for ransom — is malicious
encryption of shared network files in cloud service providers.
Cybercriminals
are targeting organizations that are most likely to pay larger ransoms in order
to regain access to files encrypted by ransomware. The costs of downtime due to
operational paralysis, inability to recover backed-up data, and reputational
damage are particularly catastrophic for organizations that store their data in
the cloud.
Ransomware is a type of
malicious software, or malware, designed to deny access to a computer system or
data until a ransom is paid. Ransomware typically spreads through phishing
emails or by unknowingly visiting an infected website. Ransomware can be
devastating to an individual or an organization..
Having data stored
"on the cloud" does not mean the data is safe. ... Essentially, this
allows you to "mount" the cloud drive and then "unmount" it
afterward, physically detaching it from the system. This can significantly
reduce the risk of ransomware spreading to your backups.
A data breach in which
the data is held for ransom is not the same as a Ransomware attack. ... A data
breach however is a security incident in which sensitive or confidential data
is copied and stolen from the organisation, it can then be used in a number of
ways both for financial gain and to cause harm
Ransomware is a
particularly nasty and scary form of malware that blocks and encrypts user
data, which is then held for ransom. It can block access to your personal
information, or threaten to disable your devices unless you pay for the
password to decrypt and unlock your data.
This can be very
profitable for online criminals, and there is no guarantee that users who pay a
ransom will get full access to their systems again. Plus, if payment is
demanded via credit card, for example, criminals may then have access to your
card details, enabling them to commit further theft and fraud.
Ransomware is malware
that, when downloaded to a device, scrambles or deletes all data until a ransom
is paid to restore it. Ransomware is becoming more and more common, with
research suggesting that in 2019 a new organization will be hit by a ransomware
attack every 14 seconds.
Let’s take the most
famous example of ransomware for example; the WannaCry ransomware attack.
WannaCry was a piece of malware that infected over 230,000 computers across 150
companies, within a single day. It encrypted thousands of files and requested
$300 worth of bitcoin payments to restore them, per device.
More recently, 22
cities in Texas have been hit by ransomware attacks, with attackers demanding
$2.5 million to restore encrypted files, leading to a federal investigation.
Ransomware is an especially prevalent in financial organizations, with 90%
experiencing an attack in the last year.
Ransomware begins with
the malicious software being downloaded onto an endpoint device, like a desktop
computer, laptop or smartphone. This usually happens because of user error, or
ignorance of security risks. A common method of distributing malware is a
phishing attack. This involves an attacker attaching an infected document or
URL to an email, while disguising it as being legitimate to trick users into
opening it, which will install the malware on their device.
Another popular method
of spreading ransomware is using a ‘trojan horse’ virus style. This involves
disguising ransomware as legitimate software online, and then infecting devices
after users install this software.
Ransomware typically
works very quickly. In seconds, the malicious software will take over critical
process on your device, and search for files to be encrypted, meaning all of
the data within them is scrambled. The ransomware will likely delete any files
it cannot encrypt.
The ransomware will
then infect any other hard-drives or USB devices connected to the infected host
machine. Any new devices or files added to your device will also be encrypted
after this point. Then, the ransomware will begin sending out signals to all of
the other devices on your network, to attempt to infect them as well.
There are different
types of ransomware. Some threaten to release the encrypted data to the public,
which may be damaging to companies who need to protect customer or business
data. There is also scareware, that floods the computer with pop-up and demand
a ransom to solve the issue. The same principle is always involved – a
malicious program infects the computer and a payment is requested to remove it.
Why is Ransomware so
Effective?
Ransomware can be
hugely damaging to businesses, causing loss of productivity and financial
cost. Most obviously there is the loss
of files and data, which may represent hundreds of hours of work, or customer
data that is critical to the smooth running of your organization. There is also the loss of productivity as
machines will be unusable.
According to Kaspersky it takes organizations at
least a week to recover their data in most cases. Then of course there is the
financial loss of needing to replace infected machines, pay for an IT company
to remediate against the attack and put protection in place to stop it
happening again.
For these reasons many
businesses feel they have no choice but to pay the ransom, although it is
highly recommended that they do not. Ransomware generates over $25 million in
revenue for hackers each year, which demonstrates how effective it is to extort
money from organizations. So why is malware so effective?
Targets Human
Weaknesses
By targeting people
with phishing attacks, attackers can bypass traditional security technologies
with ransomware. Email is a weak point in many businesses’ security
infrastructure, and hackers can exploit this by using phishing emails to trick
users into opening malicious files and attachments. By using trojan horse
viruses, hackers also target human error by causing them to inadvertently to
download malicious files.
The major issue here is
a lack of awareness about security threats from most users, with many people
unaware of what threats look like, and what they should avoid downloading or
opening on the internet or in emails. This lack of security awareness helps
ransomware to spread much more quickly.
Ransomware attacks are
growing by a record amount, with attackers developing increasingly
sophisticated malware. Many businesses do not have the strong defences needed
in place to block these attacks, because they can be expensive and complicated
to deploy and use. It’s often hard for IT teams to convince company executives
that they need strong security defences until it’s too late and systems have
already been compromised.
Out of Date Hardware
and Software
Alongside not having
strong defences against attacks, many organizations also rely too heavily on hardware
and software that is out of date. Over time, attackers discover security
vulnerabilities. Technology companies often push out security updates, but for
many organizations they have no way to verify that users are installing this
updates. Many organizations also rely heavily on older computers that are no
longer supported, meaning they are open to vulnerabilities.
This is one of the main
reasons the WannaCry virus was so successful. It targeted many large
organizations like the NHS, which for most part uses decades old machines on
operating systems that are no longer regularly supported with updates. The
exploit WannaCry used to infect systems was actually discovered two months
before the attack took place and was patched by Microsoft, but devices were not
updated, and the attack still rapidly spread.
How Can You Stop
Ransomware?
The best way for
businesses to stop ransomware attacks is to be proactive in your security
approach and ensure that you have strong protections in place before ransomware
can infect your systems. Here are some tips for the best protections to put in
place to stop ransomware attacks:
Strong, Reputable
Endpoint Anti-Virus Security
One of the most
important ways to stop ransomware is to have a very strong endpoint security
solution. These solutions are installed on your endpoint devices, and block any
malware from infecting your systems. They also give admins the ability to see
when devices have been compromised, and ensure that security updates have been
installed.
Email Security, Inside
and Outside the Gateway
As ransomware is
commonly delivered through email, email security is crucial to stop ransomware.
Secure Email gateway technologies filter email communications with URL defences
and attachment sandboxing to identify threats and block them from being
delivered to users. This can stop ransomware from arriving on endpoint devices
and block users from inadvertently installing ransomware onto their device.
Ransomware is also
commonly delivered through phishing. Secure email gateways can block phishing
attacks, but there is also Post-Delivery Protection technologies, which use
machine learning and AI algorithms to detect phishing attacks, and display
warning banners within emails to alert them that an email may be suspicious.
This helps users to avoid phishing emails which may contain a ransomware
attack.
Web Filtering &
Isolation Technologies
DNS Web filtering
solutions stop users from visiting dangerous websites and downloading malicious
files. This helps to block viruses that spread ransomware from being downloaded
from the internet, including trojan horse viruses that disguise malware as
legitimate business software.
DNS filters can also
block malicious third party adverts. Web filters should be configured to
aggressively block threats, and to stop users from visiting dangerous or
unknown domains. Utilizing Isolation can also be an important tool to stop
ransomware downloads. Isolation technologies completely remove threats away
from users by isolating browsing activity in secure servers and displaying a
safe render to users.
This can help to prevent ransomware as any malicious
software is executed in the secure container and does not affect the users
themselves. The main benefit of Isolation is that it doesn’t impact the user’s
experience whatsoever, delivering high security efficacy with a seamless
browsing experience.
Security Awareness
Training
The people within your
organization are often your biggest security risk. In recent years there has
been a huge growth in Security Awareness Training platforms, which train users
about the risks they face using the internet at work and at home. Awareness
Training helps to teach users what threats within email look like, and best
security practices they should follow to stop ransomware, such as making sure
their endpoints are updated with the latest security software.
Security Awareness
Training solutions typically also provide phishing simulation technologies.
This means admins can create customized simulated phishing emails, and send
them out to employees to test how effectively they can detect attacks. Phishing
simulation is an ideal way to help view your security efficacy across the
organization, and is a useful tool to help identify users that need more
security training to help stop the spread of ransomware.
Data Backup and
Recovery
If a ransomware attack
succeeds and your data is compromised, the best way to protect your
organization is to be able to restore the data you need quickly and minimize
the downtime. The best way to protect data is to ensure that it is backed up in
multiple places, including in your main storage area, on local disks, and in a
cloud continuity service. In the event of a ransomware attack, backing up data
means you will be able to mitigate the loss of any encrypted files and regain
functionality of systems.
The best Cloud Data
Backup and Recovery platforms will allow businesses to recover data in the case
of a disaster, will be available anytime, and will be easily integrated with
existing cloud applications and endpoint devices, with a secure and stable
global cloud infrastructure. Cloud data
backup and recovery is an important tools to remediating against Ransomware.
Don’t Let Ransomware
Damage Your Organization
By following the above
steps, you can begin to protect your organization against damaging ransomware
attacks. If you want more help finding out how you can protect your
organization against ransomware, get in touch. Our security Experts can help
you to identify your business needs and suggest the right software to help
improve your security issues, with product quotes and demos.
The idea behind
ransomware, a form of malicious software, is simple: Lock and encrypt a
victim’s computer or device data, then demand a ransom to restore access.
In many cases, the
victim must pay the cybercriminal within a set amount of time or risk losing
access forever. And since malware attacks are often deployed by cyberthieves,
paying the ransom doesn’t ensure access will be restored.
Ransomware holds your
personal files hostage, keeping you from your documents, photos, and financial
information. Those files are still on your computer, but the malware has
encrypted your device, making the data stored on your computer or mobile device
inaccessible.
While the idea behind
ransomware may be simple, fighting back when you’re the victim of a malicious
ransomware attack can be more complex. And if the attackers don’t give you the
decryption key, you may be unable to regain access to your data or device.
Knowing the types of
ransomware out there, along with some of the dos and don’ts surrounding these
attacks, can go a long way toward helping protect yourself from becoming a
victim of ransomware.
Types of ransomware--
Ransomware attacks can
be deployed in different forms. Some variants may be more harmful than others,
but they all have one thing in common: a ransom. Here are seven common types of
ransomware.
Crypto malware. This
form of ransomware can cause a lot of damage because it encrypts things like
your files, folders, and hard-drives. One of the most familiar examples is the
destructive 2017 WannaCry ransomware attack. It targeted thousands of computer systems
around the world that were running Windows OS and spread itself within
corporate networks globally. Victims were asked to pay ransom in Bitcoin to
retrieve their data.
Lockers.
Locker-ransomware is known for infecting your operating system to completely
lock you out of your computer or devices, making it impossible to access any of
your files or applications. This type of ransomware is most often
Android-based.
Scareware. Scareware is
fake software that acts like an antivirus or a cleaning tool. Scareware often
claims to have found issues on your computer, demanding money to resolve the
problems. Some types of scareware lock your computer. Others flood your screen
with annoying alerts and pop-up messages.
Doxware. Commonly
referred to as leakware or extortionware, doxware threatens to publish your
stolen information online if you don’t pay the ransom. As more people store
sensitive files and personal photos on their computers, it’s understandable
that some people panic and pay the ransom when their files have been hijacked.
RaaS. Otherwise known
as “Ransomware as a service,” RaaS is a type of malware hosted anonymously by a
hacker. These cybercriminals handle everything from distributing the ransomware
and collecting payments to managing decryptors — software that restores data
access — in exchange for their cut of the ransom.
Mac ransomware. Mac
operating systems were infiltrated by their first ransomware in 2016. Known as
KeRanger, this malicious software infected Apple user systems through an app
called Transmission, which was able to encrypt its victims’ files after being
launched.
Ransomware on mobile
devices. Ransomware began infiltrating mobile devices on a larger scale in
2014. What happens? Mobile ransomware often is delivered via a malicious app,
which leaves a message on your device that says it has been locked due to
illegal activity.
The origins of
ransomware
How did ransomware get
started? While initially targeting individuals, later ransomware attacks have
been tailored toward larger groups like businesses with the intent of yielding
bigger payouts. Here are some notable dates on the ransomware timeline that
show how it got its start, how it progressed, and where ransomware is now.
PC Cyborg, also known
as the AIDS Trojan, in the late 1980s. This was the first ransomware, released
by AIDS researcher Joseph Popp. Popp carried out his attack by distributing
20,000 floppy disks to other AIDS researchers. Little did the researchers know,
these disks contained malware that would encrypt their C: directory files after
90 reboots and demand payment.
GpCode in 2004. This
threat implemented a weak form of RSA encryption on victims’ personal files
until they paid the ransom.
WinLock in 2007. Rather
than encrypting files, this form of ransomware locked its victims out of their
desktops and then displayed pornographic images on their screens. In order to
remove the images, victims had to pay a ransom with a paid SMS.
Reveton in 2012. This
so-called law enforcement ransomware locked its victims out of their desktops
while showing what appeared to be a page from an enforcement agency such as the
FBI. This fake page accused victims of committing crimes and told them to pay a
fine with a prepaid card.
CryptoLocker in 2013.
Ransomware tactics continued to progress, especially by 2013 with this
military-grade encryption that used key storage on a remote server. These
attacks infiltrated over 250,000 systems and reaped $3 million before being
taken offline.
Locky in 2016.
So-called Locky ransomware used social engineering to deliver itself via email.
When it was first released, potential victims were enticed to click on an
attached Microsoft Word document, thinking the attachment was an invoice that
needed to be paid. But the attachment contained malicious macros. More recent
Locky ransomware has evolved into the use of JavaScript files, which are
smaller files that can more easily evade anti-malware products.
WannaCry in 2017. These
more recent attacks are examples of encrypting ransomware, which was able to
spread anonymously between computers and disrupt businesses worldwide.
Sodinokibi in 2019. The
cybercriminals who created this ransomware used managed service providers
(MSPs) like dental offices to infiltrate victims on a larger scale.
Ransomware remains a
popular means of attack, and continues to evolve as new ransomware families are
discovered.
Who are the targets of
ransomware attacks?
Ransomware can spread
across the Internet without specific targets. But the nature of this
file-encrypting malware means that cybercriminals also are able to choose their
targets. This targeting ability enables cybercriminals to go after those who
can — and are more likely to — pay larger ransoms.
Dos and don’ts of
ransomware--
Ransomware is a
profitable market for cybercriminals and can be difficult to stop. Prevention
is the most important aspect of protecting your personal data. To deter
cybercriminals and help protect yourself from a ransomware attack, keep in mind
these eight dos and don’ts.
1. Do use security
software. To help protect your data, install and use a trusted security suite
that offers more than just antivirus features. For instance, Norton 360 With
LifeLock Select can help detect and protect against threats to your identity
and your devices, including your mobile phones.
2. Do keep your
security software up to date. New ransomware variants continue to appear, so
having up-to-date internet security software will help protect you against
cyberattacks.
3. Do update your
operating system and other software. Software updates frequently include
patches for newly discovered security vulnerabilities that could be exploited
by ransomware attackers.
4. Don’t automatically
open email attachments. Email is one of the main methods for delivering
ransomware. Avoid opening emails and attachments from unfamiliar or untrusted
sources. Phishing spam in particular can fool you into clicking on a
legitimate-looking link in an email that actually contains malicious code. The
malware then prevents you from accessing your data, holds that data hostage,
and demands ransom.
5. Do be wary of any
email attachment that advises you to enable macros to view its content. Once
enabled, macro malware can infect multiple files. Unless you are absolutely
sure the email is genuine and from a trusted source, delete the email.
6. Do back up important
data to an external hard drive. Attackers can gain leverage over their victims
by encrypting valuable files and making them inaccessible. If the victim has
backup copies, the cybercriminal loses some advantage. Backup files allow
victims to restore their files once the infection has been cleaned up. Ensure
that backups are protected or stored offline so that attackers can’t access
them.
7. Do use cloud
services. This can help mitigate a ransomware infection, since many cloud
services retain previous versions of files, allowing you to “roll back” to the
unencrypted form.
8. Don’t pay the
ransom. Keep in mind, you may not get your files back even if you pay a ransom.
A cybercriminal could ask you to pay again and again, extorting money from you
but never releasing your data.
With new ransomware
variants appearing, it’s a good idea to do what you can to minimize your
exposure. By knowing what ransomware is and following these dos and don’ts, you
can help protect your computer data and personal information from being
ransomware’s next target.
Cloud Backups are Not
Safe from Ransomware
PureLocker is a piece
of ransomware that is being used in targeted attacks against company servers,
and seems to have links with notorious cybercriminal groups.
This malware, which
encrypts its victims’ servers in order to demand a ransom, has been analyzed by
researchers at Intezer and IBM X-Force. They called it PureLocker because it is
written in the programming language PureBasic.
This choice of language is
unusual, but offers the attackers several advantages, such as the fact that
cybersecurity providers often struggle to generate trustworthy detection
signatures for malicious software written in this language. PureBasic is also easily transferable between
Windows, Linux and OX-X, which greatly facilitates attacks on other platforms.
BELOW: I WILL EXPLAIN BUG ALGORITHMS IN GREATER DETAIL LATER.. THIS IS CHAATNE KE VAASTE.
Swarms of drones with
limited resources can effectively search an environment, using an algorithm to make it all work – without
guidance from a central computer.
Small robots to spread
out autonomously after they are released, video as much of an unknown
environment as possible, then return to a central base with images for later
analysis.
Critical military areas in
India has already been mapped by foreign forces for attack without GPS.. and we don’t have a clue..
Modi is using Pakistan specific and digitally blind Ajit Doval as arm candy during his endless foreign jaunts..
We ask, is there a job description for a NSA ?
Does this critical chair require a resourceful leader who is digitally savvy..
Does he have to pass any exams set by experts and constantly update himself to mentally hone himself ?
Or, all that is reuired is a 74 year old grease and tackle field agent ( with dyed hair ) who was deep in Pakistan decades ago with a circumcised willy ?
Is ego massage more important ?
Each of my 300 critical messages for fortunes of Bharatmata to Modi have been copied to Ajit Doval too.. Result ? Zilch !
NSA is not military specific , and that too in pathetic reactive mode.
If we cend a highly technical complaint to NIA/ ED/ NSA / IB/ PMO / CBI/ CYBER CELL , we are asked to go to police station and file FIR with a khaini munching pandu havaldar who does not know English..
Despite my 33 part post on SHELL COMPANIES money laundering is going on merrily.
Despite my 13 part post on BLOCKCHAIN/ BITCON capital flight from Surat is still going on..
If you go to a gargantuan bellied Pandu havaldar, with red paan juice dripping from the corner of his mouth and complain about Blockchain, he will beat you up..
Let us dance !
Modi is using Pakistan specific and digitally blind Ajit Doval as arm candy during his endless foreign jaunts..
We ask, is there a job description for a NSA ?
Does this critical chair require a resourceful leader who is digitally savvy..
Does he have to pass any exams set by experts and constantly update himself to mentally hone himself ?
Below: Signals
Intelligence (SIGINT) is intelligence-gathering by interception of signals,
whether communications between people (communications intelligence) or from
electronic signals not directly used in communication (electronic intelligence).
Signals intelligence is a subset of
intelligence collection management. As
sensitive information is often encrypted, signals intelligence in turn involves
the use of cryptanalysis to decipher the messages. Traffic analysis—the study
of who is signaling whom and in what quantity—is also used to integrate
information again
EVEN TODAY WE DON’T KNOW
WHO INDIAs FORIEGN PAYROLL DEEP STATE AGENTS ARE..
NSA KOH KUCHCH NAHIN POTHA.. NAY –PATHA.. EVEN TODAY THEY DONT KNOW ROTHSCHILD RULED INDIA..
NSA KOH KUCHCH NAHIN POTHA.. NAY –PATHA.. EVEN TODAY THEY DONT KNOW ROTHSCHILD RULED INDIA..
FROM THE YEAR 2012 TO 2016
IF YOU GOOGLE FOR "WORST JOURNALIST "
MY POST BELOW WOULD COME ON PAGE 1 AS ITEM 1 , AMONG NEARLY 70 MILLION POSTS
http://ajitvadakayil.blogspot.com/2012/08/indias-worst-journalist-barkha-dutt.html
TILL I BACKED TRUMP AGAINST ROTHSCHILDs CANDIDATE HILLARY
NOW THE POST IS SUNK.. HARDLY ANYBODY GOES BEYOND THE FIRST TEN PAGES ON GOOGLE SEARCH...
CHECK OUT BARKHA DUTTs CONVERSATIONS -- WHEELING AND DEALING..
https://www.youtube.com/watch?v=Pon2a09gYK4
capt ajit vadakayil
..
IF YOU GOOGLE FOR "WORST JOURNALIST "
MY POST BELOW WOULD COME ON PAGE 1 AS ITEM 1 , AMONG NEARLY 70 MILLION POSTS
http://ajitvadakayil.blogspot.com/2012/08/indias-worst-journalist-barkha-dutt.html
TILL I BACKED TRUMP AGAINST ROTHSCHILDs CANDIDATE HILLARY
NOW THE POST IS SUNK.. HARDLY ANYBODY GOES BEYOND THE FIRST TEN PAGES ON GOOGLE SEARCH...
CHECK OUT BARKHA DUTTs CONVERSATIONS -- WHEELING AND DEALING..
https://www.youtube.com/watch?v=Pon2a09gYK4
capt ajit vadakayil
..
Or, all that is reuired is a 74 year old grease and tackle field agent ( with dyed hair ) who was deep in Pakistan decades ago with a circumcised willy ?
Is ego massage more important ?
Each of my 300 critical messages for fortunes of Bharatmata to Modi have been copied to Ajit Doval too.. Result ? Zilch !
NSA is not military specific , and that too in pathetic reactive mode.
If we cend a highly technical complaint to NIA/ ED/ NSA / IB/ PMO / CBI/ CYBER CELL , we are asked to go to police station and file FIR with a khaini munching pandu havaldar who does not know English..
Despite my 33 part post on SHELL COMPANIES money laundering is going on merrily.
Despite my 13 part post on BLOCKCHAIN/ BITCON capital flight from Surat is still going on..
If you go to a gargantuan bellied Pandu havaldar, with red paan juice dripping from the corner of his mouth and complain about Blockchain, he will beat you up..
Let us dance !
Small robots and drones
used advanced navigation techniques such as camera-based SLAM (simultaneous
localisation and mapping).
The algorithm is the
‘swarm gradient bug algorithm’ (SGBA), which maximises the area covered by
having robots travel in different directions away from the departure point,
while following walls and avoiding objects as they go
Bug algorithms are a
class of algorithms that just react to objects as they come into sensor range.
Bug algorithms, do not
make maps of the environment but deal with obstacles on the fly. In principle,
detailed maps are very convenient, because they allow a robot to navigate from
any point in the map to any other point, along an optimal path.
However, the
costs of making such a map on tiny robots is prohibitive. The proposed bug
algorithm leads to less efficient paths but has the merit that it can even be
implemented on tiny robots.
Once on the move, the
drones head in their preferred direction, navigated by analysing sequential
images from a down-facing camera (‘visual odometry’) which is modified by
wall-following using laser raging ( Crazyflies include laser ranging). Laser
ranging is also used to avoid static objects.
Triggered by low
battery charge, the robots return to base where stored camera images can be
viewed. Return navigation is through locking on to a radio beacon (2.4GHz)
located at the nominal base and tracking along the signal gradient.
Swarms of small and
cheap robots would be able to perform tasks that are currently out of reach of
large, individual robots. For instance, a swarm of small flying drones would be
able to explore a disaster site much quicker than a single larger drone.
In a proof-of-concept
simulated search-and-rescue situation, the swarm was introduced into a building
within which with two dummies had been left
Within six minutes, the
six drones had explored ~80% of open rooms and found both ‘victims’
BELOW: HOW MANY MILITARY DRONES POWERED BY AI WILL BE FAIR TO EUROPEAN ROMA GYPSIES ? OR TO PALESTINIANS IN ISRAEL?
I HAVE SOURCES WITHIN HSBC IN THEIR FRAUD CONTROL DEPT , ABROAD..
BALLS TO ROTHSCHILD FOUNDED BANK HSBC..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
THEY ARE ADOPTING BLOCKCHAIN TO HIDE THEIR PAST CRIMES AND COVER THEIR TRACKS..
I WILL PUT A SEPARATE POST ON HSBC WHICH IS WORSE THAN BCCI..
HSBC, EUROPE'S BIGGEST BANK, PAID A $1.9 BILLION FINE IN 2012 TO AVOID PROSECUTION FOR ALLOWING AT LEAST $881 MILLION IN PROCEEDS FROM THE SALE OF ILLEGAL DRUGS. IN ADDITION TO FACILITATING MONEY LAUNDERING BY DRUG CARTELS, EVIDENCE WAS FOUND OF HSBC MOVING MONEY FOR SAUDI BANKS TIED TO TERRORIST GROUPS
https://en.wikipedia.org/wiki/Dirty_Money_(2018_TV_series)
BALLS TO ROTHSCHILD FOUNDED BANK HSBC..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
THEY ARE ADOPTING BLOCKCHAIN TO HIDE THEIR PAST CRIMES AND COVER THEIR TRACKS..
