Wednesday, December 11, 2019

WHAT ARTIFICIAL INTELLIGENCE CANNOT DO , a grim note to the top 100 intellectuals of this planet , Part 10 - Capt Ajit Vadakayil




THIS POST IS CONTINUED FROM PART 9, BELOW--





SOMEBODY CALLED ME UP AND ASKED ME..

CAPTAIN—

WHO IS MUHAMMAD IBN MUSA AL-KHWARIZMI WHOM MODERN HISTORIANS ARE CALLING THE “FATHER OF COMPUTER SCIENCE” AND THE “FATHER OF ALGORITHMS”??.

LISTEN –

ARAB MUHAMMAD IBN MUSA AL-KHWARIZMI WAS A BRAIN DEAD FELLOW WHOSE ENTIRE WORK WAS SOLD TO HIM TRANSLATED INTO ARABIC BY THE CALCIUT KING FOR GOLD.

THE CALICUT KING MADE HIS MONEY BY NOT ONLY SELLING SPICES –BUT KNOWLEDGE TOO.

HE MAMANKAM FEST HELF AT TIRUNAVAYA KERALA BY THE CALICUT KING EVERY 12 YEARS WAS AN OCCASION WHERE KNOWLEDGE WAS SOLD FOR GOLD.

http://ajitvadakayil.blogspot.com/2019/10/perumal-title-of-calicut-thiyya-kings.html

EVERY ANCIENT GREEK SCHOLAR ( PYTHAGORAS/ PLATO/ SOCRATES ETC ) EXCEPT ARISTOTLE STUDIED AT KODUNGALLUR UNIVERSITY.. THE KERALA SCHOOL OF MATH WAS PART OF IT.

OUR ANCIENT BOOKS ON KNOWLEDGE DID NOT HAVE THE AUTHORs NAME AFFIXED ON THE COVER AS WE CONSIDERED BOOKS AS THE WORK OF SOULS , WHO WOULD BE BORN IN ANOTHER WOMANs WOMB AFTER DEATH.

THE GREEKS TOOK ADVANTAGE OF THIS , STOLE KNOWLEDGE FROM KERALA / INDIA AND PATENTED IT IN THEIR OWN NAMES, WITH HALF BAKED UNDERSTANDING .

WHEN THE KING OF CALICUT CAME TO KNOW THIS, HE BLACKBALLED GREEKS FROM KODUNGALLUR UNIVERSITY .. AND SUDDENLY ANCIENT GREEK KNOWLEDGE DRIED UP LIKE WATER IN THE HOT DESERT SANDS.

LATER THE CALICUT KING SOLD TRANSLATED INTO ARABIC KNOWLEDGE TO BRAIN DEAD ARABS LIKE MUHAMMAD IBN MUSA AL-KHWARIZMI FOR GOLD..

THESE ARAB MIDDLE MEN SOLD KNOWLEDGE ( LIKE MIDDLEMEN FOR SPICES) TO WHITE MEN FOR A PREMIUM.

FIBONACCI TOOK HIS ARABIC WORKS TO ITALY FROM BEJAYA , ALGERIA.

http://ajitvadakayil.blogspot.com/2010/12/perfect-six-pack-capt-ajit-vadakayil.html

EVERY VESTIGE OF ARAB KNOWLEDGE IN THE MIDDLE AGES WAS SOLD IN TRANSLATED ARABIC BY KODUNGALLUR UNIVERSITY FOR GOLD..

FROM 800 AD TO 1450 AD KODUNGALLUR UNIVERSITY OWNED BY THE CALICUT KING EARNED HUGE AMOUNT OF GOLD FOR SELLING READY MADE TRANSLATED KNOWLEDGE ..

THIS IS TIPU SULTANS GOLD WHO STOLE IT FROM NORTH KERALA TEMPLE VAULTS.. ROTHSCHILD BECAME THE RICHEST MAN ON THIS PLANET BY STEALING TIPU SUTANs GOLD IN 1799 AD.

http://ajitvadakayil.blogspot.com/2011/10/tipu-sultan-unmasked-capt-ajit.html

WHEN TIPU SULTAN WAS BLASTING TEMPLE VAULTS, LESS THAN 1% OF THE GOLD WAS SECRETLY TRANSFERRED TO SOUTH KERALA ( TRADITIONAL ENEMIES ) OF THE CALICUT KING. LIKE HOW SADDAM HUSSAIN FLEW HIS FIGHTER JETS TO ENEMY IRAN .

THIS IS THE GOLD WHICH WAS UNEARTHED FROM PADMANABHASWAMY TEMPLE..

http://ajitvadakayil.blogspot.com/2013/01/mansa-musa-king-of-mali-and-sri.html

ALGORITHMS ARE SHORTCUTS PEOPLE USE TO TELL COMPUTERS WHAT TO DO. AT ITS MOST BASIC, AN ALGORITHM SIMPLY TELLS A COMPUTER WHAT TO DO NEXT WITH AN “AND,” “OR,” OR “NOT” STATEMENT.

THE ALGORITHM IS BASICALLY A CODE DEVELOPED TO CARRY OUT A SPECIFIC PROCESS. ALGORITHMS ARE SETS OF RULES, INITIALLY SET BY HUMANS, FOR COMPUTER PROGRAMS TO FOLLOW.

A PROGRAMMING ALGORITHM IS A COMPUTER PROCEDURE THAT IS A LOT LIKE A RECIPE (CALLED A PROCEDURE) AND TELLS YOUR COMPUTER PRECISELY WHAT STEPS TO TAKE TO SOLVE A PROBLEM OR REACH A GOAL.

THERE IS NO ARTIFICIAL INTELLIGENCE WITHOUT ALGORITHMS. ALGORITHMS ARE, IN PART, OUR OPINIONS EMBEDDED IN CODE.

ALGORITHMS ARE AS OLD AS DANAVA CIVILIZATION ITSELF – THIEF GREEK EUCLID’S ALGORITHM BEING ONE OF THE FIRST EXAMPLES DATING BACK SOME 2300 YEARS

EUCLID JUST PATENTED MATH HE LEARNT IN THE KERALA SCHOOL OF MATH IN HIS OWN NAME.. EUCLID IS A THIEF LIKE PYTHAGORAS WHO LEARNT IN THE KERALA SCHOOL OF MATH.

http://ajitvadakayil.blogspot.com/2011/01/isaac-newton-calculus-thief-capt-ajit.html

ALGEBRA DERIVED FROM BRAIN DEAD AL-JABR, ONE OF THE TWO OPERATIONS HE USED TO SOLVE QUADRATIC EQUATIONS.

ALGORISM AND ALGORITHM STEM FROM ALGORITMI, THE LATIN FORM OF HIS NAME.


CONTINUED TO 2--

  1. CONTINUED FROM 1-

    BRAIN DEAD CUNT AL-KHWARIZMI DEVELOPED THE CONCEPT OF THE ALGORITHM IN MATHEMATICS -WHICH IS A REASON FOR HIS BEING CALLED THE GRANDFATHER OF COMPUTER SCIENCE ( SIC ).. THEY SAY THAT THE WORD “ALGORITHM” IS ACTUALLY DERIVED FROM A LATINIZED VERSION OF AL-KHWARIZMI’S NAME BRAAAYYYYYYY.

    ALGORITMI DE NUMERO INDORUM IN ENGLISH AL-KHWARIZMI ON THE HINDU ART OF RECKONING GAVE RISE TO THE WORD ALGORITHM DERIVING FROM HIS NAME IN THE TITLE. THE WORK DESCRIBES THE HINDU PLACE-VALUE SYSTEM OF NUMERALS BASED ON 1, 2, 3, 4, 5, 6, 7, 8, 9, AND 0. THE FIRST USE OF ZERO AS A PLACE HOLDER IN POSITIONAL BASE NOTATION WAS DUE TO AL-KHWARIZMI IN THIS WORK.

    ANOTHER IMPORTANT WORK BY AL-KHWARIZMI WAS HIS WORK SINDHIND ZIJ ON ASTRONOMY. THE WORK, DESCRIBED IN DETAIL IN , IS BASED IN INDIAN ASTRONOMICAL WORKS..

    THE MAIN TOPICS COVERED BY AL-KHWARIZMI IN THE SINDHIND ZIJ ARE CALENDARS; CALCULATING TRUE POSITIONS OF THE SUN, MOON AND PLANETS, TABLES OF SINES AND TANGENTS; SPHERICAL ASTRONOMY; ASTROLOGICAL TABLES; PARALLAX AND ECLIPSE CALCULATIONS; AND VISIBILITY OF THE MOON. A RELATED MANUSCRIPT, ATTRIBUTED TO AL-KHWARIZMI, ON SPHERICAL TRIGONOMETRY IS DISCUSSED..

    PTOLEMY’ ENTIRE WORKS ARE LIFTED FROM KODUNGALLUR UNIVERSITY KERALA OWNED BY THE CALICUT KING. AL-KHWARIZMI'S TABLES WERE CAST ON PTOLEMY’S TABLES.

    AL-KHWARIZMI WROTE ON THE ASTROLABE AND SUNDIALS ,WHICH ARE HINDU INSTRUMENTS

    THERE IS A STATUE OF MUHAMMAD IBN MUSA AL-KHWARIZMI HOLDING UP AN ASTROLABE IN FRONT OF THE FACULTY OF MATHEMATICS OF AMIRKABIR UNIVERSITY OF TECHNOLOGY IN TEHRAN . HE GOT AN ASTROLABE INSTRUMENT AND TRANSLATED INTO ARABIC NOTES OF THE MANUAL ( BOTH CONSTRUCTION AND OPERATIONAL ) FOR GOLD .. HIS ASTROLABE INSTRUMENT HAD PLATES FOR MECCA/ ISTANBUL/ ALEXANDRIA.

    ASTROLABE BRASS INSTRUMENTS WERE SOLD BY KODUNGALLUR UNIVERSITY PROFESSORS AT THE LIBRARY OF CORDOBA IN SPAIN..

    THESE SIMPLE BRASS DEEP SEA NAVIGATION INSTRUMENTS WERE PRODUCED MUCH BEFORE THE COMPLICATED ANTIKYTHERA AUTOMATIC ( PERPETUAL MOTION ) MECHANISM..

    THE DEEP SEA NAVIGATING SHIPS OF QUEEN DIDO , A KERALA THIYYA PRINCESS WHO TAUGHT AT THE UNIVERSITY OF ALEXANDRIA IN 1600 BC ( ON DEPUTATION FROM KODUNGALLUR UNIVERSITY ) CARRIED THESE INSTRUMENTS..

    http://ajitvadakayil.blogspot.com/2019/05/the-ancient-7000-year-old-shakti.html

    ASTROLABE IT IS AN ELABORATE INCLINOMETER, HISTORICALLY USED BY ASTRONOMERS AND NAVIGATORS TO MEASURE THE ALTITUDE ABOVE THE HORIZON OF A CELESTIAL BODY, DAY OR NIGHT.

    IT CAN BE USED TO IDENTIFY STARS OR PLANETS, TO DETERMINE LOCAL LATITUDE GIVEN LOCAL TIME (AND VICE VERSA), TO SURVEY, OR TO TRIANGULATE. ASTROLABE WAS CALLED SITARA YANTRA..

    http://ajitvadakayil.blogspot.com/2019/09/onam-our-only-link-to-planets-oldest.html

    AN ASTROLABE (SOLD IN CORDOBA SPAIN ) WAS EXCAVATED FROM THE WRECK SITE OF A PORTUGUESE ARMADA SHIP AS THE OLDEST IN THE WORLD. THEY ALSO CERTIFIED A SHIP'S BELL -- DATED 1498 -- RECOVERED FROM THE SAME WRECK SITE ALSO AS THE OLDEST IN THE WORLD.

    DONT EVER THINK THAT VASCO DA GAMA AND COLUMBUS NAVIGATED ON WESTERN TECHNOLOGY.. THEY USED ANCIENT DEEP SEA NAVIGATING INSTRUMENTS OF ANCIENT KERALA THIYYA NAVIGATORS..

    DIOPHANTUS STUDIED IN KODUNGALLUR UNIVERSITY. HE IS THE AUTHOR OF A SERIES OF BOOKS CALLED ARITHMETICA, ALL LIFTED FROM KERALA SCHOOL OF MATH.

    THIEF DIOPHANTUS WAS THE FIRST GREEK MATHEMATICIAN WHO RECOGNIZED FRACTIONS AS NUMBERS; THUS HE ALLOWED POSITIVE RATIONAL NUMBERS FOR THE COEFFICIENTS AND SOLUTIONS.

    IN MODERN USE, DIOPHANTINE EQUATIONS ARE USUALLY ALGEBRAIC EQUATIONS WITH INTEGER COEFFICIENTS, FOR WHICH INTEGER SOLUTIONS ARE SOUGHT. DIOPHANTUS WAS A BRAIN DEAD FELLOW WHO STOLE HIS ALGEBRA FROM THE KERALA SCHOOL OF MATH.

    MEDIOCRE BRAIN JEW ALBERT EINSTEIN WAS A THIEF… HE STOLE FROM PART TWO ( BRAHMANAS ) AND PART THREE ( ARANYAKAS ) OF THE VEDAS..

    http://ajitvadakayil.blogspot.com/2018/11/albert-einstein-was-thief-plagiarist.html

    LIES WONT WORK.. A BROWN BLOGGER IS IN TOWN !

    Capt ajit vadakayil
    ..

  1. https://ajitvadakayil.blogspot.com/2019/12/how-italian-waitress-became-empress-of.html

    TODAY SONIA GANDHI IS ALL OVER TV, RUNNING DOWN MODI AND CAB/ NRC..

    WHAT IS MOST HILARIOUS IS THAT SHE IS SITTING IN FRONT OF A BOOKSHELF PACKED WITH THICK HARDBOUND BOOKS..

    WE ARE SUPPOSED TO IMAGINE-- OOOOHHH SUCH A LEARNED ITALIAN GENIUS..

    WHO IS THIS WOMAN?

    WHEN SHE MARRIED RAJIV GANDHI, MASSIVE PROPAGANDA WAS DONE THAT SHE WAS THE CLASS MATE OF RAJIV GANDHI AT CAMBRIDGE UNIVERSITY.. AND RAJIV GANDHI FELL FOR THIS ITALIAN BEAUTY...

    IN REALITY , SHE WAS A WAITRESS IN CAMBRIDGE TOWN..

    THIS DECEIT IS AKIN TO A CHAMIYA BEER BAR WAITRESS IN MUMBAI DECLARING THAT SHE STUDIED IN IIT MUMBAI..

    THE ITALIAN WAITRESS ( MAINO JEWESS ) TURNED EMPRESS VIA NAC, NEVER GAVE AN INTERVIEW IN HER LIFE ..

    ONCE SHE GAVE THAT TRAITOR JOURNALIST RAJDEEP SARDESAI AN INTERVIEW..

    THE WHOLE CONVERSATION NEVER TOOK OFF BEYOND WHAT COLOUR SARI INDIRA GANDHI LIKED OR WHAT TYPE OF SPAGHETTI SHE COOKED..

    AMIGO

    ANTONIO

    COLCOTRONI

    VERGOTTINI

    BABINO

    SPAGHETTI

    ###########

    HERE IS A TRUE STORY ABOUT VERGOTTINI

    I WITNESSED THIS AS A SIX YEAR OLD BOY IN CALICUT

    FATHER VERGOTTINI WAS AN ITALIAN PRIEST IN CALICUT.. HE WORE WHITE ROBES AND DROVE A BOTTLE GREEN ITALIAN SPORTS CAR ...

    HE WAS STALL AND HANDSOME IN HIS OLD AGE AND COULD TURN EYES AS HE DROVE PAST..HE PRESIDED OVER ALMOST 9O % OF SPORTS FUNCTIONS IN CALICUT..

    ONE DAY, A THIEF ON CYCLE SNATCHED THE GOLD CHAIN OF A SCHOOL GIRL .. I KNEW THIS GIRL AND SHE WAS CRYING..

    SO I RAISED AN ALARM , AND ONE OF THE RAMBO TYPES OF CALICUT APPEARED.. HE WAS MY NEIGHBOURs RELATIVE ..

    HE RAN AND APPREHENDED THE THIEF IN A RESTAURANT , AND GOT HIM AND THE GOLD CHAIN BACK TO THE CRYING GIRL..

    PRETTY SOON A LARGE CROWD OF MORE THAN 300 GATHERED , AND WE WERE ALL POUNDING THE THIEF TAKING TURNS--GIVE A PUNCH AND GO BACK FOR OTHERS TO COME AND PUNCH..

    SUDDENLY ONE MAN CRIED-- STOP HITTING HIM -- WE HAVE BEATEN HIM ENOUGH.. HE HAS LEARNT HIS LESSON.. IF WE HIT HIM ANYMORE, HE WILL DIE..

    THEN A HEAVY ITALIAN VOICE ( IN MALAYALAM ) COMES FROM FATHER VERGOTTINI, WATCHING FROM THE BACK GROUND..

    "IYYAALE VERUTHE VIDAAN PADILLA " ( DONT SPARE HIM--GIVE HIM SOME MORE )

    BELIEVE THIS OR NOT-- THE ENTIRE CROW WAS IN SPLITS --LAUGHING THEIR GUTS OUT.. HERE WAS A MAN OF PEACE ENCOURAGING VIOLENCE.I HAVE NEVER SEEN A MOB MOOD TURN FROM ANGER TO EXTREME MIRTH..

    THIS IS WHY I SAY AI MACHINES CAN NEVER DETECT HUMOR..

    THIS PADRE WAS A PEDOPHILE.. HE SEXUALLY MOLESTED HUNDREDS OF SMALL GIRLS IN ST VINCENT COLONY GIRLS SCHOOL , CALICUT.. I GOT THIS FROM A GIRL WHO WAS MOLESTED ..

    SUCH WAS HIS CLOUT THAT NOBODY DARED TO UTTER A WORD AGAINST HIM..

    capt ajit vadakayil
    ..




CAPT AJIT VADAKAYIL SAYS  A MUST MEAN  “INTELLIGENCE AUGUMENTATION “  IN FUTURE ..

Let this be IA


OBJECTIVE AI CANNOT HAVE A VISION,  
IT CANNOT PRIORITIZE,   
IT CANT GLEAN CONTEXT,   
IT CANT TELL THE MORAL OF A STORY ,  
IT CANT RECOGNIZE A JOKE, OR BE A JUDGE IN A JOKE CONTEST  
IT CANT DRIVE CHANGE,    
IT CANNOT INNOVATE, 
IT CANNOT DO ROOT CAUSE ANALYSIS ,  
IT CANNOT MULTI-TASK,   
IT CANNOT DETECT SARCASM,  
IT CANNOT DO DYNAMIC RISK ASSESSMENT ,  
IT IS UNABLE TO REFINE OWN KNOWLEDGE TO WISDOM, 
IT IS BLIND TO SUBJECTIVITY,  
IT CANNOT EVALUATE POTENTIAL,   
IT CANNOT SELF IMPROVE WITH EXPERIENCE,
IT CANNOT UNLEARN
IT IS PRONE TO CATASTROPHIC FORGETTING    
IT DOES NOT UNDERSTAND BASICS OF CAUSE AND EFFECT,   
IT CANNOT JUDGE SUBJECTIVELY TO VETO/ ABORT,    
IT CANNOT FOSTER TEAMWORK DUE TO RESTRICTED SCOPE,  
IT CANNOT MENTOR,   
IT CANNOT BE CREATIVE,  
IT CANNOT THINK FOR ITSELF, 
IT CANNOT TEACH OR ANSWER STUDENTs QUESTIONS,  
IT CANNOT PATENT AN INVENTION, 
IT CANNOT SEE THE BIG PICTURE , 
IT CANNOT FIGURE OUT WHAT IS MORALLY WRONG, 
IT CANNOT PROVIDE NATURAL JUSTICE, 
IT CANNOT FORMULATE LAWS
IT CANNOT FIGURE OUT WHAT GOES AGAINST HUMAN DIGNITY
IT CAN BE FOOLED EASILY USING DECOYS WHICH CANT FOOL A CHILD, 
IT CANNOT BE A SELF STARTER, 
IT CANNOT UNDERSTAND APT TIMING, 
IT CANNOT FEEL
IT CANNOT GET INSPIRED
IT CANNOT USE PAIN AS FEEDBACK,
IT CANNOT GET EXCITED BY ANYTHING
IT HAS NO SPONTANEITY TO MAKE THE BEST OUT OF  SITUATION 
IT CAN BE CONFOUNDED BY NEW SITUATIONS
IT CANNOT FIGURE OUT GREY AREAS,
IT CANNOT GLEAN WORTH OR VALUE
IT CANNOT UNDERSTAND TEAMWORK DYNAMICS 
IT HAS NO INTENTION
IT HAS NO INTUITION,
IT HAS NO FREE WILL
IT HAS NO DESIRE
IT CANNOT SET A GOAL

IT CANNOT BE SUBJECTED TO THE LAWS OF KARMA

ON THE CONTRARY IT CAN SPAWN FOUL AND RUTHLESS GLOBAL FRAUD ( CLIMATE CHANGE DUE TO CO2 ) WITH DELIBERATE BLACK BOX ALGORITHMS,  JUST FEW AMONG MORE THAN 60 CRITICAL INHERENT DEFICIENCIES.



HUMANS HAVE THINGS A COMPUTER CAN NEVER HAVE.. A SUBCONSCIOUS BRAIN LOBE,  REM SLEEP WHICH BACKS UP BETWEEN RIGHT/ LEFT BRAIN LOBES AND FROM AAKASHA BANK,  A GUT WHICH INTUITS,   30 TRILLION BODY CELLS WHICH HOLD MEMORY,   A VAGUS NERVE , AN AMYGDALA ,  73% WATER IN BRAIN FOR MEMORY,  10 BILLION MILES ORGANIC DNA MOBIUS WIRING ETC.



SINGULARITY ,  MY ASS !





The primary reason behind the shift to the cloud is the cost-friendliness of the technology when compared to on-site storage. This stems from the fact as it does not need any investments on physical investments or any kind of expert for the management as it is handled by the cloud service provider.

Cloud computing removes hardware expenses, as hardware is provided by a vendor. There’s no need to buy, install, configure, and maintain servers, databases, and other components of your runtime environment. Moreover, using cloud-based solutions, you pay only for what you use, so if you don’t need extra resources you can simply scale down and not pay for them.

You pay for the capacity you use. This allows your organization to treat cloud storage costs as an ongoing operating expense instead of a capital expense with the associated upfront investments and tax implications.


The costs associated with the hardware, applications, and bandwidth are responsibility of the supplier. The payment of the service is usually monthly or annual and according to the usage as it follows the model, pay-as-you-go.

Organizations that deploy cloud computing services save more than 35 percent on operating costs each year. Maintaining an in-house IT team big enough to manage local servers can quickly lead to a ballooning budget.

Cost of benefits, which cloud service can help reduce include , fewer upfront costs, since you are not required to purchase hardware. Potential for lower lifetime costs on configuration and maintenance. Access to expert assistance on setup, configuration, maintenance, and software licenses. Potential to consolidate servers and increase workload efficiency..

Server virtualization brings positive transformations, such as reduced hardware costs, improved server provisioning and deployment, better disaster recovery solutions, efficient and economic use of energy, and increased staff productivity.



There are a lot of options available in the market, you need to dig deeper into Shared vs Cloud vs Dedicated hosting to decide which best suits your needs.
Before taking a final call, Ask yourself these Questions:
What’s my monthly budget?
Daily and monthly traffic I expect on my website
Any expected traffic spikes? If yes, how much?
Security requirements.
Do I need a dedicated IP for my website?
Is private SSL required?
Do I need server root access?

Best Cheap Cloud Hosting Providers 2019--

Vultr. Vultr is a very cheap cloud hosting provider which offer plans starting at $2.50 per month. ...
Kamatera – Get 30 Days Free Trial. ...
CloudWays. ...
Host1Plus | Heficed. ...
Digital Ocean. ...
InterServer. ...
A2Hosting [99.99% Uptime] ...
BlueHost [Best for Bloggers]


Now Google is making a terabyte of cloud storage available for just $10. Check out Google Drive's new pricing structure announced last week, which now offers the first 15 GB per month for free. For $100 a month, Google offers as much space you could ever need: 10 terabytes or more.

The Google Cloud Platform Free Tier gives you free resources to learn about Google Cloud Platform (GCP) services by trying them on your own. ... A 12-month free trial with $300 credit to use with any GCP services. Always Free, which provides limited access to many common GCP resources, free of charge.

Scalability in the context of cloud computing can be defined as the ability to handle growing or diminishing resources to meet business demands in a capable way. In essence, scalability is a planned level of capacity that can grow or shrink as needed.

Public cloud solutions allow you to evolve at almost infinite speed. This would not be possible in a local data center. Because the division of resources between customers is done dynamically, your business can double or even triple the amount of computing and storage to meet peak demand.

The hiring of the service is done on demand. This way, you also gain scalability to grow. If there are traffic spikes or the data center reaches the operating limit, simply switch to a more comprehensive plan. Again, it’s a cheaper solution than buying mainframes and routers.

Cloud hosting provides scalability at a vast scale as compared to dedicated hosting. This is a treat for those users who have customers with demands changing on a daily basis. So basically one can scale up or down easily with cloud hosting and meet the flexibility in their demands.

Scalability is one of the most valuable and predominant feature of cloud computing. Through scalability you can scale up your data storage capacity or scale it down to meet the demands of your growing business

Simply put, if a cloud computing system (i.e. networks, storage, servers, applications and services) can rapidly respond to meet new demands – either in size or volume – it is scalable. Traditionally, businesses were tied to physical constraints, such as hard-drive space and memory, all of which impeded scalability

One of the main benefits that come with using public cloud services is the ease of scalability—to a point. For small and medium-sized businesses in general, scalability is pay-as-you-go. The resources are pretty much offered 'on demand' so any changes in activity level can be handled very easily. This, in turn, brings with it cost-effectiveness.

Thanks to the pooling of a large number of resources, users are benefiting from the savings of large-scale operations. There are many services, like Google Drive, which are offered for free.

Finally, the vast network of servers involved in public cloud services means that it can benefit from greater reliability.

On-premises solutions are rather difficult to scale, as the type of hardware needed depends on your application’s demands. If your app experiences heavy traffic, you might need to significantly upgrade on-premises hardware. This problem doesn’t exist with a cloud service, which you can quickly scale up or down with a few clicks. Cloud services are a perfect solution for handling peak loads. With cloud-based services, businesses can use whatever computing resources they need.

Growth constraints are one of the most severe limitations of on-premise storage. With cloud storage, you can scale up as much as you need. Capacity is virtually unlimited.

Cloud hosting allows you to be more flexible with your tech resources. Cloud hosting companies go to great lengths to make sure that you can easily scale your site’s processing power and disk space as you go. This makes cloud hosting a great option for growing businesses.

The consequences of not having enough computing or storage resources are dire: First come performance issues, then users start getting error messages and then they are locked out of applications.

Unfortunately, some organizations panic and try to solve the problem by buying more and more computer hardware. That can make the problem worse: if demand drops, hardware goes underutilized and constrains a company’s capital expenditure budget.

Scalability is the ability to handle growing or diminishing resources to meet business demands. In other words, scalability is a planned level of capacity that can grow or shrink as needed. It means your IT environment is suddenly flexible enough to deliver exactly the right amount of computing power when you need it.

When computer scientists talk about the kind of growth seen in most corporate environments, it’s called exponential growth. That word gets used a lot and may be one of the most misused terms in vogue today. To understand why traditional IT technology cannot be expected to process high volumes of data, it’s important to understand that term.

When faced with an exponentially growing challenge, people often respond with linear solutions. When a law firm that is used to dealing with gigabytes of evidence in litigation starts to get cases involving a terabyte of data, their instinct is to upgrade their technology. That means giving their IT guy a budget to buy more computers.

Unfortunately, computers can be a bottleneck. You can always throw hardware at the problem, but when an application that used to create several gigabytes of data are suddenly creating terabytes of data, a few new computers is not going to address the problem.

Because cloud providers can scale to manage increasing demand, you can have an non-linear solution for your business challenges. A cloud provider like Amazon Web Services hosts trillions of objects at any one time, which means your exponential growth is just a blip to them.

Scalability Testing is defined as the ability of a network, system or a process to continue to function well when changes are done in the size or volume of the system to meet a growing need. It is a type of non-functional testing.

Scalability testing ensures that an application can handle the projected increase in user traffic, data volume, transaction counts frequency, etc. It tests the system, processes, and databases ability to meet a growing need.

It is also referred to as performance testing, as such, it is focused on the behavior of the application when deployed to a larger system or tested under excess load.

In Software Engineering, Scalability Testing is to measure at what point the application stops scaling and identify the reason behind it.

Why do Scalability Testing--
Scalability testing lets you determine how your application scales with increasing workload.
Determine the user limit for the Web application.
Determine client-side degradation and end user experience under load.
Determine server-side robustness and degradation.
What to test in Scalability Testing

Here are few Scalability Testing Attributes:-- 
Response Time
Screen transition
Throughput
Time (Session time, reboot time, printing time, transaction time, task execution time)
Performance measurement with a number of users
Request per seconds, Transaction per seconds, Hits per second
Performance measurement with a number of users
Network Usage
CPU / Memory Usage
Web Server ( request and response per seconds)
Performance measurement under load
Test Strategy for Scalability testing
Test Strategy for Scalability Testing differ in terms of the type of application is being tested. If an application accesses a database, testing parameters will be testing the size of the database in relation to the number of users and so on.