I WILL PUT A SEPARATE POST ON HSBC WHICH IS WORSE THAN BCCI..
HSBC, EUROPE'S BIGGEST BANK, PAID A $1.9 BILLION FINE IN 2012 TO AVOID PROSECUTION FOR ALLOWING AT LEAST $881 MILLION IN PROCEEDS FROM THE SALE OF ILLEGAL DRUGS. IN ADDITION TO FACILITATING MONEY LAUNDERING BY DRUG CARTELS, EVIDENCE WAS FOUND OF HSBC MOVING MONEY FOR SAUDI BANKS TIED TO TERRORIST GROUPS
https://en.wikipedia.org/wiki/Dirty_Money_(2018_TV_series)
- SOMEBODY ASKED ME
WHAT IS THIS "NATIONAL PRAYER BREAKFAST " HELD IN WASHINGTON DC USA EVERY YEAR ?
IT IS A DEEP STATE EVENT..
JEW PRESIDENT EISENHOWER WAS THE FIRST TO ATTEND IT.
AFTER THAT EVERY US PRESIDENT HAS ATTENDED IT.. IF YOU DONT ATTEND THE JEWISH DEEP STATE WILL ELIMINATE YOU..
https://en.wikipedia.org/wiki/National_Prayer_Breakfast
I MAY WRITE A FULL POST ABOUT THIS.. ABOUT BASTARD JEW DOUGLAS COE, THE C STREET GANG, THE FRATERNITY OF FELLOWSHIP ( THE CHOSEN PEOPLE ),
PRAYER IS TO JEW JESUS WHO NEVER EXISTED..
http://ajitvadakayil.blogspot.com/2019/09/istanbul-deep-seat-of-jewish-deep-state.html
THE JEWISH DEEP STATE MERGED GOD AND POWER SINCE THE DAYS OF JEW BENJAMIN FRANKLIN..
http://ajitvadakayil.blogspot.com/2012/11/snuff-movies-freemason-benjamin.html
JEWISH EXCEPTIONALISM IS ROOTED IN THE TRUTH THAT MIDGET KING DAVID, WAS A PEEPING TOM WHEN KERALA NAMBOODIRI WOMAN BATH SHEBA TOOK A NAKED BATH .. HER HUSBAND URAIH WAS BASTARD DAVIDs BEST FRIEND AND ARMY COMMANDER WHO MADE HIM KING..
BASTARD MIDGET DAVID GOT URAIH MURDERED AND USURPED HIS WIFE BATHSHEBA..
SEE IF YOU ARE THE CHOSEN ONE YOU CAN DO ANYTHING..
THE FELLOWSHIP FRATERNITY IS ALL ABOUT "CHOSEN PEOPLE"
https://en.wikipedia.org/wiki/Douglas_Coe
FELLOWSHIP IS A CRYPTO JEW ORGANISATION.. CONTROLLED BY THE DEEP STATE..
https://en.wikipedia.org/wiki/The_Fellowship_(Christian_organization)
ALL IN GOOD TIME..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
TRUMP
PUTIN
AMBASSADORS TOO FROM RUSSIA/ USA
EXTERNAL AFFAIRS MINISTER/ MINISTRY
ALICE AJIT DOVAL
RAW
PMO
ALICE PM MODI
- SOMEBODY CALLED ME UP AND SAID-
CAPTAIN PLEASE WRITE A POST ON THE "NATIONAL PRAYER BREAKFAST " MEET HELD IN USA EVERY YEAR.. ONLY YOU HAVE THE CEREBRAL WHEREWITHAL TO WRITE ABOUT IT..
INDEED
WE HAD EVELYN SHARMA ATTENDING IN 2017.. SHE IS A BOLLYWOOD BIMBETTE WITH A GERMAN PASSPORT, A GERMAN JEW MOTHER AND A PNJAAABI PUTTAR FATHER..
IN WHAT WAY THIS BIMBETTE REPRESENTS INDIA IS A MATTER OF DEBATE..
LET ME SHOW A VIDEO WHERE SHE IS JIVING TO HONEY SINGH IN BIKINI..
https://www.youtube.com/watch?v=MXJCnccDLA0
WHO IS HONEY SINGH?
HE IS THE DARLING OF PNJAAABI PUTTARS AND PNJAAABI KUDIS WHO WANT TO MIGRATE TO KNEDAAA.
ONE POOR SHIELA DIXIT WAS CAUGHT ON STAGE JIVING TO THIS FILTHY SONG BELOW.. SHE GOT THE VIDEO DELETED LATER
https://www.youtube.com/watch?v=gc3JsSq3bFE
FOR PEOPLE WHO DO NOT KNOW PNJAAABI , CHECK OUT THE ENGLISH TRANSLATION IN THE LINK BELOW--IT IS ALL ABOUT CUNT AND PRICK..
THIS IS NOW OUR NEW INDIAN PNJAAABI CULTURE..
https://www.musixmatch.com/lyrics/Yo-Yo-Honey-Singh/Choot-Vol-1/translation/english
THEN WHO ELSE ATTENDED ?
WIFE OF CM FADNAVIS..AMRUTA ..
WHY?
IN 2015, COUPLE OF JEWS GOT KILLED IN PARIS.. THE NEXT DAY FADNAVIS LIT UP VT STATION IN FRENCH FLAG COLOURS.. MILLIONS OF MUSLIMS DEAD IN LIBYA/ SYRIA/ IRAQ , HE COULD NOT CARE LESS.
FADNAVIS BABY FUCKED IT UP TOTALLY BY DISPLAYING THE NETHERLAND FLAG.. RED ON TOP, WHITE IN BETWEEN, BLUE AT BOTTOM.. AKKAL THODA JAAST HAI NAH ?
STILL HE MUST BE REWARDED BY THE JEWISH DEEP STATE , RIGHT?
AMRUTA FADNAVIS HOLDS THE POST OF VICE-PRESIDENT – CORPORATE HEAD (WEST INDIA) WITH AXIS BANK.
NO WONDER AT THE POLICE HQ AT MUMBAI ( CRAWFORD MARKET ) , PRIVATE ROTHSCHILD AXIS BANK ATM HAS BEEN RECESSED INTO THE POLICE GOVT PROPERTY.. OFFICE OF COMMISSIONER OF POLICE, CRIME BRANCH BUILDING, OPP CRAWFORD MARKET, MUMBAI ..
AXIS BANK IS ROTHSCHILDs MIGHTY BANK —IT HAS NOTHING TO DO WITH WEE INDIAN UTI BANK AS PER WIKIEPRDIA PROPAGANDA..
https://www.ndtv.com/india-news/devendra-fadnavis-promoted-amruta-fadnaviss-bank-axis-bank-at-cost-of-state-banks-says-plea-2092631
BELOW AMRUTA SINGS AT "UMANG " WHICH IS SOMETHING SIMILAR LIKE THIS "MEET".. HERE JEWISH BOLLYWOOD MAFIA ( PAKISTANI ISI SPONSORED ) WHEELS AND DEALS WITH MUMBAI POLICE..
IF ANY CRYING BOLLYWOOD STAR WANTS TO FILE A CASE OF DEFAMATION AGAINST A BLOGGER ( FOR TELLING TRUTHS ) , ALL HE NEED TO DO IS TO CALL UP HIS PET POLICE TOP COP..
https://www.youtube.com/watch?v=NS_MZDM1Jbs
WET YOUR BEAKS ( GALA GHEELA ) WITH THE FOLLOWING WIKIPEDIA POSTS..FIRST.. BEFORE YOU READ MY POST..
https://en.wikipedia.org/wiki/National_Prayer_Breakfast
https://en.wikipedia.org/wiki/The_Fellowship_(Christian_organization)
https://en.wikipedia.org/wiki/Douglas_Coe
https://en.wikipedia.org/wiki/Abraham_Vereide
https://en.wikipedia.org/wiki/C_Street_Center
THIS IS A JEWISH DEEP STATE MAFIA BREAKFAST.. THIS MAFIA CREATED THE RED NAXAL CORRIDOR IN INDIA..
http://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html
INDIAN COLLEGIUM JUDGES IN DEEP STATE PAYROLL PLAYED KOSHER BALL.. THERE ARE REWARDS IF YOU INJURE BHARATMATA..
THIS PRAYER BREAKFAST IS ABOUT WEAPONIZING JESUS ( WHO NEVER EXISTED ).. PRAYER GETS MURDERED IN THIS BREAKFAST MEETING, AND HOW !..
capt ajit vadakayil
..
THIS POST IS NOW CONTINUED TO PART 8, BELOW--
PSSSSTT--
WHEN
A WOMAN FEELS THAT A MAN CAN IMPALE HER , AND LIFT HER OFF THE GROUND USING SHEER PP ( PRICK POWER ) AND
CRY - “LOOK MAA NO HANDS” – SHE IS
YOURS..
WHEN
YOU ASK A WOMAN , WHAT TYPE OF MAN SHE PREFERS— SHE WILL GIVE HAJAAAAR BULLSHIT
—SENSE OF HUMOUR/ POETICAL/ HUGE BANK BALANCE/ NATTY LOOKS / SENSITIVE/ CHIVALROUS , BLAH BLAH FUCKIN’ BLAH
MY
LEFT BALL !
IN
HER WILDEST DARK WET DREAMS SHE JUST NEEDS THE VIRILE CAVEMAN WITH SILVER HAIR..
THIS POST IS NOW CONTINUED TO PART 8, BELOW--
CAPT AJIT VADAKAYIL
..
ReplyDeleteDEEP STATE AGENTS ALL OVER THIS PLANETS ARE WORRIED THAT INDIA WILL BECOME THIS PLANETs NO 1 SUPERPOWER IN 14 YEARS..
THEY ARE IN A TEARING HURRY TO KILL INDIA .. THE WHITE MAN LOATHES TO BE RULED BY THE BROWN MAN..
IN 1947 KOSHER BIG BROTHER JEW ROTHSCHILD DIVIDED INDIA BY AMPUTATING PAKISTAN AND BANGLADESH..
NOW THEY WANT TO AMPUTATE KASHMIR..
THESE DEEP STATE AGENTS IN- US CONGRESS/ UK-EU PARLIAMENT/ UN/ AMNESTY / INDIAN POLITICAL PARTIES LIKE CONGRESS- DMK- TMC -AIMIM CLAMOUR FOR HUMAN RIGHTS OF KASHMIRI MUSLIMS..
JUST WHO ARE THESE KASHMIRI MUSLIMS?
THESE MUSLIM BASTARDS HAVE DONE GENOCIDE OF KASHMIRI HINDU PANDITS, ETHNICALLY CLEANSED KASHMIR , DESTROYED THOUSANDS OF TEMPLES .. DEEP STATE AGENTS IN OUR ILLEGAL INDIAN COLLEGIUM JUDICIARY WERE IN CAHOOTS..
NONE OF THE DEEP STATE AGENTS WILL UTTER A WORD ABOUT GENOCIDE OF ROMA GYPSIES DURING WW2..
THEY WONT TALK ABOUT HOW ROMA GYPSIES HAVE BEEN PERSECUTED FOR A THOUSAND YEARS ..
INDIA HAS WOKEN UP..
WE KNOW THE TRAITORS FROM WITHIN AND OUR ENEMIES FROM OUTSIDE..
WE WILL DEAL WITH THEM..
LET THE JEWISH DEEP STATE AND THEIR AGENTS GET THIS CRYSTAL CLEAR .. KASHMIR IS THE SOURCE OF OUR RIVERS WHICH ORIGINATE IN THE HIMALAYAS.. WE KNOW HOW TO PROTECT OUR ANCIENT MOTHERLAND..
INSTEAD OF HAVING PIPE DREAMS THAT INDIA CAN BE BULLIED INTO GIVING AWAY KASHMIR TO PAKISTAN-- GET THIS CLEAR IN YOUR SLIME FILLED HEADS-- PAKISTAN BELONGS TO INDIA..
WE AWAIT PAKISTAN TO DRAW FIRST BLOOD AND NUKE INDIA FIRST. AFTER THAT WE WILL TAKE BACK PAKISTAN , ALBEIT AS RADIOACTIVE WASTELAND..
WE KNOW THE WEE TACTICAL NUKES IN PAKISTANs ARSENAL.. PAKISTAN AND THEIR ALLIES DO NOT KNOW THE MASSIVE STRATEGIC NUKES INDIA HAS IN HER ARMORY ..
https://ajitvadakayil.blogspot.com/2019/11/history-of-romani-gypsies-capt-ajit.html
SUCK ON THIS COMMENT !
capt ajit vadakayil
..
DeletePUT ABOVE COMMENT IN WEBSITES OF--
UN GEN SECRETARY
TRUMP
PUTIN
AMBASSADORS TO FROM USA/ RUSSIA
AMBASSADORS TO FROM ALL EU NATIONS – INCULDING UK / SCANDINAVIA/ CHINA / PAKISTAN
PMO
PM MODI
RSS
RAM MADHAV
MOHAN BHAGAWAT
AVBP
VHP
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DEFENCE MINISTER - MINISTRY
ALL THREE ARMED FORCE CHIEFS.
RAJEEV CHANDRASHEKHAR
MOHANDAS PAI
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SADGURU JAGGI VASUDEV
SRI SRI RAVISHANKAR
BABA RAMDEV
AMISH TRIPATHI
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
ANNA VETTIKAD
NIVEDITA MENON
SHOBHAA DE
RANA AYYUB
JOHN BRITTAS
KERALA FINANCE MINISTER THOMAS ISAAC
ALL COLLECTORS OF KERALA
ALL MPs/ MLAs OF KERALA
ALL MEDIA OF KERALA/ INDIA
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
RAHUL GANDHI
PRIYANKA VADRA
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
PIYUSH GOEL
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
CLOSET COMMIE ARNAB GOSWMI
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
HISTORY TV CHANNEL
DAVID HATCHER CHILDRESS
GIORGIO A TSOUKALOS
WENDY DONIGER
SHELDON POLLOCK
AUDREY TRUSCHKE
ENTIRE BBC GANG
MATA AMRITANANDAMAYI
MOHANLAL
SURESH GOPI
EVERY HINDU ORGANISTAION
E SREEDHARAN
DULQUER SALMAN
PGURUS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
I love this comment, India has had enough
Deletehttps://twitter.com/shree1082002/status/1200273349319856128
DeleteSent to UN secretary..
Deletehttps://www.un.org/en/contact-us/index.html
auto reply - Thanks!
Your response has been submitted.
Sent to following ids..
Deletedujarric@un.org
haqf@un.org
secretariat@unfccc.int
office@pa.gov.az
newdelhi@mission.mfa.gov.az
amb.baku@mea.gov.in
statsradsberedningen.registrator@gov.se
ambassaden.new-delhi@gov.se
amb.stockholm@mea.gov.in
secretarypm@opm.gov.bz
belize@modigroup.com
embcr-in@rree.go.cr
amboffice.panama@mea.gov.in
indembog@cable.net.co
stm@stm.dk
hoc.copenhagen@mea.gov.in
jiko.rasoqosoqo@govnet.gov.fj
delamb@um.dk
hoc.suva@mea.gov.in
primeminister@gov.gd
ministere.Etat@me.etat.lu
newdelhi.amb@mae.etat.lu
nde@minbuza.nl
amb.thehague@mea.gov.in
j.ardern@ministers.govt.nz
nzhcindia@mfat.net
hoc.wellington@mea.gov.in
postmottak@smk.dep.no
emb.newdelhi@mfa.no
hoc.oslo@mea.gov.in
info@bk.admin.ch
newdelhi@eda.admin.ch
hoc.berne@mea.gov.in
rusembindija@mid.ru
amb.moscow@mea.gov.in
hoc.washington@mea.gov.in
president@president.go.kr
india@mofa.go.kr
hoc.seoul@mea.gov.in
cons.hamburg@mea.gov.in
boris.johnson.mp@parliament.uk
info@new-delhi.diplo.de
web.newdelhi@fco.gov.uk
hoc.london@mea.gov.in
Thanks to Debdoot bhai for email ids.
https://timesofindia.indiatimes.com/india/assam-to-make-public-information-on-hindu-bengalis-out-of-nrc/articleshow/72285039.cms
ReplyDeleteINDIA WILL ACCEPT HINDU BANGLADESIS WHO ARE PERSECUTED IN BANGLADESH..
WE WILL NOT ACCEPT MUSLIM BANGLADESIS..
https://www.bbc.com/news/world-asia-china-50581862
ReplyDeleteHONGKONG PROTESTS ARE LED AND FUNDED BY THE JEWISH DEEP STATE
I MAY WRITE A SEPARATE POST ON HOW DRUG MONEY OF DEEP STATE IS LAUNDERED IN HONGKONG..
ROTHSCHILDs BANK HSBC WAS FOUNDED IN HONGKONG TO LAUNDER OPIUM DRUG MONEY..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
IMAGINE MEXICAN AND COLOMBIAN CARTELS USED PAKISTANI BANK BCCI TO LAUNDER THEIR DRUG MONEY..
BCCI WAS SPONSORED BY AMERICAN PRESIDENTS REAGAN, BUSH SR AND CLINTON
BCCI WAS A JEWISH BANK.. PAKISTANIS WERE JUST A FRONT..
JEW BARACK OBAMAs MOTHER , WHITE JEWESS ANN DUNHAM , WAS A FRONT FOR DEEP STATE BANK BCCI IN KARACHI..
https://ajitvadakayil.blogspot.com/2019/11/paradox-redemption-victory-in-defeat.html
WATCH THIS MOVIE "INFILTRATOR" ... IT GIVES A GENERAL IDEA OF "OPERATION C CHASE"
https://en.wikipedia.org/wiki/The_Infiltrator_(2016_film)
capt ajit vadakayil
..
SEND THE ABOVE COMMENT TO--
PUTIN
AMBASSADORS TO FROM RUSSIA
PRESIDENT XI
AMBASSADOR TO FROM CHINA
EDITOR GLOBAL TIME HU XIJIN
EXTERNAL AFFAIRS MINISTER/ MINISTRY
PMO
PM MODI
AJIT DOVAL
RAW
Sent to putin.
DeleteMailed to-
info@globaltimes.com.cn
editor@globaltimes.com.cn
chinaemb_in@mfa.gov.cn
Sent to-
Deletecontact@amitshah.co.in,
narendramodi1234@gmail.com,
info.nia@gov.in,
information@cbi.gov.in,
Rajnath Singh <38ashokroad@gmail.com>,
mos-defence@gov.in,
alokmittal.nia@gov.in,
webmaster.indianarmy@nic.in
THE HONGKONG PROTESTS ARE FUNDED AND CONTROLLED BY THE JEWISH OLIGARCHY..
ReplyDeleteEVEN CHINESE DO NOT KNOW THAT JEW MAO AND JEW MAURICE STRONG WERE DEEP STATE AGENTS...
JEWS WHO HAVE MONOPOLISED THE MAFIA AND CRIME IN HONGKONG DO NOT WANT TO BE EXTRADITED TO THE CHINESE MAINLAND..
MACAU GAMBLING IS FAR MORE THAN LAS VEGAS.. DRUG MONEY IS LAUNDERED HERE.
ROTHSCHILD CONTROLLED PORTUGAL LEGALIZED GAMBLING IN MACAU IN 1850..
ROTHSCHILD RULED INDIA..NOT THE BRITISH KING OR PARLIAMENT.. HE GREW OPIUM IN INDIA AND SOLD IT IN CHINA.. HIS DRUG MONEY WAS LAUNDERED IN HONGKONG HSBC BANK.
KATHIAWARI JEW GANDHI WAS ROTHSCHILDs AGENT WHEN IT CAME TO SUPPORTING OPIUM CULTIVATION IN INDIA..
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
INDIAN FARMERS WHO REFUSED TO CULTIVATE OPIUM WERE SHIPPED OFF ENMASSE AS SLAVES ABROAD WITH FAMILY..
http://ajitvadakayil.blogspot.com/2010/04/indentured-coolie-slavery-reinvented.html
INDIAN AND AMERICAN OLIGARCHY ( CRYPTO JEWS ) WERE ALL DRUG RUNNERS OF JEW ROTHSCHILD..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
http://ajitvadakayil.blogspot.com/2010/12/dirty-secrets-of-boston-tea-party-capt.html
DRUG CARTELS OF COLOMBIA/ MEXICO USE HONGKONG TO LAUNDER THEIR DRUG MONEY..
GAMBLING TOURISM IS MACAU'S BIGGEST SOURCE OF REVENUE, MAKING UP MORE THAN 54% OF THE ECONOMY. VISITORS ARE MADE UP LARGELY OF CHINESE NATIONALS FROM MAINLAND CHINA AND HONG KONG.
HONGKONG IS NOW FLOODED WITH DRUGS .. DUE TO HIGH STRESS AT WORK, PEOPLE ARE ADDICTED .. HOUSE RENT IN HONGKONG IS VERY HIGH DUE TO THE JEWISH OLIGARCHS WHO CONTROL HONGKONG.
IN 2012, HSBC HOLDINGS PAID US$ 1.9 BILLION TO RESOLVE CLAIMS IT ALLOWED DRUG CARTELS IN MEXICO AND COLOMBIA TO LAUNDER PROCEEDS THROUGH ITS BANKS. HSBC WAS FOUNDED BY ROTHSCHILD.
CHINA'S EXCESSIVELY STRICT FOREIGN EXCHANGE CONTROLS ARE INDIRECTLY BREEDING MONEY LAUNDERING, PROVIDING A HUGE DEMAND FOR UNDERGROUND KOSHER MAFIA BANKS.
FACTORY MANUFACTURERS CONVERT HONG KONG DOLLARS AND RENMINBI WITH UNDERGROUND BANKS FOR CONVENIENCE WHILE CASINOS IN MACAU OFFER RECEIPTS TO GIVE LEGITIMACY TO SUSPECT CURRENCY FLOWS.
INDIA WAS NO 1 EXPORTED OF PRECURSOR CHEMICALS LIKE EPHEDRINE TO MEXICO FOR PRODUCING METH.. TODAY CHINA ( GUANGDONG ) HAS TAKEN OVER POLE POSITION..
http://ajitvadakayil.blogspot.com/2017/02/breaking-bad-tv-serial-review-where.html
EL CHAPO AND HIS DEPUTY IGNACIO "NACHO" CORONEL VILLARREAL USED HONG KONG TO LAUNDER BILLIONS OF DOLLARS..TO GET SOME IDEA WATCH NETFLIX SERIES “NARCOS MEXICO” AND “EL CHAPO”.
BALLS TO THE DECOY OF "FREEDOM " FOR HONGKONG CITIZENS.. IT IS ALL ABOUT FREEDOM FOR JEWISH MAFIA TO USE HONGKONG TO LAUNDER DRUG MONEY.
JEW ROTHSCHILD COULD SELL INDIAN OPIUM IN CHINA ONLY BECAUSE THE CHINESE MAFIA AND SEA PIRATES WAS CONTROLLED BY HIM AND JEW SASSOON.
COLOMBIAN/ MEXICAN DRUG CARTEL KINGS FEAR EXTRADITION TO USA.. SAME NOW WITH HONGKONG MONEY LAUNDERING MAFIA..
https://ajitvadakayil.blogspot.com/2019/11/paradox-redemption-victory-in-defeat.html
THE 2019 HONG KONG PROTESTS HAVE BEEN LARGELY DESCRIBED AS "LEADERLESS".. BALLS, IT IS 100% CONTROLLED BY JEWS
PROTESTERS COMMONLY USED LIHKG, ( LIKE REDDIT ) AN ONLINE FORUM, AN OPTIONALLY END-TO-END ENCRYPTED MESSAGING SERVICE, TO COMMUNICATE AND BRAINSTORM IDEAS FOR PROTESTS AND MAKE COLLECTIVE DECISIONS ..
THE KOSHER WEBSITE IS WELL-KNOWN FOR BEING THE ULTIMATE PLATFORM FOR DISCUSSING THE STRATEGIES FOR THE LEADERLESS ANTI-EXTRADITION BILL PROTESTS IN 2019..
CONTINUED TO 2-
CONTINUED FROM 1-
DeleteHONGKONG PROTESTERS USE LIHKG TO MICROMANAGE STRIKE STRATEGIES , CALL FOR BACKUP OR ARRANGE LOGISTICS SUPPLIES FOR THOSE ON THE FRONT LINES OF CLASHES WITH POLICE.
LIHKG CALLS ON RESIDENTS TO SKIP WORK AND CLASSES AND VANDALISE. HONGKONGERS STICK TO LIHKG AS POSTS ARE PREDOMINANTLY IN THEIR NATIVE TONGUE, CANTONESE.
LIHKG IS A SAFE HAVEN FOR THESE PROTESTING PEOPLE CONTROLLED BY JEWSIH OLIGARCHS.
AN ACCOUNT CAN ONLY BE CREATED WITH AN EMAIL ADDRESS PROVIDED BY AN INTERNET SERVICE PROVIDER OR HIGHER EDUCATION INSTITUTION, MEANING THE USER CANNOT HIDE THEIR IDENTITY FROM LIHKG.