Prerequisites for Scalability Testing-- 
Load Distribution Capability- Check whether the load test tool enables the load to be generated from multiple machines and controlled from a central point.
Operating System- Check what operating systems do the load generation agents and load test master run under
Processor- Check what type of CPU is required for the virtual user agent and load test master
Memory- Check how much memory would be enough for the virtual user agent and load test master

How to do Scalability Testing--
Define a process that is repeatable for executing scalability tests throughout the application life-cycle
Determine the criteria for scalability
Shortlist the software tools required to run the load test
Set the testing environment and configure the hardware required to execute scalability tests
Plan the test scenarios as well as Scalability Tests
Create and verify visual script
Create and verify the load test scenarios
Execute the tests
Evaluate the results
Generate required reports
Scalability Test Plan

Before you actually create the tests, develop a detailed test plan. It is an important step to ensure that the test conforms as per the application requirement.

Following are the attributes for creating a well-defined Test Plan for Scalability Testing.--

Steps for Scripts: The test script should have a detailed step that determines the exact actions a user would perform.
Run-Time Data: The test plan should determine any run-time data that is required to interact with the application
Data Driven Tests: If the scripts need varying data at run-time, you need to have an understanding of all the fields that require this data.
Virtualization is what makes scalability in cloud computing possible.

Virtual machines (VMs) are scalable. They’re not like physical machines, whose resources are relatively fixed.

You can add any amount of resources to VMs at any time. You can scale them up by:--

Moving them to a server with more resources
Hosting them on multiple servers at once (clustering)
The other reason cloud computing is scalable? Cloud providers already have all the necessary hardware and software in place.
Individual businesses, in contrast, can’t afford to have surplus hardware on standby.

Cloud Scaling Strategies--

There are two ways to scale: vertically or horizontally. When you scale vertically, it’s often called scaling up or down. When you scale horizontally, you are scaling out or in.

Cloud Vertical Scaling refers to adding more CPU, memory, or I/O resources to an existing server, or replacing one server with a more powerful server. Amazon Web Services (AWS) vertical scaling and Microsoft Azure vertical scaling can be accomplished by changing instance sizes, or in a data center by purchasing a new, more powerful appliance and discarding the old one. AWS and Azure cloud services have many different instance sizes, so scaling vertically is possible for everything from EC2 instances to RDS databases.

Cloud Horizontal Scaling refers to provisioning additional servers to meet your needs, often splitting workloads between servers to limit the number of requests any individual server is getting. In a cloud-based environment, this would mean adding additional instances instead of moving to a larger instance size.

In practice, scaling horizontally (or out and in) is usually the best practice. It’s much easier to accomplish without downtime—even in a cloud environment, scaling vertically usually requires making the application unavailable for some amount of time. Horizontal scaling is also easier to manage automatically, and limiting the number of requests any instance gets at one time is good for performance, no matter how large the instance.

Manual vs Scheduled vs Automatic

There are essentially three ways to scale in a cloud environment: Manually, scheduled and automatic.
Manual scaling is just as it sounds. It requires an engineer to manage scaling up and out or down and in. 

In the cloud, both vertical and horizontal scaling can be accomplished with the push of a button, so the actual scaling isn’t terribly difficult. However, because it requires a team member’s attention, manual scaling cannot take into account all the minute-by-minute fluctuations in demand seen by a normal application. This also can lead to human error. An individual might forget to scale back down, leading to extra charges.

Scheduled scaling solves some of the problems with manual scaling. Based on your usual demand curve, you can scale out to, for example, 10 instances from 5 pm to 10 pm and then back into two instances from 10 pm to 7 am, then back out to five instances at 5 pm. This makes it easier to tailor your provisioning to your actual usage without requiring a team member to make the changes manually every day.

Automatic scaling (also known as autoscaling) is when your compute, database, and storage resources scale automatically based on predefined rules. For example, when metrics like vCPU, memory, and network utilization rates go above or below a certain threshold, you can scale up, down, out or in. 

Autoscaling makes it possible to ensure your application is always available—and always has enough resources provisioned to prevent performance problems or outages—without paying for far more resources than you are actually using. 

Scaling and Cost Management

Scaling is one of the most important components of cloud cost management. Right Sizing instances, or choosing the correct instance sizes based on your actual application utilization, is one of the easiest ways to reduce cloud costs without affecting performance in any way. 

There are also some cost management strategies, like Reserved Instance (RI) purchases, that take away some of the ability to scale in or down, because you’re committing to using a certain amount and type of resources for one to three years.


When you’re looking for ways to reduce costs, it’s important to understand your current usage patterns and utilization rates to make the best decisions about how to strike a balance between total scaling flexibility and cost management strategies like Reserved Instance purchases.


The most obvious and the biggest advantage of cloud computing is the endless storage capacity which can be expanded on a very nominal monthly fee.

Unlike traditional storage infrastructure, the cloud offers a more secure ecosystem and significantly brings down the chances of hacking, malware and even threat from viruses.

A great thing about using a cloud computing platform is the unlimited capacity of data storage. Even if your cloud storage platform prompts you there’s limited space available, then you can always upgrade it by paying a little extra fee, whenever the need arises.

Managed cloud hosting is built on a high performing and private cloud infrastructure. It utilizes redundancy through its several servers, storage protection, and storage area network to deliver dependable failure protection.

If, however, you need to increase your processing power or storage space, you’ll have to upgrade to a more powerful server. Traditional web hosting companies offer limited computing resources and disk space, and once you consume your allocated resources, you’ll either end up with lower performance or having to pay a higher fee for a different hosting plan. And it isn’t just the $$ cost of moving to a more powerful plan, the extra cost can be counted in the time and hassle of having to make that move.

On the other hand, cloud hosting allows you to more easily scale your plan based on your specific needs. You’ll get access to multiple servers in the same cloud network enabling you to easily make use of the computer resources and storage space you need, when you need it. Some cloud hosting providers also let you track your usage and automatically scale resources through an intuitive management portal.

Off-site management: Your cloud provider assumes responsibility for maintaining and protecting the stored data. This frees your staff from tasks associated with storage, such as procurement, installation, administration, and maintenance. As such, your staff can focus on other priorities.


Quick implementation: Using a cloud service accelerates the process of setting up and adding to your storage capabilities. With cloud storage, you can provision the service and start using it within hours or days, depending on how much capacity is involved..
.
Cloud allows accessing of data or files from any location which is on the web. This comes in very handy in the latest work cultures where many employees are working remotely. In such cases having access to work-related files and documents becomes highly essential.

Public cloud has minimal risk of losing data as most of the cloud service providers will have multiple back-up infrastructures.

With your service provider taking care of maintenance and backups,

Data loss can spell disaster for a company of any size.. Cloud-based storage is much more secure than operating an on-site data center. Organizations that store their data on the premises see 51 percent more security incidents than those that use cloud storage.

Even if one data center was to fail entirely, the network simply redistributes the load among the remaining centers—making it highly unlikely that the public cloud would ever fail. In summary, the benefits of the public cloud are:--
Cost effectiveness
Increased reliability

This alternative is great for startups and other companies that want to maintain a lean structure without investing in equipment or physical space.

Business continuity: Storing data offsite supports business continuity in the event that a natural disaster or terrorist attack cuts access to your premises.

The advantages of cloud solutions are huge, so it stands to reason that the cloud services market is booming.   Global public cloud services market is expected to reach almost $247 billion this year and grow to over $383 billion by 2020.

Disadvantages of the public cloud

You can scale up with a public cloud, but you can also run into surprise costs if you need to move large amounts of data in, out, or even within the public cloud.

Performance can be an issue, too. Your data transmission might be affected by spikes in use across the internet. If application performance is a deal breaker for you, then you may be forced to go with a private cloud.


Benefits of a private cloud--
The private cloud allows you nearly all the same benefits of the public cloud, but more so. 
Most notably, the private cloud can provide a greater level of security, making it ideal for larger businesses, or businesses that handle HIPAA or financial data. With a private cloud, this can be achieved while still allowing the organization to benefit from cloud computing.

Private cloud services offer additional benefits for business users, including more control over the server. This allows it to be tailored to your own preferences and in-house styles. While this can remove some of the scalability options, private cloud providers often offer what is known as "cloud bursting" (aka hybrid clouds)—when non-sensitive data is switched to a public cloud to free up private cloud space in the event of a significant spike in demand.

In summary, the main benefits of the private cloud are:--
Improved security
Greater control over the server
Flexibility in the form of cloud bursting

Cloud computing enables high-speed data flow over the network. As a result, it causes faster big data processing. An enormous amount of IoT data generation which will feed the big data systems. To reduce the complexity of data blending in IoT which is one of its criteria to maximize its benefits. 

Cloud helps in achieving efficiency, accuracy, speed in implementing IoT applications. Cloud helps IoT application development but IoT is not a cloud computing. ... Many cloud service providers have identified this need and started giving IoT specific services to companies to create better IoT solutions

Immediate availability. Cloud solutions are available as soon as you’ve paid for them, so you can start using a cloud service right away. There’s no need to install and configure hardware.

Performance. Cloud companies equip their data centers with high-performance computing infrastructure that guarantees low network latency for your applications.

Security. Cloud infrastructure is kept in safe data centers to ensure a top level of security. Data is backed up and can easily be recovered. Moreover, cloud vendors ensure the security of your data by using networking firewalls, encryption, and sophisticated tools for detecting cybercrime and fraud.

Performance. Cloud hosting gives you better overall performance as compared to regular web hosting as it uses many servers to deliver the computing power and storage space your site needs. Its huge pool of computing resources allows you to tap into more resources, as necessary.

Uptime and consistent availability. Cloud hosting is built to be “self-troubleshooting”. It utilizes several servers which are joined together to automatically take over in case one or more servers face issues. In other words, your site’s visitors won’t experience any downtime even if the server your website is hosted on fails.

Disaster recovery. Disaster recovery is simple and easy with cloud hosting as they’re designed to automatically take regular data backups. Having several versions of your data eliminates the possibility of you losing your data.


A large majority of IT managers see the implementation of a disaster recovery plan as expensive, complex, and difficult to deploy. But now service providers such as Microsoft Azure provide disaster recovery for all major IT systems without the expenditure of any secondary infrastructure.

 One of the advantages of storing data in the cloud is that there isn’t one single point of failure. Your data gets backed up to several servers, so if one of them fails, your organization’s information remains safe and secure.

A single point of failure is what led to the infamous Equifax and Verizon data breaches, and many companies have taken steps to avoid this fatal flaw in storage security. Cloud storage is one way organizations can eliminate this danger.

Cloud computing allows multiple employees to view and make changes to files and documents in real time, providing a much more efficient way for workers to collaborate on projects. Accessing documents in the cloud helps ensure everyone is working from the correct version of a document and that obsolete versions don’t get passed between local sources.

A significant portion of maintaining in-house data storage is performing regular backups. The IT team has to take time to create backups and schedule them around daily operations. Cloud computing services go a long way toward automating these routine backups so your team can get back to doing the work that drives your business forward.

Cloud computing can free up your office for more workspace or amenities while eliminating the need to plan for future equipment expansion. With cloud, you do not have to worry about the installation of dedicated breakers, high voltage lines, special HVAC systems or even backup generators.

 Gone are the days when companies allocated a hefty budget on maintaining and installing their data centers. Now, they can store an endless amount of data, using a cloud computing software online.

Why is cloud better than on-premise?   Dubbed better than on-premise due to its flexibility, reliability and security, cloud removes the hassle of maintaining and updating systems, allowing you to invest your time, money and resources into fulfilling your core business strategies

Cloud can be configured to give your business the same features of a dedicated server in a shared environment. Cloud is more reliable as it runs on multiple servers and even if one component fails, services continue from the other servers. It is scalable on demand. Cloud is available via internet and allows the users to access the data from any location. Users pay for the services they use.

For a managed cloud hosting service the provider will generally take care of the following:--

High Availability.
Automated resource balancing. In case a server fails, cloud servers are able to quickly balance website loads between hardware servers which also automatically take backups. This is typically managed at the virtualization level and can also manage and update software and hardware.

Security Management. Protected firewalls and intrusion detection systems, virtual local area networks (VLAN), and intrusion prevention systems are used by managed cloud servers to offer a high-end security environment.

Hybridization of virtual and physical servers. Apps and database systems are able to share a dedicated network with cloud servers which creates physical and virtual systems on a single system.


As you might expect, managed cloud hosting is more expensive than unmanaged hosting as you are paying for more comprehensive support from the hosting company.

Yes, cloud hosting is more readily scalable than traditional web hosting. Easy scaling is one of the main benefits of the cloud.

With traditional web hosting, particularly shared hosting, hosting servers are allocated a fixed amount of computing resources. All of the websites that are hosted on the same server use those resources.


Cloud computing is entirely dependent on the internet. It cannot access or store data on the cloud without an internet connection.

If your Internet connection goes down, you won’t have access to data stored in the cloud for the duration of the outage.

A big cloud risk is that the vendor can go down as well. Anything from bad weather, DDoS attacks, or a good ol’ system failure can knock the service unresponsive.

99% uptime means 1% downtime. Over the course of 365 days, that’s 3.65 days the service will be down. That’s equal to 87.6 hours.

But when do those hours occur? Late at night? During the day?

If those 87 hours were to occur during business hours, then that’s equivalent to 10 days of downtime.

Can your client live without this service for 10 business days?

And remember: That’s just for the cloud service. The client’s internet connection will also experience downtime. If you again assume 99% uptime and 1% downtime, then that’s as much as 20 business days that your client will not be able to reach the cloud service.

Can your client live without the service for 20 days?

A breach of your data or your client’s data can be devastating depending on the type of data and the extent of the breach.

The costs of investigating and resolving a breach, associated legal expenses, and the losses to a company’s reputation, can be enough to shut its doors..

The security of the data stored on the cloud is something that everybody is concerned about. It doesn’t matter what package you decide to go for while choosing the cloud computing platform, you can’t deviate from the reality, i.e. you will be placing your sensitive data and information in the hands of a third party service.

KOSHER BIG BROTHER KNOWS EVERYTHING..  ALL BIG PLAYERS ARE AGENTS OF THE JEWISH  DEEP STATE..

Cloud storage cons include the following:

Security: Security concerns are common with cloud-based services. Cloud storage providers try to secure their infrastructure with up-to-date technologies and practices, but occasional breaches have occurred, creating discomfort with users.

Administrative control: Being able to view your data, access it, and move it at will is another common concern with cloud resources. Offloading maintenance and management to a third party offers advantages but also can limit your control over your data.

Latency: Delays in data transmission to and from the cloud can occur as a result of traffic congestion, especially when you use shared public internet connections. However, companies can minimize latency by increasing connection bandwidth.

Regulatory compliance: Certain industries, such as healthcare and finance, have to comply with strict data privacy and archival regulations, which may prevent companies from using cloud storage for certain types of files, such as medical and investment records. If you can, choose a cloud storage provider that supports compliance with any industry regulations impacting your business.

There are downsides to using public cloud services. At the top of the list is the fact that the security of data held within a public cloud is a cause for concern. It is often seen as an advantage that the public cloud has no geographical restrictions, making access easy from wherever you are. But on the flip side, this could mean that your server is in a different country which is governed by an entirely different set of security and/or privacy regulations. 

One simply can’t ignore the vulnerabilities of trusting someone else with your company’s sensitive data and information. Storing data on the cloud is akin to exposing your company’s important data and information to the potential threats over the internet. Therefore, to keep such information from becoming a hacker’s playground, always remember to keep your passwords discreet. Plus, every once or twice a month, don’t forget to update your cloud’s password.

EXTRA SENSITIVE DATA , DON’T EVEN COUNT PASSWORDS TO PROTECT..  IT IS A PIECE OF CAKE TO HACK PASSWORDS

Cloud computing refers to the delivery of computing services over the internet—e.g., software applications, networks, storage, servers... You have no control and visibility over how the data center is managed and how and where your data is stored.




Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property. ... If anyone who is not specifically authorized to do so views such data, the organization charged with protecting that information is said to have suffered a data breach.

Data Breaches Expose 4.1 Billion Records In First Six Months Of 2019. According to Risk Based Security research newly published in the 2019 MidYear QuickView Data Breach Report, the first six months of 2019 have seen more than 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records

Google to shut down Google+ early due to bug that leaked data of 52.5 million users. ... This marks the second data breach for Google's disappointing social network. The first occurred in October, when up to 500,000 users' data was compromised. Shortly after, Google announced it would shut down the platform in 2019

In September of 2017, Equifax announced a data breach that exposed the personal information of 147 million people. Under a settlement filed today, Equifax agreed to spend up to $425 million to help people affected by the data breach.

The financial impact of unplanned downtime cannot be understated. For every minute of unplanned downtime due to a data center outage, a company loses $5,600 on average. That’s $300,000 in just one hour. While employees might enjoy the extra time spent in the break room, the productivity lost during that time is money you won’t get back. Unplanned downtime can also heavily damage a company’s reputation if it affects customers.

A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashionAs hackers demonstrated through the celebrity iCloud breach, poor password security can give cybercriminals an all-access pass to your private data. ... However, the biggest cause of concern for Cloud storage isn't hacked data, it's lost data.

One of the most famous examples of failure to protect against this personnel security risk is Edward Snowden and his exposure of the U.S. National Security Agency's surveillance program, PRISM.

Besides data storage of large-scaled data, cloud computing environment usually provides data processing service. ... Cloud computing providers are trusted to maintain data integrity and accuracy.

A data breach occurs when a cybercriminal successfully infiltrates a data source and extracts sensitive information. This can be done physically by accessing a computer or network to steal local files or by bypassing network security remotely


Sometimes, hackers want to steal your data so that they can hold it for ransom. This type of attack is a ransomware attack. ... Hackers usually execute ransomware attacks by gaining unauthorized access to data, then encrypting it or moving it and charging a ransom in order to restore your access to it.




Be sure to use the appropriate security methods, such as Intrusion Detection and Prevention (IDPS) systems.

An Intrusion Prevention System or IPS, also known as an Intrusion Detection and Prevention System or IDPS, is a network security appliance that monitors network and system activities and detects possible intrusions.



Intrusion detection is the process of monitoring the events occurring in your network and analyzing them for signs of possible incidents, violations, or imminent threats to your security policies. 

Intrusion prevention is the process of performing intrusion detection and then stopping the detected incidents. These security measures are available as intrusion detection systems (IDS) and intrusion prevention systems (IPS), which become part of your network to detect and stop potential incidents.
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) constantly watch your network, identifying possible incidents and logging information about them, stopping the incidents, and reporting them to security administrators.

 In addition, some networks use IDS/IPS for identifying problems with security policies and deterring individuals from violating security policies. IDS/IPS have become a necessary addition to the security infrastructure of most organizations, precisely because they can stop attackers while they are gathering information about your network.

The three IDS detection methodologies are typically used to detect incidents.--

Signature-Based Detection compares signatures against observed events to identify possible incidents. This is the simplest detection method because it compares only the current unit of activity (such as a packet or a log entry, to a list of signatures) using string comparison operations.

Anomaly-Based Detection compares definitions of what is considered normal activity with observed events in order to identify significant deviations. This detection method can be very effective at spotting previously unknown threats.

Stateful Protocol Analysis compares predetermined profiles of generally accepted definitions for benign protocol activity for each protocol state against observed events in order to identify deviations.

What is difference IDS and IPS?
The main difference between them is that IDS is a monitoring system, while IPS is a control system. IDS doesn't alter the network packets in any way, whereas IPS prevents the packet from delivery based on the contents of the packet, much like how a firewall prevents traffic by IP address.

The main difference is that an IDS only monitors traffic. If an attack is detected, the IDS reports the attack, but it is then up to the administrator to take action. That's why having both an IDS and IPS system is critical. A good security strategy is to have them work together as a team

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms

The IPS sits between your firewall and the rest of your network. Because, it can stop the suspected traffic from getting to the rest of the network. The IPS monitors the inbound packets and what they are really being used for before deciding to let the packets into the network

an intrusion detection system (IDS) differs from a firewall in that a firewall looks outwardly for intrusions in order to stop them from happening. Firewalls limit access between networks to prevent intrusion and do not signal an attack from inside the network.

intrusion detection systems and intrusion prevention systems are both important parts of network integrity.. Sometimes the systems overlap, and sometimes they’re combined or referred to together as IDPS. Although IPS is becoming a more dominant security method, it’s important to be familiar with both.

An IDS monitors your network for possible dangerous activity, including malicious acts and violations of security protocols. When such a problem is detected, an IDS alerts the administrator but doesn’t necessarily take any other action. There are several types of IDS and several methods of detection employed.

Network Intrusion Detection System (NIDS): A network intrusion detection system (NIDS) monitors packets moving into and out of a network or subset of a network. It could monitor all traffic, or just a selection, to catch security threats. A NIDS compares potential intrusions to known abnormal or harmful behavior. This option is preferred for enterprises, as it’s going to provide much broader coverage than host-based systems.

Host Intrusion Detection System (HIDS): A host intrusion detection system lives on and monitors a single host (such as a computer or device). It might monitor traffic, but it also monitors the activity of clients on that computer. For example, a HIDS might alert the administrator if a video game is accessing private files it shouldn’t be accessing and that have nothing to do with its operations. When HIDS detects changes in the host, it will compare it to an established checksum and alert the administrator if there’s a problem.

HIDS can work in conjunction with NIDS, providing extra coverage for sensitive workstations and catching anything NIDS doesn’t catch. Malicious programs might be able to sneak past a NIDS, but their behavior will be caught by a HIDS.

Types of Intrusion Detection Systems
There are two primary types of intrusion detection systems you should be aware of to ensure you’re catching all threats on your network. Signature-based IDS is more traditional and potentially familiar, while anomaly-based IDS leverages machine learning capabilities. Both have their benefits and limitations:

Signature-based: Signature-based IDS relies on a preprogrammed list of known attack behaviors. These behaviors will trigger the alert. These “signatures” can include subject lines and attachments on emails known to carry viruses, remote logins in violation of organizational policy, and certain byte sequences. It is similar to antivirus software (the term “signature-based” originates with antivirus software).

Signature-based IDS is popular and effective but is only as good as its database of known signatures. This makes it vulnerable to new attacks. Plus, attackers can and do frequently disguise their attacks to avoid common signatures that will be detected. Also, the most thorough signature-based IDS will have huge databases to check against, meaning big bandwidth demands on your system.

Anomaly-based: Anomaly-based IDS begins with a model of normal behavior on the network, then alert an admin anytime it detects any deviation from that model of normal behavior. Anomaly-based IDS begins at installation with a training phase where it “learns” normal behavior. AI and machine learning have been very effective in this phase of anomaly-based systems.

Anomaly-based systems are typically more useful than signature-based ones because they’re better at detecting new and unrecognized attacks. However, they can set off many false positives, since they don’t always distinguish well between attacks and benign anomalous behavior.

Some experts consider intrusion prevention systems to be a subset of intrusion detection. Indeed, all intrusion prevention begins with intrusion detection. But security systems can go one step further and act to stop ongoing and future attacks. When an IPS detects an attack, it can reject data packets, give commands to a firewall, and even sever a connection.

IDS and IPS are similar in how they’re implemented and operate. IPS can also be network- or host-based and can operate on a signature or anomaly basis.

Types of Intrusion Prevention Systems
A robust IT security strategy should include an intrusion prevention system able to help automate many necessary security responses. When risks occur, a prevention tool may be able to help quickly to thoroughly shut down the damage and protect the overall network.

Network-based Intrusion Prevention Systems (NIPS): As the name suggests, a NIPS covers all events on your network. Its detection is signature-based.

Network Behavior Analysis (NBA): NBA is similar to NIPS in that it provides network-wide coverage. But unlike NIPS, NBA operates on anomalies. Like anomaly-based IDS, NBA requires a training phase where it learns the network’s baseline norm.

NBA also uses a method called stateful protocol analysis. Here, the baseline norm is pre-programmed by the vendor, rather than learned during the training phase. But in both cases, the IPS is looking for deviations rather than signatures.

Wireless-based Prevention Systems (WIPS): Protecting your network brings its own unique challenges. Enter WIPS. Most WIPS have two components, including overlay monitoring (devices installed near access points to monitor the radio frequencies) and integrated monitoring (IPS using the APs themselves). 

Combining these two, which is very common, is known as “hybrid monitoring.”
Host-based Intrusion Prevention Systems (HIPS): HIPS live on and protect a single host, providing granular coverage. They are best used in conjunction with a network-wide IPS.



Differences Between IDS and IPS
There are several differences between these two types of systems. IDS only issues alerts for potential attacks, while IPS can take action against them. Also, IDS is not inline, so traffic doesn’t have to flow through it. Traffic does, however, have to flow through your IPS. In addition, false positives for IDS will only cause alerts, while false positives for IPS could cause the loss of important data or functions.



A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic



In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.



In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.

A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade.

Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and activism can motivate these attacks.



DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack

More than One Third of US Businesses Experience DDoS Attacks. The most common cyberattacks were malware (53 percent) and viruses (51 percent). A distributed denial of service attack (aka DDOS) is very easy, and is in fact widely considered one of the easiest blackhat activities to do. 



For a DDoS attack to be successful, an attacker will spread malicious software to vulnerable computers, mainly through infected emails and attachments.   Layer 7 attacks focus specifically on the layer 7 features such as HTTP, SNMP, FTP etc. Layer 7 attacks require a lot less bandwidth and packets than network layer attacks to disrupt the services

DDoS attacks cannot steal website visitors information. The sole purpose of a DDoS attack is to overload the website resources. However, DDoS attacks can be used as a way of extortion and blackmailing. For example, website owners can be asked to pay a ransom for attackers to stop a DDoS attack


DDoS attacks can last as long as 24 hours, and good communication can ensure that the cost to your business is minimized while you remain under attack.


.
In DDoS attacks, threat actors use different methods to try and amplify the volume of attack traffic generated by a compromised system. The goal is to try and turn small queries and packets into much larger payloads that can then be used to flood a target network

Once the attack is over, try to analyze it in as much detail as possible.

Some of the key questions to ask include:---

What assets were attacked? Was it targeted at your entire network, or did it target specific servers or services?
What were the attack characteristics? Was it a single sustained flood, or did it employ sophisticated attack methods such as multi-vector attacks, dynamic IP spoofing, or burst attacks?
What attack protocols and patterns were used?
What was the peak amount of network traffic, both in terms of data (bits per second) as well as requests (connections per seconds)?
Did the attack impact the network layer, or also the application layer?
Did the attack include encrypted traffic or protocols?
How long did the attack last?

Getting this information will help you get a full picture of what happened.

Apart from analyzing the attack itself, you need to understand how it impacted you.

This is a key step in understanding your internal “cost” of a DDoS attack, and as a result – how much you may be willing to spend in the future to prevent this from happening again. 


Some of the key questions to ask include:---

Was the attack stopped, or did it get through (either entirely, or in part)?
Which services were impacted, to what extent, and for how long?
What were the direct monetary damages (i.e., in lost revenue, lost productivity time, etc.)?
Were there any indirect damages, such as bad press, damage to reputation, customer complaints, etc.?
Did users experience any impact as a result of the attack, either as a result of the attack itself, or as a result of defensive measures (false positives)?
Identify Weak Spots-

The next step after identifying damages is to identify any weak spots in your defense – that is, why was attack traffic able to get through?

Did any attack traffic get through? If so, how much?
Were there any specific attack vectors that were more successful than others? In particular, were there some patterns that were stopped, while others were able to get through?
Were there any targeted resources that were impacted more than others? For example, were there some resources (networks, servers, applications, etc.) that were able to fend off the attack, while others were impacted?
Did legitimate users experience any false positives? What was the ratio of legitimate traffic to malicious traffic that was stopped (or allowed to go through)?

By identifying weak spots, you should try to understand not only what resources were impacted, but also why they were impacted. Was there a particular type of attack that was able to get through, or – conversely – were there specific services that were impacted while others were not?

Another key element to look at is false positives. If your protections are deployed too broadly, this can lead to false-positives which prevent legitimate users from accessing services. Even though not a result of the attack itself, for end customers the experience is the same…

Identifying weak spots in your armor helps you to address them in the next steps.--

Verify Security Vendor SLA
If you have a pre-existing DDoS mitigation service in place, now is the time to check that they met their SLA commitments.
A high-grade DDoS protection service should provide you with technology, capacity and service guarantees to ensure full protection against any type of DDoS threat.

Look at the results of your analysis, based on the points above, and ask yourself the following questions:--

Did my defenses stop the attack?
Was all attack traffic stopped, or did some of it get through?
Were my users able to escape the impact of the attack (either directly, or as false-positives)?
Did my security vendor provide me with all the relevant service guarantees, and was able to meet them?

If the answers to those questions is yes, then great – you are well protected. But if the answer to one (or more) of these questions is no, then maybe you should start looking at alternatives.

Recommended actions to reduce the risk of denial of service:
Check whether your CSP is capable of scaling up bandwidth to withstand DDoS attacks. Also, ask whether they have scrubbing centers to cleanse and filter malicious traffic.
Scrubbing Center. A centralized data cleansing station where traffic is analyzed and malicious traffic (ddos, known vulnerabilities and exploits) is removed.
scrubbing centres are centralised data-cleansing stations, that filter out malicious traffic before it can reach the applications and data centres of customers.


Employees often share passwords for cloud accounts, which increases the risk for data breaches and data losses. According to one report, an average employee will share six passwords with their co-workers. Fifty-four percent of small and midsize businesses see negligent employees as the root cause of data breaches.



The cloud access security broker (CASB) market is forecast to reach 870 million U.S. dollars in size worldwide in 2019. A CASB is a software or service that safeguards the gateway between a company's on-premise IT infrastructure and a cloud provider's infrastructure.

A CASB is a third-party software integration that works across all the major software products used in an organization. The CASB software tracks and analyzes all information sent and received by each tool. This enables a granularity of insight akin to that which was possible when all information sent and received by a company could be tracked on its own servers.

Today, CASBs are used by IT teams to achieve greater visibility, compliance, threat protection, and data security.

CASBs illuminate which shadow IT cloud services are being used in an organization and enable visibility into user activity of sanctioned cloud applications. CASBs give companies a 360-degree view of all the cloud services they use – and let them tailor secure access to each. This comprehensive view also allows an organization to see whether and where their various services overlap in functionality, creating an opportunity to reduce costs.