THE JEWISH OLIGARCHS KNOW THEIR PRIVATE ARMY. THE FORUM DOES NOT REQUIRE USERS TO REVEAL ANY PERSONAL INFORMATION, INCLUDING THEIR NAMES, SO THEY CAN REMAIN ANONYMOUS.
LIHKG IS ALSO FERTILE GROUND FOR DOXXING PEOPLE NOT SUPPORTIVE OF THE MOVEMENT AGAINST THE EXTRADITION BILL. ONE POLICE OFFICER FOUND HIMSELF A TARGET OF PUBLIC MOCKERY WHEN HIS NAME AND PICTURE WERE LEAKED, ALONG WITH PRIVATE TINDER CONVERSATIONS REQUESTING SEXUAL FAVOURS IN A POLICE STATION.
THE PHRASE “BE WATER, MY FRIEND”, ORIGINALLY SAID BY MARTIAL ARTS LEGEND BRUCE LEE, HAS BECOME A MANTRA FOR PROTESTERS, WHO HAVE TAKEN A FLUID APPROACH TO THEIR RALLIES.
THE PHRASE HAS BEEN POPULARISED ON LIHKG AS A WAY TO PROVIDE ENCOURAGEMENT AND UNITE CITIZENS.
INDIAN JOURNALISTS ARE ALL STUPID POTHOLE EXPERTS, RIGHT ?
capt ajit vadakayil
..
POOR AJIT DOVAL AND RAW
ReplyDeleteTHESE ALICES IN WONDERLAND DONT EVEN KNOW THAT URBAN NAXALS/ KASHMIRI SEPARATISTS / SPONSORING DEEP STATE NGOs ARE USING TELEGRAM FOR THEIR DESH DROHI PURPOSES..
TELEGRAM WITH 210 MILLION ACTIVE USERS IS A CLOUD-BASED INSTANT MESSAGING AND VOICE OVER IP SERVICE. TELEGRAM CLIENT APPS ARE AVAILABLE FOR ANDROID, IOS, WINDOWS PHONE, WINDOWS NT, MACOS AND LINUX. USERS CAN SEND MESSAGES AND EXCHANGE PHOTOS, VIDEOS, STICKERS, AUDIO AND FILES OF ANY TYPE.
THE DEEP STATE USES TELEGRAM FOR REGIME CHANGE.. TELEGRAM IS DUBBED AS A "JIHADI MESSAGING APP".
ISIS WHICH WAS FUNDED ARMED AND CONTROLLED BY JEWISH DEEP STATE USED TELEGRAM..
https://en.wikipedia.org/wiki/Blocking_Telegram_in_Russia
LAUNCHED IN 2013, BY A ANTI-PUTIN RUSSIAN JEW , TELEGRAM COMPANY HAS MARKETED THE APP AS A SECURE MESSAGING PLATFORM IN A WORLD WHERE ALL OTHER FORMS OF DIGITAL COMMUNICATION SEEM TRACKABLE.
IT HAS FEATURES SUCH AS END-TO-END ENCRYPTION (WHICH PREVENTS ANYONE EXCEPT THE SENDER AND RECEIVER FROM ACCESSING A MESSAGE), SECRET CHATROOMS, AND SELF-DESTRUCTING MESSAGES.
USERS ON TELEGRAM CAN COMMUNICATE IN CHANNELS, GROUPS, PRIVATE MESSAGES, OR SECRET CHATS. WHILE CHANNELS ARE OPEN TO ANYONE TO JOIN (AND THUS USED BY TERRORIST GROUPS TO DISSEMINATE PROPAGANDA), SECRET CHATS ARE VIRTUALLY IMPOSSIBLE TO CRACK BECAUSE THEY’RE PROTECTED BY A SOPHISTICATED FORM OF ENCRYPTION.
THE COMBINATION OF THESE DIFFERENT FUNCTIONS IN A SINGLE PLATFORM IS WHY GROUPS LIKE ISIS USE TELEGRAM AS A “COMMAND AND CONTROL CENTER”.. THEY CONGREGATE ON TELEGRAM, THEN THEY GO TO DIFFERENT PLATFORMS. THE INFORMATION STARTS IN THE APP, THEN SPREADS TO TWITTER, FACEBOOK.
SECRET CHATS ARE PROTECTED BY END-TO-END ENCRYPTION. HOW THIS WORKS IS THAT EVERY USER IS GIVEN A UNIQUE DIGITAL KEY WHEN THEY SEND OUT A MESSAGE. TO ACCESS THAT MESSAGE, THE RECEIVER HAS TO HAVE A KEY THAT MATCHES THE SENDER’S EXACTLY, SO THAT MESSAGES FROM ANY ONE USER CAN ONLY BE READ BY THE INTENDED RECIPIENT.
THIS MAKES IT ALMOST IMPOSSIBLE FOR MIDDLEMEN SUCH AS POLICE OR INTELLIGENCE AGENCIES TO ACCESS THE FLOW OF INFORMATION BETWEEN THE SENDER AND RECEIVER.
EVEN IF POLICE CAN IDENTIFY WHO IS SPEAKING TO WHOM, AND FROM WHERE, THEY HAVE NO WAY OF KNOWING WHAT THEY’RE SAYING TO EACH OTHER. IN FACT, BECAUSE THE ENCRYPTION HAPPENS DIRECTLY BETWEEN THE TWO USERS, EVEN TELEGRAM ( BALLS , THEY KNOW ) ITSELF HAS NO WAY OF KNOWING WHAT’S IN THESE MESSAGES
BEFORE A USER SENDS A MESSAGE IN A SECRET CHAT, THEY CAN CHOOSE TO SET A SELF-DESTRUCT TIMER ON IT, WHICH MEANS THAT SOME TIME AFTER THE MESSAGE HAS BEEN READ, IT AUTOMATICALLY AND PERMANENTLY DISAPPEARS FROM BOTH DEVICES.
COMPARED WITH OTHER SOCIAL MEDIA PLATFORMS, TELEGRAM HAS EXTREMELY LOW BARRIERS TO ENTRY. ALL USERS HAVE TO DO TO SET UP AN ACCOUNT IS PROVIDE IS A CELLPHONE NUMBER, TO WHICH THE APP THEN SENDS AN ACCESS CODE.
IT’S COMMON PRACTICE FOR TERRORISTS TO SUPPLY ONE CELLPHONE NUMBER TO SET UP THEIR ACCOUNT BUT USE ANOTHER TO ACTUALLY OPERATE THE ACCOUNT.
THE SIM CARD YOU USE TO OPEN YOUR TELEGRAM ACCOUNT AND THE SIM CARD YOU ACTUALLY USE ON THE PHONE WITH THE APPLICATION DON’T HAVE TO THE SAME.
NOT ONLY DOES THIS MAKE IT HARDER FOR LAW ENFORCEMENT OFFICIALS TO TRACK DOWN TERRORISTS THROUGH TELEGRAM, IT ALSO MAKES IT EASIER FOR TERRORISTS TO SET UP A NEW ACCOUNT ONCE THEY DISCOVER THEIR PREVIOUS ONE HAS BEEN EXPOSED TO THE POLICE.
ANOTHER ATTRACTIVE FEATURE OF THE APP IS THAT IT’S REALLY QUITE HARD TO GET BOOTED OFF IT.
TELEGRAM’S MESSAGING SERVICE IS POPULAR BECAUSE IT OFFERS A “SECRET CHAT” FUNCTION ENCRYPTED WITH TELEGRAM’S PROPRIETARY MTPROTO PROTOCOL.
capt ajit vadakayil
..
feature for feature the app seems to be a bbm replacement. bbms privacy features also were exploited by those who were upto no good.
DeleteSir you mean even if the telegram firm wants to read anyone's private chat. They can't !! ??
DeletePratik
DeleteThey can whenever they want..they just claim they can't.
Regards
THERE ARE NO SECRETS ON THE DARK WEB EVEN IF YOU PAY IN BITCOIN..
DeleteDark Web was created by DARPA and US Navy.
Deletehttps://timesofindia.indiatimes.com/world/europe/germany-to-tighten-law-on-anti-semitic-crimes/articleshow/72283241.cms
ReplyDeleteDEEP STATE AGENT, JEWESS ANGELA MERKEL WITH HITLERs EYES AND CHIN, HAS DONE NOTHING TO SAVE PERSECUTED ROMA GYPSIES.
https://timesofindia.indiatimes.com/india/500-indians-alerted-about-government-backed-phishing-google/articleshow/72285551.cms
ReplyDeleteTHE MAIN MOTTO OF PHISHING EMAILS IS: TRICKING USERS TO CLICK EMAILS OR LINKS AND CAUSE MONETARY LOSS TO THEM.
PHISHING ATTACKS ARE MADE BY CYBERCRIMINALS TO GRAB SENSITIVE INFORMATION (I.E. BANKING INFORMATION, CREDIT CARD INFORMATION, STEALING OF CUSTOMER DATA AND PASSWORDS) AND MISUSE THEM.
HACKERS SPREAD THEIR PHISHING NET TO CATCH DIFFERENT TYPES OF PHISH. BE IT A SMALL PHISH OR A BIG WHALE, THEY ARE ALWAYS AT A PROFIT.
PHISHING ATTACKS ARE DONE BY CYBERCRIMINALS, WHO TRICK THE VICTIM, BY CONCEALING THEIR IDENTITY BY MASKING THEMSELVES AS A TRUSTED IDENTITY AND LURING THEM INTO OPENING DECEPTIVE EMAILS FOR STEALING SENSITIVE INFORMATION. THESE ATTACKS ARE SUCCESSFUL BECAUSE OF LACK OF SECURITY KNOWLEDGE, AMONGST THE MASSES. IN SHORT, PHISHING ATTACK IS A DISGUISED ATTACK MADE BY HACKER IN A VERY SOPHISTICATED WAY.
ON THE CONTRARY PHISHING SCAMS ARE THOSE WHEREIN THOUSANDS OF USERS ARE TARGETED AT A TIME BY CYBERCRIMINALS. FOR E.G. FAKE GOOGLE MAIL’S LOGIN PAGE IS CREATED AND EMAILS ARE SENT STATING TO CHECK THEIR ACCOUNTS. HUGE SCAMS LEAD TO HUGE LOSSES. SURVEYS SHOW A PHISHING INCREASE OF 250 PER CENT APPROXIMATELY, AS PER MICROSOFT. CHECK OUT THE DETAILS.
THERE ARE MANY TYPES OF PHISHING ATTACKS AND PHISHING SCAMS CARRIED OUT BY HACKERS. A FEW OF THEM ARE:
EMAIL PHISHING:
MANY BUSINESS OWNERS ARE UNAWARE ABOUT THE INSECURE AND FRAUD LINKS AND EMAILS. FOR E.G. THE VICTIM GETS AN E-MAIL FROM THE HACKER TO CHECK SOME UNKNOWN TRANSACTIONS IN THEIR BUSINESS BANK ACCOUNT, WITH A FAKE LINK ATTACHED TO A SITE WHICH IS ALMOST AS GOOD AS REAL. WITHOUT THINKING FOR A SECOND, THE VICTIM OPENS THE FAKE LINK AND ENTERS THE ACCOUNT DETAILS AND PASSWORDS. THAT’S IT. YOU ARE ATTACKED.
SPEAR PHISHING:
SPEAR PHISHING IS AN EMAIL ATTACK DONE BY A FOE PRETENDING TO BE YOUR FRIEND. TO MAKE THEIR ATTACK SUCCESSFUL, THESE FRAUDSTERS INVEST IN A LOT OF TIME TO GATHER SPECIFIC INFORMATION ABOUT THEIR VICTIMS; I.E. VICTIM’S NAME, POSITION IN COMPANY, HIS CONTACT INFORMATION ETC.
THEY LATER CUSTOMISE THEIR EMAILS, WITH THE GATHERED INFORMATION, THUS TRICKING THE VICTIM TO BELIEVE THAT THE EMAIL IS SENT FROM A TRUSTWORTHY SOURCE.
FAKE URL AND EMAIL LINKS ARE ATTACHED IN THE EMAIL ASKING FOR PRIVATE INFORMATION. SPEAR PHISHING EMAILS ARE TARGETED TOWARDS INDIVIDUALS AS WELL AS COMPANIES TO STEAL SENSITIVE INFORMATION FOR MAKING MILLIONS.
DOMAIN SPOOFING:
HERE THE ATTACKER FORGES THE DOMAIN OF THE COMPANY, TO IMPERSONATE ITS VICTIMS. SINCE THE VICTIM RECEIVES AN EMAIL WITH THE SAME DOMAIN NAME OF THE COMPANY, THEY BELIEVE THAT IT’S FROM TRUSTED SOURCES, AND HENCE ARE VICTIMISED.
BEFORE A FEW YEARS THERE WERE ONLY 2 TYPES OF PHISHING ATTACKS.
EMAIL PHISHING & DOMAIN SPOOFING. EITHER THE EMAIL NAME WAS FORGED, OR THE DOMAIN NAME WAS FORGED TO ATTACK VICTIMS. BUT AS TIME FLIES, CYBERCRIMINALS COME UP WITH VARIOUS TYPES OF ATTACKS WHICH ARE MENTIONED BELOW:
WHALING:
WHALING PHISHING ATTACK OR CEO FRAUD AS THE NAME SUGGESTS ARE TARGETED ON HIGH PROFILE INDIVIDUALS LIKE CEO, CFO, COO OR SENIOR EXECUTIVES OF A COMPANY. THE ATTACK IS ALMOST LIKE SPEAR PHISHING; THE ONLY DIFFERENCE IS THAT THE TARGETS ARE LIKE WHALES IN A SEA AND NOT FISH. HENCE THE NAME “WHALING” IS GIVEN FOR THESE PHISHING ATTACKS.
FRAUDSTERS TAKE MONTHS TO RESEARCH THESE HIGH VIPS, THEIR CONTACTS AND THEIR TRUSTED SOURCES, FOR SENDING FAKE EMAILS TO GET SENSITIVE INFORMATION, AND LATER STEAL IMPORTANT DATA AND CASH THUS HAMPERING THE BUSINESS. SINCE THEY TARGET SENIOR MANAGEMENTS, THE BUSINESS LOSSES CAN BE HUGE WHICH MAKES WHALING ATTACKS MORE DANGEROUS.
VISHING:
VOIP (VOICE) + PHISHING = VISHING.
TILL NOW PHISHING ATTACKS WERE MADE BY SENDING EMAILS. BUT WHEN ATTACKS ARE DONE BY TARGETING MOBILE NUMBERS, IT’S CALLED VISHING OR VOICE PHISHING.
CONTINUED TO 2-
CONTINUED FROM 1--
DeleteIN VISHING ATTACKS, THE FRAUDSTERS CALL ON MOBILE, AND ASK FOR PERSONAL INFORMATION, POSING THEMSELVES AS A TRUST-WORTHY IDENTITY. FOR E.G. THEY MAY PRETEND TO BE A BANK EMPLOYEE, EXTRACT BANK ACCOUNT NUMBERS, ATM NUMBERS OR PASSWORDS, AND ONCE YOU HAVE HANDED THAT INFORMATION, IT’S LIKE GIVING THESE THIEVES, ACCESS TO YOUR ACCOUNTS AND FINANCES.
SMISHING:
SMS + PHISHING = SMISHING.
JUST LIKE VISHING, MODE OF SMISHING ATTACKS IS ALSO RELATED TO MOBILES. HERE THE ATTACKER SENDS A SMS MESSAGE TO THE TARGET PERSON, TO OPEN A LINK OR AN SMS ALERT. ONCE THEY OPEN THE FAKE MESSAGE OR ALERT, THE VIRUS OR MALWARE IS INSTANTLY DOWNLOADED IN THE MOBILE. IN THIS WAY, THE ATTACKER CAN GET ALL THE DESIRED INFORMATION STORED ON YOUR MOBILE, USEFUL FOR STEALING YOUR MONEY.
CLONE PHISHING:
CLONE MEANS DUPLICATE OR IDENTICAL. GIVING JUSTICE TO THE NAME, CLONE PHISHING IS WHEN AN EMAIL IS CLONED BY THE FRAUDSTER, TO CREATE ANOTHER IDENTICAL AND PERFECT EMAIL TO TRAP EMPLOYEES.
SINCE IT’S A PERFECT REPLICA OF THE ORIGINAL ONE, FRAUDSTERS TAKE ADVANTAGE OF ITS LEGITIMATE LOOK AND ARE SUCCESSFUL IN THEIR MALICIOUS INTENTIONS.
SEARCH ENGINE PHISHING:
THIS IS A NEW TYPE OF PHISHING WHEREIN THE FRAUDSTER MAKES WEB SITE COMPRISING OF ATTRACTIVE BUT FAKE PRODUCTS, FAKE SCHEMES OR FAKE OFFERS TO ATTRACT CUSTOMERS. THEY EVEN TIE-UP WITH FRAUDULENT BANKS FOR FAKE INTEREST SCHEMES. THEY GET THEIR WEBSITE INDEXED BY SEARCH ENGINES AND LATER WAIT FOR THEIR PREY.
ONCE A CUSTOMER VISITS THEIR PAGE AND ENTERS THEIR PERSONAL INFORMATION TO PURCHASE PRODUCT, OR FOR ANY OTHER PURPOSE, THEIR INFORMATION GOES IN THE HANDS OF FRAUDSTERS, WHO CAN CAUSE THEM HUGE DAMAGES.
WATERING HOLE PHISHING:
IN THIS TYPE OF PHISHING, THE ATTACKER KEEPS A CLOSE WATCH ON THEIR TARGETS. THEY OBSERVE THE SITES WHICH THEIR TARGETS USUALLY VISIT AND INFECT THOSE SITES WITH MALWARE. IT’S A WAIT AND WATCH SITUATION, WHEREIN THE ATTACKER WAITS FOR THE TARGET TO RE-VISIT THE MALICIOUS SITE. ONCE THE TARGETED PERSON OPENS THE SITE AGAIN, MALWARE IS INFECTED IN THE COMPUTER OF THE PERSON, WHICH GRABS ALL THE REQUIRED PERSONAL DETAILS OR CUSTOMER INFORMATION LEADING TO DATA BREACH.
THOUGH THE CYBERHACKERS WHO TARGET PHISHING ATTACKS ON INDIVIDUALS OR COMPANIES ARE MASTER MINDS, THERE ARE CERTAIN PRECAUTIONARY MEASURES, WHICH CAN PREVENT THEM FROM SUCCEEDING. LET’S HAVE A LOOK.
PRECAUTIONS & PREVENTIONS OF PHISHING ATTACKS:--
RE-CHECK URL BEFORE CLICKING UNKNOWN OR SUSPICIOUS LINKS
DO NOT OPEN SUSPICIOUS EMAILS OR SHORT LINKS
CHANGE PASSWORDS FREQUENTLY
EDUCATE AND TRAIN YOUR EMPLOYEES FOR IDENTIFYING AND CEASING PHISHING ATTACKS
RE-CHECK FOR SECURED SITES; I.E. HTTPS SITES
INSTALL LATEST ANTI-VIRUS SOFTWARE, ANTI-PHISHING SOFTWARE AND ANTI-PHISHING TOOLBARS
DON’T INSTALL ANYTHING FROM UNKNOWN SOURCES
ALWAYS OPT FOR 2-FACTOR AUTHENTICATION
TRUST YOUR INSTINCTS
UPDATE YOUR SYSTEMS WITH LATEST SECURITY MEASURES
INSTALL WEB-FILTERING TOOLS FOR MALICIOUS EMAILS
USE SSL SECURITY FOR ENCRYPTION
REPORT PHISHING ATTACKS AND SCAMS TO APWG (ANTI-PHISHING WORKING GROUP)
AI PROVIDES A LEVEL OF PROTECTION IN THE CYBERSECURITY REALM THAT IS UNFEASIBLE FOR HUMAN OPERATORS.. GOOGLE USES MACHINE LEARNING TO WEED OUT VIOLENT IMAGES, DETECT PHISHING AND MALWARE, AND FILTER COMMENTS. THIS SECURITY AND FILTERING ARE OF AN ORDER OF MAGNITUDE AND THOROUGHNESS THAT NO HUMAN-BASED EFFORT COULD EQUAL.
ONE OF THE MOST NOTORIOUS PIECES OF CONTEMPORARY MALWARE – THE EMOTET TROJAN – IS A PRIME EXAMPLE OF A PROTOTYPE-AI ATTACK. EMOTET’S MAIN DISTRIBUTION MECHANISM IS SPAM-PHISHING, USUALLY VIA INVOICE SCAMS THAT TRICK USERS INTO CLICKING ON MALICIOUS EMAIL ATTACHMENTS.
THE EMOTET AUTHORS HAVE RECENTLY ADDED ANOTHER MODULE TO THEIR TROJAN, WHICH STEALS EMAIL DATA FROM INFECTED VICTIMS. THE INTENTION BEHIND THIS EMAIL EXFILTRATION CAPABILITY WAS PREVIOUSLY UNCLEAR, BUT EMOTET HAS RECENTLY BEEN OBSERVED SENDING OUT CONTEXTUALIZED PHISHING EMAILS AT SCALE.
CONTINUED TO 3-
CONTINUED FROM 2--
DeleteTHIS MEANS IT CAN AUTOMATICALLY INSERT ITSELF INTO PRE-EXISTING EMAIL THREADS, ADVISING THE VICTIM TO CLICK ON A MALICIOUS ATTACHMENT, WHICH THEN APPEARS IN THE FINAL, MALICIOUS EMAIL. THIS INSERTION OF THE MALWARE INTO PRE-EXISTING EMAILS GIVES THE PHISHING EMAIL MORE CONTEXT, THEREBY MAKING IT APPEAR MORE LEGITIMATE.
EMOTET IS A TROJAN THAT IS PRIMARILY SPREAD THROUGH SPAM EMAILS (MALSPAM). THE INFECTION MAY ARRIVE EITHER VIA MALICIOUS SCRIPT, MACRO-ENABLED DOCUMENT FILES, OR MALICIOUS LINK. ... EMOTET IS POLYMORPHIC, WHICH MEANS IT CAN CHANGE ITSELF EVERY TIME IT IS DOWNLOADED TO EVADE SIGNATURE-BASED DETECTION.
ONCE EMOTET HAS INFECTED A HOST, A MALICIOUS FILE THAT IS PART OF THE MALWARE IS ABLE TO INTERCEPT, LOG, AND SAVE OUTGOING NETWORK TRAFFIC VIA A WEB BROWSER LEADING TO SENSITIVE DATA BEING COMPILED TO ACCESS THE VICTIM'S BANK ACCOUNT(S). EMOTET IS A MEMBER OF THE FEODO TROJAN FAMILY OF TROJAN MALWARE.
ONCE ON A COMPUTER, EMOTET DOWNLOADS AND EXECUTES A SPREADER MODULE THAT CONTAINS A PASSWORD LIST THAT IT USES TO ATTEMPT TO BRUTE FORCE ACCESS TO OTHER MACHINES ON THE SAME NETWORK. ... THE EMAILS TYPICALLY CONTAIN A MALICIOUS LINK OR ATTACHMENT WHICH IF LAUNCHED WILL RESULT IN THEM BECOMING INFECTED WITH TROJAN.EMOTET..
A BANKER TROJAN IS A MALICIOUS COMPUTER PROGRAM DESIGNED TO GAIN ACCESS TO CONFIDENTIAL INFORMATION STORED OR PROCESSED THROUGH ONLINE BANKING SYSTEMS. BANKER TROJAN IS A FORM OF TROJAN HORSE AND CAN APPEAR AS A LEGITIMATE PIECE OF SOFTWARE UNTIL IT IS INSTALLED ON AN ELECTRONIC DEVICE.
EVERY DAY, ARTIFICIAL INTELLIGENCE ENABLES WINDOWS DEFENDER AV TO STOP COUNTLESS MALWARE OUTBREAKS IN THEIR TRACKS.
YET THE CRIMINALS BEHIND THE CREATION OF EMOTET COULD EASILY LEVERAGE AI TO SUPERCHARGE THIS ATTACK. ., BY LEVERAGING AN AI’S ABILITY TO LEARN AND REPLICATE NATURAL LANGUAGE BY ANALYSING THE CONTEXT OF THE EMAIL THREAD, THESE PHISHING EMAILS COULD BECOME HIGHLY TAILORED TO INDIVIDUALS.
THIS WOULD MEAN THAT AN AI-POWERED EMOTET TROJAN COULD CREATE AND INSERT ENTIRELY CUSTOMIZED, MORE BELIEVABLE PHISHING EMAILS. CRUCIALLY, IT WOULD BE ABLE TO SEND THESE OUT AT SCALE, WHICH WOULD ALLOW CRIMINALS TO INCREASE THE YIELD OF THEIR OPERATIONS ENORMOUSLY.
SPEAR PHISHING AGAIN---
IN SPEAR PHISHING (TARGETED PHISHING), EMAILS WITH INFECTED ATTACHMENTS OR LINKS ARE SENT TO INDIVIDUALS OR ORGANISATIONS IN ORDER TO ACCESS CONFIDENTIAL INFORMATION. WHEN OPENING THE LINK OR ATTACHMENT, MALWARE IS RELEASED, OR THE RECIPIENT IS LED TO A WEBSITE WITH MALWARE THAT INFECTS THE RECIPIENT'S COMPUTER.
DURING THE 2016 US PRESIDENTIAL CAMPAIGN, FANCY BEAR – A HACKER GROUP AFFILIATED WITH RUSSIAN MILITARY INTELLIGENCE ( SIC ) – USED SPEAR PHISHING TO STEAL EMAILS FROM INDIVIDUALS AND ORGANISATIONS ASSOCIATED WITH THE US DEMOCRATIC PARTY.
THE ONLINE ENTITIES DCLEAKS AND GUCCIFER 2.0 LEAKED THE DATA VIA MEDIA OUTLETS AND WIKILEAKS TO DAMAGE HILLARY CLINTON'S CAMPAIGN. IN JULY 2018, SPECIAL COUNSEL ROBERT MUELLER INDICTED RUSSIAN INTELLIGENCE OFFICERS ALLEGED TO BE BEHIND THE ATTACK ( SIC) . ANOTHER STATE-SPONSORED RUSSIAN HACKER GROUP, COZY BEAR, HAS USED SPEAR PHISHING TO TARGET NORWEGIAN AND DUTCH AUTHORITIES. THIS PROMPTED THE DECISION TO COUNT THE VOTES FOR THE 2017 DUTCH GENERAL ELECTION BY HAND.
AI-BASED SYSTEMS ARE ABLE TO ADAPT TO CONTINUOUSLY CHANGING THREATS AND CAN MORE EASILY HANDLE NEW AND UNSEEN ATTACKS. THE PATTERN AND ANOMALY SYSTEMS CAN ALSO HELP TO IMPROVE OVERALL SECURITY BY CATEGORIZING ATTACKS AND IMPROVING SPAM AND PHISHING DETECTION.
RATHER THAN REQUIRING USERS TO MANUALLY FLAG SUSPICIOUS MESSAGES, THESE SYSTEMS CAN AUTOMATICALLY DETECT MESSAGES THAT DON'T FIT THE USUAL PATTERN AND QUARANTINE THEM FOR FUTURE INSPECTION OR AUTOMATIC DELETION. THESE INTELLIGENT SYSTEMS CAN ALSO AUTONOMOUSLY MONITOR SOFTWARE SYSTEMS AND AUTOMATICALLY APPLY SOFTWARE PATCHES WHEN CERTAIN PATTERNS ARE DISCOVERED.
capt ajit vadakayil
..
whom do we send this message to ? this is a important message as just recently a woman from pune was duped of her Rs 1.5 lakh by a person from an app like google pay. her voice record is going viral on whatsapp. When she complained to police they said that this is happening commonly now. That thief's one online account was traced while the other online account could not be traced. What is this anonymity of online account ?
DeleteAlso my best friends father in navi mumbai was almost kidnapped from a public place. A van stopped in front of him and asked him to get in. His father was shocked and quickly started shouting at them and made a commotion. They tried for a while and then ran away. When he complained to the police they said this is common these days. Is police today just a spectator ? I remember long back when my first wallet got stolen in train in bandra, and i with my presence of mind went to register a complaint the police was tryingto avoid registering my complaint. But then when i insisted he finally took my complaint, saying even my (police wala) things get stolen what can be done.
DeleteWho are these Poonawalla brothers? They show up on news channels and other shows but they have no skill (Suhel Seth type). They seem like R stooges to disrupt the country. I checked their Wikipedia which shows Ismaili sect i.e. Aga Khan. One is married into Vadra family.
ReplyDeleteThey give confusing views and support - Congress/BJP/Hindu/Muslim. They seem like R agents trying to incite Indians.
Received By Ministry/Department
ReplyDeleteHealth & Family Welfare
Grievance Description,
Sir,
Kindly acknowledge the following message regarding WATER SHOULD BE USED IN HOMEOPATHY, BUT NOT ALCOHOL-
THE SECRET OF THEERTHAM IS THAT IT IS H 1.5 O...( NOT H2 O )..
WATER MOLECULE CHANGES PARTNERS A HUNDRED BILLION TIMES A SECOND.
IT IS SCALAR ENERGY SCIENCE .. THIS IS QUANTUM SCIENCE NOT CLASSICAL SCIENCE.. THEERTHAM WATER STRUCTURE IS AFFECTED BY THE EMOTIONS OF PEOPLE.
VEDAS ARE INFALLIBLE..
MOBIUS COIL FLOW IN GANGES WATER ( KASHI GHATS ) EMIT A GIANT SCALAR FIELD.. THE FIELD OF BRAHMAN IS SCALAR..
WATER IS A TINY BENT MOLECULE WITH THE MOLECULAR FORMULA H2O, CONSISTING OF TWO LIGHT HYDROGEN ATOMS ATTACHED TO EACH 16-FOLD HEAVIER OXYGEN ATOM. EACH MOLECULE IS ELECTRICALLY NEUTRAL BUT POLAR, WITH THE CENTER OF POSITIVE AND NEGATIVE CHARGES LOCATED IN DIFFERENT PLACES..
THE REASON WATER HAS A BENT SHAPE IS THAT THE TWO LONE PAIR OF ELECTRONS ARE ON THE SAME SIDE OF THE MOLECULE.
THE TWO HYDROGEN ATOMS AND THE TWO LONE ELECTRON PAIRS ARE AS FAR APART AS POSSIBLE AT NEARLY 108 DEGREES BOND ANGLE. 108 IS THE DIGITAL VALUE OF HINDU KING MANTRA OM..
THE WATER MOLECULE IS BENT MOLECULAR GEOMETRY BECAUSE THE LONE ELECTRON PAIRS, ALTHOUGH STILL EXERTING INFLUENCE ON THE SHAPE, ARE INVISIBLE WHEN LOOKING AT MOLECULAR GEOMETRY.
QUANTUM COMPUTERS WILL TAKE OFF ONLY WHEN SILICON IS REPLACED WITH LIVING GANGES WATER , AND WIRING IS ORGANIC LIKE DNA..
WATER IS A POLAR MOLECULE AND ALSO ACTS AS A POLAR SOLVENT. WHEN A CHEMICAL SPECIES IS SAID TO BE POLAR, THIS MEANS THAT THE POSITIVE AND NEGATIVE ELECTRICAL CHARGES ARE UNEVENLY DISTRIBUTED.
THE POSITIVE CHARGE COMES FROM THE ATOMIC NUCLEUS, WHILE THE ELECTRONS SUPPLY THE NEGATIVE CHARGE. ITS THE MOVEMENT OF ELECTRONS THAT DETERMINES POLARITY.
WATER (H2O) IS POLAR BECAUSE OF THE BENT SHAPE OF THE MOLECULE. THE SHAPE MEANS MOST OF THE NEGATIVE CHARGE FROM THE OXYGEN ON SIDE OF THE MOLECULE AND THE POSITIVE CHARGE OF THE HYDROGEN ATOMS IS ON THE OTHER SIDE OF THE MOLECULE. THIS IS AN EXAMPLE OF POLAR COVALENT CHEMICAL BONDING.
THE ELECTRONEGATIVITY VALUE OF HYDROGEN IS 2.1, WHILE THE ELECTRONEGATIVITY OF OXYGEN IS 3.5. THE SMALLER THE DIFFERENCE BETWEEN ELECTRONEGATIVITY VALUES, THE MORE LIKELY ATOMS WILL FORM A COVALENT BOND. A LARGE DIFFERENCE BETWEEN ELECTRONEGATIVITY VALUES IS SEEN WITH IONIC BONDS
BOTH HYDROGEN ATOMS ARE ATTRACTED TO THE SAME SIDE OF THE OXYGEN ATOM, BUT THEY ARE AS FAR APART FROM EACH OTHER AS THEY CAN BE BECAUSE THE HYDROGEN ATOMS BOTH CARRY A POSITIVE CHARGE. THE BENT CONFORMATION IS A BALANCE BETWEEN ATTRACTION AND REPULSION.
REMEMBER THAT EVEN THOUGH THE COVALENT BOND BETWEEN EACH HYDROGEN AND OXYGEN IN WATER IS POLAR, A WATER MOLECULE IS AN ELECTRICALLY NEUTRAL MOLECULE OVERALL. EACH WATER MOLECULE HAS 10 PROTONS AND 10 ELECTRONS, FOR A NET CHARGE OF 0.
WATER ACTS AS A POLAR SOLVENT BECAUSE IT CAN BE ATTRACTED TO EITHER THE POSITIVE OR NEGATIVE ELECTRICAL CHARGE ON A SOLUTE. THE SLIGHT NEGATIVE CHARGE NEAR THE OXYGEN ATOM ATTRACTS NEARBY HYDROGEN ATOMS FROM WATER OR POSITIVE-CHARGED REGIONS OF OTHER MOLECULES.
I HAVE CHEMICAL TANK CLEANING SECRETS WHICH WILL BE REVEALED ONLY WHEN MY REVELATIONS REACH 98 PERCENT.
http://ajitvadakayil.blogspot.com/2010/11/water-valley-and-walking-on-water-capt.html
HOMEOPATHY ALL OVER THE WORLD HAS BEEN HIJACKED BY JEW ROTHSCHILD.. IN INDIA THEY USE ALCOHOL .. SORRY, THE PROPERTY OF WATER HOLDING MEMORY IS THE BASE OF HOMEOPATHY.
WATER CAN RETAIN A MEMORY OF SOLUTE PARTICLES AFTER ARBITRARILY LARGE DILUTION. .. EVEN WHEN THEY ARE DILUTED TO THE POINT THAT NO MOLECULE OF THE ORIGINAL SUBSTANCE REMAINS.
CAPT AJIT VADAKAYIL DEMANDS OF INDIAS HEALTH MINISTER.. USE WATER IN HOMEOPATHY-NEVER ALCOHOL..
http://ajitvadakayil.blogspot.com/2011/01/living-water-capt-ajit-vadakayil.html
Capt ajit vadakayil
..
Current Status
Case closed
Date of Action
27/11/2019
Reason
Complaint details inadequate or not legible
95% OF BABUS IN ALL OUR MINISTRIES DESERVE TO BE SACKED
DeleteTHEY ARE LED BY A NAPUNSAK PM NAMED NARENDRA DAMODARDAS MODI-- WHOSE SOLE AIM IS TO GET A NOBEL PRIZE .. HIS JEWISH MASTERS ARE HAPPY WITH HIM..
GUJJU NO 2 IS STILL SINGING THE PRAISES OF DESH DROHIS VERGHESE KURIEN AND MS SWAMINATHAN..
HE IS STILL BOASTING ABOUT HIS NEEM COATED UREA TO ILLITERATE VILLAGERS .. LIKE A RETARDED CHILD..
HE IS STILL PRAISING AMUL/ GUJARAT MILK MARKETING FEDERATION WHO DOES NOT HAVE ONE SINGLE HUMPED COW..
I AM KEEPING A TRACK OF HOW MANY TIMES GUJJU NO 2 HAS UTTERED THE NAME OF GANDHI SINCE HE SAT OF THE PMs CHAIR..
Captain,
ReplyDeleteFirst I have sent this message to AYUSH ministry.They closed the case citing that "it does not belong to this ministry ".I wonder then why does that ministry exist(AYUSH-H FOR HOMEOPATHY).Then this health ministry finally closed it as saying "inadequate or not legible".It seems that the health ministry takes suggestions only from "BILL AND MELINDA GATES FOUNDATION"
https://www.thehindu.com/news/national/undertrials-who-complete-50-of-proposed-sentence-must-be-released-says-union-law-minister/article30109658.ece
ReplyDeletePAAGAL KUTTA KAATA HAI LAGTA HAI USKO..
DeleteFOR SIX YEARS KAYASTHA PRASAD HAS DONE NOTHING.. THE POST BELOW HAS BEEN SENT TO HIM MORE THAN 25 DOZEN TIMES..
http://ajitvadakayil.blogspot.com/2014/09/undertrial-prisoners-in-indian-remand.html
MODI HAS GIVEN PADMA VIBHUSHAN TO THEDA FACE --INDIAs NO 1 CROOK.. IN RETURN HE GOT KICKED ON HIS HEAD TWO DAYS AGO..
Modi does favors to undeserving candidates expecting boot licks. Most of the times it works and some times it wont,as in the case of theda face.
Delete"IN HER WILDEST DARK WET DREAMS SHE JUST NEEDS THE VIRILE CAVEMAN WITH SILVER HAIR.."
ReplyDeleteThis Just Made By Day, I Had A Good Laugh..
But This Is The Reality.
Thanks And Regards
INDIAN MEN WHO DYE THEIR HAIR MUST KNOW THIS
DeleteCLASSY GIRLS DONT LIKE THIS..
Point Noted Guruji _/\_
DeleteGradually I am getting sick over dating and such other games that people play and enjoy, have dated few damsel in distresses in need of help being an emotional fool in the past, but it turned out later that it was me who's in distress when they left!! Such ungratefulness!!
DeleteSo much time and energy and emotions wasted..
MANs GREATEST BLESSING IS TO HAVE A WOMAN WHO IS WITH HIM THROUGH STORMS AND SHINE -- TILL DEATH DO WE PART..
DeleteMANs WORST CURSE IS TO HAVE NALAYAK CHILDREN, WHOM HE IS ASHAMED OF..
Thank You Guruji...You Are So Right!!
DeleteVery few deserving men (one is you) get this blessing.
Nalayak children (one is me) does bring a lot of trouble to their parents.
Regards
MAN DOES NOT LIKE TO LOSE
DeleteTHE ONLY TIME HE FEELS HAPPY WHEN HE LOSES , IS WHEN HIS OWN SON DEFEATS HIM
I KNOW HOW I FELT WHEN MY ELDER SON DEFEATED ME IN TENNIS..
Both of your son are true gems any parent would love to have.
DeleteYou are in true sense a complete man with a lovely family..
_/\_
Respected Sir,
ReplyDeletePardon me for this query but can one light a lamp for Lord Rahu during rahukaalam.kindly reply.
Thank you
HEY, YOU FORGOT KETU ..
Delete😛😇😇😁😁😁
Deletehttps://www.bloomberg.com/news/articles/2019-11-26/trump-says-u-s-will-designate-mexican-cartels-as-terror-groups
ReplyDeleteDear Capt Ajit sir,
ReplyDeleteToday, inspite of Pragya Thakur giving her apology, the opposition was simmering to make this global ruckus and said 'Godse down down...' due to tattus - Rajnat and Modiji not supporting her, inspite she saying that Rahul calling her a terrorist and she suffered bcos of fake cases by UPA regima is unpardonable and asked Rahul to apologise. Rahul came later into the hall, our tattu speaker Om Birla did not ask him to respond to Giriraj Singh who raised the question on speaker to defend all MP's and raise privilege motion on Rahul if he doesn't apologize to Pragya.
It's high time, we put an end to Gandhi saga and remove his face from our currency and from the face of the world...to make India #1 otherwise we will still be under the clutches of Rothschild deep state in India/Abroad.
https://www.ndtv.com/india-news/if-she-sets-foot-congress-mla-govardhan-dangi-warns-pragya-thakur-amid-nathuram-godse-row-2140580
ReplyDeleteDear Capt Ajit sir,
ReplyDeleteSalman Khan's Dabang 3 is in trouble, for showing Sadus/sants in the song, not liked by Hindus,,, https://www.dnaindia.com/bollywood/report-bollywood-s-only-aim-is-to-malign-hindus-twitter-trends-boycottdabangg3-due-to-salman-khan-s-hud-hud-song-2803711?fbclid=IwAR3-IXtgvS2lW-SRYXcUgDKdzGlH_4SpzXThop-pkmApvqHC5wRSG_A8R_g
https://timesofindia.indiatimes.com/videos/city/kolkata/west-bengal-4-bjp-offices-captured-by-tmc-workers-after-win-in-by-polls/videoshow/72287163.cms
ReplyDeletehttps://timesofindia.indiatimes.com/india/i-stand-by-my-statement-terming-pragya-thakur-terrorist-rahul-gandhi/articleshow/72291495.cms
ReplyDeleteDEEP STATE CONTROLLED COLLEGIUM NCW IS HIGHLY SELECTIVE...
PRAGYA THAKUR HAS TOLD THE TRUTH WHICH 90% INDIANS WILL SAY..
I DARE MODI TO HAVE A NATIONWIDE REFERENDUM
####################################
BETWEEN GANDHI AND GODSE , WHO IS THE PATRIOT AND WHO IS THE TRAITOR
#########################################
ABOLISH DESH DROHI NCW ORGANISATION..
http://ajitvadakayil.blogspot.com/2018/01/dubious-role-of-bilderberg-club-created.html
ALL OVER AFRICA GANDHI STATUES HAVE BEEN VANDALISED BY PEOPLE..
JEWISH DEEP STATE BUILDS STATUES OF ROTHSCHILD AGENTS GANDHI AND MARTIN LUTHER KING JR ALL OVER THE WORLD..
PEOPLE HAVE REJECTED GANDHI AND KING..
MIND CONTROL PROGRAM MK ULTRA HAS THE INITIALS OF GANDHI AND KING..
http://ajitvadakayil.blogspot.com/2018/07/martin-luther-king-jr-had-125-white.html
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
WE THE PEOPLE ARE KEEPING A COUNT OF HOW MANY TIMES GUJJU NO 2 MODI HAS UTTERED THE NAME OF GUJJU NO 1 KATHIWARI JEW GANDHI IN THE PAST 6 YEARS..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePRAGYA THAKUR
RAHUL GANDHI
NCW
MAIN
NCW STATES
REKHA SHARMA
SWATI MALLIWAL
ALL MPs OF INDIA
ALL MLAs OF INDIA
PRESIDENT OF SOUTH AFRICA
AMBASSADOR TO FROM SOUTH AFRICA
TRUMP
AMBASSADOR TO FROM USA
PUTIN
AMBASSADOR TO FROM RUSSIA
PMO
PM MODI
UN GEN SECRETARY
RSS
RAM MADHAV
MOHAN BHAGAWAT
AVBP
VHP
SWAMY
RAJIV MALHOTRA
NCERT
EDUCATION MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DEFENCE MINISTER - MINISTRY
ALL THREE ARMED FORCE CHIEFS.
RAJEEV CHANDRASHEKHAR
MOHANDAS PAI
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SADGURU JAGGI VASUDEV
SRI SRI RAVISHANKAR
BABA RAMDEV
AMISH TRIPATHI
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
PIYUSH GOEL
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
CLOSET COMMIE ARNAB GOSWMI
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
HISTORY TV CHANNEL
DAVID HATCHER CHILDRESS
GIORGIO A TSOUKALOS
WENDY DONIGER
SHELDON POLLOCK
AUDREY TRUSCHKE
ENTIRE BBC GANG
MATA AMRITANANDAMAYI
MOHANLAL
SURESH GOPI
EVERY HINDU ORGANISTAION
E SREEDHARAN
DULQUER SALMAN
PGURUS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
TIME TO REJECT GANDHI ONCE AND FOR ALL.. ENOUGH IS ENOUGH.. ALL MUST PARTICIPATE.. AS PRAGYA THAKUR FOR AN ACK..
DeleteCaptain, message sent to sadhvi pragya at sadhvipragyabjp@gmail.com, have asked for an acknowledgement
DeleteCaptain, have also sent the message to rahul gandhi via office@rahulgandhi.in, shashi tharoor via office@tharoor.in,
Deleteshashi.tharoor@nic.in, amitabh kant via amitabh.kant@nic.in and rajiv malhotra via RajivMalhotra2007@gmail.com. I have asked for an ack
Sent Emails to many IDs,have asked Sadhvi Pragya for acknowledgement.
DeleteYour Registration Number is : PMOPG/E/2019/0682900
DeleteSent message to pragya thakur and to the following mail ids-
Deletecontact@amitshah.co.in
office@rahulgandhi.in
jpnadda@gmail.com
38ashokroad@gmail.com- rajnath singh
ombirlakota@gmail.com
Sent emails to more than 1500 ids..
DeletePresident of South Africa - asked for ack.
presidentrsa@presidency.gov.za,
khusela@presidency.gov.za
Sir, received reply from President of South Africa.
DeleteWe acknowledge with thanks, receipt of your correspondence addressed to the President of the Republic of South Africa, His Excellency, President Cyril Ramaphosa
Going forward, the Presidential Hotline (Email: President@presidency.gov.za) will respond to all Service Delivery related issues. The contact number for the Presidential Hotline is 17737.
All other matters referred to PresidentRSA@presidency.gov.za will receive the required attention and a response will be communicated soonest.
Thank you
Michael Louw
Director: Support Services
Private Office of the President
Tel: +27 12 300 5332
WHEN I WROTE THAT JEWS CONDUCTED THE RUSSIAN REVOLUTION AND KILLED THE CAZR AND HIS FAMILY
DeleteNOBODY BELIEVED ME ..BECAUSE I WAS THE FIRST TO SAY THAT AMRX/ LENIN/ STALIN/ TROTSKY WERE ALL JEWS AND AGENTS OF JEW ROTHSCHILD..
THEN PUTIN DECLARED THAT 85% OF BOLSHEVIK REVOLUTIONISTS WERE JEWS--WITH REST MARRIED TO JEWESSES..
http://ajitvadakayil.blogspot.com/2013/07/exhuming-dirty-secrets-of-holodomor.html
BUT EVEN PUTIN DID NOT KNOW THAT LEO TOLSTOY WAS A GERMAN JEW AND AN AGENT OF GERMAN JEW ROTHCHILD..
http://ajitvadakayil.blogspot.com/2019/08/german-jew-leo-tolstoy-who-fanned-dying.html
GOOD JOB HEGDE
Delete##########
REAL JOKE
HOW DID SIR LODGE MISS HIS FLIGHT FROM MUMABI AIRPORT TO LONDON ?
WELL, LODGE WAS SITTING IN THE VVIP LOUNGE SIPPING WINE .. IN THE VVIP LOUNGE A OFFICER COMES AND ANNOUNCES BY NAME
SO A GHAATI OFFICER CAME AND ANNOUNCED " WILL MISTER LODAGAY PLEASE REPORT FOR CHECKING IN"
SIR LODGE MISSED HIS FLIGHT !
Good job Sriram!! Love The Joke
DeleteGetting the appreciation of Captain!!!
DeleteWow
That's a tonne of happiness and blessings
I appreciate @Shriram Hegde
Our Ajit Sir is so generous and large hearted
Hmmm...Thank You
Sir and Debdoot bhai, Thanks. Love your jokes.
DeleteGreat work shriram.
DeleteJai shri ram !!
Thanks Dharmapada and Pratik.
Deletehttps://timesofindia.indiatimes.com/life-style/food-news/beer-brewed-from-sewage-water-is-the-latest-fad-in-sweden/photostory/72260471.cms
ReplyDeleteTHE BEST BEER IS CHINESE TSINGTAO
I HAVE SEEN THE ORIGINS CLEAR WATER SOURCE OF THIS BEER UP A MOUNTAIN.
I HAVE DRUNK ALMOST ALL BEER BRANDS IN MY 40 YEARS AT SEA
AMERICAN BEER IS THE WORST..
https://www.youtube.com/watch?v=mxS71rcT4BA
https://en.wikipedia.org/wiki/Tsingtao_Brewery
T THIS
S SHIT
I IS
N NO
G GOOD
T TRY
A ANOTHER
O ONE
NOTHING COULD BE FURTHER FROM THE TRUTH
http://ajitvadakayil.blogspot.com/2013/03/beer-moderate-drinking-for-good-health.html
https://www.scmp.com/news/world/middle-east/article/2120805/trumps-opium-war-us-begins-bombing-taliban-drug-labs-new
ReplyDeleteIT IS A FOUL LIE THAT TALIBAN GROWS OPIUM..
US TROOPS SAFEGUARD OPIUM FIELDS OPERATED BY JEWS..
DURING THE VIETNAM WAR THE BODIES & CASKETS OF DEAD SOLDIERS OFTEN CONTAINED HEROIN BEING SMUGGLED INTO THE UNITED STATES ON MILITARY AIRCRAFT. PLASTIC-WRAPPED DRUGS WERE SHIPPED INTO THE USA IN THE BOTTOM OF CASKETS, IN BODY BAGS, AND EVEN IN BODY CAVITIES
AFTER 17 YEARS AND 1.1 TRILLION USD SPENT, THERE IS NO END TO THE FIGHTING – BUT AMERICAN INTERVENTION HAS RESULTED IN AFGHANISTAN BECOMING THE WORLD’S FIRST TRUE NARCO-STATE..
US TROOPS GUARDED THE POPPY FIELDS ! US PRESIDENTS WERE INVOLVED IN DRUG TRAFFICKING ON THE BEHEST OF THE JEWISH DEEP STATE
OPIUM PRODUCTION IN AFGHANISTAN, PROVIDES MORE THAN 92 % PERCENT OF THE WORLD’S HEROIN . PAKISTANI BCCI BANK LAUNDERED THE MONEY..