CASBs can be configured to block specified services, devices, or users – and even post-login behaviors and signals – through adaptive access controls. For example, an employee who either wittingly or unwittingly attempts to upload an infected file can be prevented from doing so, in real time. This allows organizations to detect and respond to negligent or malicious insider threats, privileged user threats, and compromised accounts.

Data security

CASBs also allow IT teams to enforce data-centric security practices such as secure collaboration in cloud services, access control, and information rights management. Controls may be customized based on a variety of factors, such as data classification or user activity. Utilizing advanced data loss prevention (DLP) methods (like document fingerprinting, among others), CASBs can notify IT when sensitive data is being transmitted, allowing them to take further actions as necessary.









CASB products were designed to provide visibility for Shadow IT and limit employee access to unauthorized cloud services. Today, organizations have embraced the cloud, replacing many of their datacenter applications with Software as a Service (SaaS) or moving much of their IT into infrastructure (IaaS) providers like Amazon or Azure. 

Instead of limiting access, CASB's have evolved to protect cloud-hosted data and provide enterprise-class security controls so that organizations can incorporate SaaS and IaaS into their existing security architecture.

CASBs provide four primary security services: Visibility, Data Security, Threat Protection, and Compliance.

A CASB identifies all the cloud services (both sanctioned and unsanctioned) used by an organization's employees. Originally, this only included the services they would use directly from their computer or mobile device, often called "Shadow IT." Today, it is possible for an employee to connect an unsanctioned SaaS directly to a an approved SaaS via API. This "Shadow SaaS" requires more advanced visibility tools.

Shadow IT Monitoring: Your CASB must connect to your cloud to monitor all outbound traffic for unapproved SaaS applications and capture real-time web activity. Since nearly all SaaS applications send your users email notifications, your CASB should also scan every inbox for rogue SaaS communication to identify unapproved accounts on an approved cloud services.

 Shadow SaaS Monitoring: Your CASB must connect to your approved SaaS and IaaS providers to monitor third party SaaS applications that users might connect to their account. It should identify both the service as well as the level of access the user has provided.

Risk Reporting: A CASB should assess the risk level for each Shadow IT/Shadow SaaS connection, including the level of access each service might request (i.e. read-only access to a calendar might be appropriate, read-write access to email might not.) This allows you to make informed decisions and prioritize the applications that need immediate attention.

Event Monitoring: Your CASB should provide information about real-time and historical events in all of your organization’s SaaS applications. If you do not know how the applications are being used, you can not properly control them or properly assess the threats facing your organization.

CASB (Cloud Access Security Broker) solutions may fill many of the security gaps addressed in this article and delivers a holistic view of the entire cloud environment which enables organizations to effectively manage cloud security risks while capitalizing on the benefits offered by cloud computing.

While CASB solutions have been available now for the past 5 years, the market is still immature. Each product on the market has its own strengths and weaknesses and covers different threats. Therefore, it is important to understand your cloud services use cases when it comes to choosing a CASB solution. 

Assessing the impacts on the existing infrastructure is also required. If you are interested in further discussing CASB solutions and being well-advised in designing and choosing the best suited solution, reach out to Orange Consulting.

Conduct risk assessments before migrating to cloud services and use cloud access security brokers (CASBs) as an additional security layer.

A cloud access security broker (CASB) is on-premises or cloud based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies.


A CASB can offer a variety of services, including but not limited to monitoring user activity, warning administrators about potentially hazardous actions, enforcing security policy compliance, and automatically preventing malware.

A cloud access security broker, or CASB, is a type of software developed to help IT departments monitor cloud access and usage by employees and partners. CASBs are deployed to help ensure the company's cloud services are used securely and properly.

It is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. A CASB acts as a gatekeeper, allowing the organization to extend the reach of their security policies beyond their own infrastructure.

CASBs typically offer the following:--

Firewalls to identify malware and prevent it from entering the enterprise network.
Authentication to checks users' credentials and ensure they only access appropriate company resources.
Web application firewalls (WAFs) to thwart malware designed to breach security at the application level, rather than at the network level.
Data loss prevention (DLP) to ensure that users cannot transmit sensitive information outside of the corporation.

CASBs work by ensuring that network traffic between on-premises devices and the cloud provider complies with the organization's security policies. The value of cloud access security brokers stems from their ability to give insight into cloud application use across cloud platforms and identity unsanctioned use. This is especially important in regulated industries.

CASBs use auto-discovery to identify cloud applications in use and identify high-risk applications, high-risk users and other key risk factors. Cloud access brokers may enforce a number of different security access controls, including encryption and device profiling. They may also provide other services such as credential mapping when single sign-on is not available.

Microsoft includes CASB functionality in its base Azure security services at no extra charge. To meet the needs of IaaS and PaaS users, CASB vendors have added or expanded functionality for security tasks, such as the following:---

Single sign-on (SSO) -- allows an employee to enter their credentials one time and access a number of applications.
Encryption -- encrypts information from the moment it's created until it's sitting at rest in the cloud.
Compliance reporting tools -- ensure that the company's security systems comply with corporate policies and government regulations.
User behavior analytics -- identifies aberrant behavior indicative of an attack or data breach.
The ability of a CASB to address gaps in security extends across software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) environments. In addition to providing visibility, a CASB also allows organizations to extend the reach of their security policies from their existing on-premises infrastructure to the cloud and create new policies for cloud-specific context.

The CASB serves as a policy enforcement center, consolidating multiple types of security policy enforcement and applying them to everything your business utilizes in the cloud—regardless of what sort of device is attempting to access it, including unmanaged smartphones, IoT devices, or personal laptops.


With the increase in workforce mobility, the growth in BYOD and the presence of unsanctioned employee cloud usage, or Shadow IT, the ability to monitor and govern the usage of cloud applications has become essential to the goal of enterprise security. 

Rather than banning cloud services outright and potentially impacting employee productivity, a CASB enables businesses to take a granular approach to data protection and the enforcement of policies—making it possible to safely utilize time-saving, productivity-enhancing, and cost-effective cloud services.







Shadow IT is a term that refers to Information Technology (IT) applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department.

Shadow IT, also known as Stealth IT or Client IT, are Information technology (IT) systems built and used within organizations without explicit organizational approval, for example, systems specified and deployed by departments other than the IT department.

Shadow IT is the use of information technology systems, devices, software, applications, and services outside the scope and supervision of an organization's approved IT system. Examples include employee use of: USB flash drives or other personal data storage

Shadow IT can present itself in many ways, a few examples being: Staff sharing files between themselves, suppliers and customers. Often with a cloud file store such as OneDrive, Dropbox or Google Drive

Many people consider shadow IT an important source of innovation, and such systems may become prototypes for future approved IT solutions. On the other hand, shadow IT solutions are not often in line with organizational requirements for control, documentation, security, reliability, etc

One of the main causes of increased cloud-computing risks is the tendency of employees and managers to bypass the IT team and download third-party applications. The growth in the number of SaaS applications that help you carry out random tasks—convert JPEG files into PDF, record and edit video files, instant messaging, etc.—result in employees signing up and using these programs without taking the necessary precautions.

Often, sensitive files are uploaded onto unknown cloud servers to simply convert them into different file types. Though these go undetected most of the time, a single instance of confidential company information surfacing in the public or landing in the hands of competition can damage business reputation forever. 

The explosion of cloud and as-a-service (remote) technologies has made it easy for employees to buy and use their own applications without the help of IT

Shadow IT can introduce security risks when unsupported hardware and software are not subject to the same security measures that are applied to supported technologies. Furthermore, technologies that operate without the IT department’s knowledge can negatively affect the user experience of other employees by impacting bandwidth and creating situations in which network or software application protocols conflict. 

Shadow IT can also become a compliance concern when, for example, an employee stores corporate data in their personal DropBox account.

Feelings toward shadow IT are mixed; some IT administrators fear that if shadow IT is allowed, end users will create data silos and prevent information from flowing freely throughout the organization. Other administrators believe that in a fast-changing business world, the IT department must embrace shadow IT for the innovation it supplies and create policies for overseeing and monitoring its acceptable use.


Popular shadow technologies include personal smartphones, tablets and USB thumb drives. Popular shadow apps include Google Docs, instant messaging services and Skype.




People generally don’t start shadow IT projects because they disrespect the IT department or want to cause trouble. We live in a digital world. As a result, more non-technical workers are becoming tech-savvy through osmosis. They pick up new tech trends here, read about digital transformation there. They dream up all the ways that new software and hardware can make their jobs easier and more productive.

Often, this tinkering moves beyond daydreams and into the office where people outside of the IT team make moves to improve their work via technology. Think marketers researching and purchasing marketing automation software or hoteliers downloading project workforce management software to communicate with staff.

And while these motions might be in conflict with their IT department’s road map, the intentions behind shadow IT comes from an earnest, entrepreneurial place. People who do the work know the work best. The non-technical workers pushing for their own tech solutions have unique insights into their job's pain points, and can quickly recognize a solution’s ability to tackle problems.

Cause for concern

However, good intentions should not to minimize an IT department’s worries around shadow IT. Information technology departments are subject matter experts as well. Their concerns around unofficial technology programs are directly related to the department's areas of expertise, including:

Compliance. IT needs to ensure that solutions are compliant with industry standards. Are teams following license agreements? Are users correctly installing and using encrypted devices?  

Security. This is a no-brainer for IT teams. Job one is to make sure that all tech used within their company is unbreachable and private so that proprietary information remains internal.

Reliability. IT makes sure that systems are suited for the long haul. Tools need to stay live, functional, and updated. They need to scale for the enterprise.

Compatibility. Similarly, enterprise companies often rely on various systems. These large companies have powerful and diverse IT stacks. There’s a danger that shadow projects will not be compatible with legacy software and tools.

Redundancies. When tech projects happen below the board, communication tends to breakdown. Time and money are wasted when departments overlap work on the similar – or even identical – solutions.

 IT departments can empower non-technical workers to explore and iterate on new tech solutions – all while staying within proper IT-defined guardrails. This arrangement will inspire company-wide agility while maintaining centralized, IT-sanctioned approaches to business technology.

One way to implement this change is to embed technical experts within non-technical team. For instance, many marketing teams now have a MarTech division led by IT folks who also have marketing acumen.

No-code platforms represent another opportunity which enables non-technical employees to develop workplace applications without writing code. Using this approach, workers of all stripes can build applications uniquely suited to their needs. 

Meanwhile, IT remains the centralized point of control for this no-code technology, setting guardrails on which teams and individuals can create. In other words, security and governance remain safely in the hands of IT experts.


Security risks at the vendor
When a cloud service vendor supplies a critical service for your business and stores critical data – such as customer payment data and your mailing lists – you place the life of your business in the vendor’s hands.

Ask yourself – how clean are those hands?

Many small businesses know almost nothing about the people and technology behind the cloud services they use.

They rarely consider:--

The character of the vendor’s employees
The security of the vendor’s technology
The secret access the vendor has to their data

Your reputation no longer depends on the integrity of only your business – now it also depends on the integrity of the vendor’s business. And that’s a cloud computing risk.  So you are transferring the responsibility of protecting the data to a third party, but you are still liable if that party fails to live up to the task.

This is one of the many risks in cloud computing. Even if a vendor has your best interests at heart, your interests will always be secondary to theirs.

However, when you use a cloud service provider, the vendor is in control. You have no guarantee that the features you use today will be provided for the same price tomorrow. The vendor can double its price, and if your clients are depending on that service, then you might be forced to pay.

What happens if you are not able to make payment?

If you get behind on your bill, then you may be surprised to find your data is held hostage by the vendor. You cannot access the service and export your data until you pay up.

When you host a service locally, the data and level of service is always in your control. You can confidently assure your clients that their systems and data are safe because they are always within your reach.

Remember: you have many ways to protect your data when it is in control. However, once it’s in the hands of a cloud service provider, you have ceded control to an entity over which you have no oversight.

When you rely on a cloud service for a business-critical task, then you are putting the viability of your business in the hands of two services: the cloud vendor and your ISP.

One of the disadvantages of cloud computing can come in the form of vendor mismatches. Organizations might run into complications when migrating services to a different vendor with a different platform. If this process isn’t handled correctly, data can be exposed to unnecessary vulnerabilities. A good cloud services provider has the expertise to migrate your data between vendors safely.

Malicious insiders could have a wide raging impact on the confidentiality, integrity and availability of enterprise data. With the use of cloud apps, the risk increases as insiders can use their cloud accounts with their unmanaged devices to spread malwares throughout an organization, infect rich data or exfiltrate sensitive data.

A malicious insider can use an unmanaged device to exfiltrate sensitive date from corporate OneDrive storage

A malicious insider can use an unmanaged device to upload malicious file to corporate OneDrive storage or attach it to a Salesforce record. The file may then be opened by a legitimate user connected to the enterprise corporate network.

On the other hand, user credentials may become compromised through phishing attacks of other similar techniques. Threath actors may use the stolen cloud accounts to perform malicious activities.

Sensitive data can be leaked, falsified, infected or destroyed causing significant cost to business. Legal implications are also possible for organizations in highly regulated industries, such as healthcare, if personal information is exposed during cloud account takeover (ATO) incidents.

Unfortunately, these new threats cannot be handled by the standard IT security measures. Therefore, organizations should enhance their security measures to protect their assets against malware, ransomware, cloud ATO and other malicious cloud activities.

Here below some known security measures to protect enterprises against the above-mentioned malicious cloud activities:--

Develop and deploy a data loss prevention (DLP) strategy.
Perform user and entity behavior analytics (UEBA) for better visibility.
Scan and quarantine malware at upload, at download and at rest.
Block known and zero-day threats.

Encrypt sensitive data before it goes to cloud storage.


Identity Sprawl
Historically, users used to authenticate on a central identity datastore to access on-premise corporate apps. Overtime,   business began to use cloud apps and Software as A Service (SaaS) such as ServiceNow or Salesforce. 

Likewise, social media and other shadow cloud apps gained popularity and are incorporated into day-to-day business operations. Suddenly, employees found themselves authenticating against different datastores all over the internet. This ID sprawl increases the risk of user’s cloud accounts takeover and makes protecting access to an organization’s information far more challenging.

Here are some security measures to protect user’s cloud accounts:--

Use a central identity and access management (IAM) platform for approved cloud apps.
Restrict access from unmanaged devices and control the type of cloud apps used companywide.
Enforce multi-factor authentication to access corporate cloud apps.
Apply granular content-based and context-based policies..

Be sure to use the appropriate security methods, such as Intrusion Detection and Prevention (IDPS) systems.



An Intrusion Prevention System or IPS, also known as an Intrusion Detection and Prevention System or IDPS, is a network security appliance that monitors network and system activities and detects possible intrusions.

Intrusion detection is the process of monitoring the events occurring in your network and analyzing them for signs of possible incidents, violations, or imminent threats to your security policies. Intrusion prevention is the process of performing intrusion detection and then stopping the detected incidents. These security measures are available as intrusion detection systems (IDS) and intrusion prevention systems (IPS), which become part of your network to detect and stop potential incidents.

Intrusion detection systems (IDS) and intrusion prevention systems (IPS) constantly watch your network, identifying possible incidents and logging information about them, stopping the incidents, and reporting them to security administrators. 

In addition, some networks use IDS/IPS for identifying problems with security policies and deterring individuals from violating security policies. IDS/IPS have become a necessary addition to the security infrastructure of most organizations, precisely because they can stop attackers while they are gathering information about your network.
The three IDS detection methodologies are typically used to detect incidents.

Signature-Based Detection compares signatures against observed events to identify possible incidents. This is the simplest detection method because it compares only the current unit of activity (such as a packet or a log entry, to a list of signatures) using string comparison operations.

Anomaly-Based Detection compares definitions of what is considered normal activity with observed events in order to identify significant deviations. This detection method can be very effective at spotting previously unknown threats.

Stateful Protocol Analysis compares predetermined profiles of generally accepted definitions for benign protocol activity for each protocol state against observed events in order to identify deviations.

What is difference IDS and IPS?

The main difference between them is that IDS is a monitoring system, while IPS is a control system. IDS doesn't alter the network packets in any way, whereas IPS prevents the packet from delivery based on the contents of the packet, much like how a firewall prevents traffic by IP address.
The main difference is that an IDS only monitors traffic.

 If an attack is detected, the IDS reports the attack, but it is then up to the administrator to take action. That's why having both an IDS and IPS system is critical. A good security strategy is to have them work together as a team

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms

The IPS sits between your firewall and the rest of your network. Because, it can stop the suspected traffic from getting to the rest of the network. The IPS monitors the inbound packets and what they are really being used for before deciding to let the packets into the network

an intrusion detection system (IDS) differs from a firewall in that a firewall looks outwardly for intrusions in order to stop them from happening. Firewalls limit access between networks to prevent intrusion and do not signal an attack from inside the network.

Intrusion detection systems and intrusion prevention systems are both important parts of network integrity.. Sometimes the systems overlap, and sometimes they’re combined or referred to together as IDPS. Although IPS is becoming a more dominant security method, it’s important to be familiar with both.

An IDS monitors your network for possible dangerous activity, including malicious acts and violations of security protocols. When such a problem is detected, an IDS alerts the administrator but doesn’t necessarily take any other action. There are several types of IDS and several methods of detection employed.

Network Intrusion Detection System (NIDS): A network intrusion detection system (NIDS) monitors packets moving into and out of a network or subset of a network. It could monitor all traffic, or just a selection, to catch security threats. A NIDS compares potential intrusions to known abnormal or harmful behavior. This option is preferred for enterprises, as it’s going to provide much broader coverage than host-based systems.

Host Intrusion Detection System (HIDS): A host intrusion detection system lives on and monitors a single host (such as a computer or device). It might monitor traffic, but it also monitors the activity of clients on that computer. 

For example, a HIDS might alert the administrator if a video game is accessing private files it shouldn’t be accessing and that have nothing to do with its operations. When HIDS detects changes in the host, it will compare it to an established checksum and alert the administrator if there’s a problem.

HIDS can work in conjunction with NIDS, providing extra coverage for sensitive workstations and catching anything NIDS doesn’t catch. Malicious programs might be able to sneak past a NIDS, but their behavior will be caught by a HIDS.

Types of Intrusion Detection Systems
There are two primary types of intrusion detection systems you should be aware of to ensure you’re catching all threats on your network. Signature-based IDS is more traditional and potentially familiar, while anomaly-based IDS leverages machine learning capabilities. Both have their benefits and limitations:

Signature-based: Signature-based IDS relies on a preprogrammed list of known attack behaviors. These behaviors will trigger the alert. These “signatures” can include subject lines and attachments on emails known to carry viruses, remote logins in violation of organizational policy, and certain byte sequences. It is similar to antivirus software (the term “signature-based” originates with antivirus software).

Signature-based IDS is popular and effective but is only as good as its database of known signatures. This makes it vulnerable to new attacks. Plus, attackers can and do frequently disguise their attacks to avoid common signatures that will be detected. Also, the most thorough signature-based IDS will have huge databases to check against, meaning big bandwidth demands on your system.

Anomaly-based: Anomaly-based IDS begins with a model of normal behavior on the network, then alert an admin anytime it detects any deviation from that model of normal behavior. Anomaly-based IDS begins at installation with a training phase where it “learns” normal behavior. AI and machine learning have been very effective in this phase of anomaly-based systems.

Anomaly-based systems are typically more useful than signature-based ones because they’re better at detecting new and unrecognized attacks. However, they can set off many false positives, since they don’t always distinguish well between attacks and benign anomalous behavior.

Some experts consider intrusion prevention systems to be a subset of intrusion detection. Indeed, all intrusion prevention begins with intrusion detection. But security systems can go one step further and act to stop ongoing and future attacks. When an IPS detects an attack, it can reject data packets, give commands to a firewall, and even sever a connection.

IDS and IPS are similar in how they’re implemented and operate. IPS can also be network- or host-based and can operate on a signature or anomaly basis.

Types of Intrusion Prevention Systems
A robust IT security strategy should include an intrusion prevention system able to help automate many necessary security responses. When risks occur, a prevention tool may be able to help quickly to thoroughly shut down the damage and protect the overall network.

Network-based Intrusion Prevention Systems (NIPS): As the name suggests, a NIPS covers all events on your network. Its detection is signature-based.

Network Behavior Analysis (NBA): NBA is similar to NIPS in that it provides network-wide coverage. But unlike NIPS, NBA operates on anomalies. Like anomaly-based IDS, NBA requires a training phase where it learns the network’s baseline norm.

NBA also uses a method called stateful protocol analysis. Here, the baseline norm is pre-programmed by the vendor, rather than learned during the training phase. But in both cases, the IPS is looking for deviations rather than signatures.

Wireless-based Prevention Systems (WIPS): Protecting your network brings its own unique challenges. Enter WIPS. Most WIPS have two components, including overlay monitoring (devices installed near access points to monitor the radio frequencies) and integrated monitoring (IPS using the APs themselves). 

Combining these two, which is very common, is known as “hybrid monitoring.”

Host-based Intrusion Prevention Systems (HIPS): HIPS live on and protect a single host, providing granular coverage. They are best used in conjunction with a network-wide IPS.

Differences Between IDS and IPS

There are several differences between these two types of systems. IDS only issues alerts for potential attacks, while IPS can take action against them. Also, IDS is not inline, so traffic doesn’t have to flow through it. Traffic does, however, have to flow through your IPS. In addition, false positives for IDS will only cause alerts, while false positives for IPS could cause the loss of important data or functions.

A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.

A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade.

Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and activism can motivate these attacks.

DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack


More than One Third of US Businesses Experience DDoS Attacks. The most common cyberattacks were malware (53 percent) and viruses (51 percent). A distributed denial of service attack (aka DDOS) is very easy, and is in fact widely considered one of the easiest blackhat activities to do. 

For a DDoS attack to be successful, an attacker will spread malicious software to vulnerable computers, mainly through infected emails and attachments.   Layer 7 attacks focus specifically on the layer 7 features such as HTTP, SNMP, FTP etc. Layer 7 attacks require a lot less bandwidth and packets than network layer attacks to disrupt the services

DDoS attacks cannot steal website visitors information. The sole purpose of a DDoS attack is to overload the website resources. However, DDoS attacks can be used as a way of extortion and blackmailing. For example, website owners can be asked to pay a ransom for attackers to stop a DDoS attack


DDoS attacks can last as long as 24 hours, and good communication can ensure that the cost to your business is minimized while you remain under attack.






A cloud service provider, or CSP, is a company that offers some component of cloud computing -- typically infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS) -- to other businesses or individuals. 

Cloud computing security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

Cloud computing and storage provides users with capabilities to store and process their data in third-party data centers.  Organizations use the cloud in a variety of different service models (with acronyms such as SaaS, PaaS, and IaaS) and deployment models (private, public, hybrid, and community). 

Application-level security issues (or cloud service provider CSP level attacks) refer to intrusion from the malicious attackers due to vulnerabilities of the shared nature of the cloud. Some companies host their applications in shared environments used by multiple users, without considering the possibilities of exposure to security breaches, such as:

1. SQL injection
An unauthorized user gains access to the entire database of an application by inserting malicious code into a standard SQL code. Often used to attack websites, SQL injection can be avoided by the usage of dynamically generated SQL in the code. It is also necessary to remove all stored procedures that are rarely used and assign the least possible privileges to users who have permission to access the database.

2. Guest-hopping attack
In guest-hopping attacks, due to the separation failure between shared infrastructures, an attacker gets access to a virtual machine by penetrating another virtual machine hosted in the same hardware. One possible mitigation of guest-hopping attack is the Forensics and VM debugging tools to observe any attempt to compromise the virtual machine. Another solution is to use the High Assurance Platform (HAP), which provides a high degree of isolation between virtual machines.

3. Side-channel attack
An attacker opens a side-channel attack by placing a malicious virtual machine on the same physical machine as the victim machine. Through this, the attacker gains access to all confidential information on the victim machine. The countermeasure to eliminate the risk of side-channel attacks in a virtualized cloud environment is to ensure that no legitimate user VMs reside on the same hardware of other users.

4. Malicious insider
A malicious insider can be a current or former employee or business associate who maliciously and intentionally abuses system privileges and credentials to access and steal sensitive customer information within the network of an organization. Strict privilege planning and security auditing can minimize this security risk that originates from within an organization.

5. Cookie poisoning
Cookie poisoning means to gain unauthorized access into an application or a webpage by modifying the contents of the cookie. In a SaaS model, cookies contain user identity credential information that allows the applications to authenticate the user identity. Cookies are forged to impersonate an authorized user. A solution is to clean up the cookie and encrypt the cookie data.

6. Backdoor and debug option
The backdoor is a hidden entrance to an application, which was created intentionally or unintentionally by developers while coding. Debug option is also a similar entry point, often used by developers to facilitate troubleshooting in applications. But the problem is that the hackers can use these hidden doors to bypass security policies and enter the website and access the sensitive information. To prevent this kind of attack, developers should disable the debugging option.

7. Cloud browser security
A web browser is a universal client application that uses Transport Layer Security (TLS) protocol to facilitate privacy and data security for Internet communications. TLS encrypts the connection between web applications and servers, such as web browsers loading a website. Web browsers only use TLS encryption and TLS signature, which are not secure enough to defend malicious attacks. One of the solutions is to use TLS and at the same time XML based cryptography in the browser core.

8. Cloud malware injection attack
A malicious virtual machine or service implementation module such as SaaS or IaaS is injected into the cloud system, making it believe the new instance is valid. If succeeded, the user requests are redirected automatically to the new instance where the malicious code is executed. The mitigation is to perform an integrity check of the service instance before using it for incoming requests in the cloud system.

9. ARP poisoning
Address Resolution Protocol (ARP) poisoning is when an attacker exploits some ARP protocol weakness to map a network IP address to one malicious MAC and then update the ARP cache with this malicious MAC address. It is better to use static ARP entries to minimize this attack. This tactic can work for small networks such as personal clouds, but it is easier to use other strategies such as port security features on large-scale clouds to lock a single port (or network device) to a particular IP address.

Network-level security attacks
Cloud computing largely depends on existing network infrastructure such as LAN, MAN, and WAN, making it exposed to some security attacks which originate from users outside the cloud or a malicious insider. In this section, let’s focus on the network level security attacks and their possible countermeasures.

10. Domain Name System (DNS) attacks
It is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS), which converts hostnames into corresponding Internet Protocol (IP) addresses using a distributed database scheme. DNS servers are subject to various kinds of attacks since DNS is used by nearly all networked applications – including email, Web browsing, eCommerce, Internet telephony, and more. It includes TCP SYN Flood Attacks, UDP Flood Attack, Spoofed Source Address/LAND Attacks, Cache Poisoning Attacks, and Man in the Middle Attacks.

11. Domain hijacking
Domain hijacking is defined as changing a domain’s name without the owner or creator’s knowledge or permission. Domain hijacking enables intruders to obtain confidential business data or perform illegal activities such as phishing, where a domain is substituted by a similar website containing private information. One way to avoid domain hijacking is to force a waiting period of 60 days between a change in registration and a transfer to another registrar. Another approach is to use the Extensible Provisioning Protocol (EPP), which utilizes a domain registrant-only authorization key as a protection measure to prevent unintended name changes. Another approach is to use the Extensible Provisioning Protocol (EPP), which utilizes a domain registrant-only authorization key as a protection measure to prevent unauthorized name changes.

12. IP Spoofing
In IP spoofing, an attacker gains unauthorized access to a computer by pretending that the traffic has originated from a legitimate computer. IP spoofing is used for other threats such as Denial of Service and Middle Attack Man:

a. Denial of service attacks (DoS)
It is a type of attack that tries to make a website or network resource unavailable. The attacker floods the host with a massive number of packets in a short amount of time that require extra processing. It makes the targeted device waste time waiting for a response that never comes. The target is kept so busy dealing with malicious packets that it does not respond to routine incoming requests, leaving the legitimate users with denied service.

An attacker can coordinate hundreds of devices across the Internet to send an overwhelming amount of unwanted packets to a target. Therefore, tracking and stopping DoS is very difficult. TCP SYN flooding is an example of a DoS attack in which the intruder sends a flood of spoofed TCP SYN packets to the victim machine. This attack exploits the limitations of the three-way handshake in maintaining half-open connections.

b. Man In The Middle Attack (MITM)
A man-in-the-middle attack (MITM) is an intrusion in which the intruder relays remotely or probably changes messages between two entities that think they communicate directly with each other. The intruder utilizes network packet sniffer, filtering, and transmission protocols to gain access to network traffic. MITM attack exploits the real-time processing of transactions, conversations, or transfer of other data. It can be reduced using packet filtering by firewall, secure encryption, and origin authentication techniques.

End-user/host level attacks
The cloud end-user or host level attacks include phishing, an attempt to steal the user identity that includes usernames, passwords, and credit card information. Phishing is to send the user an email containing a link to a fake website that looks like a real one. When the user uses the fake website, his username and password will be sent to the hacker who can use them to attack the cloud.

Another method of phishing is to send an email to the user claiming to be from the cloud service company or, for instance, to tell the user to provide their username and password for maintenance purposes. Countermeasures of phishing are the use of Spam filters and spam blockers in the browsers. You can also train the users not to respond to any spoofed email and not to give their credentials to any website.

Emerging attacks called denial of service (DoS) and distributed denial of service attacks (DDoS) are among the top ways that risk application security. DoS and DDos attacks are when legitimate users are prevented from accessing the service commonly through flooding. Flooding targets machines or resources with excessive requests to overload systems that prevent legitimate request from being met.

Denial of service attacks (DoS) is a type of attack that tries to make a website or network resource unavailable. The attacker floods the host with a massive number of packets in a short amount of time that require extra processing. It makes the targeted device waste time waiting for a response that never comes. The target is kept so busy dealing with malicious packets that it does not respond to routine incoming requests, leaving the legitimate users with denied service.