JEWISH EVIL PHARMA SELLS “LEGAL DRUGS” – THEY MASS PRODUCE AND SELL ‘OPIOIDS’ SUCH AS OXYCONTIN AND PERCOCET WHICH IS SIMILAR TO HEROIN.
PERCOCET IS A COMBINATION OF OXYCODONE AND ACETAMINOPHEN. OXYCODONE AND PERCOCET ARE BOTH CLASSIFIED AS NARCOTIC ANALGESICS
ISIS AND KASHMIRI SEPARATISTS CRUSH AND SNORT OXYCONTIN, OR BY DISSOLVING THE TABLETS IN WATER AND INJECTING THE SOLUTION.
OXYCODONE IS MADE BY MODIFYING THEBAINE, AN ORGANIC CHEMICAL FOUND IN OPIUM. DESIGNATED AS AN OPIOID, OR SEMI-SYNTHETIC OPIATE, OXYCODONE SHARES A GENERAL CLASSIFICATION WITH HEROIN, HYDROCODONE, AND OXYMORPHONE.
AJIT DOVAL-- STOP YOUR PENCHANT TO GIVE EGO MASSAGE TO MOSI.. DO YOUR JOB.. DONT GET AN ORGASM WHEM MODI MAKES YOU SIT NEXT TO HIM , WHEN HE MEETS FOREIGN LEADERS.. IS THAT IN YOUR JOB DESCRIPTION ?
WE WATCH..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
Your Registration Number is : PMOPG/E/2019/0682889
DeleteCaptain,
DeleteI watched an afghanistan documentary long back. The roads were laid in circular shape with diameter covered 3/4th of the country area. No vehicle from the outer area can enter the inner area. This big road in circular shape was contructed in the name of development and infrastrucure. Talibans were armed and this encouraged them to fight. So US army can be deployed in the country in the name of fight. While US govt lost a trillion, the US elites made billions of fortune. The ISI must be hand in glove because ISI often infiltrated and attacked brotherhood afganistan. The US turned blind eye to kashmir terrorism because this is what ISI expected from the US elites inturn of their covert operation in afghanistan.
Regards,
Muthu Swamynathan
Sir, sent to -
Delete17akbarroad@gmail.com
webmaster.indianarmy@nic.in,
proiaf.dprmod@nic.in,
pronavy.dprmod@nic.in,
contact@amitshah.co.in,
narendramodi1234 ,
info.nia@gov.in,
information@cbi.gov.in,
mos-defence@gov.in
Tweet:
Deletehttps://twitter.com/AghastHere/status/1200634261604311040?s=20
Handles:
@PMOIndia @narendramodi @NIA_India @dir_ed @SpokespersonMoD @indiannavy @IAF_MCC @AmitShah @HMOIndia @rajnathsingh @DefenceMinIndia
Hello Captain Ajit Vadakayil,
ReplyDeleteSirji please guide.
If the boy and the girl both belong to same Nadi Madhya.Is this good or inauspicious combination? Can they go ahead for marriage if all other 28 Guna Milan is done?
never marry with nadi dosha...like NEVER.
Deletehttps://twitter.com/AnaMyID/status/1198966798084800512
ReplyDeleteTHIS SLUT ANAMIKA IS THE BITCH OF JACK DORSEY TO GIVE PIN PRICKS TO SANATANA DHARMA..
https://timesofindia.indiatimes.com/business/india-business/q2-gdp-growth-dips-further-to-4-5-from-six-year-low-of-5-in-june-quarter/articleshow/72294355.cms
ReplyDeleteWE DONT CARE FOR DEEP STATE DATA
INDIA IS GROWING TODAY AT 10.1%
WE ALREADY HAVE A 5 TRILLION ECONOMY
INDIA IS THE NO 3 ECONOMY ON THE PLANET TODAY..
READ QUESTIONS TO QUORA 680 TO 820.
https://ajitvadakayil.blogspot.com/2019/06/archived-questions-to-quora-from-capt.html
WE DONT WANT SUBRAMANIAN SWAMY TO SAVE INDIAN ECONOMY
HE IS THE FELLOW WHO MADE PM CHANDRASHEKAR SELL INDIAN GOLD TO ROTHSCHILD..
HE WORE A MOSSAD SPONSORED SIKH TURBAN IN 1976
HE WANTED MODI TO BUY SINKING JEWISH COMPANY DASSAULT WHICH PRODUCES SUBSTANDARD RAFALE JETS..
HE WANTED MENSTRUATING WOMEN TO ENTER SABARIMALA.
HE WANTED INDIAN TROOPS IN AFGHANISTAN SO THAT USA CAN WITHDRAW THEIR TROOPS..
WHAT DOES NATO BUDGET DO?
40% OF THE BUDGET IS SPENT IN LAVISH LIFESTYLE AND PARTIES..
NATO IS ROTHSCHILDs PRIVATE ARMY..
India is indeed growing fast.
DeleteThe gap between the haves and have not is growing equally faster.
Lets say india has 100 cr people. In may be roughly broken down as...
50 cr - poor
40 cr - lower middle class
8 cr - upper middle class
2 cr - elites and upper class
Most of the readers will easily belong in the top 5 % of the population ( having cars + good houses + multiple foreign travel + indulgence in luxuries like expensive mobiles,watches,clothes and hotels etc.
I wonder how many readers will identify themselves as lower middle class and below.
Will there be a single indian reader who belongs to the lower 40% of the population.
90 % of the readers belong to the top 10% of the population ( jobs in corporates, businessmen , govt officers etc or their family members)
Thats is why Captain complains that most readers come for free time pass, as these 10% are living in a comfort zone and have no hurry for a larger change.
Infact these 10% peoples economics is closely and directly bound with the white man. Either drawing salary from white man or doing direct work for white ( eg 95 % of software people write codes for white corporations).
The bottom 40% has no direct dealing with whites. They dont draw salaries from corporation or directly work for them.
The key to change lies with the lower middle class, who are the link between the haves and have nots.
I don't think there are many lower middle class readers .
The top 10 % can not make India a super power without earning the trust and respect of the other 90 % .
France, england ,america and china all have had a sucessful revolution before being what they are now.
What about india? What is the path towards superpowerdum?
Foreign countries will not be able to compete with india, as even this 10% is equalent to the total population of most countries of the world by numbers.
If i am not wrong all of the jaichands and traitors of india so far belong to these upper 10% of the population.
What will be the role of the bottom 40 % of the population in the march towarda superpowerdum?
Will india become a superpower before, or after, the gap between haves and not is minimised?
Of course the lower middle class will play the major role in the transition. Without them India may spiral towards a China type cultural revolution.
There is no connect and no trust between the the top 10% and the bottom 40% of india's population.
The average height and weight of the poor of india is constantly falling, while the top 10% are facing overweight issues.
There are countries within countries in India.
Countries outside of india can not throw a serious challange to india in its future path.
DeleteIndia to become $5 trillion economy by 2024: Amit Shah
https://timesofindia.indiatimes.com/india/india-to-become-5-trillion-economy-by-2024-amit-shah/articleshow/72311784.cms
Captain,
ReplyDeleteUddhav Thackeray has announced that there won't be any metro carshed in Aarey
India is lagging bcoz of this useless crump born in india
This comment has been removed by the author.
Deletehttps://www.youtube.com/watch?v=Kh3RHV5G1Fc
ReplyDeleteWHEN EL CHAPO BROKE OUT OF PRISON VIA A TUNNEL, 11.6 KM LONG , 33 FEET UNDER THE GROUND...
THE MEXICAN PRESIDENT KNEW IT
DURING THE LAST WEEK, NONE OF THE PRISONERS COULD SLEEP BECAUSE OF THE DRILLING SOUND..
ONE THE DAY OF THE PRISON BREAK -- ALL PRISONERS WERE HOLLERING " EL CHAPO IS BREAKING OUT OF PRISON".. NOBODY LIKED HIM..
EVERY GUARD KNEW IT.
DEA KNEW IT
CIA KNEW IT
HERE IS A PRISON BREAK OF A DIFFERENT TYPE-- WHERE PRISONERS AID THE ESCAPE
https://www.youtube.com/watch?v=AI1Uz6opNtc
What has happened in Hong kong will be studied refined and applied globally. Chilling scenarios. Hope GOI also learns from this.
ReplyDelete“MONEY LAUNDERING” COVERS ALL KINDS OF METHODS USED TO CHANGE THE IDENTITY OF ILLEGALLY OBTAINED MONEY (I.E. CRIME PROCEEDS) SO THAT IT APPEARS TO HAVE ORIGINATED FROM A LEGITIMATE SOURCE.
DeleteTHE TECHNIQUES FOR LAUNDERING FUNDS VARY CONSIDERABLY AND ARE OFTEN HIGHLY INTRICATE.
IN HONG KONG, CRIME PROCEEDS ARE GENERATED FROM VARIOUS ILLEGAL ACTIVITIES. THEY CAN BE DERIVED FROM DRUG TRAFFICKING, SMUGGLING, ILLEGAL GAMBLING, BOOKMAKING, BLACKMAIL, EXTORTION, LOAN SHARKING, TAX EVASION, CONTROLLING PROSTITUTION, CORRUPTION, ROBBERY, THEFT, FRAUD, COPYRIGHT INFRINGEMENT, INSIDER DEALING AND MARKET MANIPULATION.
WHEN CRIME PROCEEDS ARE LAUNDERED, CRIMINALS WOULD THEN BE ABLE TO USE THE MONEY WITHOUT BEING LINKED EASILY TO THE CRIMINAL ACTIVITIES FROM WHICH THE MONEY WAS ORIGINATED.
THE MONEY LAUNDERING MAFIA IN HONGKONG IS JEWISH CONTROLLED BY THE DEEP STATE..
HONG KONG IS A MAJOR PIPELINE THROUGH WHICH INTERNATIONAL FRAUDSTERS, GLOBAL DRUG-TRAFFICKING CARTELS, PEOPLE-SMUGGLING GANGS AND ONLINE RACKETEERS FUNNEL THEIR ILL-GOTTEN GAINS.
ONLINE FRAUD, INVESTMENT FRAUD, DRUGS, LOAN-SHARKING, BOOKMAKING, ILLEGAL GAMBLING, TAX EVASION AND CORRUPTION WERE ALL CRIMES ASSOCIATED WITH THE MONEY-LAUNDERING CASES IN HONGKONG
HSBC WAS FOUNDED BY JEW ROTHSCHILD TO LAUNDER OPIUM DRUG MONEY
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
IN A LANDMARK CASE, THE HSBC BANK AGREED TO PAY A US$1.9 BILLION IN FINES IN 2012, AFTER ADMITTING IT KNOWINGLY MOVED HUNDREDS OF MILLIONS FOR MEXICAN DRUG CARTELS AND ILLEGALLY SERVED CLIENTS IN IRAN, MYANMAR, LIBYA, SUDAN AND CUBA IN VIOLATION OF US SANCTIONS.
UNDER THE TERMS OF THE SETTLEMENT, FEDERAL PROSECUTORS AGREED TO DROP ALL CHARGES AFTER FIVE YEARS IF THE BANK PAID THE FINE, TOOK REMEDIAL ACTION AND AVOIDED COMMITTING NEW VIOLATIONS.
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
HE DEEP STATE ENSURED THAT AUTHORITIES FAILED TO PROSECUTE ANY SBC SENIOR EXECUTIVES AND ALLOWED THE BANK ITSELF TO WALK AWAY WITH NO CRIMINAL RECORD.
MOST OF THE PARSI JUDGES AND LAWYERS IN INDIA ARE DESCENDANTS OF DRUG RUNNERS IN THE PAYROLL OF SASSOON AND ROTHSCHILD.
THOUSANDS OF FILIPINO DOMESTIC WORKERS IN HONG KONG DUPED INTO PAYING FOR BOGUS JOBS IN CANADA AND BRITAIN HAVE BEEN FRAUD VICTIMS AS WELL AS UNWITTING CONTRIBUTORS TO A MONEY-LAUNDERING SCHEME THAT AUTHORITIES HAVE IGNORED
PEOPLE LINKED TO A JEWISH MAID AGENCY UNDER SCRUTINY USED INTERNATIONAL BANKS LOCALLY TO REPEATEDLY TRANSFER MILLIONS OF HONG KONG DOLLARS IN SMALL SUMS TO BURKINA FASO, MALAYSIA, NIGERIA AND TURKEY.
INSTEAD OF DOING HIS JOB, AJIT DOVAL IS SITTING NEXT TO MODI IN ALL HIS FOREIGN JAUNTS.. AND BOTH ARE BABES IN THE WOODS WHEN IT COMES TO WORLD INTRIGUE..
HSBC plans to move from paper-based records to blockchain to track $20 bn worth of assets
Deletehttps://www.firstpost.com/tech/news-analysis/hsbc-plans-to-move-from-paper-based-records-to-blockchain-to-track-20-bn-worth-of-assets-7715711.html
I HAVE SOURCES WITHIN HSBC IN THEIR FRAUD CONTROL DEPT , ABROAD..
DeleteBALLS TO ROTHSCHILD FOUNDED BANK HSBC..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
THEY ARE ADOPTING BLOCKCHAIN TO HIDE THEIR PAST CRIMES AND COVER THEIR TRACKS..
I WILL PUT A SEPARATE POST ON HSBC WHICH IS WORSE THAN BCCI..
HSBC, EUROPE'S BIGGEST BANK, PAID A $1.9 BILLION FINE IN 2012 TO AVOID PROSECUTION FOR ALLOWING AT LEAST $881 MILLION IN PROCEEDS FROM THE SALE OF ILLEGAL DRUGS. IN ADDITION TO FACILITATING MONEY LAUNDERING BY DRUG CARTELS, EVIDENCE WAS FOUND OF HSBC MOVING MONEY FOR SAUDI BANKS TIED TO TERRORIST GROUPS
https://en.wikipedia.org/wiki/Dirty_Money_(2018_TV_series)
This comment has been removed by the author.
ReplyDeleteIT IS REAL
DeleteYOU ARE NOT ALLOWED TO TAKE VIDEOS
Dear sir,
DeleteI have not took it sir.... I have found it in youtube normal page... If it is not permissible to share I will delete it...
Dear Capt Ajit sir,
ReplyDeleteCong created Shiv sena...Modi is on Demo-Kursi surplus...Jairam Ramesh on live tv in India Today on the Rajdeep Sardesai's book 'How Modi won Indis' discussin at 9 pm today. !!
http://ajitvadakayil.blogspot.com/2016/01/deck-cadets-training-record-book-on.html
ReplyDeleteAT SEA CREW WHO SAILED UNDER THE COMMAND OF VADAKAYIL, VOUCHED IT IS A GOOD THING TO TAKE SHIT FROM HIM..
THE MORE SHIT YOU TAKE-- THE MORE YOU BENEFIT..
Your shit is like a manure, to a nurturing seedling like soul it provides nourishment......
DeleteDear Capt Ajit sir,
ReplyDeleteArnab broke one more news now....another woman - 35 yr old charred to death in Hyd...so 2 cases there and one more law student death in Jharkand similarly seems to be clearly planned targetted to make Inda a Rape capital...we need to phish out our own jaichands quickly :-)
Police arrested four culprits who are involved in the murder of Doctor Priyanka Reddy. As per the reports, the main suspect, Mohammed Pasha, a lorry driver belongs to Narayanpet in Mahabubnagar, a cleaner and other two persons were arrested.
ReplyDeleteThe mother of Mohammed Pasha responded and told that she is unaware of what her son has done. She added that he works as a lorry driver and told that he came to home at 12 midnight. Later the police came at 3'o clock.
1/n
ReplyDeleteAjit Sir,
Totally been caught up with trolls on Twitter.
I could not come here.
Had to cut size them.
Right Wings are as dangerous as Leftist if Right Wings patronize a selfish fellow through whom they prove their credibility as Desh Bhakts.
Modi Bhakts are hounding those who blame Modi for the ones faced by Sadhvi Pragya ji.
RSS too shouldn't be targeted.
That RSS fellow Ratan Sharda has footprints everywhere, needs to get fired out of RSS.
Horrible RW.
Thank God, your Blog taught us the conviction to look though.
Sadhvi Pragya has only handful of supportive individuals in BJP.
She has been true to her faith. She didn't give up & risked out her political career.
Sadhvi Pragya ji is the future along with Yogi ji.
Giriraj ji supported Sadhvi ji.
Bitch Shobhaa De could tweet blatantly without hiccups against Sadhvi ji but RW are so selective.
When I supported Sadhvi ji blaming Modi, many RW trolled that Modi is good bcoz he didn't revoke BJP ticket on her.
Are these people by any means be called RW?
2/n
ReplyDeleteBJP has become a Menace.
Who summons a Sanyasin to Parliament and allows assaults to be shot on her and to add more irritation to the matter the Sanyasin is asked to give clarification!
This is not done.
Sadhvi ji has her own principles, why should a sanyasin bend?
Her Dharma was compromised.
I felt really bad for her.
So many big handles who always sing Bharat Bharat Bharat remained mute.
It was clear that they were chanting Modi Modi Modi in the tune of Bharat.
BJP needs to be taught a befitting lesson.
Horrible parliamentary sessions are going on
Ajit Sir, plz kindly reserve your support for BJP.
Plz don't do now.
I beg you not to support BJP.
They have gone beyond the limit.
Hindu Godmen & Saffron Politicians are selectively targeted.
No noise of any Nun-Rapist or Mullah raping young boys.
Modi is now Sickular with more focus on #SabkaViswas Scheme for Mullahs only.
I feel this Pragya Thakur episode has been scripted and directed by higher echelons of BJP to divert steam off some other serious issues ...
ReplyDeleteAlso if that person can get away with a half hearted apology in SC, so should Thakur.
Captain,
ReplyDeletewhy does Pakistani intelligence agency ISI has a goat in its logo? it is peculiar for a south Asian country who go for ferocious animals like lion and tigers.
https://en.wikipedia.org/wiki/Odhavaji_Raghavji_Patel
ReplyDeleteIN 2012, OR PATEL PASSED AWAY --UNSUNG
THIS BLOGSITE IS GRATEFUL TO THIS GUJARATI...
I HAVE AN AJANTA CLOCK BEHIND MY COMPUTER.. I WOULD SAY THIS DIRT CHEAP DIGITAL CLOCK IS THIS PLANETs BEST CLOCK..
https://www.youtube.com/watch?v=XjZ-biM5cGU
THE CLOCK ABOVE NEVER GOES OUT OF SYNC-- AND IS ACCURATE .. THE TEMPE READING IS CORRECT , AS I COMPARE IT WITH A PROPER THERMOMETER ..
THIS CLOCK IN ITS NEXT EDITION MUST HAVE RELATIVE HUMIDITY IN PERCENTAGE..
ReplyDeletehttps://en.wikipedia.org/wiki/Odhavaji_Raghavji_Patel
IN 2012, OR PATEL PASSED AWAY --UNSUNG
THIS BLOGSITE IS GRATEFUL TO THIS GUJARATI...
I HAVE AN AJANTA CLOCK BEHIND MY COMPUTER.. I WOULD SAY THIS DIRT CHEAP DIGITAL CLOCK IS THIS PLANETs BEST CLOCK..
https://www.youtube.com/watch?v=XjZ-biM5cGU
THE CLOCK ABOVE NEVER GOES OUT OF SYNC-- AND IS ACCURATE .. THE TEMPE READING IS CORRECT , AS I COMPARE IT WITH A PROPER THERMOMETER ..
THIS CLOCK IN ITS NEXT EDITION MUST HAVE RELATIVE HUMIDITY IN PERCENTAGE..
CHECK OUT THE ELECTRIC SCOOTER.
https://www.youtube.com/watch?v=BEH-D59NrQ8
OREVA PROVIDES EBIKES TO THE DEALER WITHOUT BATTERY..
THE DEALER PUTS CHEAP AND USELESS CHINESE BATTERIES. PEOPLE MUST KNOW THIS.. THIS MUST NOT BE A DIRTY SECRET .. A HIDDEN EXPENSIVE COST AFTER 18 MONTHS..
Added a Twitter Moment in his loving memory with a link to this post, Capt.
Deletehttps://twitter.com/AghastHere/status/1200628541223833601?s=20
Guruji,
ReplyDeleteWe have formed a fundraiser for Sabarimala and for supporting brave warrior brothers fighting with their lives. We formed a group (not like Gaurav sharmas) but through well known chain of friends and readers combined and came out with this. But without your blogsite,your sacrifice it wouldn't have been possible.
We dedicate this to lord Ayyappa and of course our mentor (ours truly).
This is our tiny bit to save our sacred grove and last bastion of Sanatan dharma.
gf.me/u/wyyh7k
This is the link of the fundraiser.
We need your blessing and auspices towards this cause.
Your crew....
ALL SABARIMALA PILGRIMS WHO WERE UNFAIRLY THROWN INTO JAIL , AND WHO LOST THEIR JOBS MUST BE FINANCIALLY SUPPORTED BY HINDU ORGS..
DeleteCOMMIE GOONS WERE DRESSED IN POLICE UNIFORM..
Guruji,
DeleteIam very dismayed with Karnataka,telangana and tamil nadu, AP GOVTS(well now we have Jagan at helm) have not even made a comment or spoken about it. As for hindu organizations, we know what RSS and VHP did (securing vote bank for modi).... They have been reduced to this. We have been discussing about supporting and have sent mails to rss and VHP etc but to no avail. Your readers have more power than any of these tattus and greedy fellows.
Captain sir,
DeletePranam.
Donated $101 for Sabrimala and also has shared link on twitter.
ARE YOU STILL WORKING IN CAHOOTS WITH TRAITORS GAURAV CHARMA AND KALYAN KRISHNAN?
DeleteNo Captain sir. Just this blog site. I am not in touch with anyone else.
DeleteGANDHI HAD 4 BULLET HOLES ON HIS CHEST.. IT WAS PROVED THAT GODSE SHOT ONLY 3 BULLETS.
ReplyDeletehttps://twitter.com/republic/status/1200451147376414720
###############
Capt. Ajit Vadakayil October 7, 2017 at 4:01 PM
GANDHI DID NOT UTTER "HEY RAM" WHEN HE WAS SHOT
GANDHI WAS KILLED BY A 4TH BULLET
NATHURAM GODSE WAS A CHIPAVAN JEW WHO WORE GIRLs DRESS WHEN HE WAS YOUNG
DEAD MEN TELL NO TALES --GANDHI HAD TOO MANY SECRETS --AND HE WAS GETTING BITTER LIKE OUR OLD FASTING GOAT ANNA HAZARE WHO WAS SIDELINED
SIDE KICK KACHRAWAAL RAN AWAY WITH THE PRIZE
ROTHSCHILD DID NOT GIVE GANDHI THE NOBEL PEACE PRIZE.
Raghu Nayak, the gardener at the Birla House in New Delhi, was the first to chase Godse and overpower him. President Rajendra Prasad awarded Nayak Rs 500.. In 2016 , the Odisha government handed over a cheque of Rs 5 lakhs to his 85 yer old widow Mandodari Nayak
According to George Fetherling, Godse did not try to flee, "stood silently waiting to be arrested but was not approached at first because he was still armed; at last a member of the Indian air force grabbed him by the wrist, and Godse released his weapon". Fetherling, then "quickly surrounded Godse to prevent the crowd from lynching him"
ROTHSCHILD AGENT HERBERT TOM REINER ( VICE CONSUL US EMBASSY ) TOLD A LIE WHEN HE SAID HE HEARD 3 BULLETS , HE WAS 5 FEET AWAY FROM GODSE AND NABBED HIM PHYSICALLY..
NEHRU MADE SURE THERE WAS NO POST MORTEM OF GANDHIs BODY--THOUGH THE LAW REQUIRED IT
Mahatma Gandhi was assassinated on 30 January 1948 in the compound of Birla House-- Gandhi died at 5:40pm, about half an hour after he was shot.
ALMOST ALL HEARD 4 SHOTS
Vincent Sheean who witnesses the event wrote that he heard "four, dull, dark explosions"
Godse and Apte were sentenced to death on 8 November 1949. They were hanged in the Ambala jail on 15 November 1949
During the assassination trial, the Nehru government did not call American Marine Herbert "Tom" Reiner who caught Godse-- though the law required this.
According to the Almanac of World Crime, at the hanging Apte's neck broke and he died instantly. but, "Godse died slowly by the rope," instead of having his neck snap, he choked "to death for fifteen minutes."
BR Ambedkar remarked after a momentary silence and regret, "My real enemy is gone; thank goodness the eclipse is over now"
THIS BLOGSITE DOES NOT CARE FOR ROTHSCHILDs AGENT --KATHIAWARI JAIN CRYPTO JEW GANDHI
GODSE SWORE THAT HE FIRED ONLY THREE SHOTS. HE DID NOT ATTEMPT TO RUN.. RATHER HE RAISED HIS HAND HOLDING THE GUN AND HIMSELF SHOUTED FOR THE POLICE TO ARREST HIM
According to George Fetherling, Godse did not try to flee, "stood silently waiting to be arrested but was not approached at first because he was still armed; at last a member of the Indian air force grabbed him by the wrist, and Godse released his weapon".