An attacker can coordinate hundreds of devices across the Internet to send an overwhelming amount of unwanted packets to a target. Therefore, tracking and stopping DoS is very difficult. TCP SYN flooding is an example of a DoS attack in which the intruder sends a flood of spoofed TCP SYN packets to the victim machine. This attack exploits the limitations of the three-way handshake in maintaining half-open connections.

Other possible application security issues can result from cloud malware injection. The attacker, in this case, focuses on inserting harmful implementations to cloud services. In other instances, cookie poisoning can modify a user’s cookies so the attacker can gain unauthorized information for identity fraud.

Backdoor attacks is a conventional technique that bypasses system security undetectably to directly access user information directly in the cloud. Through hidden filters on webpages, hidden field attack attackers yield and collect unauthorized information.

When attackers identify two virtual machines hosted on same physical hardware and attempt to penetrate one machine from another, it is called guest hopping. Another way of attack is through SQL injection in which the attack embeds a malicious code into a poorly designed application and then passes it to the back-end database. SQL Injection (SQLi) is an injection attack where an attacker executes malicious SQL statements to control a web application’s database server, thereby accessing, modifying and deleting unauthorized data.


What can SQL Injection do?
There are a lot of things an attacker can do when exploiting an SQL injection on a vulnerable website. By leveraging an SQL Injection vulnerability, given the right circumstances, an attacker can do the following things:--

Bypass a web application’s authorization mechanisms and extract sensitive information
Easily control application behavior that’s based on data in the database
Inject further malicious code to be executed when users access the application
Add, modify and delete data, corrupting the database, and making the application or unusable
Enumerate the authentication details of a user registered on a website and use the data in attacks on other sites
It all depends on the capability of the attacker, but sometimes an SQL Injection attack can lead to a complete takeover of the database and web application.

An inside channel attack refers to a cache attack when cache accesses are monitored to gain encrypted data. At times, a person or employee will attempt to threaten enterprises since they have access to their system and data.

How do SQL Injection attacks work?
A developer usually defines an SQL query to perform some database action necessary for his application to function. This query has one or two arguments so that only desired records are returned when the value for that argument is provided by a user.

An SQL Injection attack plays out in two stages:--
Research: Attacker gives some random unexpected values for the argument, observes how the application responds, and decides an attack to attempt.
Attack: Here attacker provides carefully crafted value for the argument. The application will interpret the value part of an SQL command rather than merely data, the database then executes the SQL command as modified by the attacker.

An unauthorized user gains access to the entire database of an application by inserting malicious code into a standard SQL code. Often used to attack websites, SQL injection can be avoided by the usage of dynamically generated SQL in the code. It is also necessary to remove all stored procedures that are rarely used and assign the least possible privileges to users who have permission to access the database.

Lastly, network level attacks are among the security risks of cloud computing. A DNS attack includes domain hijacking and cross site scripting that can be costly for enterprises. When intruders sends malicious data to computers with an IP address that indicates the message originates from a trusted host, this is known as IP spoofing.

A man-in-the-middle attack, communication between two users is monitored by attackers to gain confidential information. To conclude network level attacks, sniffing is an attack in which data is captured and interpreted while flowing through the network. The attacker is able to gain access to all information that is transported through the network.



A man-in-the-middle attack (MITM) is an intrusion in which the intruder relays remotely or probably changes messages between two entities that think they communicate directly with each other. The intruder utilizes network packet sniffer, filtering, and transmission protocols to gain access to network traffic. MITM attack exploits the real-time processing of transactions, conversations, or transfer of other data. It can be reduced using packet filtering by firewall, secure encryption, and origin authentication techniques.

IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, to impersonate another computer system, or both.

In IP spoofing, an attacker gains unauthorized access to a computer by pretending that the traffic has originated from a legitimate computer. IP spoofing is used for other threats such as Denial of Service and Middle Attack Man:

IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, to impersonate another computer system, or both



In IP spoofing, the attacker modifies the source address in the outgoing packet header, so that the destination computer treats the packet as if it is coming from a trusted source, e.g., a computer on an enterprise network, and the destination computer will accept it.


End-user/host level attacks
The cloud end-user or host level attacks include phishing, an attempt to steal the user identity that includes usernames, passwords, and credit card information. Phishing is to send the user an email containing a link to a fake website that looks like a real one. When the user uses the fake website, his username and password will be sent to the hacker who can use them to attack the cloud.

Another method of phishing is to send an email to the user claiming to be from the cloud service company or, for instance, to tell the user to provide their username and password for maintenance purposes. Countermeasures of phishing are the use of Spam filters and spam blockers in the browsers. You can also train the users not to respond to any spoofed email and not to give their credentials to any website.

 Security concerns associated with cloud computing fall into two broad categories: security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers (companies or organizations who host applications or store data on the cloud).  The responsibility is shared, however. 

The provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected, while the user must take measures to fortify their application and use strong passwords and authentication measures.


Due to the lower costs and ease of implementing PaaS and SaaS products, the probability of unauthorized use of cloud services increases. However, services provisioned or used without IT's knowledge present risks to an organization. The use of unauthorized cloud services could result in an increase in malware infections or data exfiltration since the organization is unable to protect resources it does not know about. The use of unauthorized cloud services also decreases an organization's visibility and control of its network and data.

 Internet-Accessible Management APIs can be Compromised. CSPs expose a set of application programming interfaces (APIs) that customers use to manage and interact with cloud services (also known as the management plane). Organizations use these APIs to provision, manage, orchestrate, and monitor their assets and users. These APIs can contain the same software vulnerabilities as an API for an operating system, library, etc. Unlike management APIs for on-premises computing, CSP APIs are accessible via the Internet exposing them more broadly to potential exploitation.

Threat actors look for vulnerabilities in management APIs. If discovered, these vulnerabilities can be turned into successful attacks, and organization cloud assets can be compromised. From there, attackers can use organization assets to perpetrate further attacks against other CSP customers.

Separation Among Multiple Tenants Fails. Exploitation of system and software vulnerabilities within a CSP's infrastructure, platforms, or applications that support multi-tenancy can lead to a failure to maintain separation among tenants. This failure can be used by an attacker to gain access from one organization's resource to another user's or organization's assets or data. Multi-tenancy increases the attack surface, leading to an increased chance of data leakage if the separation controls fail.

This attack can be accomplished by exploiting vulnerabilities in the CSP's applications, hypervisor, or hardware, subverting logical isolation controls or attacks on the CSP's management API. To date, there has not been a documented security failure of a CSP's SaaS platform that resulted in an external attacker gaining access to tenants' data.

No reports of an attack based on logical separation failure were identified; however, proof-of-concept exploits have been demonstrated.


Data Deletion is Incomplete. Threats associated with data deletion exist because the consumer has reduced visibility into where their data is physically stored in the cloud and a reduced ability to verify the secure deletion of their data. This risk is concerning because the data is spread over a number of different storage devices within the CSP's infrastructure in a multi-tenancy environment. In addition, deletion procedures may differ from provider to provider. Organizations may not be able to verify that their data was securely deleted and that remnants of the data are not available to attackers. This threat increases as an agency uses more CSP services.

Cloud and On-Premise Threats and Risks

The following are risks that apply to both cloud and on-premise IT data centers that organizations need to address.

Credentials are Stolen. If an attacker gains access to a user's cloud credentials, the attacker can have access to the CSP's services to provision additional resources (if credentials allowed access to provisioning), as well as target the organization's assets. The attacker could leverage cloud computing resources to target the organization's administrative users, other organizations using the same CSP, or the CSP's administrators. An attacker who gains access to a CSP administrator's cloud credentials may be able to use those credentials to access the agency's systems and data.

Administrator roles vary between a CSP and an organization. The CSP administrator has access to the CSP network, systems, and applications (depending on the service) of the CSP's infrastructure, whereas the consumer's administrators have access only to the organization's cloud implementations. In essence, the CSP administrator has administration rights over more than one customer and supports multiple services.

Vendor Lock-In Complicates Moving to Other CSPs. Vendor lock-in becomes an issue when an organization considers moving its assets/operations from one CSP to another. The organization discovers the cost/effort/schedule time necessary for the move is much higher than initially considered due to factors such as non-standard data formats, non-standard APIs, and reliance on one CSP's proprietary tools and unique APIs.

This issue increases in service models where the CSP takes more responsibility. As an agency uses more features, services, or APIs, the exposure to a CSP's unique implementations increases. These unique implementations require changes when a capability is moved to a different CSP. If a selected CSP goes out of business, it becomes a major problem since data can be lost or cannot be transferred to another CSP in a timely manner.

 Increased Complexity Strains IT Staff. Migrating to the cloud can introduce complexity into IT operations. Managing, integrating, and operating in the cloud may require that the agency's existing IT staff learn a new model. IT staff must have the capacity and skill level to manage, integrate, and maintain the migration of assets and data to the cloud in addition to their current responsibilities for on-premises IT.

Key management and encryption services become more complex in the cloud. The services, techniques, and tools available to log and monitor cloud services typically vary across CSPs, further increasing complexity. There may also be emergent threats/risks in hybrid cloud implementations due to technology, policies, and implementation methods, which add complexity. This added complexity leads to an increased potential for security gaps in an agency's cloud and on-premises implementations.

 Insiders Abuse Authorized Access. Insiders, such as staff and administrators for both organizations and CSPs, who abuse their authorized access to the organization's or CSP's networks, systems, and data are uniquely positioned to cause damage or exfiltrate information.

The impact is most likely worse when using IaaS due to an insider's ability to provision resources or perform nefarious activities that require forensics for detection. These forensic capabilities may not be available with cloud resources.

 Stored Data is Lost. Data stored in the cloud can be lost for reasons other than malicious attacks. Accidental deletion of data by the cloud service provider or a physical catastrophe, such as a fire or earthquake, can lead to the permanent loss of customer data. The burden of avoiding data loss does not fall solely on the provider's shoulders. If a customer encrypts its data before uploading it to the cloud but loses the encryption key, the data will be lost. In addition, inadequate understanding of a CSP's storage model may result in data loss. Agencies must consider data recovery and be prepared for the possibility of their CSP being acquired, changing service offerings, or going bankrupt.

This threat increases as an agency uses more CSP services. Recovering data on a CSP may be easier than recovering it at an agency because an SLA designates availability/uptime percentages. These percentages should be investigated when the agency selects a CSP.


CSP Supply Chain is Compromised. If the CSP outsources parts of its infrastructure, operations, or maintenance, these third parties may not satisfy/support the requirements that the CSP is contracted to provide with an organization. An organization needs to evaluate how the CSP enforces compliance and check to see if the CSP flows its own requirements down to third parties. If the requirements are not being levied on the supply chain, then the threat to the agency increases.

This threat increases as an organization uses more CSP services and is dependent on individual CSPs and their supply chain policies.

Insufficient Due Diligence Increases Cybersecurity Risk. Organizations migrating to the cloud often perform insufficient due diligence. They move data to the cloud without understanding the full scope of doing so, the security measures used by the CSP, and their own responsibility to provide security measures. They make decisions to use cloud services without fully understanding how those services must be secured..


Cloud Security Alliance (CSA) is a not-for-profit organization with the mission to “promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.”

The CSA has over 80,000 individual members worldwide.  CSA gained significant reputability in 2011 when the American Presidential Administration selected the CSA Summit as the venue for announcing the federal government’s cloud computing strategy

The latest CSA  ( Cloud Security Alliance ) report highlights  leading concerns: --

1. Data breaches. "Data is becoming the main target of cyber attacks,".the report's authors point out. "Defining the business value of data and the impact of its loss is essential important for organizations that own or process data." In addition, "protecting data is evolving into a question of who has access to it," they add. "Encryption techniques can help protect data, but negatively impacts system performance while making applications less user-friendly."

2. Misconfiguration and inadequate change control. "Cloud-based resources are highly complex and dynamic, making them challenging to configure. Traditional controls and change management approaches are not effective in the cloud." The authors state "companies should embrace automation and employ technologies that scan continuously for misconfigured resources and remediate problems in real time."

3. Lack of cloud security architecture and strategy. "Ensure security architecture aligns with business goals and objectives. Develop and implement a security architecture framework."

4. Insufficient identity, credential, access and key management. "Secure accounts, inclusive to two-factor authentication and limited use of root accounts. Practice the strictest identity and access controls for cloud users and identities."

5. Account hijacking. This is a threat that must be taken seriously. "Defense-in-depth and IAM controls are key in mitigating account hijacking."

6. Insider threat. "Taking measures to minimize insider negligence can help mitigate the consequences of insider threats. Provide training to your security teams to properly install, configure, and monitor your computer systems, networks, mobile devices, and backup devices." The CSA authors also urge "regular employee training awareness. Provide training to your regular employees to inform them how to handle security risks, such as phishing and protecting corporate data they carry outside the company on laptops and mobile devices."

7. Insecure interfaces and APIs. "Practice good API hygiene. Good practice includes diligent oversight of items such as inventory, testing, auditing, and abnormal activity protections." Also, "consider using standard and open API frameworks (e.g., Open Cloud Computing Interface (OCCI) and Cloud Infrastructure Management Interface (CIMI))."

8. Weak control plane. "The cloud customer should perform due diligence and determine if the cloud service they intend to use possesses an adequate control plane."

9. Metastructure and applistructure failures. "Cloud service providers must offer visibility and expose mitigations to counteract the cloud's inherent lack of transparency for tenants. All CSPs should conduct penetration testing and provide findings to customers."

10. Limited cloud usage visibility. "Mitigating risks starts with the development of a complete cloud visibility effort from the top down. Mandate companywide training on accepted cloud usage policies and enforcement thereof.  All non-approved cloud services must be reviewed and approved by the cloud security architect or third-party risk management."

11. Abuse and nefarious use of cloud services. "Enterprises should monitor their employees in the cloud, as traditional mechanisms are unable to mitigate the risks posed by cloud service usage."



Attacks on the resources used by one or more of the other tenants can affect your operations as well. Attackers may hit the entire network and cause downtime to several clients, depending on the bandwidth available. This can frustrate your clients as well as stall your regular operations.


 EXAMPLE:  Hackers targeted Portland-based cloud computing company Cedexisnin May 2017 in an attack that caused widespread outages across Cedexis’ infrastructure. Many French media outlets, including Le Monde, Le Figaro, and more that used Cedexis services were impacted. Their customers faced downtime because of the denial of service attack on Cedexis’ cloud.


Insider threats include intentional or unintentional behavior by employees that results in exposing or sharing of sensitive data.

This includes mistakenly sharing files with confidential information (like employee social security numbers) with a larger unauthorized group and using inappropriate sharing controls.

Ninety-four percent of all organizations experience at least one insider threat incident every month.

 EXAMPLE:  Data thefts are most common when people jump ship. For example, a salesperson leaving the company for a competitor can easily download customer data from a cloud CRM application. Cloud data thefts such as this are more difficult to detect than the theft of hard-copy documents, for example.

Recommended actions to reduce the risk of an insider attack:--
Improve access controls using tools such as multifactor authentication and authorization to ensure that only the right people have access to your data.

Use computer-based security awareness training courses and employee agreements to prevent intentional or unintentional sharing of confidential data.

Insider threats are not limited to employees. They extend to contractors, supply chain partners, service providers and account compromise attacks that can abuse access to an organization’s assets both on-premise and in the cloud

Disgruntled employees sometimes become malicious insiders.


The most dangerous are those who have received termination notices. They may decide that they have nothing to lose because they aren’t worried about getting fired anymore. 

Depending on the nature of your organization and the work you do, it might be a good idea for them to stop working for your company the moment they know they've been terminated. Get them to give you any physical keys they might have and disable their user accounts right away. 

It may ultimately cost your organization less money to just give your terminated employee their severance pay than to pay them to work an extra few weeks. But if they must work for some time after they've been terminated, watch them especially carefully.

Another type of indication of an employee or a contractor who could be a malicious insider is when they seem unusually enthusiastic about their work. They may volunteer for more work or additional tasks not because they want a raise, but because they want to expand their access to sensitive data

Types of Insider Threats
There are three types of insider threats, Compromised users, Careless users, and Malicious users.
Compromised Employees or Vendors
Compromised employees or vendors are the most important type of insider threat you’ll face. This is because neither of you knows they are compromised. It can happen if an employee grants access to an attacker by clicking on a phishing link in an email. These are the most common types of insider threats.

Careless Employees
Careless employees or vendors can become targets for attackers. Leaving a computer or terminal unlocked for a few minutes can be enough for one to gain access.

Granting DBA permissions to regular users (or worse, using software system accounts) to do IT work are also examples of careless insider threats.

Malicious Insider
Malicious attackers can take any shape or form. They usually have legitimate user access to the system and willfully extract data or Intellectual Property. Since they are involved with the attack, they can also cover up their tracks. That makes detection even more difficult.


The most significant issues with detecting insider threats are:

1. Legitimate Users
The nature of the threat is what makes it so hard to prevent. With the actor using their authentic login profiles, there’s no immediate warning triggered. Accessing large files or databases infrequently may be a valid part of their day to day job requirements.

2. System and Software Context
For the security team to know that something terrible is happening, they need to know what something bad looks like. This isn’t easy as. Usually, business units are the experts when it comes to their software. Without the right context, detecting a real insider threat from the security operations center is almost impossible.

3. Post Login Activities
Keeping track of every user’s activities after they’ve logged in to the system is a lot of work. In some cases, raw logs need to be checked, and each event studied. Even with Machine Learning (ML) tools, this can still be a lot of work. It could also lead to many false positives being reported, adding noise to the problem.

Indicators of Insider Attacks
Detecting attacks is still possible. Some signs are easy to spot and take action on.

Common indicators of insider threats are:

Unexplained Financial Gain
Abuse by Service Accounts.
Multiple failed logins.
Incorrect software access requests.
Large data or file transfers.
Using systems and tools that look for these items can help raise the alarm for an attack. While regular endpoint scans (daily) will ensure workstations stay clean from viruses and malware.


Your cloud environment interfaces with all of your infrastructure stacks and applications, so it’s very important to watch for any insider threats which may exist there.

In order to help prevent insider threats to your cloud, you need to make sure that it’s properly configured for optimal security. Secure-by-default landing zones can prevent new attack surfaces from opening up in development, staging and production environments. 

You must also implement identity access management that’s well suited to the cloud. The principle of least privilege can also be as useful for protecting cloud networks as it is for on-premises networks. No user should have more privileges than they absolutely need in order to do their jobs.

Insider threats can be a lot more dangerous than outsider threats. As far as malicious attackers are concerned, insiders already have authorized access to your buildings and user accounts. An outside attacker needs to work to find an external attack vector into your networks and physical facilities. Those are steps inside attackers can usually skip. It's a lot easier to privilege escalate from a user account you already have than to break into any user account in the first place. 

Organizations, on average, experience 14 Compromised account incidents each month, where unauthorized third-party agents exploit stolen user credentials to gain access to corporate data stored in a public cloud service. Eighty percent of organizations are affected by this risk every month.

 EXAMPLE:  Cybercriminals stole personal data (including the residential addresses and earnings) of 3 million customers of the media and entertainment company WWE (World Wrestling Entertainment). Hackers gained access to the data after targeting a database left unsecured on the Amazon cloud server.

Recommended actions to reduce the risk of a data breach:
Shadow IT and BYOD (bring your own device) practices often lead to data breaches. Strengthen data security by installing anti-malware, encryption, authentication, and data protection software in the personal devices that employees use for work.
Educate employees about the need to keep their manager and IT lead in the loop when using any new applications other than those specified or provided by the IT team.

Check terms and conditions as well as security features offered by CSPs and SaaS providers to ensure data privacy.


Bring Your Own Device (BYOD)
Fifty-nine percent of organizations today allow their employees to bring their own devices to work, a concept called BYOD. While it helps businesses save money on IT equipment, it also increases security risks.


Employees might use unapproved SaaS applications from their personal devices. They may also use personal and official cloud storage applications side-by-side, increasing the risk of confidential data getting posted in a personal space. BYOD policies make it difficult to track employees’ use of business data on their personal devices. Stolen, lost, or misused devices can also result in business data getting breached



A service level agreement (SLA) is a consensus between a client and a service provider. SLA agreement encapsulates roles & responsibilities, exceptions, accountability & penalties for both parties.

The following definitions apply to the SLA:--

"Back-off Requirements" means, when an error occurs, the Application is responsible for waiting for a period of time. This means that after the first error, there is a minimum back-off interval of 1 second and for each consecutive error, the back-off interval increases exponentially up to 32 seconds.

"Covered Service" means Production-Grade Cloud Bigtable Instance.
"Downtime" means more than a five percent Error Rate for a Production-Grade Cloud Bigtable Instance. Downtime is measured based on server side Error Rate.

"Downtime Period" means a period of five consecutive minutes of Downtime with a minimum of 60 requests per minute. Intermittent Downtime for a period of less than five minutes will not be counted towards any Downtime Periods.

"Error Rate" means the number of Valid Requests that result in a response with HTTP Status 50x and Code "Internal Error", "Unknown", or "Unavailable" divided by the total number of Valid Requests during that period. Repeated identical requests do not count towards the Error Rate unless they conform to the Back-off Requirements.

"Financial Credit" means the following for Cloud Bigtable Replicated Instances with Valid Requests using a Multi-Cluster routing policy:

"Monthly Uptime Percentage" means total number of minutes in a month, minus the number of minutes of Downtime suffered from all Downtime Periods in a month, divided by the total number of minutes in a month.

"Production-Grade Cloud Bigtable Cluster" means a Cloud Bigtable Cluster with 3 or more nodes provisioned.

"Production-Grade Cloud Bigtable Instance" means a Cloud Bigtable Instance that only contains Production-Grade Cloud Bigtable Clusters.

"Region" means a region described at https://cloud.google.com/about/locations/, as may be updated by Google from time to time.

"Replicated Instance" means a Production-Grade Cloud Bigtable Instance which contains 2 or more Production-Grade Cloud Bigtable Clusters, with each cluster in a different Zone of either the same Region or different Regions.

"Valid Requests" are requests –
for a Replicated Instance using the Multi-Cluster routing policy and that conform to the Documentation and that would normally result in a non-error response.
for a Replicated Instance using a Single-Cluster routing policy that conform to the Documentation and that would normally result in a non-error response.
for a Zonal Instance that conform to the Documentation, and that would normally result in a non-error response.

"Zonal Instance" means a Production-Grade Cloud Bigtable Instance with one Production-Grade Cloud Bigtable Cluster.



Many small businesses sign up for cloud providers without asking for a robust service level agreement (SLA).

A Service Level Agreement (SLA) is the bond for performance negotiated between the cloud services provider and the client. Earlier, in cloud computing all Service Level Agreements were negotiated between a client and the service consumer

SLAs provide companies a standard to hold each other accountable in regards to customer support efforts. They also create a goal for employees to meet so they remain productive. Most importantly, they can prove that negotiated promises between companies are being kept. 

Depending on the agreement, failing to meet an SLA (often called an SLA violation) can result in a cash payment and/or a discount to the customer. This compensation is for the business inconvenience that may occur from the poor support experience. 

Service-level agreements, amongst other things, bolster trust in and between organizations – making it clear what needs to be done, to what standard, and when.
In the event of a disaster, your cloud provider should have a plan in place to prevent total loss of your data. Cloud providers should have a section of the SLA that describes their disaster recovery and backup solutions in detail. 

Depending on the provider, they may provide automatic backups and snapshots of your data. If the user is required to set up backup and recovery systems, the SLA should outline that. It may not specifically state how to activate them, but you should be aware if you need to activate them or not.


SLAs should not be made up of incomprehensible legal language; look for terms that guarantee a specified level of performance by the CSP. Understanding the extent of security features, e.g., encryption and data loss prevention, offered by the vendor along with the technical and business features—up-time, resilience, etc.—will help to ensure that your data in the cloud is secured.


Multifactor authentication: Multifactor authentication is an authentication method that allows access to a portal or application only after the user successfully presents two or more pieces of evidence. A two-factor authentication that uses a password as well as a one-time authentication key (OTP) is an example of this.

The front line of defense for any system is encryption. It uses complex algorithms to conceal or encrypt information. To decrypt these files, you must have a confidential encryption key. Encryption helps prevent confidential data from falling into the wrong hands. Encrypting data at rest is a must while encrypting data in-transit is highly advised.

What is encryption algorithm?
A mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. Blowfish, AES RC4, RC5, and RC6 are examples of encryption algorithms.


Data backup is the process of duplicating data to allow for its retrieval in case of a data loss event. It helps to ensure that data is not lost because of natural disasters, theft, or any other mishap

A firewall is a network security tool that monitors incoming and outgoing traffic to detect anomalies. It also blocks specific traffic based on a defined set of rules. Cloud-based virtual firewalls help to filter network traffic to and from the internet and secure the data center.


A software bug is a coding error that causes an unexpected defect in a computer program. In other words, if a program does not perform as intended, it is most likely because of a bug

A software bug is an error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.



The process of finding and fixing bugs is termed "debugging" and often uses formal techniques or tools to pinpoint bugs, and since the 1950s, some computer systems have been designed to also deter, detect or auto-correct various computer bugs during operations.

Most bugs arise from mistakes and errors made in either a program's source code or its design, or in components and operating systems used by such programs. A few are caused by compilers producing incorrect code. A program that contains many bugs, and/or bugs that seriously interfere with its functionality, is said to be buggy (defective). 

Bugs can trigger errors that may have ripple effects. Bugs may have subtle effects or cause the program to crash or freeze the computer. Other bugs qualify as security bugs and might, for example, enable a malicious user to bypass access controls in order to obtain unauthorized privileges.

The Top Reasons for Software Bugs:
Lack of Communication. Lack of organized communication leads to miscommunication. ...
Recurring Ambiguity in Requirements. ...
Missing Process Framework. ...
Programming Errors. ...
Too much Rework. ...

Self Imposed Pressures.






Here are possible occurrences that threaten data integrity:--

Data breaches, locks, and removals are among the possibilities that can risk in the loss of data integrity. Data breaches are incidents in which sensitive data are stolen by individuals who have no authorization to do so. Also referred to vendor lock-in, data lock is a situation in which customers using a service cannot easily convert to a competitor’s product or service, usually as a result or incompatible technologies. In the case of data removal where there is a rendering representation of data loss, recovery may become difficult if the server broke down or failed.

Guest-hopping attack
In guest-hopping attacks, due to the separation failure between shared infrastructures, an attacker gets access to a virtual machine by penetrating another virtual machine hosted in the same hardware. One possible mitigation of guest-hopping attack is the Forensics and VM debugging tools to observe any attempt to compromise the virtual machine. Another solution is to use the High Assurance Platform (HAP), which provides a high degree of isolation between virtual machines.

Side-channel attack
An attacker opens a side-channel attack by placing a malicious virtual machine on the same physical machine as the victim machine. Through this, the attacker gains access to all confidential information on the victim machine. The countermeasure to eliminate the risk of side-channel attacks in a virtualized cloud environment is to ensure that no legitimate user VMs reside on the same hardware of other users.

Malicious insider
A malicious insider can be a current or former employee or business associate who maliciously and intentionally abuses system privileges and credentials to access and steal sensitive customer information within the network of an organization. Strict privilege planning and security auditing can minimize this security risk that originates from within an organization.

Cookie poisoning
Cookie poisoning means to gain unauthorized access into an application or a webpage by modifying the contents of the cookie. In a SaaS model, cookies contain user identity credential information that allows the applications to authenticate the user identity. Cookies are forged to impersonate an authorized user. A solution is to clean up the cookie and encrypt the cookie data.

Cookie poisoning is the act of manipulating or forging session cookies for the purpose of bypassing security measures and achieving impersonation and breach of privacy. By forging these cookies, an attacker can impersonate a valid client, and thus gain information and perform actions on behalf of the victim. Or attackers can use forged cookies to trick a server into accepting a new version of the original intercepted cookie with modified values. The ability to forge such session cookies (or more generally, session tokens) stems from the fact that all tokens are not generated in a secure way.

A cookie is information that a web site puts on your hard disk so that it can remember something about you at a later time. More technically, it is information for future use that is stored by the server on the client side of a client / server communication. Typically, a cookie records your preferences when using a particular site. Cookies stored on your computer's hard drive maintain bits of information that allow web sites you visit to authenticate your identity, speed up your transactions, monitor your behavior, and personalize their presentations for you. 

How do cookies work?

When a user visits a site, the site sends a tiny piece of data, called a cookie, which is stored on the user's computer by their browser. The browser sends the cookie back to the server with every request the browser makes to that server, such as when the user clicks a link to view a different page or adds an item to a shopping basket.

The data stored in the cookie lets the server know with whom it is interacting so it can send the correct information back to the user. Cookies are often used by web servers to track whether a user is logged in or not, and to which account they are logged in. Cookie-based authentication is stateful for the duration of multiple requests and has been the default method for handling user authentication for a long time. It binds the user authentication credentials to the user's requests and applies the appropriate access controls enforced by the web application.

A typical example of a cookie use begins with a user entering their login credentials, which the server verifies are correct. The server then creates a session that is stored in a database, and a cookie containing the session ID is returned to the user's browser. On every subsequent request, the browser returns the cookie data, and the session ID is verified by the server against the database; if it is valid, the request is processed. When the user logs out of the site, the session is usually destroyed on both the client and server side, but if the user has checked the “Keep me logged in” or “Remember me” option, the cookie will persist on the user's computer



Cookies can be accessed by persons unauthorized to do so due to insufficient security measures. An attacker can examine a cookie to determine its purpose and edit it so that it helps them get user information from the website that sent the cookie.

Cross-site scripting (XSS) injection attacks are a common method used to steal session cookies. If attackers can find a page on a site that is vulnerable to XSS injection, they can insert a script into the page that sends them the session cookie of everyone that views the page. The cookie then enables the attackers to impersonate its rightful owner, enabling them to stay logged in to the victim's account for as long as they want, without ever having to enter a password.

Alternative cookie attacks include predicting, brute force hacking or replicating the contents of a valid authentication cookie. Any such forged cookies would enable the attacker to impersonate a site's genuine users.

How can we prevent cookie poisoning?
As cookie poisoning is fairly easy to do, adequate cookie-poisoning protection should detect cookies that were modified on a client machine by verifying that cookies which are sent by the client are identical to the cookies that were set by the server.

Ingrian Networks has developed a patented platform which provides a means for securing cookies authenticity. When cookies pass through the platform, sensitive information is encrypted. A digital signature is created that is used to validate the content in all future communications between the sender and the recipient. If the content is tampered with, the signature will no longer match the content and will be refused access by the server.

In addition, web applications should be developed so that certain key parameters are not stored within cookies so as to minimize the damage if they are stolen or forged. 

Backdoor and debug option

The backdoor is a hidden entrance to an application, which was created intentionally or unintentionally by developers while coding. Debug option is also a similar entry point, often used by developers to facilitate troubleshooting in applications. But the problem is that the hackers can use these hidden doors to bypass security policies and enter the website and access the sensitive information. To prevent this kind of attack, developers should disable the debugging option.


Cloud browser security
A web browser is a universal client application that uses Transport Layer Security (TLS) protocol to facilitate privacy and data security for Internet communications. TLS encrypts the connection between web applications and servers, such as web browsers loading a website. Web browsers only use TLS encryption and TLS signature, which are not secure enough to defend malicious attacks. One of the solutions is to use TLS and at the same time XML based cryptography in the browser core.

Cloud malware injection attack

A malicious virtual machine or service implementation module such as SaaS or IaaS is injected into the cloud system, making it believe the new instance is valid. If succeeded, the user requests are redirected automatically to the new instance where the malicious code is executed. The mitigation is to perform an integrity check of the service instance before using it for incoming requests in the cloud system.

A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation. Commands from the web are executed in a secure container, separate from the user endpoint, and accessed by the remote display protocol. By placing a browser application in the cloud, it becomes more centralized, manageable, cost effective, scalable and protected.

Enhanced security: Due to the fact that no executable web code ever reaches the user endpoint, pieces of malicious code and potential threats are blocked.

Better privacy: Unlike traditional web browsers, cloud browsers protect a user's digital identity and location during each session by passing information through a cloud-based data center.
Implemented cloud service benefits: Similar to other cloud services, cloud browser providers will manage the maintenance, scalability and capacity. This gives administrators a single point of command and control.

Reduced need for point solutions: Browsing within the cloud minimizes the necessity of added functionality such as content filtering, data loss protection (DLP), SSL inspection, endpoint security protection, domain name system (DNS) services, firewalls and VPNs

ARP poisoning
Address Resolution Protocol (ARP) poisoning is when an attacker exploits some ARP protocol weakness to map a network IP address to one malicious MAC and then update the ARP cache with this malicious MAC address. It is better to use static ARP entries to minimize this attack. This tactic can work for small networks such as personal clouds, but it is easier to use other strategies such as port security features on large-scale clouds to lock a single port (or network device) to a particular IP address.




 Network-level security attacks
Cloud computing largely depends on existing network infrastructure such as LAN, MAN, and WAN, making it exposed to some security attacks which originate from users outside the cloud or a malicious insider..

Domain Name System (DNS) attacks

It is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS), which converts hostnames into corresponding Internet Protocol (IP) addresses using a distributed database scheme. DNS servers are subject to various kinds of attacks since DNS is used by nearly all networked applications – including email, Web browsing, eCommerce, Internet telephony, and more. It includes TCP SYN Flood Attacks, UDP Flood Attack, Spoofed Source Address/LAND Attacks, Cache Poisoning Attacks, and Man in the Middle Attacks.




Domain hijacking

Domain hijacking is defined as changing a domain’s name without the owner or creator’s knowledge or permission. Domain hijacking enables intruders to obtain confidential business data or perform illegal activities such as phishing, where a domain is substituted by a similar website containing private information. One way to avoid domain hijacking is to force a waiting period of 60 days between a change in registration and a transfer to another registrar. 



Another approach is to use the Extensible Provisioning Protocol (EPP), which utilizes a domain registrant-only authorization key as a protection measure to prevent unintended name changes. Another approach is to use the Extensible Provisioning Protocol (EPP), which utilizes a domain registrant-only authorization key as a protection measure to prevent unauthorized name changes.



All cloud based security issues can be broken down into four departments. Risks include data integrity, application security, content and policy security, and network level attacks.

https://static.googleusercontent.com/media/1.9.22.221/en//enterprise/pdf/whygoogle/google-common-security-whitepaper.pdf





  1. WE ASK THE MODI GOVT..

    MAKE IT COMPULSORY FOR EVERY INDIAN TO DECLARE HOW MUCH BITCOIN HE HAS WITH HIM..

    HE ALSO HAS TO DECLARE HOW HE GOT IT..

    MAKE IT A JAILABLE OFFENCE FOR MISDECLARATION ..

    CYBER HACKERS ARE ASKING FOR PAYMENT IN BITCOIN..

    DDOS SCAMMERS ARE IMPERSONATING ONE OF RUSSIA’S MOST NOTORIOUS HACKING GROUPS IN ORDER TO EXTORT VICTIMS OUT OF THOUSANDS OF DOLLARS WORTH OF BITCOIN.

    THE SCHEME WORKS LIKE THIS: ATTACKERS LAUNCH THE DDOS ATTACK FROM A BOTNET, IN WHICH EACH IP IN THE BOTNET SENDS A FRACTION OF THE OVERALL TRAFFIC TO THE TARGET. THE VICTIM HAS A DEADLINE, TYPICALLY SIX DAYS, TO PAY TWO BITCOIN. IF THEY DON’T PAY BY THE TIME THE DEADLINE EXPIRES, THE FEE INCREASES BY ONE BITCOIN PER DAY, AND THE DDOS RESUMES.

    A U.S. JUDGE SENTENCED A 21-YEAR-OLD MAN SERGIY USATYUK, OF ILLINOI TO 13 MONTHS IN PRISON FOR RUNNING SERVICES THAT MADE IT POSSIBLE FOR ATTACKERS TO LAUNCH MILLIONS OF THEIR OWN DDOS ATTACKS WITH LITTLE FEAR OF BEING APPREHENDED

    https://ajitvadakayil.blogspot.com/2019/11/what-artificial-intelligence-cannot-do_15.html

    capt ajit vadakayil
    ..

SOMEBODY ASKED ME

WHAT IS THIS EXTREME VIOLENCE IN NE STATES ABOUT CAB ?

WELL THIS VIOLENCE IS SPONSORED BY DEEP STATE ( ROTHSCHILD ) FUNDED NGOs.

ONLY ONE PERSON ON THE PLANET CAN TELL YOU WHY JEW ROTHSCHILD INTRODUCED "INNER LINE PERMIT" IN NE STATES AND WHY CHINA WANTS TO ANNEX ARUNACHAL PRADESH..

MY NEXT POST WILL BE ABOUT THIS..

IT WILL MAKE DONALD TRUMPS OLD BALLS GO TRRR PRRR BRRRR.

AJIT DOVAL-- STOP RESTING ON YOUR PAST DEEP PAKISTAN LAURELS.. MOVE YOUR SCRAWNY ASS !

capt ajit vadakayil
..


  1. THE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS..

    ALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..

    THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIEMENT.

    THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS.. OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN.

    WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGEMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION..

    THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN..

    JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...

    JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…

    WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..

    THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..

    http://ajitvadakayil.blogspot.com/2018/11/the-indian-constitution-does-not-allow.html

    WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..

    WE NEED TO FORM MILITARY COURTS IN INDIA TO HANG TRAITOR JUDGES IN PAYROLL OF THE DEEP STATE.. THESE JUDGES ARE IN CAHOOTS WITH BENAMI MEDIA..

    PEOPLE IN NE STATES CONTROLLED BY JEW ROTHSCHILD ( DEEP STATE ) FUNDED NGOs ARE ENGAGED IN RIOTS.. MY NEXT POST WILL EXPLAIN WHY?

    OUR POTHOLE JOURNALISTS AND STUPID JUDGES DO NOT EVEN KNOW WHAT IS “INNER LINE PERMIT” IN ARUNACHAL PRADESH CREATED BY JEW ROTHSCHILD WHO RULED INDIA ..

    WE KNOW ILLEGAL COLLEGIUM JUDGES HAVE FOREIGN SUPPORT WHEN THEIR LEGISTLATE AND DO EXTREME JUDICIAL OVERREACH..

    Capt ajit vadakayil
    ..
    .
    1. PUT ABOVE COMMENT IN WEBSITES OF-
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

  1. This means that Indian parliament has already passed NJAC and all it needs is someone with balls of steel to face off the judges as it has been illegally cancelled by the judges.

    So what has been done illegally is null and void and the original bill is the law as passed by the parliament.
    .
    1. NJAC STANDS !

      WE NEED A PM AND LAW MINISTER WHO ARE NOT SLAVES OF THE JEWISH DEEP STATE..

      CAPT AJIT VADAKAYIL WILL WRITE THE LEGACY OF MODI AND PRASAD.. FUTURE GENERATIONS WILL SPIT ON THEM.

      THE INDIAN PRESIDENT WAS KICKED ON HIS HEAD BY THE CJI NAMED DATTU ..

      capt ajit vadakayil
      ..

THIS POST IS NOW CONTINUED TO PART 11 , BELOW--

https://ajitvadakayil.blogspot.com/2019/12/what-artificial-intelligence-cannot-do_1.html



CAPT AJIT VADAKAYIL
..

205 comments:


  1. https://timesofindia.indiatimes.com/india/in-dhoti-punjabi-abhijit-receives-nobel-india-cheers/articleshow/72465231.cms

    ONLY TRAITORS CHEER ABHIJIT BANNERJEE....

    JEW ROTHSCHILD HAS GIVEN US A NEW AMARTYA SEN NAMED ABHIJIT BANNERJEE --..

    AMARTYA SEN HAS BEEN PUT OUT TO PASTURE FOR BEING INEFFECTIVE ….

    A MILLION BONGS DANCED ON THE STREETS OF CALCUTTA WHEN AMARTYA SEN GOT NOBEL PRIZE.. LET ME SEE HOW MANY ATTEND HIS FUNERAL….

    WHAT WAS AMARTYA SENs QUALIFICATION? . HE MARRIED JEWESS EMMA ROTHSCHILD …

    WHAT IS ABHIJEET BANNEJEEs QUALIFICATION? .. HE MARRIED FRENCH JEWESS ESTHER DUFLO….
    BOTH MIYA AND BIWEE GOT NOBEL PRIZE.. EKATTA.. BRAAAAYYYYYYYYYY !..

    DEEP STATE DARLING ABHIJIT BANNERJEE WAS ONE OF THE 108 SIGNATORIES WHO LIED THAT MODI COOKED UP STATISTICS PUBLISHED BY CENTRAL STATISTICAL OFFICE NSSO JUST PRIOR TO 2019.. THIS WAS A POLITICAL MOVE..

    COMMIE ABHIJIT BANERJEEs NAME IS NO 5 IN THE LIST..

    ABHIJIT BANNERJEE WON NOBEL PRIZE ONLY BECAUSE HIS WIFE IS A JEWESS ESTHER DUFLO WHO SHARED THE NOBEL PRIZE WITH HIM....

    ABHIJIT BANNERJEE , IS A DEEP STATE AGENT --JUST LIKE AMARTYA SEN AND RAGHURAM RAJAN..
    HE IS GUILTY OF LYING USING A PLATFORM GIVEN TO HIM BY FORD FOUNDATION TO BRING HIS OWN WATAN DOWN..

    I HAVE READ SOME OF HIS WORKS INCLUDING HIS BOOK “POOR ECONOMICS “ AND HEARD HIS VIEWS -- AND I CONSIDER HIM A MEDIOCRE BRAIN WHO HAS REACHED PLACES BY SPONSORSHIP FROM JEWISH NEOCONS ..

    DEEP STATE DARLING ABHIJIT BANNERJEE WAS ONE OF THE 108 SIGNATORIES WHO LIED THAT MODI COOKED UP STATISTICS PUBLISHED BY CENTRAL STATISTICAL OFFICE NSSO JUST PRIOR TO 2019 TO PAINT A ROSY PICTURE OF INDIAN ECONOMY ..

    WE ASK WHICH PROFESSOR WITH INTEGRITY WILL MARRY HIS OWN DOCTORAL STUDENT ?

    IS ABHIJIT BANNERJEEs WIFE ESTHER DUFLO ( A JOINT NOBEL PRIZE WINNER ) WORTHY OF HER DEGREE ?'ROTHSCHILD ECONOMISTS SWAMY/ MANMOHAN SINGH/ MONTEK SINGH AHLUWALIA/ RAGHURAN RAJAN / CHID/ AMARTYA SEN / ABHIJIT BANNERJEE / GITA GOPINATH --

    DO NOT KNOW THAT GDP IS USED TO PORTRAY WHITE BEGGAR NATIONS AS RICH AND ECONOMICALLY STRONG NATION LIKE INDIA , AS A BEGGAR NATION..

    INDIA IS GROWING TODAY AT 10.1%.. WE ARE A 5 TRILLION USD ECONOMY ALREADY.. WE ARE NO 3 IN ECONOMIC STRENGTH ON THE PLANET..


    . READ ITEMS 686 TO 820 OF THE POST BELOW--

    Go0gle for the blogpost below---

    ……………………….. ARCHIVED - QUESTIONS TO QUORA FROM CAPT AJIT VADAKAYIL , NO 1 TO NO 1017 ……………………

    ReplyDelete
  2. Pranam Captain

    Which is your favourite Attar? And what is the correct way to apply an attar?

    Regards
    Sagar

    ReplyDelete
  3. THE INDIAN JUDICIARY HAS FACILITATED CONVERSION OF TRIBALS AND COASTAL FISHERMEN OF TAMIL NADU AND KERALA INTO CHRISTIANITY.. THERE ARE REWARDS FOR THIS..

    http://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html

    https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html

    HERE IS A SHOCKER-- PEOPLE CANT THINK DEEP..

    WHY DID PRAYER BREAKFAST GROUP ( FAMILY/ FELLOWSHP ) SPONSOR NAC IN INDIA?

    THEY WANTED TO CREATE A SITUATION AMONG HINDUS LIKE IN THE TIME OF SIKANDAR BHUTSHIKAN..

    THIS WIKIPEDIA ARTICLE IS WATERED DOWN TO SHOW THIS BASTARD IN GOOD LIGHT..

    https://en.wikipedia.org/wiki/Sikandar_Shah_Miri

    THIS 7TH MUSLIM KING OF KASHMIR , SIKANDAR BUTSHIKAN , WAS THE MOST CRUEL OF ALL THE MUSLIM RULERS WHO INVADED INDIA.

    SIKANDAR BHUTSHIKAN MADE HINDUS KAFFIRS ( LESSER HUMANS ) ..

    KASHMIRIS WERE PROUD HINDUS, THE LAND OF KASHMIR HAD 100% HINDUS.

    KAFFIRS ARE LESSER HUMAN BEINGS WHO ARE CRIMINALS BY DEFINITION BECAUSE THEY ARE NOT MUSLIMS.

    LIFE BECASE SO TOUGH THAT HINDUS TO ISLAM CONVERTED FOR SURVIVAL.

    IN KASHMIR, SIKANDAR BUTSHIKAN LEVIED BOTH JIZYA AND ZAKAT ON HINDUS.

    SIKANDAR BHUTSHIKAN DESTROYED THE MARTHANDA TEMPLE. WHICH WAS MORE MAGNIFICIENT THAN TAJMAHAL.

    IT TOOK HIS SOLDIERS 13 MONTHS TO DESTROY THE GLORIOUS 3100 YEAR OLD MARTHANDA SUN TEMPLE OF KASHMIR--SUCH WAS ITS AMAZING STRENGTH WITH HUGE INTERLOCKING STONES..

    THIS CRUEL MUSLIM KING AUTHORISED HIS SOLDIERS TO RAPE DEAD HINDU WOMEN WHO TOOK POISON TO ESCAPE CAPTURE. HE HAD ALREADY BANNED ALL HINDUS IN KASHMIR FROM CREMATING THEIR DEAD BODIES.

    FOR A HINDU CREMATION AFTER DEATH IS A MUST TO PREVENT THE SOUL BEING TRAPPED ON EARTH.

    HE BANNED DANCE, DRAMA, MUSIC AND ICONOGRAPHY AS AESTHETIC ACTIVITIES OF THE HINDUS AND FIATED THEM AS HERETICAL AND UN-ISLAMIC. HE FORBADE THE HINDUS TO APPLY A TILAK MARK ON THEIR FOREHEADS.

    HE DID NOT PERMIT HINDUS TO PRAY AND WORSHIP, BLOW A CONCH SHELL OR TOLL A BELL. A HEAVY JIZYA (TAX) EQUAL TO 4 TOLAS OF SILVER WAS IMPOSED ON THE HINDUS.

    IF A HINDU WAS CAUGHT IN A MUSLIM DRESS TO ESCAPE CAPTURE, HE WOULD BE TORTURED MOST SEVERELY.

    HIS POLICY TOWARDS HINDUS WAS -- CONVERT OR DIE.

    THE HINDUS WILL NOT REPAIR TEMPLES
    THEY WILL NOT RIDE A HORSE WITH SADDLE AND BRIDLE.
    THEY WILL NOT CARRY SWORDS OR BOWS AND ARROWS.
    THEY WILL NOT PREVENT MUSLIM TRAVELERS FROM STAYING IN THEIR TEMPLES & SHRINES.
    THEY WILL NOT MOURN THEIR DEAD LOUDLY.
    THEY WILL NOT BUILD HOUSES IN NEIGHBOURHOOD OF MUSLIMS.
    THEY WILL NOT CARRY THEIR DEAD NEAR THE GRAVE-YARDS OF MUSLIMS.
    THEY WILL NOT GIVE UP THEIR TRADITIONAL DRESS SO THAT THEY CAN BE DISTINGUISHED FROM MUSLIMS.

    THEIR SACRED HINDU BOOKS WERE THROWN INTO THE DAL LAKE BY SIKANDAR BUTSHIKAN . THE PANDITS NUMBERING OVER ONE LAKH ( 100 000 ) WERE DROWNED IN THE DAL LAKE BY HOLDING THEIR HEADS UNDERWATER AND THEN THEY WERE BURNED IN A HEAP AT A SPOT IN THE VICINITY OF RAINAWARI IN SRINAGAR CITY KNOWN AS BHATTA MAZAR BEYOND PRESENT DAY JOGILANKER.

    THE WATERS OF THE PLACID DAL LAKE HOLDS ALL THESE MORBID MEMORIES.

    HISTORICALLY HINDUS HAVE NEVER ENGAGED PRO-ACTIVELY I VIOLENCE AND DRAWN FIRST BLOOD.. HINDUS HAVE ALWAYS BEEN REACTIVE – TOTALLY EXASPERATED , AND TO AVOID BEING BRANDED AS COWARDS.

    GODHRA RIOTS WAS A REACTION, NOT A PROACTIVE ACTION.

    CONTINUED TO 2-

    ReplyDelete
    Replies
    1. CONTINUED FROM 1--

      http://ajitvadakayil.blogspot.com/2012/11/babri-masjid-demolition-mughal-emperor.html

      CAPT AJIT VADAKAYIL WILL WRITE THE LEGACY OF UDDHAV THACKREY, A DROHI..

      MARATHA HINDUS DID NOT VOTE FOR THE ITALIAN WAITRESS OF AHMED PATEL ( PAKISTANI, ISI SPONSORED )

      http://ajitvadakayil.blogspot.com/2017/11/hindu-holocaust-continues-capt-ajit.html

      NAC TRIED TO MAKE HINDUS CONVERT TO CHRISTIANITY/ ISLAM.. YOU CANT EVEN SAY, WE DON’T WANT ILLEGAL BANGLADESI MUSLIM IMMIGRANTS INTO INDIA.

      TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP. SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..

      I WILL PUT A FULL BLOGPOST ON NAC AND COMMUNAL VIOLENCE BILL.

      THE ITALIAN WAITRESS PACKED NAC WITH ANTI-HINDU PEOPLE.. MIND YOU, NAC WAS NOT APPLICABLE IN KASHMIR BECAUSE HINDUS WERE MINORITY THERE..

      THE ILLEGAL COLLEGIUM JUDICIARY PLAYED ALL..

      WE WILL FORM MILITARY COURTS TO HANG DESH DROHIS WHO SPONOSRED NAC..

      Capt ajit vadakayil
      ..

      Delete
  4. SOMEBODY CALLED ME UP AND ASKED ME---

    WHY WAS BR AMBEDKAR SO BITTER IN THE LAST YEARS OF HIS LIFE ..

    INDEED –AFTER BR AMBEDKAR LOST THE LOK SABHA ELECTIONS FROM BHANDARA IN 1954 HE LOST ALL HOPE OF BECOMING PM.

    JEW COMMIE JOHN DEWEY WAS BR AMBEDKARs MENTOR WHILE DRAFTING THE CONSTITUTION.

    ROTHSCHILDs AGENT JEW JOHN DEWEY WROTE MAOs LITTLE RED BOOK.

    JOHN DEWEY WANTED TO MAKE BR AMBEDKAR THE PM OF INDIA.. BUT THERE WAS ZERO CHANCE OF HIM GETTING ELECTED LIKE MANMOHAN SINGH..

    BR AMBEDKAR HAD LEFT A WEE UNNOTICED LOOP HOLE FOR HIMSELF VIA ARTICLE 75 OF THE CONSTITUTION.. HE COULD COME VIA THE RAJYA SABHA BACKDOOR, IF HE COULD INFLUENCE THE PRESIDENT RAJENDRA PRASAD, BUT THAT WAS NOT TO HAPPEN.

    THE BRITISH CONSTITUTION DOES NOT ALLOW AN UNELECTED PM -- HE HAS TO COME VIA THE HOUSE OF COMMONS.

    BUT THE INDIAN CONSTITUTION WHICH WAS A STRAIGHT LIFT OF THE BRITISH CONSTITUTION ( WITH SOME SOCIAL ENGINEERING PROVIDED BY JOHN DEWEY ) ALLOWED A MAN WHO IS NEITHER IN THE LOK SABHA OR RAJYA SABHA ( ARTICLE 75 ) TO BECOME PM, PROVIDED THE PRESIDENT SANCTIONS IT..

    IN EVERY FUNCTIONING PARLIAMENTARY DEMOCRACY ON THIS PLANET THE GOLDEN THUMB RULE IS THAT THE HEAD OF THE GOVERNMENT MUST BE A MEMBER OF THE PARLIAMENT , AND MUST BE ELECTED BY THE PEOPLE..

    HEY , IS INDIA A BANANA REPUBLIC ?

    ROTHSCHILD VIA BILDERBERG CLUB DECIDED MANMOHAN SINGH ( WORSE THAN A LAME DUCK ) WOULD BE RBI GOVERNOR/ FINANCE MINISTER/ PM OF INDIA..

    http://ajitvadakayil.blogspot.com/2016/03/pm-defense-minister-finance-minister-of.html

    MANMOHAN SINGH WITH SOFTER THAN RUBBER SPINE LOST THE 1999 LOK SABHA ELECTION FROM THE SOUTH DELHI CONSTITUENCY AND HAD NO HOPES OF EVER BEING ELECTED. PEOPLE REJECTED THIS LIMPET PERSON, NO SARDARJEE CAN BE LIKE HIM EVER..

    http://ajitvadakayil.blogspot.com/2011/09/shrewd-club-within-naive-bilderberg.html

    IMAGINE WHEN THE ITALIAN MAINO JEWESS WAITRESS WAS EMPRESS VIA NAC, SHE HAD LAME DUCK SARDARJEE AS HER PM.. SHE DID NOT ADVISE HIM , SHE COMMANDED HIM..

    FOR A DECADE MANMOHAN SINGH REMAINED PM WHILE BEING THE MEMBER OF RS – VIA CHRISTIAN STRONGHOLD ASSAM.

    RAHUL GANDHI LOST MISERABLE IN AMETHI BUT HE BECAME MP VIA WAYANAD ( KERALA ) WHERE TRIBALS HAVE BEEN CONVERTED TO CHRISTINITY ENMASSE BY RICE BAGS.

    THE ITALIAN MAINO JEWESS FELL PHUTT ON HER FACE WHEN SHE TRIED TO MADE KAFIRS OUT OF MAJORITY HINDUS IN THEIR OWN LAND VIA COMMUNAL VIOLENCE BILL ..

    KAFIRS ARE LESS THAN HUMANS – LIKE ANIMALS.. KAFIRS ARE CRIMINALS BY DEFINITION JUS BECAUSE THEY ARE NOT MUSLIMS.

    NAC TRIED TO MAKE HINDUS CONVERT TO CHRISTIANITY/ ISLAM.. YOU CANT EVEN SAY, WE DON’T WANT ILLEGAL BANGLADESI MUSLIM IMMIGRANTS INTO INDIA.

    IN 1997,THE ILLEGAL COLLEGIUM JUDICARY , THE SUPREME COURT STATED THAT A PERSON WHO IS NOT A MEMBER OF EITHER HOUSE OF PARLIAMENT CAN BE APPOINTED AS PM FOR SIX MONTHS, WITHIN WHICH HE MUST BECOME A MEMBER OF EITHER HOUSE OF PARLIAMENT OR HE CEASES TO BE PM.

    TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP. SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..

    THE ITALIAN WAITRESS PACKED NAC WITH ANTI-HINDU PEOPLE.. MIND YOU, COMMUNAL VIOLENCE BILL VIA NAC WAS NOT APPLICABLE IN KASHMIR BECAUSE HINDUS WERE MINORITY THERE..

    THE ILLEGAL COLLEGIUM JUDICIARY PLAYED ALL..

    WE ASK MODI TO FORM MILITARY COURTS AND TRY DESH DROHIS WITHIN INDIA WHO MADE UNCONSTITUTIONAL NAC POSSIBLE.. WE WANT CAPITAL PUNISHMENT FOR SEDITION..

    WHY DID PRAYER BREAKFAST GROUP ( FAMILY/ FELLOWSHP ) SPONSOR NAC IN INDIA?

    https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html

    THEY WANTED TO CREATE A SITUATION AMONG HINDUS LIKE IN THE TIME OF ISLAMIC BIGOT KING SIKANDAR BHUTSHIKAN WHO DERPIVED KASHMIRI HINDUS OF HUMAN RIGHTS AND FORCED HINDUS TO CONVERT TO ISLAM FOR SURVIVAL , IN SHEER IN EXPASPERATION..

    BEFORE SIKANDAR BHUTSHIKAN KASHMIR HAD 100% HINDUS..

    MY NEXT POST WILL BE ON NAC AND COMMUNAL VIOLENCE BILL —WATCH THIS SPACE..

    Capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      RBI
      RBI GOVERNOR
      NIRMALA SITARAMAN
      FINANCE MINISTRY CENTRE/ STATES
      PMO
      PM MODI
      LAW MINISTER/ MINISTRY
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
      SWAMY
      RAJIV MALHOTRA
      I&B MINISTER/ MINISTRY
      NCERT
      EDUCATION MINISTER/ MINISTRY
      CMs OF ALL INDIAN STATES
      DGPs OF ALL STATES
      GOVERNORS OF ALL STATES
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      PIYUSH GOEL
      NITI AYOG
      AMITABH KANT
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      RAJDEEP SARDESAI
      PAAGALIKA GHOSE
      NAVIKA KUMAR
      ANAND NARASIMHAN
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      FAYE DSOUZA
      ZAKKA JACOB
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      ARUN SHOURIE
      N RAM
      ALL MPs OF INDIA

      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      FINANCE MINISTER OF KERALA THOMAS ISAAC
      JULIO REBEIRO
      AK ANTONY
      OOMMEN CHANDY
      PC GEORGE
      JOHN ABRAHAM


      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
  5. https://timesofindia.indiatimes.com/home/environment/global-warming/teen-climate-activist-greta-thunberg-is-times-person-of-the-year/articleshow/72476521.cms

    WE THE PEOPLE OF INDIA SPIT ON JEWESS GRETA THUNBERG-- A DEEP STATE AGENT.

    DEEP STATE WANTS INDIA TO MOTHBALL OUR ENORMOUS RESERVES PF COAL..

    MODI TO GET A NOBEL PRIZE IS DANCING TO THE TUNE OF HIS JEWISH MASTERS..AND HE HAS RETAINED A STUPID FELLOW PRAKASH JAVEDEKAR AS HIS ENVIRONMENT MINISTER..

    https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF—
      TRUMP
      PUTIN
      AMBASSADORS TO FROM RUSSIA- USA
      NGT
      ENVIRONMENT MINISTER/ MINISTRY
      ALL STATE ENVIRONMENT MINISTERS
      PM MODI
      LAW MINISTER/ MINISTRY
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
      SWAMY
      RAJIV MALHOTRA
      I&B MINISTER/ MINISTRY
      NCERT
      EDUCATION MINISTER/ MINISTRY
      CMs OF ALL INDIAN STATES
      DGPs OF ALL STATES
      GOVERNORS OF ALL STATES
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      PIYUSH GOEL
      NITI AYOG
      AMITABH KANT
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      RAJDEEP SARDESAI
      PAAGALIKA GHOSE
      NAVIKA KUMAR
      ANAND NARASIMHAN
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      FAYE DSOUZA
      ZAKKA JACOB
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      ARUN SHOURIE
      N RAM
      ALL MPs OF INDIA

      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      FINANCE MINISTER OF KERALA THOMAS ISAAC
      JULIO REBEIRO
      AK ANTONY
      OOMMEN CHANDY
      PC GEORGE
      JOHN ABRAHAM


      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Sent to
      ed-del-rev@nic.in
      alokmittal.nia@gov.in
      Russian President website
      swamy39@gmail.com
      rsccell@sansad.nic.in
      editor@thequint.com
      editorial@thewire.in
      ideas@scroll.in
      mrs.mlekhi@gmail.com
      contact@pgurus.com
      cons1.washington@mea.gov.in
      cg.vladi@mea.gov.in
      rusembindija@mid.ru
      rusembindia@mid.ru
      consulate_mumbai@mail.ru

      Delete
  6. Captain, I found somebody lifting your blogs.