According to Matt Doeden and others, "Godse did not flee the scene, and he voluntarily surrendered himself to the police"
http://ajitvadakayil.blogspot.in/2017/01/mahatma-gandhi-and-his-endless.html
http://ajitvadakayil.blogspot.in/2011/02/diabolical-ministering-angel-mother.html
http://ajitvadakayil.blogspot.in/2012/09/mahatma-gandhi-re-writing-indian.html
GANDHI , NEHRU OR PATEL DID NOT GIVE INDIA INDEPENDENCE
http://ajitvadakayil.blogspot.in/2013/02/the-indian-navy-mutiny-of-1946-only-war.html
NEHRU AND PATEL WERE FREEMASONS
http://ajitvadakayil.blogspot.in/2015/10/the-only-dalit-freemason-of-india-capt.html
capt ajit vadakayil
..
TOP MILITARY BOSSES AND NATIONAL SECURITY ADVISORS CANNOT BE BRAIN DEAD ANY MORE.. MOST OF THEM CANNOT ABSORB NEW DIGITAL TECHNOLOGY..
ReplyDeleteTHE GREASE AND TACKLE AGE OF GEN PATTON / FIELD MARSHALL MANEKSHAW TYPE BLUSTER AND SWAGGER IS NOW OVER..
WARS MUST BE WON BEFORE THEY ARE FOUGHT..
AJIT DOVAL CANNOT REST ON HIS PAST LAURELS SECURED BY BEING A DEEP ASSET INSIDE PAKISTAN..
WE DONT GET IMPRESSED BY THE FACT THAT HE SITS BESIDES MODI, WHEN HE HAS HIS ENDLESS FOREIGN JAUNTS..
AJIT DOVAL HAS FAILED TO ADVISE MODI THAT HE MUST HEED MORE THAN 300 CRITICAL SUGGESTIONS SENT BY BLOGGER CAPT AJIT VADAKAYIL, AFTER DROPPING HIS FAALTHU HUMONGOUS EGO.
DONT MAKE ME SAY ANYTHING MORE ..
PAKISTAN IS MERRILY HACKING ISRO/ DRDO AND KUDANKULAM NUCLEAR PLANT.
https://ajitvadakayil.blogspot.com/2019/11/what-artificial-intelligence-cannot-do_88.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
ISRO CHIEF
DRDO CHIEF
PRESIDENT OF INDIA
VP OF INDIA
Sent to -
Deletewebmaster.indianarmy@nic.in,
proiaf.dprmod@nic.in,
pronavy.dprmod@nic.in,
contact@amitshah.co.in,
narendramodi1234 ,
info.nia@gov.in,
information@cbi.gov.in,
mos-defence@gov.in,
isropr@isro.gov.in,
jsoffice@isro.gov.in,
director@ceptam.drdo.in
Your Registration Number is : PMOPG/E/2019/0686543
DeleteYour Registration Number is : PMOPG/E/2019/0687394
Deletehttps://swarajyamag.com/insta/pawar-power-play-bjp-ncp-alliance-negotiations-failed-over-demand-for-agri-ministry-for-supriya-sule-fadnavis-removal
ReplyDeleteThere is a document from e bhumi website of Maharashtra doing rounds stating that Amit and Ritesh sons of Vilasrao Deshmukh have taken a loan of over 4.75 crores from a co-op bank in Latur.
ReplyDeleteThis is a list of farmers .
Co operative banks have had a bad name riddled with scams and npas.
https://timesofindia.indiatimes.com/india/kashmiri-students-cant-pay-fees-hit-with-fines/articleshow/72301600.cms
ReplyDeleteHAS ANY OF THESE ISLAMIC KASHMIRI STUDENTS CONDEMNED THE ETHNIC CLEANSING OF KASHMIRI PANDITS -- WHICH WAS DONE IN CAHOOTS WITH BENAMI MEDIA AND ILLEGAL COLLEGIUM JUDICIARY?'
Captain,
ReplyDeleteCan't trump spray biological toxins on the opium fields as covert operation in mexico and south america? This will make the growing opium fields non usable for decades.
Regards,
Muthu Swamynathan.
Stumbled across a temple in Virpur Gujarat of Saint Jalaram that feeds it's devotees with prasad of khichdi and doesn't accept donations in cash or kind saying they have enough funds to feed people for 400 years!
ReplyDeletehttps://timesofindia.indiatimes.com/city/kochi/kerala-nun-rape-case-court-extends-bail-of-bishop-franco-mulakkal/articleshow/72304364.cms
ReplyDeleteTHIS RAPIST BASTARD KEEPS GETTING BAIL..
VATICAN IS INVOLVED ..
WHAT IS OUR JUDICIARY WORTH?
Captain, the Ayodhya-verdict is a most deceitful way of suppressing Hindus in the modern-era. I explain below.
Delete----------------------
Example 1:--- Sonu has Rs.10,000 in his pocket. Monu steals it from his pocket and claims that the money is now his. Sonu argues and forcibly snatches it back. Monu complains to police-&-court saying that the money rightfully belongs to him since he snatched it & hence it was his ("finders-keepers" & "might-is-right" logic). The court says that Sonu must be magnanimous and either forget the money or share it 50:50 with Monu. However, Sonu refuses and files for appeal. Finally, the court says that must return the money to Sonu. BUT, to appease an aggrieved Monu, the court says that Monu must be given DOUBLE the money as compensation (Rs.20,000). This compensation is to be given by the Government. Can this case be an example of Natural-Justice ?
----------------------
Example 2:--- Sonu has a 1-acre plot of land on which he built a shop. Monu grabs the land using force and demolishes the walls-&-shop. Now, Monu constructs a new-shop on the grabbed-land. Sonu files a case against Monu. The court, after decades of delays, finally rules in favour of Sonu allowing the demolition of illegal-structure & reconstruction of Sonu's walls-&-shop. BUT to appease an aggrieved Monu, the court says that Monu must be given DOUBLE the land (2-acres) in a different-location. This land must be given by the Government. Can this case be an example of Natural-Justice ?
----------------------
These examples show that the system has rewarded the aggressor & (indirectly) punished the victim. Just think, now in all future cases, Hindus will think a hundred-times before claiming any more ancient-temples because they are now straight-jacketed into having ONLY two choices :---
1) Reclaim 1-temple, but end up (indirectly) creating 2-mosques/church/synagogue/etc. since "aggrieved" party must be compensated (that too double!). This will be an indirect boost in the facilities-&-wealth of the abrahamic-faiths.
2) Do-not reclaim any temple and silently watch it be used as a mosque/church/synagogue/etc. so that you don't end up creating DOUBLE the facilities-&-sites for the abrahamic-faiths in the quest to reclaim 1-site.
A classic case of "Damned-if-you-do, Damned-if-you-don't".
----------------------
Also in Ayodhya-case, why is the party which lost the case being given compensation in the first-place, that too 5-acres when the disputed-site was only 2.77-acres ? And if so, then shouldn't the appeasement-compensation be EQUAL to the size of disputed-land (i.e 2.77 acres of seperate-site) ? Since in India, the judiciary usually refers to past-rulings in unrelated-cases (Stare-Decisis), does this now mean that every thief, land-grabber, etc. who is told to return the stolen/occupied-property will now be compensated double/nearly-double the property by the Government using the Ayodhya-verdict as a reference ?
DeleteAll this shows that the Anti-Hindu agenda is in full-swing since 1947. Islamic-Invaders started OVERT suppression of Hindus (genocide, theft, demolitions, etc.). European-Christian-&-Jewish-Invaders started COVERT suppression of Hindus (poison-injections, inferiority-complex, forced-labour, etc.). But now we have OVERT-&-COVERT suppression of Hindus since 1947 where we are punished-&-fooled at same time!
----------------------
This "Ek-ka-Do" (One-for-Two) formula has been going on for a long time to suppress Hindus and India. Some examples below:---
1) To create ONE India we had to allow the creation of TWO Pakistans (West & East, Bangladesh is rebranded East-Pak like how MNCs rebrand)
2) To allow ONE Flag for across India we had to allow TWO Flags for Jammu-&-Kashmir (Official-State-Flag & India-Flag), Nagaland and Karnataka (unoffical-State-Flags & India-Flag).
3) To allow ONE Constitution for India we had to allow TWO Constitutions in J&K
3) To allow ONE Community (Hindus) to live in peace we had to allow TWO civil-codes (one especially for Muslims, while one for everyone else)
4) To allow ONE Nation to function peacefully, we had to allow TWO sets of land-rules (one for "protected-regions" where only locals can buy land, and one for other regions where anybody can buy land even those from the "protected-regions")
5) To reclaim ONE Ancient-Temple site we have to give a site that is nearly TWICE the size to the "aggrieved-minority" (Ayodhya-case)
Hi..Here's what the judgement says:
Delete*The Supreme Court said that the 2003 Archaeology Survey of India's (ASI) report can't be dismissed as conjecture or just a guess work and junked the theory of pre-existence of an Idgah at the disputed site. "Babri mosque wasn't constructed on a vacant land. An underlying structure did exist," it said.
*The SC held that the Allahabad High Court was wrong to divide the land between the three main parties -- Ram Lalla Virajman, Nirmohi Akhara and the S ..
Read more at:
//economictimes.indiatimes.com/articleshow/71979080.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
Captain, in the 2019-documentary "Prince Charles: Inside the Duchy of Cornwall (Episode-1)", it is shown that in the Duchy of Cornwall (a Royal-real-estate management-firm of Prince-Charles), Lord-Jacob-Rothschild is a member of the Board-of-Directors of the Duchy called "Prince's-Council" who regularly meet with the Prince ! He is shown at 35:18 along with some other "experts". The documentary states that these directors are --- "hand-picked by the Duke many of whom are old friends, from the worlds of agriculture, finance & law AND that nearly all of them give their time for free !"
ReplyDeleteUnfortunately, the original episode was deleted from YouTube due to copyright-claim. But, I found it on the internet-archive "Wayback-Machine". The video-player in Wayback-Machine does NOT allow fast-forwarding or rewinding. So one is forced to sit through entire video. But to avoid this, I downloaded the video (by right-click on webpage and clicking on "Inspect" to find source-video and download it). Now I have hosted it in my Google-Drive where you can watch it with fast-forward and rewinding and even download it. It is 204-MB file for download.
My Google-Drive link to the video (watch or download):--
https://drive.google.com/file/d/15HfplVo_Vm0srsTpdSqmlWc7h_k3r6VC/view?usp=sharing
Wayback-Machine archive of original youtube-page (NO fast-forward or rewind options available):--
https://tinyurl.com/yx3vg29o
Wayback-Machine video only (NO fast-forward or rewind options available, Download available):--
https://tinyurl.com/rnnssg5
SOMEBODY ASKED ME
ReplyDeleteWHAT IS THIS "NATIONAL PRAYER BREAKFAST " HELD IN WASHINGTON DC USA EVERY YEAR ?
IT IS A DEEP STATE EVENT..
JEW PRESIDENT EISENHOWER WAS THE FIRST TO ATTEND IT.
AFTER THAT EVERY US PRESIDENT HAS ATTENDED IT.. IF YOU DONT ATTEND THE JEWISH DEEP STATE WILL ELIMINATE YOU..
https://en.wikipedia.org/wiki/National_Prayer_Breakfast
I MAY WRITE A FULL POST ABOUT THIS.. ABOUT BASTARD JEW DOUGLAS COE, THE C STREET GANG, THE FRATERNITY OF FELLOWSHIP ( THE CHOSEN PEOPLE ),
PRAYER IS TO JEW JESUS WHO NEVER EXISTED..
http://ajitvadakayil.blogspot.com/2019/09/istanbul-deep-seat-of-jewish-deep-state.html
THE JEWISH DEEP STATE MERGED GOD AND POWER SINCE THE DAYS OF JEW BENJAMIN FRANKLIN..
http://ajitvadakayil.blogspot.com/2012/11/snuff-movies-freemason-benjamin.html
JEWISH EXCEPTIONALISM IS ROOTED IN THE TRUTH THAT MIDGET KING DAVID, WAS A PEEPING TOM WHEN KERALA NAMBOODIRI WOMAN BATH SHEBA TOOK A NAKED BATH .. HER HUSBAND URAIH WAS BASTARD DAVIDs BEST FRIEND AND ARMY COMMANDER WHO MADE HIM KING..
BASTARD MIDGET DAVID GOT URAIH MURDERED AND USURPED HIS WIFE BATHSHEBA..
SEE IF YOU ARE THE CHOSEN ONE YOU CAN DO ANYTHING..
THE FELLOWSHIP FRATERNITY IS ALL ABOUT "CHOSEN PEOPLE"
https://en.wikipedia.org/wiki/Douglas_Coe
FELLOWSHIP IS A CRYPTO JEW ORGANISATION.. CONTROLLED BY THE DEEP STATE..
https://en.wikipedia.org/wiki/The_Fellowship_(Christian_organization)
ALL IN GOOD TIME..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
TRUMP
PUTIN
AMBASSADORS TOO FROM RUSSIA/ USA
EXTERNAL AFFAIRS MINISTER/ MINISTRY
ALICE AJIT DOVAL
RAW
PMO
ALICE PM MODI
Your Registration Number is : PMOPG/E/2019/0686509
DeleteSent DM to Indian ambassador to USA -- https://www.facebook.com/harsh.shringla
DeleteIndian embassy Russia-
amb.moscow@mea.gov.in,
amboffice.moscow@mea.gov.in,
dcm.moscow@mea.gov.in,
Russian ambassador to India-
rusembindia@mid.ru
narendramodi1234 ,
info.nia@gov.in,
webmaster.indianarmy@nic.in,
information@cbi.gov.in,
Rajnath Singh <38ashokroad@gmail.com>,
pseam@mea.gov.in
https://www.indiatoday.in/india/story/congress-created-shiv-sena-to-counter-trade-unions-in-1960s-jairam-ramesh-1623812-2019-11-29
ReplyDeleteOne of the most successful double agent spy after 1947 is Bala Saheb Thackarey. He had close ties with Pawar family right from 1960s. Many reports suggest that Sena was funded and was protected by Congress party. That is the reason why Bal Thackaray was not arrested at anytime for any provocative statements even though the Congress was ruling both center and state for many years. The family ties are cemented by marriage and blood relations. BJP leaders knew about this.
The famous Marathi Author Madhu Mangesh Karnik once remarked in one of his works about the difference in Hindutva of the RSS and the Shiv Sena, post Babri episode. For RSS, Hindutva is its skin, firmly integrated with its body, while in case of Shiv Sena it was more of a shawl, ready to be discarded or changed to green or red color when necessary. It is like a snake shedding skin when necessary for survival.
But today, Maharashtra is controlled by the Thackarey Pawar families. At present, congress has nothing to gain here except keeping BJP away from power. The Maharashtra unit of Congress party should distance from the Delhi High Command. In 1996, the congress men under Chidambaram and moopanar formed Tamil Manila Congress to protest against the support given an unpopular alliance
Fastags made compulsory at toll plazas or else pay twice the toll
ReplyDeletehttps://www.huffingtonpost.in/entry/subramanian-swamy-nirmala-sitharaman-economy-finance-minister-gdp_in_5de103d9e4b0913e6f7d276b?ncid=other_twitter_cooo9wqtham&utm_campaign=share_twitter
ReplyDeleteWHO SAYS SUBRAMANIAN SWAMY IS A GENIUS ?
ONLY MOSSAD AND JEWISH DEEP STATE SAYS SO..
CAPT AJIT VADAKAYIL SAYS SUBRAMANIAN SWAM IS JUST A GLIB TALKER, WHO DOES NOT KNOW REAL ECONOMICS.. HE KNOWS ONLY ROTHSCHILD ECONOMICS.. HE IS NOT EVEN A PATRIOT..
######################################
Swamy, however, said, “Do you know what the real growth rate today is? They are saying that it is coming down to 4.8%. I’m saying it is 1.5%.”
################################################
WHAT DOES CAPT AJIT VADAKAYIL SAY ?
INDIA IS GROWING TODAY AT 10.1 %
INDIA IS ALREADY A 5 TRILLION ECONOMY..
INDIA IS THIS PLANETs NO 3 ECONOMY EVERY WHICH WAY..
###############################
ALL PROFESSORS OF ELITE INDIAN BUSINESS SCHOOLS AND COLLEGES MUST READ THE FOLLOWING QUESTIONS POSED TO QUORA BY CAPT AJIT VADAKAYIL..
READ QUESTIONS 680 TO 820 CHALLENGING THE FOUNDATIONS OF MODERN ECONOMICS..
https://ajitvadakayil.blogspot.com/2019/06/archived-questions-to-quora-from-capt.html
###########################################
SWAMY IS THE FELLOW WHO GOT PM CHANDRASHEKAR TO SELL 47 TONNES PRISTINE GOLD TO ROTHSCHILD WHEN THERE WAS NO NEED TO..
SWAMY IS THE FELLOW WHO WORE A MOSSAD SPONSORED SIKH TURBAN FANCY DRESS IN 1976..
SWAMY IS THE FELLOW WHO WANTS MODI TO BUY SINKING JEWISH DASSAULT, WHO MAKES USELESS RAFALE JET FIGHTERS..
DEMONETIZATION IS THE REASON WHY MODI/ JAITLEY WAS ABLE TO BREAK THE SPINE OF NAXALS.. HUNDREDS OF SINTEX WATER TANKS BURIED UNDER THE GROUND FILLED WITH REDUNDANT 1000 RUPEE CURRENCY NOTES HAD TO BE SET ON FIRE ..
SWAMY IS UNFIT TO BE A FINANCE MINISTER ... HE HAS TOO MANY PERSONAL AXES TO GRIND , WHICH AFFECTS HIS LEVEL HEADEDNESS..
capt ajit vadakayil
..
ALL READERS -- SEND THIS CRITICAL COMMENT TO--
DeleteNIRMALA SITARAMAN
FINANCE MINISTER/ MINISTRY
ALL STATE FINANCE MINISTERS
RBI
RBI GOVERNOR
PMO
PM MODI
SWAMY
RAJIV MALHOTRA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
RAJEEV CHANDRA SHEKHAR
MOHANDAS PAI
DILIP SHANGHVI
GAUTAM ADANI
ADI GODREJ
GITA GOPINATH
MANMOHAN SINGH
MONTEK SINGH AHLUWALIA
CHIDAMBARAM
RAGHURAN RAJAN
ARVIND SUBRAMANIAN
ALL MPs OF INDIA
ALL MLAs OF INDIA
RSS
RAM MADHAV
MOHAN BHAGAWAT
AVBP
VHP
NCERT
EDUCATION MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DEFENCE MINISTER - MINISTRY
ALL THREE ARMED FORCE CHIEFS.
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SADGURU JAGGI VASUDEV
SRI SRI RAVISHANKAR
BABA RAMDEV
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
CLOSET COMMIE ARNAB GOSWMI
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
ALL BUSINESS SCHOOL DEANS
ALL ELITE ECONOMIC COLLEGE DEANS
PGURUS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
https://twitter.com/DrGPradhan/status/1200679675988627457
DeleteHALWAI DOCTOR CONMAN LOVES SWAMY SAAARRR
INDIA MUST GO FOR BTT NOW..
DeleteWHY HAS A HUGE PARASITE INCOME TAX DEPT SUCKING THE LIFE BLOOD OF BHARATMATA
WHY LET THE FRUITS OF DEMONETIZATION ROT ?
http://ajitvadakayil.blogspot.com/2014/11/abolish-income-tax-in-india-have.html
Your Registration Number is : PMOPG/E/2019/0686251
DeleteJust note his conflicting views on the subject of BJP Sena alliance. Dr. Swamy initially batted for Shiv Sena and later back pedalled.
DeleteSee the news on October 29 and later on November 23
No One Should Doubt Aaditya Thackeray’s Ability: BJP’s Swamy Bats For Sena’s Claim - https://www.youtube.com/watch?v=U46IrnsjiEY
Dr. Subramanian Swamy Slams Shiv Sena Amid New Govt Formation In Maha, Here's His Message - https://www.republicworld.com/india-news/politics/swamyretaliation-to-protect-mainstream-hindutva-was-to-split-spitters.html
Sent DM to - https://www.facebook.com/nirmala.sitharaman/
DeleteSent emails to Finance ministry -
governor@rbi.org.in
jsinv-dea@nic.in,
wim-dfs@nic.in,
jsrev@nic.in,
Nirmala Sitharaman ,
mosfinance@nic.in,
appointment.fm@gov.in,
secyexp@nic.in,
pramod.das@gov.in,
mathewag@nic.in,
contact@amitshah.co.in,
narendramodi1234
info@iimb.ac.in,
dean@xlri.ac.in,
dean@fms.edu,
dc@iimk.ac.in,
dean-ca@mdi.ac.in,
deangp@imi.edu
registrar@spav.ac.in
director@spav.ac.in
nitapadmin@nitap.ac.in
directornitap@gmail.com
director@iitg.ernet.in
director@nits.ac.in
admin@aiimspatna.org
director@iitp.ac.in
dean@aiimsraipur.edu.in
director@nitrr.ac.in
director@aiims.edu
director@admin.iitd.ac.in
secretary@nitdelhi.ac.in
registrar@spa.ac.in
skjain@iitgn.ac.in
director@svnit.ac.in
registrar@nitkkr.ac.in
diroffice@iitmandi.ac.in
director@nith.ac.in
director@nitsri.net
director@nitjsr.ac.in
director@iisertvm.ac.in
director@nitc.ac.in
director@sctimst.ac.in
director@aiimsbhopal.edu.in
director@iiitm.ac.in
director@iiserb.ac.in
director@iiti.ac.in
nsr@manit.ac.in
director@spabhopal.ac.in
sanjeev@iiserpune.ac.in
director@iitb.ac.in
director@aiimsbhubaneshwar.edu.in
dr_acd@vnit.ac.in
director@iitbbs.ac.in
director@jipmer.edu.in
ad-ugacad@nitpy.ac.in
registrar@nitpy.ac.in
director@iitrpr.ac.in
director@niper.ac.in
director@aiimsjodhpur.edu.in
office_academics@iitj.ac.in
director@mnit.ac.in
manager@dbhpscentral.org
director@nitsikkim.ac.in
director@acsir.res.in
director@iiitdm.ac.in and many others.
https://twitter.com/shree1082002/status/1200849541999648770
DeleteNamaste Capt Ajitji,
DeletePosted twitter video on Your Swamy message.
https://twitter.com/Mohit_b_Handa/status/1201096039282819073
Will spread it further.
https://www.reddit.com/r/IndiaSpeaks/comments/e2gxp6/how_many_of_you_have_seen_articles_of_ajit/
ReplyDeletedear readers, please reply on what you think about captain in above link..
https://www.reddit.com/r/IndiaSpeaks/comments/e2gxp6/how_many_of_you_have_seen_articles_of_ajit/
Deletebelow is the comments pasted at the above link
My only question is why do we need to know about the false history and also what is wrong in knowing about our Ancient "True History". I think we as Indians need to be ashamed of reading false history written by so called Anti nationalists. According me Capt Ajit Vadakayil {guruji} has explored the whole planet extensively and also has done a lot of research. One needs guts to show the path of Truth. Can anybody explain in depth the subjects he has covered so far in his blog with a readership in billions? It is high time that we Indians must be proud of our ancient history also about our Sanathana Dharma which was carried by generations. What is the necessity of converting our Hindu brothers and sisters to Christians and Islam when we have studied in our History books the harm both the religions have done to our ancestors. One can witness the false attacks taking place in the world and especially targeting and butchering Our Bharathmata at all corners. If you are really a Kshatriya change your perceptions and fight for justice that will be fruitful to our country. I think only a mad person with drained brain believes in false history rather than true history.
Thanks...have posted my comments...for guiding people to save time/effort and read Capt Ajit Vadakayil blogposts to lead life the way it should be...for the benefit of all.
DeleteDear Capt Ajit sir,
ReplyDeleteThis is one of the best renderings of Amit Shah on the Indian economy...how India has laid a strong foundation stone and detoxified Indian economy during 2014-19 which will fructify even more from 2019-2024 :-) https://www.facebook.com/amitshahofficial/videos/997424607272176/ - must watch
Captain,
ReplyDeleteHow is OM BIRLA work as an speaker in loksabha assembly
Have u seen his work as a speaker
Dear Readers,
ReplyDeleteAjit Sir has been putting these macho pics of him on Blog.
Now I have been checking Sir's older blogs and there are pics of Ajit Sir at Colossus of Rome.
Seems a teenager.
Then there are pics of Ajit Sir's elder son when he was a kid enjoying with younger brother.
Very adorable pic.
So, can Ajit Sir add some of his pics, how he grew up with age, curious to see.
Ajit Sir can you make a blog about this plzzz
To Readers,
For me Ajit Sir is like Bhagwaan Narasimha who roars & the entire globe shivers.
Also like Bhagwaan Parashuram, running the axe like anything.
Those eyes, I see and I get scared.
Ajit Sir, what you feel about yourself?
To which avatar of Bhagwaan Narayana you associate yourself?
Plz do reply
I AM JUST AN OLD SEA DOG
Deletehttp://ajitvadakayil.blogspot.com/2010/11/old-sea-dog-capt-ajit-vadakayil.html
Introduction is very intriguing.
DeleteBut those eyes, it will always intimidate to both camps - Your Lovers and Your critics
Those who know you, I wonder how many times they would be thinking; whether they should approach you or to hold back.
Here on comments section, fuse उड़ जाती है कुछ भी लिखने के लिए
बार बार सोचना पड़ता है कि किस तरीक़े से लिखेंगे, आप नाराज़ हो गए तो
MY WORLD STOPS for me when I open Capt Ajitji's blog.
DeleteIn this age of constant fight with life issues where meaning is being lost and materialism is increasing, opening Capt's blog is like that intense goosebump feeling.
I guess this feeling is fractionally similar to what Arjun would have felt when TIME stopped on Krishna's GITA discourse in the middle of battlefield who was mentally and physically down like we are most times.
SOMEBODY CALLED ME UP AND SAID-
ReplyDeleteCAPTAIN PLEASE WRITE A POST ON THE "NATIONAL PRAYER BREAKFAST " MEET HELD IN USA EVERY YEAR.. ONLY YOU HAVE THE CEREBRAL WHEREWITHAL TO WRITE ABOUT IT..
INDEED
WE HAD EVELYN SHARMA ATTENDING IN 2017.. SHE IS A BOLLYWOOD BIMBETTE WITH A GERMAN PASSPORT, A GERMAN JEW MOTHER AND A PNJAAABI PUTTAR FATHER..
IN WHAT WAY THIS BIMBETTE REPRESENTS INDIA IS A MATTER OF DEBATE..
LET ME SHOW A VIDEO WHERE SHE IS JIVING TO HONEY SINGH IN BIKINI..
https://www.youtube.com/watch?v=MXJCnccDLA0
WHO IS HONEY SINGH?
HE IS THE DARLING OF PNJAAABI PUTTARS AND PNJAAABI KUDIS WHO WANT TO MIGRATE TO KNEDAAA.
ONE POOR SHIELA DIXIT WAS CAUGHT ON STAGE JIVING TO THIS FILTHY SONG BELOW.. SHE GOT THE VIDEO DELETED LATER
https://www.youtube.com/watch?v=gc3JsSq3bFE
FOR PEOPLE WHO DO NOT KNOW PNJAAABI , CHECK OUT THE ENGLISH TRANSLATION IN THE LINK BELOW--IT IS ALL ABOUT CUNT AND PRICK..
THIS IS NOW OUR NEW INDIAN PNJAAABI CULTURE..
https://www.musixmatch.com/lyrics/Yo-Yo-Honey-Singh/Choot-Vol-1/translation/english
THEN WHO ELSE ATTENDED ?
WIFE OF CM FADNAVIS..AMRUTA ..
WHY?
IN 2015, COUPLE OF JEWS GOT KILLED IN PARIS.. THE NEXT DAY FADNAVIS LIT UP VT STATION IN FRENCH FLAG COLOURS.. MILLIONS OF MUSLIMS DEAD IN LIBYA/ SYRIA/ IRAQ , HE COULD NOT CARE LESS.
FADNAVIS BABY FUCKED IT UP TOTALLY BY DISPLAYING THE NETHERLAND FLAG.. RED ON TOP, WHITE IN BETWEEN, BLUE AT BOTTOM.. AKKAL THODA JAAST HAI NAH ?
STILL HE MUST BE REWARDED BY THE JEWISH DEEP STATE , RIGHT?
AMRUTA FADNAVIS HOLDS THE POST OF VICE-PRESIDENT – CORPORATE HEAD (WEST INDIA) WITH AXIS BANK.
NO WONDER AT THE POLICE HQ AT MUMBAI ( CRAWFORD MARKET ) , PRIVATE ROTHSCHILD AXIS BANK ATM HAS BEEN RECESSED INTO THE POLICE GOVT PROPERTY.. OFFICE OF COMMISSIONER OF POLICE, CRIME BRANCH BUILDING, OPP CRAWFORD MARKET, MUMBAI ..
AXIS BANK IS ROTHSCHILDs MIGHTY BANK —IT HAS NOTHING TO DO WITH WEE INDIAN UTI BANK AS PER WIKIEPRDIA PROPAGANDA..
https://www.ndtv.com/india-news/devendra-fadnavis-promoted-amruta-fadnaviss-bank-axis-bank-at-cost-of-state-banks-says-plea-2092631
BELOW AMRUTA SINGS AT "UMANG " WHICH IS SOMETHING SIMILAR LIKE THIS "MEET".. HERE JEWISH BOLLYWOOD MAFIA ( PAKISTANI ISI SPONSORED ) WHEELS AND DEALS WITH MUMBAI POLICE..
IF ANY CRYING BOLLYWOOD STAR WANTS TO FILE A CASE OF DEFAMATION AGAINST A BLOGGER ( FOR TELLING TRUTHS ) , ALL HE NEED TO DO IS TO CALL UP HIS PET POLICE TOP COP..
https://www.youtube.com/watch?v=NS_MZDM1Jbs
WET YOUR BEAKS ( GALA GHEELA ) WITH THE FOLLOWING WIKIPEDIA POSTS..FIRST.. BEFORE YOU READ MY POST..
https://en.wikipedia.org/wiki/National_Prayer_Breakfast
https://en.wikipedia.org/wiki/The_Fellowship_(Christian_organization)
https://en.wikipedia.org/wiki/Douglas_Coe
https://en.wikipedia.org/wiki/Abraham_Vereide
https://en.wikipedia.org/wiki/C_Street_Center
THIS IS A JEWISH DEEP STATE MAFIA BREAKFAST.. THIS MAFIA CREATED THE RED NAXAL CORRIDOR IN INDIA..
http://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html
INDIAN COLLEGIUM JUDGES IN DEEP STATE PAYROLL PLAYED KOSHER BALL.. THERE ARE REWARDS IF YOU INJURE BHARATMATA..
THIS PRAYER BREAKFAST IS ABOUT WEAPONIZING JESUS ( WHO NEVER EXISTED ).. PRAYER GETS MURDERED IN THIS BREAKFAST MEETING, AND HOW !..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
RAJEEV CHANDRA SHEKHAR
MOHANDAS PAI
DILIP SHANGHVI
GAUTAM ADANI
ADI GODREJ
GITA GOPINATH
ALL MPs OF INDIA
ALL MLAs OF INDIA
RSS
RAM MADHAV
MOHAN BHAGAWAT
AVBP
VHP
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SADGURU JAGGI VASUDEV
SRI SRI RAVISHANKAR
BABA RAMDEV
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
CLOSET COMMIE ARNAB GOSWMI
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
PGURUS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Sent emails.
DeleteTweets:
Deletehttps://twitter.com/AghastHere/status/1201193000501563392?s=20
https://twitter.com/AghastHere/status/1201193206773239810?s=20
https://twitter.com/AghastHere/status/1201193370598535168?s=20
https://twitter.com/AghastHere/status/1201193455990407169?s=20
https://twitter.com/AghastHere/status/1201193621413777408?s=20
https://twitter.com/AghastHere/status/1201193906127290368?s=20
https://twitter.com/AghastHere/status/1201194110595452928?s=20
https://twitter.com/AghastHere/status/1201194245794648065?s=20
https://twitter.com/AghastHere/status/1201194319425654784?s=20
Handles:
@rashtrapatibhvn @MVenkaiahNaidu @VPSecretariat @loksabhaspeaker @PMOIndia @narendramodi @NIA_India @dir_ed @AmitShah @HMOIndia @rajnathsingh @DefenceMinIndia @SpokespersonMoD @PiyushGoyal @PiyushGoyalOffc @indiannavy @IAF_MCC @NITIAayog @amitabhk87 @CMOMaharashtra @Dev_Fadnavis @CMOKerala @vijayanpinarayi @CMOfficeAssam @sarbanandsonwal @CMO_Odisha @Naveen_Odisha @ArunachalCMO @PemaKhanduBJP @ashokgehlot51 @CMPuducherry @VNarayanasami @capt_amarinder @BjpBiplab @NBirenSingh @ysjagan @BSYBJP @vijayrupanibjp @NitishKumar @MamataOfficial @DrPramodPSawant @Neiphiu_Rio @SangmaConrad @myogiadityanath @ArvindKejriwal @mlkhattar @BiswabhusanHC @jagdishmukhi @AnusuiyaUikey @ADevvrat @SatyadeoNArya @KalrajMishra @KeralaGovernor @BSKoshyari @tathagata2 @jagdishmukhi @GovernorOdisha @vpsbadnore @anandibenpatel @jdhankhar1 @HRDMinistry @DrRPNishank @ncert @VHPDigital @ABVPVoice @DrMohanBhagwat @rammadhavbjp @RSSorg @Swamy39 @RajivMessage @rajeev_mp @TVMohandasPai @ravishndtv @fayedsouza @PrannoyRoyNDTV @aroonpurie @vineetjaintimes @Raghav_Bahl @seemay @virsanghvi @KaranThapar_TTP @PritishNandy @ShekharGupta @svaradarajan @nramind @MIB_India @PrakashJavdekar @OfficeOfRSP @rsprasad @drajoykumar @AkhileshPSingh @BHAKTACHARANDAS @DeependerSHooda @dineshgrao @GouravVallabh @JM_Scindia @JaiveerShergill @rajeevgowda @MYaskhi @Meem_Afzal @PCChackoOffice @plpunia @Pawankhera @RajBabbarMP @suhelseth @pGurus1 @Polytikle @bajaj_ltd @RNTata2000 @AdityaBirlaGrp @MPNaveenJindal @WiproInsights @reliancegroup @AdityaBirlaGrp @InfyFoundation @gautam_adani @Nidhi @vikramchandra @Sonal_MK @SreenivasanJain @AnchorAnandN @navikakumar @sagarikaghose @sardesairajdeep @ArnabGoswamiRtv @madhutrehan @mkvenu1 @ThePrintIndia @TheQuint @scroll_in @thewire_in @GVLNRAO @sambitswaraj @GeneralBakshi @madhukishwar @sudhirchaudhary @sonal_mansingh @imbhandarkar @prasoonjoshi_ @smritiirani @M_Lekhi @KirronKherBJP @vivekagnihotri @KanganaTeam @AnupamPKher @ashokepandit @GautamGambhir @vivekoberoi @priyankagandhi @RahulGandhi @OfficeofUT @RajThackeray @DeShobhaa @ShashiTharoor @Ram_Guha @PavanK_Varma @chetan_bhagat @SriSri @SadhguruJV @yogrishiramdev @davidfrawleyved @DalrympleWill @Koenraad_Elst @fgautier26 @adamdangelo @Quora @gshewakr @sundarpichai @jimmy_wales @jack
AMRUTA FADNVIS HAS SINGLE OCTAVE VOCAL RANGE --PATHETIC.
ReplyDeletehttps://www.youtube.com/watch?v=yVm3vlzcTRo
FREDDY MERCURY HAS FOUR OCTAVE VOCAL RANGE-- AMAZING
https://www.youtube.com/watch?v=0omja1ivpx0
ANAL SEX RECEIVING FREDDY BABY WEARS A COCK SOCK..
https://twitter.com/sardesairajdeep/status/1200804229880795137
ReplyDeleteSHAUKAT AZMI AND HER HUSBAND KAIFI AZMI WERE LEADING LIGHTS OF THE INDIAN PEOPLE'S THEATRE ASSOCIATION (IPTA) AND THE PROGRESSIVE WRITERS ASSOCIATION (IWA), WHICH WERE THE CULTURAL PLATFORMS OF ROTHSCHILDS LEFT WING
THE INDIAN PROGRESSIVE WRITERS' ASSOCIATION WAS SET UP IN LONDON IN 1935 BY JEW ROTHSCHILD WHO RULED INDIA..
FOUNDER OF PROGRESSIVE WRITERS ASSOCIATION SAJJAD ZAHEER WAS THE FOUNDING MEMBER OF THE COMMUNIST PARTY OF PAKISTAN.
KATJU BABY USED TO INCLUDE FAIZ AHMED FAIZ VERSES IN HIS JUDGEMENTS
THESE ARE THE TYPE OF CHOOTIYA CJIS WE HAD.
http://justicekatju.blogspot.com/2015/02/faiz-ahmed-faiz-1322015-today-13th.html
Qafas udaas hai yaaron sabaa se kuch to kaho
Kaheen to bahr-e-Khuda aaj zikr-e-yaar chale
THE CAGE IS SAD, O FRIENDS, SAY SOMETHING TO THE BREEZE,
FOR GOD'S SAKE, SOMEWHERE THERE SHOULD BE A DISCUSSION ABOUT THE BELOVED TODAY..
JEW FAIZ AHMED FAIZ WAS A ROTHSCHILD COMMIE.. HIS WIFE WAS A WHITE SKINNED JEWISH HONEY TRAP ALYS ...
NEHRUs HALF BROTHER JEW SHEIKH ABDULLAH WHOSE WIFE IS THE DAUGHTER OF FRENCH JEW MICHAEL HARRY NEDOU MARRIED OFF FAIZ..
ALYS WAS THE AUNT OF JEW SALMAN TASEER WHOSE HAS SEX WITH TAVLEEN SINGH AND PRODUCED JEW AATISH TASEER....
OUR JUDICIARY IS FILLED WITH STUPID JUDGES WHO EMBELLISH THEIR JUDGEMENTS WITH CHOOTIYA URDU VERSES..
https://twitter.com/SadhguruJV/status/1198432311840313344
ReplyDeleteTHIS STUPID FELLOW KNOWS NOTHING ABOUT GOOD PARENTING..
Sir
ReplyDeletesent email n asked for an ack -sadhvipragyabjp@gmail.com
Your Registration Number is : PMOPG/E/2019/0688674
ReplyDeleteRef: Who says subramanian swamy is a genius ? .....
https://www.youtube.com/watch?v=m-JIofHHU6s
ReplyDeletecaptain, watch this trailer "Commandos 3" , no bollywood actors (tiger shroff type) can compete vidyut in stunts. he is so underrated.
Rashtriya Swayamsevak Sangh (RSS) joint general secretary Dr Krishna Gopal has said that if Dara Shikoh had ruled India in place of Aurangzeb then Islam would have flourished in the country and Hindus would have also understood Islam better.
ReplyDeleteCalling Mughal prince Dara Shikoh, the eldest son of Mughal emperor Shah Jahan, an epitome of Indianness, the senior RSS functionary said that he was a 'real Hindustani' who never compromised with Islam and always tried to unite the society.
Gopal gave this statement while speaking at a symposium on 'Dara Shikoh: A hero of the Indian syncretist traditions'.
He further urged the Muslim community to follow Dara Shikoh's legacy rather complaining that there was an atmosphere of fear in the country.
"Dara was a prince, who translated Upnishads into Persian. He discussed and debated it with intellectuals. He knew the God was only one and there were different faiths to find him. Dara was never divisive. He understood the assimilative power of society and tried to establish compatibility while remaining a true Muslim," news agency ANI quoted Gopal as saying.
Gopal further said Shah Jahan knew about Shikoh’s capability and prepared ground for his succession. However, his only mistake was that he translated Upanishads to Persian, which was unacceptable to the fundamentalists.
Gopal also said that Dara Shikoh was a man of the Indian syncretist tradition who posed a direct threat to Aurangzeb who saw him as a threat to Islam.
Rejecting the statement that Muslims in India are living in an atmosphere of fear, the senior RSS functionary said that there are around 50,000 Parsis, some 45 lakh Jains and some 80 lakh followers of Buddhism who never said they are in fear then why do Muslims, who are around 16-17 crore, say they are living in an atmosphere of fear.
“They are in fear despite ruling the country for 600 years. Why don't you come out from this fear?” he said.
Union Minister Mukhtar Abbas Naqvi who was also present at the event hailed Dara Shikoh as an identity of nationalism adding that he was a victim of the brutality of fanatics who were directly influenced by Aurangzeb's thinking.
Shah Jahan had designated Dara with the title Padshahzada-i-Buzurg Martaba (Prince of High Rank) and wanted to anoint him as his successor. However, in the war of succession which started after Shah Jahan's illness, Dara was defeated by his younger brother Aurangzeb and was executed in 1659 after being declared a threat to the public peace apart from being called a “heretic”.
For the past 3 days I have been attacking on RSS on Twitter like anything.
DeleteSadhvi Pragya ji is attacked and there is no ultimatum from RSS.
I have played mind games on Twitter that RSS of 2019 is not at all the super patriot RSS of 1947.
So many of Modi bhakts called me Mullah & Chutiya, I can't mention here.
A hound of Modi bhakts trolled me they before yesterday afternoon & I kept it continuing giving befitting replies like poison.
Finally they surrendered late night 1:30am.
It drained my entire energy.
Modi Bhakt off late have become a critical menace.
They want everyone to get baptized in the name of Modi & sprinkle Modi named water, then can a person be called Desh Bhakts it seems.
Horrible
The sooner everyone rejects RSS & teach them a lesson the better it is.
Selfish RW can never be called RW.
More dangerous than Communist bcoz a clear enemy is better than an apprehensive confidant.
RSS has all qualities right now.
Someone must tell that Mumbai based selfish fellow Ratan Sharda to lay off
Patriots cannot afford such a selfish fellow.
Ajit Sir,
DeleteWhatever happened with Sadhvi Pragya ji is not at all acceptable.
It was an insult to Sanatana Dharma, our culture itself.
You have not given your complete review about this incident.
Plz give your reaction/review.
What you think about the above.
Being lenient towards BJP at this juncture, doesn't seems to be a good bet.
Also Israel is already in India.
It seems what was proposed is already implemented.
Below was the information about the proposal flashed in June.
https://www.google.com/amp/s/www.indiatoday.in/amp/india/story/israel-ready-help-india-dealing-water-shortage-1549664-2019-06-15
Now already it has started it seems.
A BJP payed IT handle has tweeted it with panache.
Israel will recognize that fellow with Kosher award.
I request again,
Ajit Sir,
Plz give your review about the one that happened with Sadhvi Pragya ji.
I was shocked & very much disturbed When I checked with various handles who pretends to be Desh Bhakts but didn't tweet in support of Sadhvi Pragya ji, why?
What has happened?
I didn't understand.
Why did they hold back?
Not NETA's handle but other big non-NETA handles.
Seems these NETA along with non-NETA together are in cahoots.
Something is secretly cooking up.
Are we being made fools?
Ajit Sir,
ReplyDeleteI'm not getting your blog on 26/11 Mumbai Terror attack and regarding that fellow Hemant Karkare.
You have mentioned that this fellow Ajmal Kasab was scape Goated.
Where is that blog?
Google has sunk all post.
Please kindly share that link.
Totally gone out of Google search, not appearing.
Ajit Sir,
DeleteIs there no blog as such?
Somewhere you have mentioned in details about 26/11, also it's relationship to Chabad House.
Which is that?
Plz do share the link.
I'm not getting it.
Can anyone give the blog link of Mumbai Terror attack having Captain's perspective.
DeleteI remember, I have read about it years back.
I am unable to find it.
Even Fatawa-E-Alamgiri is screwed up.
Anything that exposes the JEWS & their mercenaries are buried by Google.
Kindly anyone do share the link.
When I have read about it, how can it happen that such a thing is no more visible in the search result.
Hi Dharmapada,
DeleteCheck below comment from Captain-
(blog- http://ajitvadakayil.blogspot.com/2018/02/sanatana-dharma-hinduism-exhumed-and_12.html)
Capt. Ajit Vadakayil
May 31, 2014 at 10:12 PM
hi n,
we have a system of punishing the outer ring in any crime.
the mafia boss sitting in the centre, and his immediate mafia lieutenants in the inner rings are always untouched .
so we punish khalistanis and LTTE who were used in the outer ring.
during 26/11 attack at mumbai, taj and oberoi were full of diamond merchants who attended a diamond merchants conference. adani was in taj. varda shine, MD of Diamond Trading Company (DTC) was in Taj-but had just left-- as apparently the attack was behind schedule.
diamond merchants and brokers got shot in leopold cafe.
the chabad house founder had his own diamond polishing plant in Israel. when chabad house was attacked , David Bialka, a diamond trader was resourceful enough to climb down from the 5th floor to the street --and onlookers threw stones at him thinking that he was a terrorist.
chatrapati shivaji train terminus attack was a fog cover. ajmal kasab was meant to be captures and interrogated-- he knows nothing being in the outer ring.
even the akshardham temple attacks-- had jain diamond merchants killed.
WE NEED BETTER BRAINS IN OUR INTERNAL SECURITY AGENCIES !
DESPITE HEMANT KARKARE GETTING KILLED ALL ARE SCRATCHING THEIR HEADS .
the least i say anything --the better
capt ajit vadakayil
https://www.businesstoday.in/current/economy-politics/rahul-bajaj-takes-on-amit-shah-says-corporates-live-in-fear-cannot-criticise-modi-govt/story/391315.html
ReplyDeletePOOR RAHUL BAJAJ
HE HAS BECOME SENILE..
WE DONT LISTEN TO SENILE OLD GOATS..
https://twitter.com/AsYouNotWish/status/1199960239816069125
ReplyDeleteTHIS POLL IS SLANTED.. IF THERE IS A NATIONWIDE REFERENDUM 90% WILL VOTE , THAT GODSE WAS A PATRIOT..
TWITTER DOES NOT REPRESENT INDIA.. I AM NOT ON TWITTER..
CAPT AJIT VADAKAYIL DECLARES--
KATHIAWARI JEW AND ROTHSCHILDs AGENT GANDHI WAS A TRAITOR -- GODSE WAS A PATRIOT..
BALLS TO GANDHI-- PEDOPHILE , LIAR AND MAN WITH ZERO INTEGRITY..
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
I WILL NOT EXPOSE 50% OF ROTHSCHILD-- BECAUSE HE DID NOT GIVE GANDHI A NOBEL PRIZE..
SOMEWHERE THERE IS SOMETHING GOOD IN ROTHSCHILD.. I DID NOT WALK HIS PATH..
capt ajit vadakayil
..
PUT ABOVE COMENT IN WEBSITE OF --
DeletePRAGYA THAKUR
PMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
RAJEEV CHANDRA SHEKHAR
MOHANDAS PAI
DILIP SHANGHVI
GAUTAM ADANI
ADI GODREJ
GITA GOPINATH
ALL MPs OF INDIA
ALL MLAs OF INDIA
RSS
RAM MADHAV
MOHAN BHAGAWAT
AVBP
VHP
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SADGURU JAGGI VASUDEV
SRI SRI RAVISHANKAR
BABA RAMDEV
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
CLOSET COMMIE ARNAB GOSWMI
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
PGURUS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
https://twitter.com/PritishNandy/status/1200644044356898822
ReplyDeleteCHECK OUT THIS DEEP STATE DARLING..
Another Deep State darling like Pritish Nandy is Anurag Kashyap.
DeleteKashyap couldn't handle the abuses he suffered bcoz of his mischief.
Some lakhs of followers he had on Twitter.
Since he got pathetically trolled, he made a petty excuse that his daughter is being targeted & quit from his Twitter account.
Nazism is "Trotskyism Reborn" with the anti-thesis of Communism. Similarly, the Hindu Maha Sabha before independence and the present Shiv Sena in Maharashtra are funded by the same groups, with the purpose of creating a controlled opposition. The leader of Hindu Maha Sabha, Nirmal Chatterjee and his son, later became communists.
ReplyDeleteAfter Trotsky was expelled from Russia, the Trotskyists has been masquerading with the ideology that suited the environment. Neocons, the lobby group directly responsible for the disastrous war in Iraq of 2003, is essentially an extension of Trotskyism. They are not conservatives in any sense of the word. They changed their color again and reincarnated as neo-liberals.
The british controlled indian media created a controlled opposition through MK Gandhi. Such a humongous fraud went undetected because of the lack of social media networking. The same fraud was tried with Kejriwal and JNU commie Kanhaiya with frenzied media coverage, all fell flat due to awareness created by social media. Gandhi and his experiments with brahmacharya would be punished posthumously as per the laws. The Indian government contributed $10 million for the movie Gandhi, based on a book of fiction called Freedom at Midnight.
Bala Saheb Thackarey is also a double agent. He had close ties with Pawar family right from 1960s. Because of this relation, Bala Saheb was highly respected in Mumbai. He was not arrested at anytime for any provocative statements, even when the Congress party was in power. The Pawar and Thackaray are blood related by marriage.
The famous Marathi Author Madhu Mangesh Karnik once remarked in one of his works about the difference in Hindutva of the RSS and the Shiv Sena, post Babri episode. For RSS, Hindutva is its skin, firmly integrated with its body, while in case of Shiv Sena it was more of a shawl, ready to be discarded or changed to green or red color when necessary. It is like a snake shedding skin when necessary for survival.
https://www.facebook.com/groups/INDIANREALHISTORY/permalink/2461466747275770/
https://orientalreview.org/2011/01/11/episode-6-leon-trotsky-father-of-german-nazism-v/
Captain Sir,
ReplyDeletehttps://www.business-standard.com/article/news-ani/we-are-moving-towards-fourth-generation-warfare-nsa-doval-118102500988_1.html
Ajit Doval does not seem to be ignorant of new technologies. Somehow, it does not show up in his actions or practices followed by our bureacrats.