    See this person, he has copied your blogpost & comment contents on topics such as Activity-traps, Gratitude, MLM, Team-dyamics, etc......What is interesting is that he never mentiones your name explicity and does not give any link to the original-blog/comment......Instead, in a strange-manner, he simply states --- "From the famous Captain" --- see it yourself.

    Original-comment about activity-trap (from 2017):---
    https://tinyurl.com/tmprrnt

    Lifted-content of activity-trap & others (from 2018):---
    https://www.linkedin.com/pulse/meaning-real-work-vs-activity-trap-chinmaya-mishra
    https://www.linkedin.com/pulse/mlm-merchants-pipe-dreams-greed-driving-spirit-slaves-chinmaya-mishra
    https://www.linkedin.com/pulse/gratitude-noblest-all-virtues-chinmaya-mishra
    https://www.linkedin.com/pulse/team-work-dynamics-chinmaya-mishra-1
    https://www.linkedin.com/pulse/life-management-chinmaya-mishra

    ReplyDelete
  7. https://www.linkedin.com/pulse/team-work-dynamics-chinmaya-mishra-1

    ASK THIS BASTARD IF CAPTAIN HAS A NAME ..

    IF HE HAS LIFTED WHOLESALE HE MUST PUBLISH THE LINK..

    http://ajitvadakayil.blogspot.com/2010/12/team-work-team-dynamics-capt-ajit.html

    ReplyDelete
    Replies
    1. Have commented and asked him in the link above.

      Delete
    2. Dear Captain,
      He is an IIM Lucknow grad and works at Eriksson. He has deleted the article.

      Delete
    3. infact he has deleted all the other articles copied from captain's blog.

      so he is ready to delete it all but cannot write "From Ajit Vadakayil" , not expected from someone with such a good education background!

      Delete
  8. https://timesofindia.indiatimes.com/india/dark-day-in-constitutional-history-of-india-sonia-gandhi-on-passage-of-citizenship-bill-by-parliament/articleshow/72478929.cms

    ITALIAN MAINO JEWESS WHO WAS A WAITRESS TRIED TO BE EMPRESS OF INDIA VIA NAC...

    USING CVB SHE TRIED TO CONVERT HINDUS TO KAFIRS IN THEIR OWN LAND.

    ReplyDelete
  9. Captain,
    Ravi shankar prasad in a discussion on CAB in R.S said that parliment is sovereign and it has even the power to override the ruling of sc and he further went on to assert the power of parliment in making laws.All credit goes to you captain.atleast now he has spoken something sensible.

    ReplyDelete
    Replies
    1. AS A LAW MINISTER YOU MUST KNOW THIS -- WITH ATTORNEY GENERAL YOU CAN TEAR THE ASS OF THE ILLEGAL COLLEGIUM JUDICIARY...

      Delete
  10. 🙏🙏
    Captain sir,
    CAB passed in Rajya sabha.
    Vadakayil effect in action
    🇮🇳🇮🇳🇮🇳👏👏👏

    ReplyDelete
  11. Oops O dear! Lutyens media lost their bete noire ...Modi got clean chit from Nanavati Mehta commission...

    ReplyDelete
  12. SOMEBODY ASKED ME

    WHAT IS THIS EXTREME VIOLENCE IN NE STATES ABOUT CAB ?

    WELL THIS VIOLENCE IS SPONSORED BY DEEP STATE ( ROTHSCHILD ) FUNDED NGOs.

    ONLY ONE PERSON ON THE PLANET CAN TELL YOU WHY JEW ROTHSCHILD INTRODUCED "INNER LINE PERMIT" IN NE STATES AND WHY CHINA WANTS TO ANNEX ARUNACHAL PRADESH..

    MY NEXT POST WILL BE ABOUT THIS..

    IT WILL MAKE DONALD TRUMPS OLD BALLS GO TRRR PRRR BRRRR.

    AJIT DOVAL-- STOP RESTING ON YOUR PAST DEEP PAKISTAN LAURELS.. MOVE YOUR SCRAWNY ASS !

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. The appointment of Kummanam Rajasekharan, Kerala BJP chief, as Governor of Mizoram was preceded by a barrage of protests from China backed maoists and Vatican backed missionaries. But soon he became a respected person in the state, as indicated by the results of recent elections.

      Delete
  13. https://timesofindia.indiatimes.com/city/mumbai/accused-doctor-trio-in-payal-tadvi-case-seek-strict-bail-conditions-to-be-dropped-hc-defers-matter/articleshow/72459089.cms?UTM_Source=Google_Newsstand&UTM_Campaign=RSS_Feed&UTM_Medium=Referral

    These doctors are doing their higher studies. None have the means to do a Mallya. They will not give up on their hard earned seats for PG....

    ReplyDelete
  14. Thanks a ton...Ajit sir...love you....just want to bow down to you once and if i am lucky get a Hug from you....God bless you all...

    ReplyDelete
  15. This comment has been removed by the author.

    ReplyDelete
  16. THE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS..

    ALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..

    THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIEMENT.

    THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS.. OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN.

    WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGEMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION..

    THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN..

    JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...

    JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…

    WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..

    THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..

    http://ajitvadakayil.blogspot.com/2018/11/the-indian-constitution-does-not-allow.html

    WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..

    WE NEED TO FORM MILITARY COURTS IN INDIA TO HANG TRAITOR JUDGES IN PAYROLL OF THE DEEP STATE.. THESE JUDGES ARE IN CAHOOTS WITH BENAMI MEDIA..

    PEOPLE IN NE STATES CONTROLLED BY JEW ROTHSCHILD ( DEEP STATE ) FUNDED NGOs ARE ENGAGED IN RIOTS.. MY NEXT POST WILL EXPLAIN WHY?

    OUR POTHOLE JOURNALISTS AND STUPID JUDGES DO NOT EVEN KNOW WHAT IS “INNER LINE PERMIT” IN ARUNACHAL PRADESH CREATED BY JEW ROTHSCHILD WHO RULED INDIA ..

    WE KNOW ILLEGAL COLLEGIUM JUDGES HAVE FOREIGN SUPPORT WHEN THEIR LEGISTLATE AND DO EXTREME JUDICIAL OVERREACH..

    Capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF-
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Many Thanks for the Deeksha Captain, I have spread on social media every which way

      Delete
    3. dear captain, twitter has suspended me from posting messages due to a previous tweet.
      https://drive.google.com/open?id=1sUG_sKFB0DBZWGjcUbMIzzhkuEHktk-0

      i have raised a public grivence in pmo portal. ( PMOPG/E/2019/0706674).
      your new signature picture looks good with clear blue background. thanks.

      Delete
    4. Mailed to-
      ravis@sansad.nic.in
      contact@amitshah.co.in
      adityathackeray@me.com
      supremecourt@nic.in
      nalsa-dla@nic.in
      info@vhp.org
      info.nia@gov.in
      rammadhav@gmail.com
      38ashokroad@gmail.com
      secylaw-dla@nic.in
      contactus@rss.org
      narendramodi1234@gmail.com

      Delete
    5. shared on Facebook sir, and thanks for the deeksha.

      Delete
  17. Hello captain,
    Thank you very much for 17th deeksha.
    Eagerly waiting for your next post on collegium.

    Gratitude
    Aditya Kamath

    ReplyDelete
  18. Dear Captain the anti Cab protest is not communal ,nor it's against any other fellow Indians .It's our fight against illegal Bangladeshi,infiltrators .Assam is already overburdened from years and years , our own language and culture are at a total threat .Bringing in another set of foreigners as Assamese local people are facing scarcity of jobs. The Assam Accord will be diluted. Assam is already full of illegal Bangladesi and Rohingya immigrants.No process of proper deportation has been done to them. Assamese people will become a minority in their own homeland just like Kashmiri Hindus and Tripuris in Tripura.Assam has a very rich culture. Most of the people are proud hindus. Lord Krishna visited Assam many times. Assam is the homeland of Narakasura, Rukmini,Banasura son of Kerala King Bali and Ghatokocha . Assamese people are very similar to Kerala culture like tangy fish and Assamese New Year Bohag(Baisakh) Bihu and Kerala New Year Vishu,Assamese Makar Sankaranti Magh Bihu where a Fire Meji is burnt which symbolise Bhisma which is similar to Sabarimala Makara Vilaku. Banasura made Baneshwar Temple in Guwahati and Mahavairav Temple in Tezpur. Also Assam lost Sylhet district to Pakistan during partition. Our reason of opposing Citizenship Amendment Bill is totally different from the leftist narrative. Just like Malayalee Hindu people love Malayalam and their religion similarly Assamese Hindu people love Assamese and Hinduism . Most of the immigrants or refugees belong to a different culture and language which do not match with the local culture and language while the religion might be same. This possess a threat to linguistic, cultural and economic opportunities like employment and job to the local population.
    Assam is burning and the Government is totally turning it's back to us .
    Each of us is carrying a deep seated anguish and anger . The agitation is similar to the Sabarimala Agitation of Kerala. This is our fight for our motherland .
    If u feel our pain ,stand in solidarity with us . Jai Sri Ram Jai Sri Shyam
    Jai Guruvaurappan Swami Sharanam Ayyapan Jai Mahavishnu Jai Sai Asom Jai Matri Keralam

    ReplyDelete
    Replies
    1. EVERY THING IS NE STATES IS A CHARADE..

      THERE IS A DEEP SINISTER DEEP STATE CONSPIRACY-- IN NE STATES ..

      SOME OF THESE TRIBALS IN NE STATES WAS CREATED BY JEW ROTHSCHILD BY BLENDING CRIMINAL DNA OF FOREIGN PEOPLE ( TIBETAN / MYANMAR / CHINA YUNNAN) FOR FUTURE USE AS HIS SLAVES ..

      I WILL EXPLAIN IN MY NEXT POST

      Delete
    2. NRC was set up with good ideals. But the Officials destroyed it from within. Most Bengali Hindus were denied whereas Bengali Muslims were included. This happened because of bribes and a certain misplaced reasoning and sympathy. Many Assamese officials think that B'deshi Muslims will integrate because they have declared themselves as 'No-Axomiya' or New Assamese but Bengali Hindus declared their mother tongue as Bengali. Assamese people are fixated on their Culture and how Bengali culture and language can dominate them. The fear has proper historic reasons. But this idea is misplaced now ... but Assamese officials could not see beyond their deep hatred for Bengalis.

      Yes, you wouldn't agree. But i know better than the most. But my father worked in Assam police and he was involved in detection of B'deshis. All his colleagues got rich within three months whereas he had to sell family jewelry for medical treatment. All Muslim chaps had some documents, real or created ones whereas Hindus never bothered about documentation. And the bias of Assam Police officials was very clear.

      Your pain is understood and shared. However, CAB is good for India. And yes, it is detrimental to Assam as the demography is at its tipping point. However, do you think that those who are detected in NRC can be pushed back to B'desh ? Impossible. So, CAB is not adding any refugees right now. It is only legalizing the Hindu ones who are already there.

      The present unrest is partly funded and fueled by the Islamic groups and gradually turning the protest in to Assamese- (Hindu) Bengali riots, as happened in Assam too many times. And yes, Assamese people are dancing to that tune without using their brains.

      Take the case to HC. State that CAB and NRC dates are not reconcilable and ask for clarification from Centre and direction from Court. Also ask that till such clarification is not received the CAB maybe suspended in Assam. And please do understand that B'deshi Muslims are not anyone's friend. Ask Hindus from Kashmir who will tell you about that....or even few non-dhimmified Hindus from B'desh.

      Delete
    3. I understand the pain and plight of persecuted Hindus of Pakistan,Bangladesh,Afghanistan. I am also not anti Bengali but there is already overpopulation in Assam and The Assamese General Caste have shrinking opportunities for jobs. I love my language , culture and religion and I also respect other languages,culture and religion. I also see the plight of Tripuri people in Tripura and Kashmiri Pandits in Jammu and Kashmir. Due to large scale immigration Dhubri, Barpeta, Nagaon,Morigaon etc districts became Bangladeshi Islamic Majority. They declare themselves as Assamese and I oppose them too.Most Assamese people look for jobs rather then doing business. I wish that the government creates good jobs for the local Assam people. Assam is often ignored by mainstream media. rest of India and I wish they give importance to it. Assam has a lot of resources and the deep state is targeting those resources.The government sold many oilfields to the private companies and they can exploit the resources without the local people getting benefits.The floods and earthquakes in Assam did not receive media attention it deserves. I wish that the persecution of the people should stop in these nations. We should highlight the persecuted Hindus in agencies like UN,ICJ. I want the government should respect the sentiments of local Assamese population. I also wish that there is Akhand Bharat so that there is stopage of Hindu persecution and demographic shift of people.

      Delete
  19. Dear Captain,

    Found this twitter link while browsing reddit.

    https://twitter.com/JennyJinya/status/1198631966343606276?s=09

    Don't know why i bawled after going through that twitter thread. Are black cats really bad luck captain. Please reply.

    ReplyDelete
    Replies
    1. Maa Durga rides a cat.. A big one though.

      Delete
    2. lot of black magic people have great demand for black cats. Some chitpavan jews are involved. They are sold for high price. The cat is killed in the practice by them.

      Delete
  20. Captain Sir, does this mean that illegal collegium judges can strike down CAB even after both houses approval? Then this can happen to article 370/35 A as well? Sorry if a wrong question...very happy today...my late mother and me were in a temple at Kabul in 2005, the Hindu pujari and family had no other place to go and my mom advised them to approach Indian embassy...she would be so happy today...wherever she is...saubhagyam Gurudev _/\_

    ReplyDelete
    Replies
    1. ILLEGAL COLLEGIUM JUDICARY STRUCK DOWN NJAC AFTER 100% UNANIMOUS VOTES IN LOK / RAJYA SABHA-- AND THE SIGNATURE OF THE PRESIDENT .

      JUSTICES J. S. KHEHAR, MADAN LOKUR, KURIAN JOSEPH AND ADARSH KUMAR GOEL HAD DECLARED THE 99TH AMENDMENT AND NJAC ACT UNCONSTITUTIONAL .. THESE FOUR JUDGES AND EX-CJI CL DATTU MUST BE TRIED BY THE MILITARY COURT FOR SEDITION…

      AND ONE CUNT JUDGE TRIED TO JAIL ARUN JAITLEY FOR SEDITION..

      https://timesofindia.indiatimes.com/india/Sedition-charge-on-finance-minister-Arun-Jaitley-for-slamming-SCs-NJAC-ruling/articleshow/49488057.cms

      OUR MPs ARE ALL NAPUNSAKS---WITHOUT BALLS !

      Delete
  21. https://twitter.com/davidfrawleyved/status/1204791606064435200

    THE JEWISH ROYAL SAUDI BLOODLINE HAS NOT TAKEN A SINGLE SYRIAN MUSLIM REFUGEE..

    ReplyDelete
  22. https://timesofindia.indiatimes.com/india/insidious-cab-will-wreck-statute-fail-court-test-p-chidamabaram/articleshow/72482822.cms

    CHID BABY , APPIDIYAAAA?.. ..

    WE PLAN TO CREATE MILITARY COURTS AND HANG THE JUDGES WHO HAVE USED ILLEGAL JUDICIAL REVIEW TO UNDERMINE INDIAs DEMOCRACY BY JUDICIAL REVIEW....

    ILLEGAL COLLEGIUM JUDICIARY CREATED THE NAXAL RED CORRIDOR AND CAUSED ETHNIC CLEANSING OF KASHMIRI PANDITS..

    WE WILL PUNISH BENAMI MEDIA AND SOME UPA POLITICIANS IN THE PAYROLL OF THE DEEP STATE..

    THE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS..


    ALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..


    THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIAMENT....

    THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS..

    OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN...


    WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGEMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION...


    THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN...

    JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...

    JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…


    WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..


    THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..WE THE PEOPLE ARE ABOVE THE CONSTITUTION..

    THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..

    TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP.

    SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..

    THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN..


    JUSTICES J. S. KHEHAR, MADAN LOKUR, KURIAN JOSEPH AND ADARSH KUMAR GOEL HAD DECLARED THE 99TH AMENDMENT AND NJAC ACT UNCONSTITUTIONAL .. THESE FOUR JUDGES AND EX-CJI CL DATTU MUST BE TRIED BY THE MILITARY COURT FOR SEDITION…

    capt ajit vadakayil..'

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF-
      CHID BABY
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      AK ANTONY
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Your Registration Number is : PMOPG/E/2019/0708006

      Delete
  23. ALL READERS LISTEN UP

    IF YOU MESSAGES ARE BEING BLOCKED BY TWITTER/ FACEBOOK---

    COMPLAIN TO I&B MINISTER/ MINISTRY, PMO, PM MODI, LAW MINISTER/ MINISTRY, HOME MINISTER/ MINISTRY --EVERY SINGLE TIME..

    COMPLAIN THAT MESSAGES TO INDIAN RULERS FOR THE SURVIVAL OF BHARATMATA , PROTECTING THE WATAN FROM FOREIGN AND DOMESTIC DESH DROHIS ARE BLOCKED DELIBERATELY ..

    capt ajit vadakayil
    ..

    ReplyDelete
  24. This means that Indian parliament has already passed NJAC and all it needs is someone with balls of steel to face off the judges as it has been illegally cancelled by the judges.

    So what has been done illegally is null and void and the original bill is the law as passed by the parliament.

    ReplyDelete
    Replies
    1. NJAC STANDS !

      WE NEED A PM AND LAW MINISTER WHO ARE NOT SLAVES OF THE JEWISH DEEP STATE..

      CAPT AJIT VADAKAYIL WILL WRITE THE LEGACY OF MODI AND PRASAD.. FUTURE GENERATIONS WILL SPIT ON THEM.

      THE INDIAN PRESIDENT WAS KICKED ON HIS HEAD BY THE CJI NAMED DATTU ..

      capt ajit vadakayil
      ..

      Delete
  25. Good Morning Sir!

    Regards,
    Sriganesh

    ReplyDelete
  26. Dear Captain, Very timely written blog on CAB. Please expand, how Govt can convince these people. Why do they see a problem if at all few Bangla Hindus settle? Why not a Southie cannot make a living there? All this mess needs to clean up. With the international pressure I am afraid, SC may interfere. Advise Shah what to do to get it implemented, I think he is listening.

    Thank you!

    ReplyDelete
  27. WATCH THIS SPACE !

    https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html

    capt ajit vadakayil
    ..

    PUT ABOVE COMMENT IN WEBISTES OF-
    TRUMP
    PUTIN
    PM OF UK
    CHID BABY
    KAPIL SIBAL
    ANAND SHARMA
    ABHI SEX MAANGTHA SINGHVI
    DIG VIJAY SINGH
    ADHIR RANJAN CHOWDHURY
    AK ANTONY
    SANJAY HEGDE
    SANJAY JHA
    TEHSEEN POONAWAALA
    SEHZAD POONAWALA
    LAW MINISTER PRASAD
    ATTORNEY GENERAL
    LAW MINISTRY CENTRE/ STATES
    CJI BOBDE
    ATTORNEY GENERAL
    ALL SUPREME COURT JUDGES
    ALL STATE HIGH COURT CHIEF JUSTICES
    PMO
    PM MODI
    AJIT DOVAL
    RAW
    IB
    NIA
    ED
    CBI
    AMIT SHAH
    HOME MINISTRY
    DEFENCE MINISTER/ MINISTRY
    ALL 3 ARMED FORCE CHIEFS
    RSS
    AVBP
    VHP
    MOHAN BHAGWAT
    RAM MADHAV
    MUKESH AMBANI
    RATA TATA
    ANAND MAHINDRA
    KUMARAMANGALAMBIRLA
    LAXMI MNARAYAN MITTAL
    AZIM PREMJI
    KAANIYA MURTHY
    RAHUL BAJAJ
    RAJAN RAHEJA
    NAVEEN JINDAL
    GOPICHAND HINDUJA
    DILIP SHANGHVI
    GAUTAM ADANI
    AMISH TRIPATHI
    DEVDUTT PATTANAIK
    CHETAN BHAGAT
    PAVAN VARMA
    RAMACHANDRA GUHA
    ROMILA THAPAR
    IRFAN HABIB
    NIVEDITA MENON
    UDDHAV THACKREY
    RAJ THACKREY
    SONIA GANDHI
    PRIYANKA VADRA
    RAHUL GANDHI
    VIVEK OBEROI
    GAUTAM GAMBHIR
    ASHOK PANDIT
    ANUPAM KHER
    KANGANA RANAUT
    VIVEK AGNIHOTRI
    KIRON KHER
    MEENAKSHI LEKHI
    SMRITI IRANI
    GVL NARASIMHA RAO
    SAMBIT PATRA
    PRASOON JOSHI
    MADHUR BHANDARKAR
    SWAPAN DASGUPTA
    SONAL MANSINGH
    MADHU KISHWAR
    SUDHIR CHAUDHARY
    GEN GD BAKSHI
    SAMBIT PATRA
    RSN SINGH
    GVL NARASIMHA RAO
    JAVED AKHTAR
    ASDDUDDIN OWAISI
    FAZAL GHAFOOL ( MES)
    E SREEDHARAN
    MOHANLAL
    SURESH GOPI
    MAMMOOTTY
    SOLI BABY
    FALI BABY
    KATJU BABY
    SALVE BABY
    PGURUS
    PRAKASH KARAT
    SITARAM YECHURY
    BRINDA KARAT
    D RAJA
    RANA AYYUB
    SHEHLA RASHID
    FATHER CEDRIC PRAKASH
    ANNA VETTICKAD
    ANNIE RAJA
    JOHN BRITTAS
    ASADDUDDIN OWAISI
    SRI SRI RAVISHANKAR
    SADGURU JAGGI VASUDEV
    MATA AMRITANANDA MAYI
    BABA RAMDEV

    WEBSITES OF DESH BHAKTS
    SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

    ReplyDelete
    Replies
    1. ALSO SEND TO --

      ENTIRE BBC GANG
      https://en.wikipedia.org/wiki/List_of_BBC_newsreaders_and_reporters

      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA

      Delete
    2. Your Registration Number is : PMOPG/E/2019/0708004

      Delete
  28. https://www.thehindu.com/news/international/trump-signs-order-targeting-college-anti-semitism/article30283327.ece

    It seems that on the issues that directly affects the American economy like trade,climate change summits trump is against the deep state.But on the matters related to foreign policy issues with other countries that does not directly affects American economy trump seems to be on the side of isreal(be it on iran,recognition of Jerusalem,venezula,coup in bolivia..)

    ReplyDelete
    Replies
    1. You are most probably right. However, me thinks, situation would be infinitely worse with hilary in power. Thats the only saving grace of the whole package for the time being given the balance of power/threat of mass destruction.

      Delete
    2. Trump is the most suitable president for USA.He will not do anything that would jeopardize the interests of usa and put their people at risk,though he does not care about sufferings of people in countries where coups are initiated by deep state.He softened his stance on north Korea because our captain had shown him how kim would pound usa in war with north Korea .

      Delete
  29. https://www.theguardian.com/media/2019/dec/12/fox-host-lambasts-trump-over-most-sustained-assault-on-press-freedom-in-us-history

    US MEDIA IS CONTROLLED BY THE JEWISH DEEP STATE --JUST LIKE INDIAN MEDIA..

    ReplyDelete
  30. https://www.bloomberg.com/news/articles/2019-12-11/greenwashing-ceos-are-a-top-climate-peril-greta-thunberg-says

    MENTALLY SICK AND GROWTH STUNTED MIDGET-- JEWESS GRETA !

    https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html

    ReplyDelete

  31. namiDecember 12, 2019 at 9:33 AM
    Sir
    Please explain time permitting why you have said Rohingya muslims are having criminal DNA.

    This will help silence those overflowing with milk of human kindness

    ReplyDelete
  32. Hi Sir,

    Really grateful for the deeksha. Thanks again sir.

    ReplyDelete
  33. In the series El Chapo, EL Chapo also killed the workers and Engineers digging the secret tunnels he built... Just like the Bengal Regiment you mentioned..

    ReplyDelete
    Replies
    1. ALL DRUG CARTELS BURY MONEY UNDERGROUND IN PLASTIC TANKS..

      AFTER THE JOB IS DONE, BEFORE THEY CAN TALK TO THEIR FAMILY THEY ARE KILLED..

      THE BENGAL REGIMENT OF ROTHSCHILD WHO GUARDED THE SECRET OPIUM OVERLAND ROUTE KNEW THAT THEIR COLLEAGUES ARE GETTING KILLED ..

      THIS WAS THE REASON FOR THE 1857 SEPOY MUTINY-- NOT SOME PIG AND COW GREASE ON CARTRIDGES WE WERE TAUGHT IN NCERT SCHOOL TEXTS IN SCHOOL.

      THE FIRST LOCALLY RECRUITED BATTALION WAS RAISED BY THE EAST INDIA COMPANY IN 1757 AND BY THE START OF 1857 THERE WERE 74 REGIMENTS OF BENGAL NATIVE INFANTRY IN THE BENGAL ARMY.

      http://ajitvadakayil.blogspot.com/2011/07/back-swing-of-john-galt-capt-ajit.html

      DURING THE INDIAN MUTINY ALL BUT TWELVE OF THE SEVENTY-FOUR REGULAR BENGAL NATIVE INFANTRY REGIMENTS MUTINIED.. IT IS A SECRET THAT MOST WERE DISBANDED AND KILLED OFF.

      THE EXECUTIONS WERE CARRIED OUT EITHER BY HANGING, BY FIRING SQUAD OR BY BLOWING FROM A GUN.

      MUTINYING REGIMENTS OFFICIALLY CEASED TO EXIST AND THEIR PLACE IN THE ORDER OF PRECEDENCE OF THE BENGAL ARMY WAS TAKEN BY ANOTHER UNIT.

      34TH REGIMENT OF BENGAL NATIVE INFANTRY WHICH WAS DISBANDED ON 6 MAY 1857 AT BARRACKPORE FOLLOWING THE ACTIONS OF MANGAL PANDEY AND HIS EXECUTION FOR MUTINY SHORTLY BEFORE THE MAIN OUTBREAK.

      TWO REGIMENTS OF BNI (THE 65TH AND 70TH) WERE SERVING IN CHINA AT THE TIME OF THE OUTBREAK GUARDING THE SECRET OVERLAND ROUTE FROM ARUNACHAL PRADESH TO HUNNAN PROVINCE CHINA

      DURING THE 1857 MUTINY THE UNITED KINGDOM GOVERNMENT PASSED THE GOVERNMENT OF INDIA ACT 1858 WHICH ESTABLISHED THE BRITISH RAJ, BRINGING TO AN END COMPANY RULE IN INDIA ( SIC) BY STRIPPING THE EAST INDIA COMPANY OF ALL ITS ADMINISTRATIVE POWERS AND HANDING OVER CONTROL OF ITS INDIAN TERRITORIES AND ARMED FORCES TO THE BRITISH CROWN ( ON PAPER )- SIC SIC SIC

      THE TRUTH IS ROTHSCHILD STOPPED ALL PRETSNCES OF BEING A PEPPER TRADER AND TOOK OVER INDIA AS ITS RULER ..

      capt ajit vadakayil
      ..

      Delete
    2. Dear Capt Ajit sir,
      I don't know what to say....this is such an important revelation and you have not even said it....what simplicity and humbleness....pranams to you. The dots connect between India and China so easily...the core business of opium driving everything around India and the globe for supremacy and retention of power !!!
      All pretenses dropped by Rothschild but masked for others....what a boomerang on the history of India and the world now with your revelation....hats off to you and your guts...grand salute...Jai Hind.

      Delete
  34. Ajit Sir,

    Thank you for the Diksha Given in earlier post. However, can you please help me how to take/initiate this Diksha in proper manner.

    Thank you Sir for your continuous support and guidance.

    Regards,
    Ravi

    ReplyDelete
    Replies
    1. Write it down on your body preferablly parts covered by cloths or simply receite it an no of times. Check out the comment section of previous blog.. Its there

      Delete
  35. Respected Sir,
    On this auspicious day i seek your and Ma'm s blessings for me and my husband.
    I went to Parthasarathy temple and had a glorious darshan of the Supreme Lord!! I owe everything to you Sir,you
    Are my Guru.my humble pranaams at your and Ma'm s feet.
    Thank you

    ReplyDelete
  36. Best message doing rounds....
    Pakistan should come up with its own CAB so that those who are unhappy in India can go there.

    ReplyDelete
  37. Kerala muslim league party has gone to Supreme court against CAB.
    Hysteria is being whipped up in some sections of Muslim community that CAB is against muslim refugees .

    As usual any fire is good for roasting political poppadoms...

    ReplyDelete
  38. प्लीज कमेंट हियर ऑन कैप्टैन्स क्वेश्चन. फुक quora
    http://qa.bharatha.in/
    डेस्कटॉप गूगल लॉगिन में थोड़ा समस्या है. इसका इलाज करने तक सबर करें.
    धन्यवाद
    ताकत और सम्मान हमेशा.

    ReplyDelete
  39. https://qa.bharatha.in/questions/41/who-is-captain-ajit-vadakayil

    ReplyDelete
  40. Captain sir,

    Can I give the number to a person I know who survived the cancer.She may not know you but she is highly spiritual and a devotee of Lord Ganesha..

    Regards,
    Sriganesh

    ReplyDelete
  41. not only arunachal pradesh but burma and thailand's indian population were driven out by fake mountain tribes from guangxi/yunnan called 'thais' and various other groups....the indian dna khmer people were the ones who mostly died in the drug wars of the 70's....by the way china's history is not 2000 or 3000 years but far less and was only civilized by indian hindu/buddhist doyens......china was not a single centralized imperial state until the manchus but always different kingdoms that have been deliberately labelled as different dynasties over a long timeline instead of seperate kingdoms coexisting independantly just like in india.......and china never ruled tibet manchuria inner mongolia or xinjiang even under the manchus [old maps even at the end of 19th century clearly show this unlike current CCP sponsored fake imperial qing maps]

    ReplyDelete
    Replies
    1. ALL ANCIENT CHINESE INVENTIONS AND DISCOVERIES ( 100% ), ARE IN REALITY INDIAN..

      Delete
  42. https://twitter.com/SreenivasanJain/status/1204972498221031424

    THIS FELLOWs MOTHER IS A SUPPORTER OF URBAN NAXAL.. HE IS THE MAGAGING EDITOR OF NDTV

    HIS MATERNAL GRANDFATHER IS MA SREENIVASAN A ROTHSCHILD AGENT

    HIS FATHER WAS LAKSHMI CHAND JAIN, WHOM ROTHSCHILD GAVE MAGSAYSAY AWARD ..

    ReplyDelete
  43. https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html

    I WANT THE ARMY COMMANDERS , BSF COMMANDERS , CRPF COMMANDERS AND SECURITY AGENCIES WHO SERVE IN NE STATES TO READ THIS BLOG POST..

    MY NE READERS MUST DO THIS NOW !

    USE WHATS APP..

    NE STATES HAD 100% HINDU POPULATION , 1000 YEARS AGO.. THE ANCIENT HINDU TEMPLES ARE ALL DESTROYED..

    ANIMAL SACRIFICE IN HINDU TEMPLES OF NE STATES WAS STARTED BY JEW ROTHSCHILD..TO MAKE THE HINDU SELF LOATHING.. TODAY MOST ANIMALS IN OPIUM PRODUCING AREAS ARE FOR SACRIFICE ALONE..

    http://ajitvadakayil.blogspot.com/2014/11/all-animal-sacrifices-in-hindu-temples.html

    THE ITALIAN WAITRESS CONVERTED MOST OF NE STATES PEOPLE INTO CHRISTIANITY FOR VOTE BANKS..

    THE NATIONAL PRAYER BREAKFAST PARTY WAS ACTIVELY INVOLVED.

    https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html

    capt ajit vadakayil
    ..

    ReplyDelete
  44. https://twitter.com/Swamy39/status/1204796040219512832

    SHIV SENA IS DEAD ---LIKE JDS IN KARNATAKA

    POOR UDDHAV THACKREY-- NO VISION , NO INTEGRITY

    ReplyDelete
  45. https://twitter.com/AnaMyID/status/1204420768752234498

    THIS SLUT ANAMIKA IS THE BITCH OF JACK DORSEY..

    POOR JACK DORSEY THINKS THIS FOUL PROPAGANDA CAN INFLUENCE HINDUS.. TEE HEEEEEEE..

    http://ajitvadakayil.blogspot.com/2017/12/testosterone-boosted-by-onion-and.html

    SANATANA DHARMA PRACTICES WERE MOLDED BY DANAVA CIVILIZATION FROM KERALA.. AYURVEDA DOES NOT PROHIBIT ONION AND GARLIC IN THE DAILY DIET, RATHER IT ENCOURAGES IT..

    http://ajitvadakayil.blogspot.com/2019/09/onam-our-only-link-to-planets-oldest.html

    HINDUS ARE REGAINING THEIR FAITH AND KSHATRIYA BLOOD OF OUR HERO ANCESTORS LIKE BHISHMA/ KARNA/ DRONA/ ARJUNA

    LIES WONT WORK ANYMORE..

    TODAY THE FASTEST GROWING RELIGION IN THE WEST AND BREAK AWAY NATIONS OF USSR , IS HINDUISM..

    capt ajit vadakayil
    ..

    ReplyDelete
  46. SOMEBODY ASKED ME

    HAS JEW ROTHSCHILD ETHNICALLY CLEANSD ORIGINAL HINDU PEOPLE AND REPLACED THEM WITH FOREIGNERS –LIKE IN OPIUM GROWING ARUNACHAL PRADESH AND NE STATES..

    IN NORTH SENTINEL ISLANDS AND ANDAMAN CHAIN, THE ORIGINAL PEOPLE WERE HINDUS .. I HAVE SEEN ALL ANDAMAN ISLANDS..

    NORTH SENTINEL ISLAND WAS ETHNICALLY CLEANSED AND REPLACED WITH A HEAD HUNTING TRIBE FROM PAPUA NEW GUINEA .. THEY ARE STILL THERE.. THESE PEOPLE ARE NOT SEA NAVIGATORS BY DNA..

    THE WHOLE IDEA WAS TO CEMENT ROTHSCHILDs “OUT OF AFRICA” BULLSHIT THEORY AND MAD MAN DARWINs EVOLUTION THEORY

    https://en.wikipedia.org/wiki/North_Sentinel_Island

    IN THIS DNA AGE OUR SCHOOL CHILDREN ARE STILL STUDYING MAD MAN CHARLES DARWINs THEORIES..

    http://ajitvadakayil.blogspot.com/2010/12/charles-darwin-and-his-apple-capt-ajit.html

    HUMAN LIFE BEGAN FROM NARMADA RIVER 65 MILLION YEARS AGO..WITH DNA FROM SHIVA LINGAM BLACK METEORITE STONES..

    https://ajitvadakayil.blogspot.com/2019/07/shiva-lingam-meterorite-hit-65-million.html

    AND THESE NEGROID PEOPLE ARE NO LONGER IN THE STONE AGE..

    WHEN MY SHIP WENT TO ANDAMANS - I SERVED ON A TIMBER CARRIER MV DIGLIPUR IN 1976.. WE WENT TO ALL ISLAND TO LOAD TIMBER EXCEPT SENTINEL ISLAND..

    THE TIMBER WAS SO HEAVY ( RED WOOD PADDOCK ) THAT THE LOGS WOULD SINK IN SALT WATER..SO THESE LOGS CAME ON RAFTS .. ELEPHANT GANDS WORKED ..

    BUCKINGHAM PALACE IS MADE OUT OF THIS STRONG WOOD..

    IN THOSE DAYS THE SENTINEL TRIBE HAD NO IRON..

    THEN A HUGE SHIP NAMED MV. PRIMROSE, RAN AGROUND IN A STORM ( NW OF SENTINEL ISLAND ) WHILE ON VOYAGE FROM BANGLADESH TO AUSTRALIA ON 2ND AUG 1981

    SINCE THEN THESE NEGRO PEOPLE HAVE HELPED THEMSELVES TO GOODIES.. THEIR ARROWS HAVE STEEL TIPS..

    SENTINEL ISLAND NEGROES HAVE THE SAME LOOKS AS ONGE TRIBE IN THE REST OF ANDAMANS..THIS VIDEO BELOW SHOWS ONGE TRIBE..

    https://www.youtube.com/watch?v=6XPriuvAwqk

    THERE WAS A RETIRED ANGLO INDIAN SHIP CAPTAIN NAMED CAPT BEALE IN ANDAMANS ( HE OWNED TUGS AND TOURIST BOATS ) WHO WAS THE DUFFERIN BATCHMATE OF MY SHIPSs ANGLO INDIAN CAPTAIN..

    SO I GOT TO GO ON VARIOUS ISLANDS ON CAPT BEALEs TUGS-- IT WAS DANGEROUS..WITH SO MANY SUBTRIBES LIKE JARAWAS, SHOMPEN , NICOBARESE ETC WHO ARE DOMESTICATED..BUT YOU NEVER KNOW , IF THEY LOVED HUMAN FLESH..

    CAPT BEALE HAD A WORKSHOP IN CALCUTTA, NAMED BEALEs MARINE.. THEY WOULD OVERHAUL OUR DERRICK CARGO BLOCKS IN A JIFFY..

    I KNOW ANDAMANS - IF I WANT I CAN WRITE A BOOK ABOUT IT.

    WE USED TO HAVE PICNICS IN VARIOUS ISLAND ..WE TOOK THE SHIPs LIFE BUOY WITH US.. WE WERE TREATED LIKE ROYALY, AS MV. DIGLIPUR BROUGHT ALL GENERAL STORES ( 100% ) FROM CHENNAI..

    INDIAN NAVY HELICOPTERS PLAYED TRICKS --DROPPING MUSIC SETS GIVING MUSIC.. AND THE MEN USED TO SHOOT ARROWS AT THE HELICOPTER..

    capt ajit vadakayil
    ..

    ReplyDelete
  47. Below a case of positive acknowledgement by dept of justice




    Date of Receipt 10/09/2019
    Received By Ministry/Department Justice
    Grievance Description
    Namaskar

    Kindly acknowledge the below comment taken from Captain Ajit Vadakayils blog

    https://www.opindia.com/2019/09/ndtv-journalist-who-insulted-isro-scientist-found-selling-isro-images-on-getty-social-media-users-question-whether-its-allowed/

    WE ASK AMIT SHAH TO IMMEDIATELY ARREST PALLAV BAGLA / PRANNOY JAMES ROY-- AND SLAP SEDITION CHARGES ..

    https://twitter.com/vigil_nte/status/1170575818415857664

    WE HAD SO MANY ISRO/ DRDO SCIENTISTS DYING MYSTERIOUSLY IN RECENT TIMES..

    http://ajitvadakayil.blogspot.com/2012/09/isro-spy-case-s-nambinarayanan.html

    capt ajit vadakayil
    ..

    Thanks And Regards
    Debdoot Sarkar....
    Current Status Case closed
    Date of Action 12/12/2019


    Remarks
    noted


    Officer Concerns To
    Officer Name Smt. Sandhya Venugopal Sharma
    Officer Designation Joint Secretary Personnel
    Contact Address
    Email Address sandhyavs@isro.gov.in
    Contact Number 08022172300

    ReplyDelete
  48. respected capt. Today my nephew ( 1 yo ) birthday, please bless him.

    You also blessed him 1 year ago. req. to u plz check my one year old comment:-

    http://ajitvadakayil.blogspot.com/2018/12/sanatana-dharma-hinduism-exhumed-and.html?showComment=1544629375553#c1927008346212393990

    ReplyDelete
  49. https://twitter.com/zainabsikander/status/1204805688678998017

    ZAINAB BABY.. MUCH MORE ARE COMING... APPLY GREASE TO EASE THE PAIN..

    https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html

    capt ajit vadakayil
    ..

    PUT ABOVE COMMENTS IN WEBSITES OF--
    ZAINAB SIKANDER
    RANA AYYUB
    BARKHA DUTT
    SHEHLA RASHID
    NIVEDITA MENON
    IRFAN HABIB
    NIDHI RAZDAN
    ASADDUDIN OWAISI
    SONIA GANDHI
    RAHUL GANDHI
    PRIYANKA GANDI
    ARUNDHATI ROY
    SHOBHAA DE
    SUHEL SETH
    THOMAS ISAAS KERALA FINANCE MINISTER
    GITA GOPINATH ( IMF CHIEF )
    JOHN BRITAS
    KUNHALIKUTTY
    KODIYERI BALAKRISHNAN
    BRINDA KARAT
    JAVED AKHTAR
    SHABANA AZMI
    INDIRA JAISING
    VRINDA GROVER
    ANAND GROVER
    JOHN DAYAL
    KANCHA ILAIH
    ANNA VETTICKAD
    FATHER CEDRIC PEREIRA
    JULIO RIBEIRO
    PAGALIKA GHOSE
    SWARA TTR BHASKAR ( OR IS IT PRRR )
    IRA BHASKAR
    ANNIE RAJA
    ROMILA THAPAR
    THAMBI SUNDAR PICHAI
    KAMALAHASSAN
    RAVISH KUMAR
    NAVJOT SINGH SIDHU
    TAREK FATAH
    SANJAY HEDGE
    KAPILSIBAL
    ABHI SEX MAANGTHA SINVI
    DIG VIJAY SINGH
    AK ANTONY
    TEHSIN POONAWAALA
    SANJAY JHA
    AATISH TASEER
    MANI SHANGARAN AIYYERAN
    STALIN
    FAAL GHAFOOR
    UDDHAV THACKTEY
    RAJ THACKREY
    SANJIV BHATT
    TEESTA SETALVAD
    NASEERUDDIN SHAH
    EX-VICE PRESIDENT ANSARI
    SHEKHAR GUPTA
    KARAN THAPAR
    SIDDHARTH VARADARAJAN
    KUMAR KETKAR
    NIKHIL WAGLE
    NISHANT VERMA
    SUMEET CHOPRA
    ASHUTOSH
    DEEPAK CHAURASIA
    VINOD SHARMA
    KAVITA KRISHNAN
    JAIRAM RAMESH
    SHASHI THAROOR
    JNULIO RIBEIRO
    JEAN DREZE
    BELA BHATIA
    FARAH NAQVI
    KIRAN MAJUMDAR SHAW
    RAHUL BAJAJ
    HARDH MANDER
    MS SWAMINATHAN
    ARUNA ROY
    UMAR KHALID
    MANISH TEWARI
    PRIYANKA CHATURVEDI
    RAJIV SHUKLA
    SANJAY NIRUPAM
    PAVAN KHERA
    RANDEEP SURJEWALA
    DEREK O BRIEN
    ADHIR RANJAN CHOWDHURY
    RASHID ALVI
    AJOY KUMAR
    ASADDUDDIN OWAISI
    MJ AKBAR
    ARUN SHOURIE
    SHAZIA ILMI
    CHANDA MITRA
    MANISH SISODIA
    ASHISH KHETAN
    SHATRUGHAN SINHA
    RAGHAV CHADDHA
    NALIN KOHLI
    GVL NARASIMHA RAO
    SAMBIT PATRA
    ATISHI MARLENA
    YOGENDRA YADAV
    SUDHANSHU TRIVEDI

    PEABRAIN

    ReplyDelete
  50. https://timesofindia.indiatimes.com/india/googles-year-in-search-2019-want-to-know-what-indians-searched-most-this-year/articleshow/72491848.cms

    GOOGLE IS SINKING AJIT VADAKAYIL WITH 1020 MILLION GOOGLE PROFILE VIEWS..

    TEEEE HEEEEEEE

    ReplyDelete
    Replies
    1. Captain,

      According to world population, nearly 20% have view ur profile

      It took ur 10 years to reach this place in people's heart... This 10 years which u could have enjoy in ur way rather than blogging for people

      That's called true humanship and sacrifice..... If Tesla, Chanakya, Henry ford, ramanujam will make list of hero of planet than u will be included in their award list like u have included them

      Delete
    2. Thanks for the Deeksha dear Captain. Requesting Deeksha for people suffering from interstitial lung disease or acute bronchitis. Requesting for my mother. Pranam

      Delete
  51. RANA AYYUB IS ON BBC , THROWING SHIT ON BHARATMATA AND HINDUS..

    WE HAVE A NAPUNSAK I&B MINISTER-- DEEP STATE DARLING PRAKASH JAVEDEKAR..

    ReplyDelete
  52. https://www.nytimes.com/2019/12/11/us/harvey-weinstein-settlement.html

    JEWISH PEDOPHILE RAPISTS CAN ALWAYS GET AWAY..

    JEW ROMAN POLANSKI WHO RAPED SEVERAL UNDERAGE GIRLS ANALLY IS SCOT FREE.

    https://en.wikipedia.org/wiki/Roman_Polanski

    JEW JEFFREY EPSTEIN WAS MURDERED SO THAT JEW CELEBRITIES CAN ESCAPE FROM JAIL..

    https://en.wikipedia.org/wiki/Jeffrey_Epstein

    ReplyDelete
  53. https://www.nbcnews.com/politics/donald-trump/trump-mocks-greta-thunberg-after-she-wins-time-person-year-n1100531

    TRUMP ONLY MOCKS HER

    WE IN INDIA SPIT ON HER LYING FACE ..

    https://ajitvadakayil.blogspot.com/2019/10/greta-thunberg-puppet-of-jewish-deep.html

    THE DAYS OF JEWISH DEEP STATE HIJACKING WORLD OPINION BY USING JEWESS GIRLS ARE OVER..

    JEWESS ANNE FRANKs DIARY WAS FAKE.. SHE WROTE WITH BALL PEN, WHICH DID NOT EXIST IN THOSE DAYS..

    https://en.wikipedia.org/wiki/Anne_Frank

    AAARRRGGHHH PPTTHHEEOOYYYYYYYYYYYYYYY

    http://falsificationofhistory.co.uk/false-history/the-faked-diary-of-anne-frank/

    CHECK OUT JEWESS NOOR INAYAT KHAN..

    http://ajitvadakayil.blogspot.com/2012/11/noor-inayat-khan-new-mata-hari-reloaded.html

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. https://aninews.in/news/world/others/brazilian-president-calls-greta-thunberg-a-brat20191211215339/

      Brazil president calls greta thunberg a 'brat'

      Delete
  54. Dear Sir

    Please clear the little understanding of the below said lines

    Unlike the Parsis, these Bene Israel Jews mixed blood with the Indian stock.

    Is this means that Bene Israeli Jews married to Indian citizens after they arrived at konkan.

    And regarding below said lines

    These are the Chitpavan Brahmins like Tilak, Gokhale, Savarkar , Ranade etc.. The Chitpavan Jews were loyal to Jew Rothschild, not to Bharatmata.

    Were these above mentioned chitpavans know that their origin was from Bene Israrelis or else after that it was told to them by Jews ruler at that time.

    ReplyDelete
    Replies
    1. WHEN PARSIS CAME TO INDIA SEEKING REFUGE, THE GUJARATI KING REFUSED TO TAKE THEM..

      THERE WAS A FULL GLASS OF MILK IN FRONT OF THE KING

      THE PARSI LEADER TOOK SOME SUGAR AND PUT IT IN THE MILK..

      THE MEANING WAS , WE PARSIS WILL MERGE INTO INDIAN SOCIETY LIKE HOW SUGAR DISSOLVED IN MILK..

      BUT PARSIS NEVER KEPT THEIR PROMISE.. THEY NEVER MARRIED INTO INDIAN SOCIETY..

      PARSIS WERE RADDHIWAALAS TILL JEW ROTHSCHILD TOOK THEM AS HIS OPIUM DRUG RUNNING AGENTS..

      ROTHSCHILD KNIGHTED 65 PARSIS..

      FOR WHAT ?

      BEING LOYAL TO BHARATMATA ?

      IF YOU SEE BY PERCENTAGE , PARSIS HAVEGOT HIGHEST PERCENTAGE OF SIRs-- BY SEVERAL TIMES THAN THE REST OF THE CLANS OF THE PLANET

      PARSIS WERE TRAITORS ...

      THEY BIT THE HAND THAT FED THEM..

      BUT THE GUJARATI KING WAS NOT AN IDIOT..

      HE KNEW THAT PARSIS CAN NEVER BE TRUSTED TO BE LOYAL TO THEIR NEW WATAN..

      SO HE ASKED THE LEADER TO SAY SOMETHING , TO PROVE THAT HE WILL BE LOYAL -- INSTEAD OF KEEPING MUM AND PUTTING BULLSHIT SUGAR IN MILK.

      TO HE SURPRISE THE PARSI LEADER RECITED IN PURE SANSKRIT, THE 16 SAMSKARAS OF A HINDU, WHICH HIS CLAN INTENDED TO FOLLOW ...

      WHEN HE RECITED 15 SAMSKARAS , THE GUJARATI KING STOPPED HIM AND GAVE THE FINAL SAMSKARA FOR PARSIS TO FOLLOW.. HE WONT ALLOW THEM CREMATION AND HENCE MOKSHA..

      HE HOPED THE PARSIS WOULD GO BACK.. THEY DID NOT..

      WHEN THE FINAL AND 16TH VERSE WAS TO BE RECITED-- THE GUJARATI KING SAID --"I WILL RECITE IT FOR YOU "....

      HE LAID OUT THE FINAL ANTHEYESTHI ( LAST FUNERAL RITE ) -- THAT PARSIS MUST NOT CREMATE AS PER HINDU RITES --THEY MUST FOLLOW ANOTHER CUSTOM WHICH WAS PREVALENT IN ANCIENT IRAN AMONG NON-HINDUS..THAT OF OFFERING THEIR DEAD BODIES TO VULTURES…

      THE ONLY REAL SAMSKARA OF A HINDU-- IS THAT HE MUST CREMATE HIS DEAD BODY ( TO FOLLOWS LAWS OF KARMA AND MOKSHA )..

      CULTURE IS EVERYTHING !

      http://ajitvadakayil.blogspot.com/2016/03/sanatana-dharma-hinduism-exhumed-and_21.html

      TODAY THESE RADHIWAALA DESCENDENTS ARE ACTING AS IF THEY HAVE BECOME PROSPEROUS BY THEIR MERIT.. BALLS -- THEY BECAME RICH BY BEING DRUG RUNNERS AND TRAITORS..

      http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html

      AND TODAY WE HAVE PARSI PRIEST JUDGE NARIMAN TELLING HINDUS WHAT TO DO..

      capt ajit vadakayil
      ..

      Delete
  55. https://timesofindia.indiatimes.com/city/aurangabad/pankaja-munde-says-she-wont-quit-dares-bjp-to-remove-her/articleshow/72493877.cms

    GET RID OF THIS STAR KID !

    ReplyDelete
  56. https://edition.cnn.com/2019/12/12/europe/russian-carrier-fire-intl/index.html

    US AIRCRAFT CARRIERS CATCH FIRE REGULARLY.. IT IS KEPT A SECRET..

    http://ajitvadakayil.blogspot.com/2011/09/deadly-fire-on-aircraft-carrier-uss.html

    ReplyDelete
  57. Sir
    thank you and lot Pranamas for your spending your valuable time for answering the doubt.

    ReplyDelete

  58. https://www.theguardian.com/books/2019/dec/12/neal-katyal-second-term-donald-trump-fundamentally-destabilise-democracy-interview

    THE ILLEGAL CRIMINAL MEXICAN IMMIGRANTS ARE CALLED "DREAMERS"

    TEE HEEEEEEEEEEEE

    SO CAN THEY CALL ROHINGYA CRIMINAL DNA ILLEGAL IMMIGRANTS DREAMERS TOO ? THEY WERE VOTE BANKS AND SMURFS FOR LAUNDERING DRUG MONEY.

    https://www.youtube.com/watch?v=-MpAahd-Q6g

    https://www.youtube.com/watch?v=8FUiMiSWZLg

    ReplyDelete
  59. How should a Prime Minister sound in a wartime situation with his country facing external aggression? British Prime Minister Winston Churchill made one of the defining speeches during the Second World War, when his country was near collapse at the onslaught of Hitler’s Germany.

    Nehru, by a speech on All India Radio (AIR), had let North-East Down During 1962 China War. After the fall of Bomdila to the Chinese, many in Assam’s Tezpur felt he was not concerned about the Brahmaputra Valley. In his address to the nation on AIR on November 20, 1962, Nehru said almost in a choked voice, ".... I want to make that clear to all of you, and, especially our countrymen in Assam, to whom our heart goes out at this moment".

    If the head of the nation was so helpless, then how could the common people withstand an attack by the Chinese? After Nehru’s speech was broadcast, people in Tezpur became hysteric. They began fleeing. There was chaos everywhere. Guwahati was flooded with thousands of such refugees.

    https://timesofindia.indiatimes.com/india/1962-Sino-Indian-war-Nehrus-speech-still-hurts-Assam/articleshow/16746435.cms

    ReplyDelete
  60. Dear Capt Ajit sir,
    Here's the fact on NE riots...from fb fwd...
    " Know your India -- the man behind Propaganda in Assam

    Akhil Gogoi -- Kanhaia Kumar of Assam -- A mini-Land-Lord who promote him as POOR FARMER like Robert Bhadra -- One Over Ground Operator of Naxal -- Funded by central committee of CPIML -- He is forefront at new initiative of NAXALS who trying to develop a base in NE after they are mercilessly wiped out from Central India "

    ReplyDelete
  61. Dear Capt Ajit sir,
    Here's some brief on 5 secret societies of which u have exposed 4 in great detail except Skulls and bones....;-)
    https://www.history.com/news/secret-societies-freemasons-knights-templar

    ReplyDelete
  62. https://www.dailypioneer.com/2019/state-editions/will-not-implement-cab-in-punjab--capt.html

    CAPT AMARINDER SINGH HAS BECOME SENILE..

    THIS IS LIKE CHIEF COOK ON THE SHIP SAYING.. I WILL NOT TAKE THIS SHIP TO NEW YORK ..

    ReplyDelete
  63. https://www.thehindu.com/business/notional-loss-in-bpcl-sale-plan-at-45-lakh-cr/article30269996.ece

    Dear Captain,
    RSS=BJP decision to sell assets worth Rs 9 lakh crore at mere Rs 70000 crore is a daylight robbery!!

    ReplyDelete
  64. ?fyi

    https://www.miindia.com/messageboard/details/Infinity-foundation-update-184323

    ReplyDelete
  65. ANYBODY INCITING VIOLENCE IN NE STATES MUST BE CHARGED WITH SEDITION..

    PROFILE WARIS PATHAN..

    PAKISTANI OFFICERS SAY HIS FATHER IS A JEW.

    ReplyDelete
  66. Dear captain The Indian government should guarantee protection of the indigenous culture, religion , language of the A ssamese people. The Assamese people are facing a lot of threats . Their language is in danger ,their Hindu religion is in danger from illegal Muslim immigrants and Christian Missionaries ,Their job opportunities are in danger as the refugees will work hard to establish themselves through job employments which can snatch away the job opportunites of the locals. Assamese people are in danger. We donot want Assam to be another Kashmir or Tripura. In Tripura the local Tripuri language and culture is suppressed by Bengalis and they became a minority in their own homeland . In Kashmir the Kashmiri Pandits became a minority in their own homeland. They were driven out and persecuted even the Sharda Script of the Kashmiri language was forgotten and most of the Kashmiri Pandits forgot their mother tongue and they speak at other languages.Assam has a lot of natural resources like oil , tea. The deep state is eyening on these resources. There is internet shut down in Assam , innocent Assamese people are lathicahrged , curfew is imposed one Assamese people died. Most of the Assamese peoples tribals or non tribals are Hindus.

    1. We are not protesting against CAB because we are a
    bunch of left liberal pseudo-seculars who are unhappy
    because persecuted Muslims are not part of CAB
    Sorry, we don't care about that. Our protest is not
    because it is discnminatory towards Muslims as some
    of the foreign media and politicians are trying o
    portray.

    2 We are also not protesting because persecuted
    Hindus are being given citizenship We are okay with it
    as we understand that India’s long cultural heritage
    makes it the only domicile of all Hindus

    3. Then why are we protesting? We are protesting
    because Assam has a history of massive influx of
    illegal Bangladeshis For various reasons (from
    economic to partition to war), over last 50 years, 7
    million Bangladeshis have taken shelter in Assam
    changing its demography completely (There are
    various articles and studies on this which can be
    googled) The people of Assam, especially the
    students, led a massive protest against this problem in
    the 80s (google Assam Agitation, Student's Movement,
    AASU, Prafulla Mahanta) After sacrificing 800+ lives,
    and countless student-years, we finally got NRC
    (among other things) thru Assam Accord Despite all
    its flaws, high court monitored NRC was the best
    effort made so far in identifying illegal Bangladeshis
    after years of lip service by politicians We were not
    happy with the final outcome of NRC as it could detect
    only 1.9 million but nonetheless, we accepted it
    grudgingly as ‘something is better than nothing’ It also
    gave us confidence that no more Bangladeshis can
    come or get regularized beyond 2019 Unfortunately,
    CAB nullifies all of it and not only legitimize 0.5 million
    out of 1.9 million but also opens the door for future
    influx! That's why we are protesting. Also there is no deportation of the illegal immigrants.

    ReplyDelete
    Replies
    1. A LOT OF NE TRIBALS ARE NOT OF INDIAN BLOOD/ STOCK..

      THEY WERE HEAD HUNTER CRIMINAL DNA MIXED BREEDS ( CHINESE HUNNAN/ MYANMAR/ TIBET ) WHOM ROTHSCHILD USED TO DRIVE AWAY INDIAN HINDUS, SO THAT HE CAN CULTIVATE OPIUM AND GUARD IT WITH EXTREME VIOLENCE..

      THIS SYSTEM OF DRUG CARTEL HENCHMEN KILLING ANYBODY WHO COMES IN THEIR PATH STARTED IN ARUNACHAL PRADESH 250 YEARS AGO..

      NOW THIS DEATH SYSTEM EXISTS IS IN COLUMBIA/ MEXICO..

      AT LEAST THERE IT IS " SILVER OR LEAD " (TAKE BRIBE OR DIE )..

      IN ARUNACHAL PRADESH IS WAS " OFF WITH HIS HEAD" ..

      NONE OF THESE TRIBALS LOOK LIKE INDIANS.. THEY HAVE NO LOVE FOR BHARATMATA..

      capt ajit vadakayil
      ..

      Delete
    2. The ethnic cleansing works with the slogan "off with his head". The Kashmiri pandits were systematically removed from their own lands. The population of Hindus in East & West Pakistan reduced to less than 5% after independence. During the period when the Mysore Sultans ransacked Kerala, people were given only two choices – Sword or Cap. That is, either they had to convert themselves into Muslims or they had to face the sword.

      Delete
    3. HINDUS OF NORTH KERALA HAVE HONOUR IN THEIR BLOOD.

      THEY HAVE SURVIVED EXTREME TERROR FROM MUSLIMS..