FROM THE YEAR 2012 TO 2016
ReplyDeleteIF YOU GOOGLE FOR "WORST JOURNALIST "
MY POST BELOW WOULD COME ON PAGE 1 AS ITEM 1 , AMONG NEARLY 70 MILLION POSTS
http://ajitvadakayil.blogspot.com/2012/08/indias-worst-journalist-barkha-dutt.html
TILL I BACKED TRUMP AGAINST ROTHSCHILDs CANDIDATE HILLARY
NOW THE POST IS SUNK.. HARDLY ANYBODY GOES BEYOND THE FIRST TEN PAGES ON GOOGLE SEARCH...
CHECK OUT BARKHA DUTTs CONVERSATIONS -- WHEELING AND DEALING..
https://www.youtube.com/watch?v=Pon2a09gYK4
capt ajit vadakayil
..
https://timesofindia.indiatimes.com/home/environment/global-warming/un-chief-warns-of-point-of-no-return-on-climate-change/articleshow/72320313.cms
ReplyDeleteUN CHIEF IS AN AGENT OF THE JEWISH DEEP STATE..
https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html
https://timesofindia.indiatimes.com/india/hyderabad-rape-murder-main-accused-dodged-officials-hrs-before-crime/articleshow/72323541.cms
ReplyDeleteTHERE IS ONLY ONE WAY TO STOP THIS MOBILE PORN TRIGGERED SEX CRIME..
ARRANGE FOR 4 ROAD TRUCK CRANES WITH TALL BOOMS..
HANG THEM IN A CHOSEN BUSY ROAD INTERSECTION, A WIDE ONE WHICH WONT CAUSE A TRAFFIC JAM..
VIDEOGRAPH THE HANGING LIVE..AND STREAM IT..
THE WHOLE WORLD WILL CRY ( DEEP STATE MEDIA ) THAT INDIA HAS GONE ROGUE..
LET IT BE..
THE DEEP STATE MEDIA MUST KNOW THAT INDIA HAS THE LEAST AMOUNT OF RAPES ON THE PLANET BY PERCENTAGE -- WE HAVE 1320 MILLION PEOPLE.. WE HAVE MORE PEOPLE THAN CHINA..
74 YEAR OLD AJIT DOVAL MUST RETIRE ..
AJIT DOVAL HAS FAILED IN HIS JOB AS NSA AND ADVISER TO PM. . HE IS FINESSED THE ART OF GIVING AN EGO MASSAGE TO MODI, RATHER THAN KNOWING HIS JOB DESCRIPTION AND DOING HIS JOB..
I WISH HIM ALL THE BEST.. I WILL WRITE HIS LEGACY...
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITE OF --
DeletePMO
PM MODI
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
SWAMY
RAJIV MALHOTRA
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
RAJEEV CHANDRA SHEKHAR
MOHANDAS PAI
DILIP SHANGHVI
GAUTAM ADANI
ADI GODREJ
GITA GOPINATH
ALL MPs OF INDIA
ALL MLAs OF INDIA
RSS
RAM MADHAV
MOHAN BHAGAWAT
AVBP
VHP
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
PIYUSH GOEL
NITI AYOG
AMITABH KANT
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
SADGURU JAGGI VASUDEV
SRI SRI RAVISHANKAR
BABA RAMDEV
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
SHASHI THAROOR
ARUNDHATI ROY
SHOBHAA DE
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
CLOSET COMMIE ARNAB GOSWMI
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
I&B DEPT/ MINISTER
LAW MINISTER/ MINISTRY
ALL CONGRESS SPOKESMEN
ANGREZ KA AULAAD- SUHEL SETH
PGURUS
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Captain,
Deleteyou are exactly right. this is how they dealt with piracy in the 17th century. pirates left to dry on the gibbet for days after hanging. our ancestors were not fools. democracy, human rights etc are not for the unworthy. countries like India where the judiciary is weak & stupid, political system corrupt and inefficient criminal get away and come out bolder. and then god save the average
Tweets:
Deletehttps://twitter.com/AghastHere/status/1201356810382462977?s=20
https://twitter.com/AghastHere/status/1201357006218518528?s=20
https://twitter.com/AghastHere/status/1201357214688120832?s=20
https://twitter.com/AghastHere/status/1201357314487394305?s=20
https://twitter.com/AghastHere/status/1201357383429165056?s=20
https://twitter.com/AghastHere/status/1201357501696020480?s=20
https://twitter.com/AghastHere/status/1201357590241910784?s=20
https://twitter.com/AghastHere/status/1201357718986121216?s=20
https://twitter.com/AghastHere/status/1201357764980805634?s=20
Handles:
@rashtrapatibhvn @MVenkaiahNaidu @VPSecretariat @loksabhaspeaker @PMOIndia @narendramodi @NIA_India @dir_ed @AmitShah @HMOIndia @rajnathsingh @DefenceMinIndia @SpokespersonMoD @PiyushGoyal @PiyushGoyalOffc @indiannavy @IAF_MCC @NITIAayog @amitabhk87 @CMOMaharashtra @Dev_Fadnavis @CMOKerala @vijayanpinarayi @CMOfficeAssam @sarbanandsonwal @CMO_Odisha @Naveen_Odisha @ArunachalCMO @PemaKhanduBJP @ashokgehlot51 @CMPuducherry @VNarayanasami @capt_amarinder @BjpBiplab @NBirenSingh @ysjagan @BSYBJP @vijayrupanibjp @NitishKumar @MamataOfficial @DrPramodPSawant @Neiphiu_Rio @SangmaConrad @myogiadityanath @ArvindKejriwal @mlkhattar @BiswabhusanHC @jagdishmukhi @AnusuiyaUikey @ADevvrat @SatyadeoNArya @KalrajMishra @KeralaGovernor @BSKoshyari @tathagata2 @jagdishmukhi @GovernorOdisha @vpsbadnore @anandibenpatel @jdhankhar1 @HRDMinistry @DrRPNishank @ncert @VHPDigital @ABVPVoice @DrMohanBhagwat @rammadhavbjp @RSSorg @Swamy39 @RajivMessage @rajeev_mp @TVMohandasPai @ravishndtv @fayedsouza @PrannoyRoyNDTV @aroonpurie @vineetjaintimes @Raghav_Bahl @seemay @virsanghvi @KaranThapar_TTP @PritishNandy @ShekharGupta @svaradarajan @nramind @MIB_India @PrakashJavdekar @OfficeOfRSP @rsprasad @drajoykumar @AkhileshPSingh @BHAKTACHARANDAS @DeependerSHooda @dineshgrao @GouravVallabh @JM_Scindia @JaiveerShergill @rajeevgowda @MYaskhi @Meem_Afzal @PCChackoOffice @plpunia @Pawankhera @RajBabbarMP @suhelseth @pGurus1 @Polytikle @bajaj_ltd @RNTata2000 @AdityaBirlaGrp @MPNaveenJindal @WiproInsights @reliancegroup @AdityaBirlaGrp @InfyFoundation @gautam_adani @Nidhi @vikramchandra @Sonal_MK @SreenivasanJain @AnchorAnandN @navikakumar @sagarikaghose @sardesairajdeep @ArnabGoswamiRtv @madhutrehan @mkvenu1 @ThePrintIndia @TheQuint @scroll_in @thewire_in @GVLNRAO @sambitswaraj @GeneralBakshi @madhukishwar @sudhirchaudhary @sonal_mansingh @imbhandarkar @prasoonjoshi_ @smritiirani @M_Lekhi @KirronKherBJP @vivekagnihotri @KanganaTeam @AnupamPKher @ashokepandit @GautamGambhir @vivekoberoi @priyankagandhi @RahulGandhi @OfficeofUT @RajThackeray @DeShobhaa @ShashiTharoor @Ram_Guha @PavanK_Varma @chetan_bhagat @SriSri @SadhguruJV @yogrishiramdev @davidfrawleyved @DalrympleWill @Koenraad_Elst @fgautier26 @adamdangelo @Quora @gshewakr @sundarpichai @jimmy_wales @jack
Sir,sent emails.
Deletedone on social media captain
DeleteCaptain, "Gangaajal" must be given, then they should be shot & their bodies should be publicly displayed by method you described.
Deletehttps://youtu.be/GJ9MH6uw_vE?t=5044
Captain, porn is the least problem. It is banned too from quite a while. The REAL issue that nobody DELIBERATELY highlights is the extremely vulgar music-videos, tabloid-papers/websites, etc. They portray any woman in the most extreme vulgar way, even if they wear normal clothes. Govt thinks that banning porn is the magic-solution, not realizing that it is the other things that are the REAL issues.
Delete------
See the fake "Cultured" Govt turning a blind-eye to music-videos (item-numbers) across India
https://youtu.be/c4JD7rEtIj8
https://youtu.be/4ZjZHqgD6YQ
https://youtu.be/_uUdJalMaF8
------
See the fake "Cultured" Govt turning a blind-eye to these type of events that take place in India (WARNING:- Vulgar-events below)
https://youtu.be/-NUDORCZGsc
https://youtu.be/JsVncFFYgTQ
------
Full Indian media is a giant soft-porn industry and our "Cultured" people & Govt are completely OK with this. Whenever the brutal-consequences of endless-titillation are realized, they brush it under the carpet blaming the "foreign/western/english-movies" or "explicit-porn" when in fact the issue is homegrown ! Maybe it is better than the old days when sleazy-people used to jack off to rape-scenes because that was the only way in which soft-porn was allowed in movies/serials and manage to escape the censorship since it was "important-part-of-the-movie/serial-plot".
I'm not saying India should be like Iran or Saudi who overdo their fake moral-superiority-complex by covering up women & overdoing everything, but a decent balance can be achieved in storytelling. I have seen korean-serials that do a fine job of storytelling, romance, etc. without making anything vulgar, explicit, soft-porn, etc. The korean movie-industry, unfortunately, is not as refined as the serial-industry. India can create a good example, but nobody cares because industry wants money & Govt (regardless of politics) doesn't care because they don't have the brains to guide society.
https://twitter.com/shree1082002/status/1201421809993703424
DeleteWhat is the I&B policy of govt of India regarding xxx porn.
DeleteAdult movies get a certificate from censor board as they are not xxx.
Xxx started during the video cassette era. One Cassette was smuggled in to india and multiple copies made and the public accessed it through video cassette libraries.
The police and govt could plead helplessness by equating it with any other smuggled contrabands.
What about todays internet era ?
The porn is acessed through registered internet providers airtel, geo etc.
If a country wants to ban and enforce porn , what should it do?
What is the govt policy?
Is watching porn a crime in India?
You have revealed its is a jewish industry. In my school days one boy told me that xxx is a company infact.
Is the only way to stop people acessing porn is to attack and occupy countries which allow porn production and destroy the infrastructure similar to fighting terrorism.
Or a complete shutdown of internet and strong anti smuggling operation to stop porn from physically coming inside the country.
Or appeal to porn producing countries to stop porn production completely.
What is the logical way to go ahead?
NATIONAL PRAYER BREAKFAST, WHERE JESUS IS WEAPONIZED AND USED AS A TALISMAN FOR COVERT POWER BY THE JEWISH DEEP STATE
ReplyDeleteABOVE WILL BE THE TITLE OF MY NEXT POST.
WATCH THIS SPACE !
Found message doing rounds...
ReplyDeleteThe FAStag program of fixing RADOI FREQ stickers that the government wanted to start from 1st is postponed to 15th.
The sticker will ensure the toll is deducted from your account when the vehicle passes thro a toll gate.
It makes those who dont use this to pay double the amount! An unfair way to implement and invitation for corruption
Most importantly and not publicised is the 4 % charge that will be levied per transaction. About 50% of this goes to a private organisation!!!
A big loot indeed in the name of convenience( that is uncertain due to tech glitch, slow pass by at gate etc)
https://twitter.com/goyalsanjeev/status/1201348074804789249
ReplyDeleteTHE WORST MINISTERS INDIA HAS EVER PRODUCED ARE KAYASTHAS PRAKASH JAVEDEKAR AND RAVI SHANKAR PRASAD..
Captain, Aditya-Thackery and Hussein, the crown-prince of Jordan, look similar. It is obvious that Jordan-royal family is crypto-jewish, but his similarity to AT may reveal that even the Thackerays could be crypto-jews (Chitpavan or something) ?
DeleteHussein:--
https://tinyurl.com/qr24xgb
Aditya:--
https://tinyurl.com/vmnnb7y
IT IS NO CONTEST. BAL THACKREY HIMSELF WROTE IN HIS AUTOBIOGRAPHY THAT HE IS CHANDRASENIYA KAYASTHA PRABHU (CKP) CASTE.
DeleteCKP, WHO ARE "CHANDRASENIYA" ARE OF DISTINCT ORIGIN FROM THE "CHITRAGUPTA" KAYASTHAS OF NORTH-INDIA ..
http://ajitvadakayil.blogspot.com/2019/07/we-never-heard-words-kayastha-and.html
HIS SURNAME IS THAKRE.. BUT HIS ANCESTOR WAS A FAN OF WHITE SKINNED BRITISH WRITER WILLIAM MAKEPEACE THACKERAY ( DIED 1863 ) WHO WROTE VANITY FAIR.
THIS IS LIKE HARI RAMCHANDANI BECOMING HARRY RAMANI..
WILLIAM MAKEPEACE THACKERAYs FATHER RICHMOND , WORKED FOR ROTHSCHILD AS A CIVIL SERVANT
WILLIAM MAKEPEACE THACKERAYs MOTHER WAS DAUGHTER OF JOHN HARMON BECHER AN OPIUM DRUG RUNNING AGENT OF ROTHSCILD IN BENGAL.
VANITY FAIR CONTAINS REFERENCES TO THE “BLACK HOLE OF CALCUTTA” WHICH GAVE ROTHSCHILD A FOOT HOLD ( FROM A TOE HOLE ) IN CALCUTTA
http://ajitvadakayil.blogspot.com/2011/07/back-swing-of-john-galt-capt-ajit.html
EXACTLY A HUNDRED YEARS LATER ( ROTHSCHILDs SIGNATURE ), IN 1857 ROTHSCHILD SAT ON THE DRIVERs SEAT OF INDIA.
http://ajitvadakayil.blogspot.com/2011/02/murky-truths-of-sepoys-mutiny-1857.html
THACKEREY FAMILY IS ENMESHED WITH CHITPAVAN BRAHMINS ( BASICALLY BENE ISRAEL JEWS ) WHOM ROTHSCHILD SPONSORED AS PESHWAS AFTER EMPEROR SHAHUs SONS WERE DISINHERITED..
RAMA-BAI THACKERAY WAS THE MOTHER OF BAL THACKERAY ANDSHRIKANT THACKERAY (FATHER OF RAJ THACKERAY)
FADNAVIS IS CHITPAVAN BRAHMIN SURNAME ..
TILAK, GOKHALE, RANADE , SAVARKAR ARE ALL CHITPAVAN BRAHMINS ( JEWS ).. BR AMBEDKARS WIFE WAS A CHITPAVAN BRAHMIN ( JEW )
NATURAN GODSE WAS A CHITPAVAN BRAHMIN ( JEW ). HE WENT TO SCHOOL IN GIRLs UNIFORM.
THE ENTIRE ROYAL FAMILY OF JORDAN IS JEWISH ..
This information gave me a loose motion like feeling.
DeleteI did doubt about Thackeray from before but got confirmed here.
Fadnavis I knew it before.
I never liked this fellow Fadnavis at all.
It's very scary.
The entire Konkan has a different story to tell.
Again the same question resurfaces,
Ajit Sir,
If you are able to catch all these then do the R think in the same wave length the way you do?
They are not easy to catch, how do R do?
Yesterday night while searching about these Jews & their association with Marwaris & Jains so many stuffs I noticed which you have put.
Literally no one can do the way you do.
Catching a person by his or her name.
You are expert in reading face, body language & behavioural pattern.
Also you catch hold of people by their name.
I just got lumps on my throat.
Such signatures are mostly overlooked but what you did is to exhumed the secret behind all these.
The Jews will never go.
They are the ones who will be done away by Bhagwaan Kalki.
Others who support Jews will also perish.
More & more refining thought with every passing blog comments.
Scary too.
Dear Capt Ajit sir,
DeleteAthawale was born on 25 December 1959 in Agalgaon, Sangli district, Bombay State, which is now a part of Maharashtra. His parents were Bandu Bapu and Honsabai Bandu Athawale. He attended Siddharth College of Law, Mumbai and married on 16 May 1992. He has a son.[1] Ramdas Athawale is a practitioner of Buddhism.[2]
Athawale has been editor of a weekly magazine called Bhumika and is a founder member of Parivartan Sahitya Mahamandal. He has served as president of Parivartan Kala Mahasangha, the Dr. Babasaheb Ambedkar Foundation and the Bauddha Kalawant Academy (Buddhist Artists Academy) and was founder president of Bauddha Dhamma Parishad (Buddhism conference). He played the title role in a Marathi film, Anyayacha Pratikar, and also had a small role in another Marathi film, Joshi ki Kamble, as well as roles in Marathi dramas such as Ekach Pyala.
So, How come Ramdas Athawale (Chitpavan brahmain Jew surname)is a Dalit ?
https://twitter.com/shree1082002/status/1201419159835299841
ReplyDeleteDear Capt Ajit sir,
ReplyDeleteCNN-Anand Narasimhan is debating Bishop Mullakal issue to support expelled nun Lucy who has exposed the rot in the house of God/church....why hindus are butchered on their issues, not convenient to discuss Church sex issues...why ? Why Kerala CM or govt not supporting sister Lucy ? Bcos, the church has immense wealth, political vote bank control and therefore Political parties don't shame them.
Dear Capt Ajit sir,
ReplyDeleteI am sure this young boy's ancestry is jewish...A 7-year-old boy is making $22 million a year on YouTube reviewing toys ;-)
https://www.businessinsider.in/entertainment/a-7-year-old-boy-is-making-22-million-a-year-on-youtube-reviewing-toys/articleshow/66924960.cms
My 7 month old tom cat died today. He climbed on to the main colony transformer of 11 kv and was electrocuted. The body did not get charred and he retained his beautiful fur in his death.He was not a indoor cat. He used to live in my house and had his own cutout gate to come in and go at his free will. I used to feed him fish. He used to press his teeths on me show love. He loved to sleep with me and could sit on lap for hours. He loved to take Panga with street dogs of my neighbourhood, only slightly afraid of the main alpha dog of the pack.
ReplyDeleteHe was popular in the neighbouhood.
Today morning he came to my room when i was sleeping. I lifted the mosquito net to let him come on to the bed. He slept with me for half an hour. I got up and then he wanted food. I gave him larger than usual portion of fish which i used to buy specially for him. He ate and went out of the house for his roaming business. 15 mins later the laundry man across the street came and informed me about the incident. His body was disposed off by then by the local electrician. He showed me the pic of his body on the transformer that he shot on his mobile.
I beleive he died an instant death. I am grateful for it as i always worried about him being run over by vehicals and dying slowly.
He used to come running to me not caring for any traffic as soon as i used to come back home from my bike.
He was mu buddy for these 7 months, the best buddy i ever had. Hope you read it.
BOTH MY SONS CRIED BITTERLY WHEN WE LOST OUR CAT IN 2000.. BOTH BOYS ARE SENSITIVE.. I WAS AT SEA..
DeleteAT 0530 TEMPLE SANSKRIT MANTRA STRAINS ( NERBY ) WOULD COME INTO OUR BEDROOM..
TEN MINUTES BEFORE THE CAT WOULD NIBBLE ON MY WIFEs TOES TO WAKE HER UP..
AT 0600 WHEN MY WIFE GETS UP, THE CAT WOULD RUSH TO THE PUJA ROOM AND SIT ON THE WINDOW SILL TO GET A VANTAGE VIEW OF MY WIFE LIGHTING THE LAMP.
AS SOON AS SHE OPENS THE FRONT DOOR, THE CAT WOULD RUN LIKE USAIN BOLT TO SIT AT THE GATE , TO WATCH HER OPENING THE GATE LOCK.. AFTER THAT THE CAT WOULD PLAY WITH SQUIRRELS FOR 30 MINUTES WHO DARE "CATCH ME IF YOU CAN"..
http://ajitvadakayil.blogspot.com/2012/10/the-joy-of-having-cat-as-pet-capt-ajit.html
capt ajit vadakayil
..
Thank you, feeling much lighter now. Have shed a tear for my dear friend.
DeleteInfact your blog on cats set into motion a chain of events,which led me having him in my life.
Sad to hear on your loss Ramas.. My Mother in law also has a CAT.
DeleteVideo on how smart a cat is.
https://www.youtube.com/watch?v=6_mc9z2EiXs
Now I get all what Capt Ajitji has expressed in his blog on CAT.
Thank Mohit, animals love better than humans. Good luck
DeleteDear Capt Ajit sir,
ReplyDeleteYour recommendation to scrap Anglo Indian representation is accepted and implemented now...kudos to you. Its takes guts to take a decision like this....
#ModiHaiTohMumkinHai
ReplyDeleteCapt. Ajit VadakayilDecember 6, 2019 at 6:09 PM
SOMEBODY CALLED ME UP AND CRIED..
CAPTAIN, YOU ARE THE FIRST AND ONLY MAN ON THIS PLANET TO WRITE THAT THE SOLAR ECLIPSE DURING MAHABHARATA WAR WAS CAUSED BY KRISHNAs SUDARSHAN CHAKRA..
I WANT ALL MY READERS TO WATCH THE VIDEO BELOW
https://www.youtube.com/watch?time_continue=3&v=R-Lacu0VG3Y&feature=emb_logo
I HAVE SEEN FLYING SHIPS TOP UP, AND TOP DOWN IN RED SEA.. FIRST TIME IT WAS HARD TO BELIEVE..
IN THE POST BELOW --READ THE PASSAGE "JAYADRATA SLAIN"..
http://ajitvadakayil.blogspot.com/2011/11/mahabharata-and-bhagawat-gita-4000-bc.html
STUPID CUNTS HAVE BEEN TRYING TO DATE THE MAHABHARATA WAR OF 4000 BC, BY A WILD GOOSE CHASE OF A NON-EXISTENT SOLAR ECLIPSE IN THE EVENING OF THE WAR.
IT WAS NOT A SOLAR ECLIPSE BUT A SUDDEN TEMPERATURE INVERSION ( SUDARSHANA CHAKRA ON SCALAR INTERFEROMETRY MODE ) WHICH CAUSED THE ATMOSPHERIC REFRACTION TO REVERSE, CAUSING THE SUN TO DIP BELOW THE HORIZON, AND CAUSE SUDDEN DARKNESS ON THE EVENING OF THE 13TH DAY OF THE WAR. THIS WAS AN OPTICAL ILLUSION..
AFTER BEHEADING JAYADRATA, HIS HEAD WAS DELIVERED TO THE LAP OF HIS FATHER MEDITATING THOUSANDS OF MILES AWAY, IN THE CRUISE MISSILE DRONE MODE.
AS SOON AS JAYADRATA WAS KILLED KRISHNA USED REVERSE INTERFEROMETRY AND CAUSED THE SUN TO GO BACK ABOVE THE HORIZON.
ARJUNAs ASTRAS WERE NOT ARROWS BY CRUISE MISSILES WHICH COULD LOITER AND STRIKE..
KARNA HAD BETTER ASTRAS THAN ARJUNA..
https://en.wikipedia.org/wiki/Karna
AFTER SAMUDRA MANTHAN BY VISHNU’S KURMA AVATAR, LORD DHANWANTAI ROSE FROM THE COSMIC OCEAN WITH SCALAR FIELD GENERATORS IN THREE OF HIS FOUR HANDS.. 1) SUDARSHANA CHAKRA INTERFEROMETRY DISC WITH WHICH KRISHNA CAUSES SUN TO DRIP DOWN THE HORIZON TO FOOL JAYADRATA..2) A CONCH 3) A AMRIT KUMBAM POT INFUSED WITH IRIDIUM..
THE FOURTH ITEM WAS A LEECH ( VACCINATION )
http://ajitvadakayil.blogspot.com/2019/09/onam-our-only-link-to-planets-oldest.html
TITANIC WATCHKEEPERS WERE LOOKING AT A LARGE ICEBERG IN THE SKY-- AN OPTICAL ILLUSION, WHEN THEY SLAMMED INTO A REAL ONE..
https://www.youtube.com/watch?v=fiNZcV0TjNc&feature=emb_logo
MY REVELATIONS NOW JUMP TO 60.12%
capt ajit vadakayil
..
This comment has been removed by the author.
ReplyDeletehttps://www.indiatoday.in/india/west/story/assam-protest-violence-in-mumbai-police-arrest-23-people-113082-2012-08-11
ReplyDeleteThis happened in 2012. The police and citizens were on the receiving end in Mumbai with the then state home minister turning indifferent.
Coincidentally same set of politicians are now in power in Maharashtra and these people have become active again.
Shivsena runs with the hares and hunts with the hounds...Wonder how long they can sustain it.
ReplyDeleteWe may give work permits to the deserving Bangladeshi Muslims but no citizenship rights. Same as Muslims of other countries get in Saudi Arabia or Gulf countries.