      AND HINDUS IN SOUTH KERALA HAVE SURVIVES THE GREED OF CHRISTIAN SOPS..

      http://ajitvadakayil.blogspot.com/2014/04/azam-khan-injecting-islamic-religious.html


      deep in the dark innards
      of kaalapani cellular jail
      spirits suddenly come alive
      captain , could you tarry a while –
      could you ponder why
      4 of my 7 wings were demolished?
      demolished after independence!
      could you pause to reflect
      on the cost of our freedom?
      on mothers, wives and sons
      their hearts torn between grief and pride
      for those who died for freedom's sake.
      are you so busy
      you fail to reflect on 800 years of slavery,
      the price in blood
      this jail paid for your freedom.
      why do you expect courts
      to decide your freedom
      the freedom which
      snuffed out inmates of this jail
      gave to everyone,
      painful price paid in blood ,
      for freedom and justice for all,
      are we still not one nation, one blood?
      do you calm each other in times of distress?
      do we in moments of horror cuddle together?
      why did you allow a system to be hijacked ?
      why this silence of conformity?
      why so many people lost in apathy?
      lying foreign benami front TV cataracts
      now shroud your eyes
      fed intravenously 24X7
      by supari fed mass media feeders
      lisping mystifying lies
      fire smouldering in judas eyes
      why is big brother profiting from fear?
      why is comfort a business?
      why is liquor laden breath calling the shots ?
      why is the child in the classroom
      with the curious mind
      beaten and conditioned
      until he too is blind ?
      "trust in the system"
      sold out benami fronts whisper
      "question nothing , higher you can reach"
      are you just content being a slave?
      content , to stand on street corners
      holding big white signs
      held beneath people sights
      clamouring of injustice
      why allow targeting of desh bhakt shakers
      who sacrifice their peace
      so that true freedom may be regained
      who do you still sell your souls?
      to evil foreign banksters who robbed india blind
      who still hold the sinister remote control
      who still have our rulers on their payroll
      who have build for themselves a lobbied up shield
      what kind of life is this ?
      is self inflicted numbness a virtue?
      is feigning ignorance bliss?
      why do you pretend to sleep?
      do you still expect to be woken up?

      Delete
  67. https://timesofindia.indiatimes.com/city/delhi/jnu-vc-holds-meeting-with-students-representatives-teachers-no-headway/articleshow/72496352.cms

    THIS LIMPET IS UNFIT TO BE A VC..

    ReplyDelete
  68. https://twitter.com/AsYouNotWish/status/1205011580775104512

    SONAM BABY MUST KNOW THAT THESE MINI SKIRTED GIRLS ( THEY WEAR THONGS UNDERNEATH ) OR WEAR SPANDEX TIGHTS DISPLAYING PRIME CAMEL TOE -- ARE THE MASTURBATING TYPES..

    THEY FANTASIZE -- WHO ALL HAVE WATCHED MY PRIVATE PARTS TODAY , WHILE MASTURBATING ..

    WOE BEGONE IF YOU MARRY THESE SLUTS..

    THEY ARE SWARA TRRR BHASKAR ( OR IS IT PRRRRR ) FANS.. NEVER MARRY A WOMAN WHO IS ADDICTED TO MASTURBATION.. THEY ARE NAGS OF THE FIRST ORDER..

    WOMEN PUT ON WAR PAINT AND MINISKIRTS TO MAKE WOMEN FEEL JEALOUS --OR ATTRACT STRANGER MEN?

    TWO OF THE HOTTEST TOPICS IN WOMEN'S MAGAZINES— WHY MEN ARE SUCH FILTHY PIGS AND HOW TO ATTRACT A MAN!

    A MAN WILL HELP A WOMAN UNDRESS HERE MULTILAYERED TEDIOUS CLOTHING BEFORE SEX. HOWEVER AFTER SEX, SHE ALWAYS DRESSES ON THEIR OWN.

    MORAL OF THE STORY: IN LIFE, NO ONE HELPS YOU , ONCE YOU'RE SCREWED.

    http://ajitvadakayil.blogspot.com/2013/11/nagging-unhappiness-at-home-death-of.html

    capt ajit vadakayil
    ..

    PUT ABOVE COMMENT IN WEBISTES OF

    SONAM MAHAJAN
    SWARA TRRR BHASKAR ( OR IS IT PRRR )
    SHOBHAA DE
    KAVITHA KRISHNAN ( HER OWN ADMISSION: ONCE SHE WORE MINISKIRT AND SMOKED IN JNU TO FINGER HINDU BOYS-- WHAT SHE DID NOT TELL IS THAT ALMOST ALL BOYS PUKED AFTER SEEING HER UGLY BLACK HAIRY LEGS )

    ARUNDHATI ROY

    ReplyDelete
    Replies
    1. Posted comment screenshots on their twitter a/cs.

      Delete
    2. I DONT SEE IT IN SONAM MAHAJANs TWITTER SITE

      DO NOT REPORT TO ME THAT YOU HAVE POSTED-- ONLY IF YOU SEE YOUR POST AFTER VERIFYING -- ONLY THEN REPORT BACK..

      Delete
    3. She has blocked me. Thats why you can't see my comment. I posted it there only.

      Delete
    4. Just posted a screenshot of this comment on Sonam Mahajan's Twitter site and saw it posted.

      Delete
  69. Mumbai IPs A Rehman quits job citing CAB blah blah ,he had applied for VRS which was rejected earlier.

    Bleeding hearts want Uighur Muslims from China to come here too..

    The entire CAB protests are being done by Muslim Lobby too as influx of muslim refugees are a heaven sent opportunity to increase their population and convert India to Dar ul Islam from present state.
    Most mainstream broadsheets have covered arguments of all bleeding hearts selectively.

    ReplyDelete
  70. https://indianexpress.com/article/explained/explained-why-basmati-export-has-come-to-a-standstill-in-punjab-6164891/

    Pesticides banned in EU and US are sold by the EU , US companies here.

    So if Indian exports if Basmati dwindle which country benefits the most? As the next supplier.

    ReplyDelete
    Replies
    1. Paraquat is one pesticide which is used most to commite sucide by farmers in Odisha.
      This pesticide does not have an antidote. Thats why doctors are nit able to save the farmers.
      Recently deshbhakt type doctors demanded Odisha govt to ban it.

      Delete
  71. https://www.facebook.com/story.php?story_fbid=454589545495744&id=339463143675052

    sir chinese troops have crossed into arunachal and have been staying there .our govt is sleeping. doval seem to be alice in wonderland

    ReplyDelete
  72. https://m.facebook.com/story.php?story_fbid=528091794586733&id=251316115213541


    north east ppl esp xtians and muslims are spreading hatred against CAB .they are demanding separate country comprising of 8 NE states

    ReplyDelete
  73. https://www.indiatoday.in/india/story/kerala-not-to-implement-citizenship-amendment-bill-says-cm-pinarayi-vijayan-1627819-2019-12-12

    ReplyDelete
    Replies

    1. https://www.indiatoday.in/india/story/kerala-not-to-implement-citizenship-amendment-bill-says-cm-pinarayi-vijayan-1627819-2019-12-12

      THIS IS LIKE CHIEF COOK ON MY SHIP DECLARING

      I AM "CHIEF"-- I WONT LOAD SULPHURIC ACID IN HOUSTON..

      95% OF OUR POLITICIANS, 99.9% OF OUR MEDIA AND 100% OF OUR ILLEGAL COLLGIEUM JUDGES CANT THINK FOR NUTS..

      INDIAN CONSTITUTION IS TO PROTECT LAW ABIDING INDIAN CITIZENS-- NOT PROSPECTIVE ROHINGYA REFUGEES OR BANGLADESI MUSLIM ILLEGAL IMMIGRANTS ALREADY HIDING IN NORTH KERALA..

      BANGLADESHI MUSLIM ILLEGAL IMMIGRANTS HAVE AADHAR CARD AND PASSPORTS-- THEY PRETEND TO BE FROM ASSAM.. BUT THEY ALL ARE FLUENT IN BANGLADESI STYLE BENGALI.. ( ADMISSION--THEY WORK VERY HARD UNLIKE LAZY MALAYALIS )

      I HAVE TRAPPED MANY OF THEM BY SINGING THEIR FAVORITE CUSS SONG FOR HINDU KAFIRS.. I AM AN EXPERT IN BODY LANGUAGE

      "EARLY MORNING KRISHNA WOKE UP AND HELD HIS HUGE PRICK IN BOTH HIS HANDS AND SHOVED IT INTO RADHAs CUNT"

      "SHOKAALE UTHIYO KAANOO DOH HAATHE DAREYOO NUNNOO , THAKAYILE RADHAR GUDHE "

      RADHA NEVER EXISTED.. TEE HEEEEEE..

      https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html

      capt ajit vadakayil
      ..

      Delete
    2. PUT ABOVE COMMENT IN WEBSITES OF--

      CM/ GOVERNOR/ HIGH COURT CHIEF JUSTICES / DGP -- OF KERALA/ PUNJAB/ BENGAL/ ALL 7 NE STATES

      PMO
      PM MODI
      ZAINAB SIKANDER
      RANA AYYUB
      BARKHA DUTT
      SHEHLA RASHID
      NIVEDITA MENON
      IRFAN HABIB
      NIDHI RAZDAN
      ASADDUDIN OWAISI
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA GANDI
      ARUNDHATI ROY
      SHOBHAA DE
      SUHEL SETH
      THOMAS ISAAS KERALA FINANCE MINISTER
      GITA GOPINATH ( IMF CHIEF )
      JOHN BRITAS
      KUNHALIKUTTY
      KODIYERI BALAKRISHNAN
      BRINDA KARAT
      JAVED AKHTAR
      SHABANA AZMI
      INDIRA JAISING
      VRINDA GROVER
      ANAND GROVER
      JOHN DAYAL
      KANCHA ILAIH
      ANNA VETTICKAD
      FATHER CEDRIC PEREIRA
      JULIO RIBEIRO
      PAGALIKA GHOSE
      SWARA TTR BHASKAR ( OR IS IT PRRR )
      IRA BHASKAR
      ANNIE RAJA
      ROMILA THAPAR
      THAMBI SUNDAR PICHAI
      KAMALAHASSAN
      RAVISH KUMAR
      NAVJOT SINGH SIDHU
      TAREK FATAH
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      STALIN
      FAAL GHAFOOR
      UDDHAV THACKTEY
      RAJ THACKREY
      SANJIV BHATT
      TEESTA SETALVAD
      NASEERUDDIN SHAH
      EX-VICE PRESIDENT ANSARI
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      KAVITA KRISHNAN
      JAIRAM RAMESH
      SHASHI THAROOR
      JNULIO RIBEIRO
      JEAN DREZE
      BELA BHATIA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MS SWAMINATHAN
      ARUNA ROY
      UMAR KHALID
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      DEREK O BRIEN
      ADHIR RANJAN CHOWDHURY
      RASHID ALVI
      AJOY KUMAR
      ASADDUDDIN OWAISI
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDA MITRA
      MANISH SISODIA
      ASHISH KHETAN
      SHATRUGHAN SINHA
      RAGHAV CHADDHA
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ATISHI MARLENA
      YOGENDRA YADAV
      SUDHANSHU TRIVEDI
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      CHID BABY
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      ASADDUDDIN OWAISI
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    3. The subject of citizenship is in the union list.only parliment has the right to make laws on the items of union list.once a law is made over these items,it applies to all over india.It is obligatory on the states to implement it.They can't deny it.It is unconstitutional to deny it and the centre can take any measures to make the states implement the law.

      Delete
    4. STATE GOVERNOR OF WEST BENGAL DOES NOT KNOW HIS OWN POWERS

      IF CAPT AJIT VADAKAYIL WAS GOVERNOR , HE WOULD HAVE MADE THE CM DO MURGA POSITION ON THE CALCUTTA CITY CENTRUM

      Delete
    5. Your Registration Number is : PMOPG/E/2019/0709440

      Delete
    6. Kerala, Punjab, Chattisgarh, Bengal,Maharashtra have joined the chorus saying they won't implement CAB...

      Central Govt will have to launch public awareness campaign soon.

      Notice how all corners of our country are being nibbled at!

      Delete
  74. The system of constantly appealing against court judgement must change.
    If there is no merit in argument why take up a case for eg that fellows lawyer says any way my client is in Delhi a gas chamber so he will die anyway so why hang him? Such jokers .

    By that half baked logic disband all courts in Delhi As anyway they will die from the gas chamber ... Why spend any money on the lawyers.

    ReplyDelete
  75. Respected guruji today is my birthday
    My name is Dr Hanuman Ram
    Please bliss me

    ReplyDelete
  76. DHONI MUST PUT HIMSELF OUT TO PASTURE.. HE IS A SPENT FORCE

    THERE ARE BETTER YOUNG PLAYERS LIKE PANT AND SAMSON

    ReplyDelete
  77. RAHUL GANDHI HAS DECLARED THIS INDIA IS THE RAPE CAPITAL OF THE WORLD..

    CAPT AJIT VADAKAYIL WILL MAKE SURE HE CAN NEVER BECOME PM OF INDIA EVER AGAIN.. THE LAST NAIL IN HIS POLITICAL COFFIN IS DRIVEN DEEP NOW..

    INDIA HAS THE LEAST RAPES/ DIVORCES/ LOSS OF VIRGINITY BEFORE MARRIAGE ON THE PLANET..

    I HAVE SEEN THIS PLANET FOR 40 YEARS..

    TEN RAPES IN INDIA HAVING 1350 MILLION PEOPLE IS NOT THE SAME PERCENTAGE OF TEN RAPES IN SWEDEN WHICH HAS ONLY 9.9 MILLION PEOPLE..

    AKKAL KA DUSHMAN RAHUL GANDHI DOES NOT KNOW MATH -- NOR DOES HIS MAINO JEWESS ITALIAN WAITRESS MOTHER , WHO LIED THAT SHE STUDIED IN CAMBRIDGE WITH HER HUSBAND RAJIV GANDHI..

    THIS IS LIKE A CHAMIYA BAR WAITRESS IN MUMBAI LYING THAT SHE STUDIED IN IIT MUMBAI..

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      RAHUL GANDHI
      SONIA GANDHI
      PRIYANKA VADRA
      PMO
      PM MODI
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      STALIN
      ZAINAB SIKANDER
      RANA AYYUB
      BARKHA DUTT
      SHEHLA RASHID
      NIVEDITA MENON
      IRFAN HABIB
      NIDHI RAZDAN
      ASADDUDIN OWAISI
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA GANDI
      ARUNDHATI ROY
      SHOBHAA DE
      SUHEL SETH
      THOMAS ISAAS KERALA FINANCE MINISTER
      GITA GOPINATH ( IMF CHIEF )
      JOHN BRITAS
      KUNHALIKUTTY
      KODIYERI BALAKRISHNAN
      BRINDA KARAT
      JAVED AKHTAR
      SHABANA AZMI
      INDIRA JAISING
      VRINDA GROVER
      ANAND GROVER
      JOHN DAYAL
      KANCHA ILAIH
      ANNA VETTICKAD
      FATHER CEDRIC PEREIRA
      JULIO RIBEIRO
      PAGALIKA GHOSE
      SWARA TTR BHASKAR ( OR IS IT PRRR )
      IRA BHASKAR
      ANNIE RAJA
      ROMILA THAPAR
      THAMBI SUNDAR PICHAI
      KAMALAHASSAN
      RAVISH KUMAR
      NAVJOT SINGH SIDHU
      TAREK FATAH
      FAZAL GHAFOOR
      UDDHAV THACKTEY
      RAJ THACKREY
      SANJIV BHATT
      TEESTA SETALVAD
      NASEERUDDIN SHAH
      EX-VICE PRESIDENT ANSARI
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      KAVITA KRISHNAN
      JAIRAM RAMESH
      SHASHI THAROOR
      JNULIO RIBEIRO
      JEAN DREZE
      BELA BHATIA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MS SWAMINATHAN
      ARUNA ROY
      UMAR KHALID
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      DEREK O BRIEN
      ADHIR RANJAN CHOWDHURY
      RASHID ALVI
      AJOY KUMAR
      ASADDUDDIN OWAISI
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDA MITRA
      MANISH SISODIA
      ASHISH KHETAN
      SHATRUGHAN SINHA
      RAGHAV CHADDHA
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ATISHI MARLENA
      YOGENDRA YADAV
      SUDHANSHU TRIVEDI
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      CHID BABY
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      ASADDUDDIN OWAISI
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Your Registration Number is : PMOPG/E/2019/0709438

      Delete
  78. https://timesofindia.indiatimes.com/india/sabarimala-sc-declines-to-pass-any-order-for-safe-entry-of-women/articleshow/72514084.cms

    SLUT REHANA FATIMA AND HER SPONSORS--LISTEN UP..

    http://ajitvadakayil.blogspot.com/2018/11/5900-year-old-sabarimala-this-planets.html

    ReplyDelete

  79. Nelson sDecember 13, 2019 at 11:25 AM
    https://www.facebook.com/story.php?story_fbid=454589545495744&id=339463143675052

    sir chinese troops have croosed into our territory in arunachal . our govt is sleeping .doval seem to be alice in wonderland

    ReplyDelete
  80. http://ajitvadakayil.blogspot.com/2013/02/jealousy-growing-ulcer-within-capt-ajit.html

    TO WRANGLE A NOBEL PRIZE MODI DOES NOT WARN WESTERN RULERS WHO GIVE TRAVEL ADVISORIES THAT INDIA IS THE WORST RAPE NATION ON THE PLANET..

    TEN RAPES IN INDIA HAVING 1350 MILLION PEOPLE IS NOT THE SAME PERCENTAGE OF TEN RAPES IN SWEDEN WHICH HAS ONLY 9.9 MILLION PEOPLE..

    INDIA HAS THE LEAST RAPES/ DIVORCES/ LOSS OF VIRGINITY BEFORE MARRIAGE ON THE PLANET..

    INDIA MUST WARN OUR CITIZENS TRAVELLING TO EUROPEAN NATIONS AS TOURISTS..

    MOST INDIANS GO ON CHEAP PACKAGE TOURS SO THAT THEY CAN IMPRESS THEIR FRIENDS ON FACEBOOK..BY PUTTING PHOTOS..

    THEY WILL NEVER SAY HOW THEY GOT CHEATED OFF THEIR MONEY..

    TODAY I WAS SPEAKING TO A RICH FRIENDS WHO CAME BACK AFTER AN EUROPEAN TOUR.. HE WENT PRIVATE WITH WIFE AND CHILD..

    HE LOST HIS PASSPORT ( FAMILY TOO ) .. HE LOST 400 EUROS AS HIS BAG WAS SWIPED .. HIS CARDS WERE USED TO SIPHON OFF HIS MONEY FROM HIS BAN..

    EVEN HIS MOBILE PHONE SIM CARD WAS USED TO STEAL HIS MONEY-- I GUESS THE FIND OUT PASSWORDS THIS WAY..

    WE ASK PM MODI/ AJIT DOVAL/ EXTERNAL AFFAIRS MINISTER.. DO YOUR JOB.. YOU ARE JUST FLOATING WITH THE FLOW.. EVEN IF WE KEEP A STONE ON YOUR OFFICIAL CHAIRS, YOUR PERSONAL WORTH MAKES NO DIFFERENCE..

    BE WARNED !

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      RAHUL GANDHI
      SONIA GANDHI
      PRIYANKA VADRA
      PMO
      PM MODI
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      STALIN
      ZAINAB SIKANDER
      RANA AYYUB
      BARKHA DUTT
      SHEHLA RASHID
      NIVEDITA MENON
      IRFAN HABIB
      NIDHI RAZDAN
      ASADDUDIN OWAISI
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA GANDI
      ARUNDHATI ROY
      SHOBHAA DE
      SUHEL SETH
      THOMAS ISAAS KERALA FINANCE MINISTER
      GITA GOPINATH ( IMF CHIEF )
      JOHN BRITAS
      KUNHALIKUTTY
      KODIYERI BALAKRISHNAN
      BRINDA KARAT
      JAVED AKHTAR
      SHABANA AZMI
      INDIRA JAISING
      VRINDA GROVER
      ANAND GROVER
      JOHN DAYAL
      KANCHA ILAIH
      ANNA VETTICKAD
      FATHER CEDRIC PEREIRA
      JULIO RIBEIRO
      PAGALIKA GHOSE
      SWARA TTR BHASKAR ( OR IS IT PRRR )
      IRA BHASKAR
      ANNIE RAJA
      ROMILA THAPAR
      THAMBI SUNDAR PICHAI
      KAMALAHASSAN
      RAVISH KUMAR
      NAVJOT SINGH SIDHU
      TAREK FATAH
      FAZAL GHAFOOR
      UDDHAV THACKTEY
      RAJ THACKREY
      SANJIV BHATT
      TEESTA SETALVAD
      NASEERUDDIN SHAH
      EX-VICE PRESIDENT ANSARI
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      KAVITA KRISHNAN
      JAIRAM RAMESH
      SHASHI THAROOR
      JNULIO RIBEIRO
      JEAN DREZE
      BELA BHATIA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MS SWAMINATHAN
      ARUNA ROY
      UMAR KHALID
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      DEREK O BRIEN
      ADHIR RANJAN CHOWDHURY
      RASHID ALVI
      AJOY KUMAR
      ASADDUDDIN OWAISI
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDA MITRA
      MANISH SISODIA
      ASHISH KHETAN
      SHATRUGHAN SINHA
      RAGHAV CHADDHA
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ATISHI MARLENA
      YOGENDRA YADAV
      SUDHANSHU TRIVEDI
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      CHID BABY
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      ASADDUDDIN OWAISI
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Posted
      https://twitter.com/Avii02379630/status/1205465284124954625?s=19

      Delete
    3. Mailed to-
      contact@amitshah.co.in
      eam@mea.gov.in
      office@rahulgandhi.in
      pgv@inc.in
      soniagandhi@sansad.nic.in
      mot_fb@nic.in
      ravis@sansad.nic.in
      prakash.j@sansad.nic.in
      rammadhav@gmail.com
      jpnadda@gmail.com
      38ashokroad@gmail.com
      info@digvijayasingh.in
      koenraadelst@hotmail.com
      minister.hrd@gov.in
      supremecourt@nic.in
      nalsa-dla@nic.in
      narendramodi1234@gmail.com

      Delete
    4. Your Registration Number is : PMOPG/E/2019/0709437

      Delete
  81. Almost entire media is showing CAB against Constitution and fanning the flames..

    ReplyDelete
  82. Captain,https://en.m.wikipedia.org/wiki/Bnei_Menashe,Are they being fooled into believing they are Jews like those Ethiopian tribes?

    ReplyDelete
    Replies
    1. Captain has called them assamese Jews. Bora of assam are bndi menashe Jews. Indrani mukherjea real name is pari bora

      Delete
  83. Are the sumi nagas also headhunters? nscn leader isak chishi swu was from this tribe.

    ReplyDelete
  84. https://economictimes.indiatimes.com/news/politics-and-nation/parliament-has-right-to-undo-courts-verdicts-ravi-shankar-prasad/videoshow/72479956.cms

    it appears the kayastha fellow whom you keep deriding has been listening to you.

    ReplyDelete
    Replies

    1. https://economictimes.indiatimes.com/news/politics-and-nation/parliament-has-right-to-undo-courts-verdicts-ravi-shankar-prasad/videoshow/72479956.cms

      THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB..

      IT DOES NOT END WITH THIS... PUNISH ALL JUDGES WHO STRUCK DOWN NJAC...

      NJAC STILL STANDS.. THE ILLEGAL COLLEGIUM JUDICIARY VERDICT VIA JUDICIAL REVIEW IS NULL AND VOID...

      JUSTICES J. S. KHEHAR, MADAN LOKUR, KURIAN JOSEPH AND ADARSH KUMAR GOEL HAD DECLARED THE 99TH AMENDMENT AND NJAC ACT UNCONSTITUTIONAL ..

      THESE FOUR JUDGES AND EX-CJI CL DATTU MUST BE TRIED BY THE MILITARY COURT FOR SEDITION…

      http://ajitvadakayil.blogspot.com/2018/11/the-indian-constitution-does-not-allow.html

      THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN...

      THIS IS LIKE A MAD CHIEF COOK DECLARING "I AM CHIEF OF THIS SHIP,N OUR NEXT POST IS NEW YOURK .. MY SWEET WHORE IS THERE " AND STRIKING DOWN LEGITIMATE ORDERS OF THE SHIP CAPTAIN..

      JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISTLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...

      JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…

      WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..

      THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..

      WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..

      INDIA IS THE ONLY NATION WHERE JUDGES ELECT JUDGES...

      WHAT IS ALL THIS ?..

      TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP. SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS.

      PAST RULINGS OF JUDGES ( IN A JUSTICE IS BLIND SYSTEM SANS CONTEXT ) CANNOT BE ATTACHED TO THE CONSTITUTION AS A LANGOT VIA STARE DECISIS.. THIS IS ILLEGAL..

      JUDICIARY HAS NO POWER TO REVIEW LAWS CREATED BY THE ELECTED LAW MAKERS.. THIS IS UNCONSTITUTIONAL ..

      JUDGES AND BENAMI MEDIA WORK INCAHOOTS… WE KNOW THE TRAITORS…

      Capt ajit vadakayil
      ..

      Delete
    2. PUT ABOVE COMMENT IN WEBSITES OF--

      RAHUL GANDHI
      SONIA GANDHI
      PRIYANKA VADRA
      PMO
      PM MODI
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      STALIN
      ZAINAB SIKANDER
      RANA AYYUB
      BARKHA DUTT
      SHEHLA RASHID
      NIVEDITA MENON
      IRFAN HABIB
      NIDHI RAZDAN
      ASADDUDIN OWAISI
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA GANDI
      ARUNDHATI ROY
      SHOBHAA DE
      SUHEL SETH
      THOMAS ISAAS KERALA FINANCE MINISTER
      GITA GOPINATH ( IMF CHIEF )
      JOHN BRITAS
      KUNHALIKUTTY
      KODIYERI BALAKRISHNAN
      BRINDA KARAT
      JAVED AKHTAR
      SHABANA AZMI
      INDIRA JAISING
      VRINDA GROVER
      ANAND GROVER
      JOHN DAYAL
      KANCHA ILAIH
      ANNA VETTICKAD
      FATHER CEDRIC PEREIRA
      JULIO RIBEIRO
      PAGALIKA GHOSE
      SWARA TTR BHASKAR ( OR IS IT PRRR )
      IRA BHASKAR
      ANNIE RAJA
      ROMILA THAPAR
      THAMBI SUNDAR PICHAI
      KAMALAHASSAN
      RAVISH KUMAR
      NAVJOT SINGH SIDHU
      TAREK FATAH
      FAZAL GHAFOOR
      UDDHAV THACKTEY
      RAJ THACKREY
      SANJIV BHATT
      TEESTA SETALVAD
      NASEERUDDIN SHAH
      EX-VICE PRESIDENT ANSARI
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      KAVITA KRISHNAN
      JAIRAM RAMESH
      SHASHI THAROOR
      JNULIO RIBEIRO
      JEAN DREZE
      BELA BHATIA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MS SWAMINATHAN
      ARUNA ROY
      UMAR KHALID
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      DEREK O BRIEN
      ADHIR RANJAN CHOWDHURY
      RASHID ALVI
      AJOY KUMAR
      ASADDUDDIN OWAISI
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDA MITRA
      MANISH SISODIA
      ASHISH KHETAN
      SHATRUGHAN SINHA
      RAGHAV CHADDHA
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ATISHI MARLENA
      YOGENDRA YADAV
      SUDHANSHU TRIVEDI
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      CHID BABY
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      ASADDUDDIN OWAISI
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    3. ASK PMO/ LAW MINISTER/ ATTORNEY GENERAL FOR AN ACK--

      ALL OF YOU MUST DO THIS.. IT IS NOW OR NEVER..

      Delete
    4. https://twitter.com/shree1082002/status/1205495394647465984

      Delete
    5. On Law Minister Ravi Shankar Prasad - PMOPG/E/2019/0709385

      Cheers
      Ravi
      KL

      Delete
    6. Your Registration Number is : PMOPG/E/2019/0709420

      Delete
    7. Your Registration Number is : PMOPG/E/2019/0709435

      Delete
    8. Mailed to-
      ravis@sansad.nic.in
      secy-jus@gov.in
      secylaw-dla@nic.in

      Delete
  85. https://timesofindia.indiatimes.com/india/states-have-no-powers-to-refuse-implementation-of-citizenship-act-home-ministry-official/articleshow/72529317.cms

    WHAT A DISGRACE.... CAPT AMARINDER SINGH HAS BECOME SENILE.. HE HAS LOST MY RESPECT FOREVER...

    WE CAN UNDERSTAND A PEA BRAINED ACTIVIST LIKE MAMATA BANNERJEE MAKING FOOLISH STATEMENTS .LIKE THIS...

    OUR COLLEGIUM JUDICIARY IS WORSE THAN POT HOLE JOURNALISTS.. THESE STUPID JUDGES DO NOT KNOW THAT JUDICIARY HAS NO POWERS OVER EXTERNAL AND INTERNAL SECURITY OF BHARATMATA, HE WATAN..

    WE PLAN TO CREATE MILITARY COURTS AND HANG THE JUDGES WHO HAVE USED ILLEGAL JUDICIAL REVIEW TO UNDERMINE INDIAs DEMOCRACY BY JUDICIAL REVIEW....

    ILLEGAL COLLEGIUM JUDICIARY CREATED THE NAXAL RED CORRIDOR AND CAUSED ETHNIC CLEANSING OF KASHMIRI PANDITS..

    THE CAB BILL WAS PASSED BY BOTH HOUSES OF THE PARLIAMENT.. AFTER PRESIDENT SIGNS IT, THE ILLEGAL COLLEGIUM JUDICARY WILL SIT IN REVIEW LIKE GODS..


    ALL THESE JUDGES ARE ALLOWED TO DO IS TO INTERPRET LAWS..


    THESE JUDGES ARE NOT EMPOWERED TO DO JUDICAL REVIEW OF LAWS PASSED BY THE PARLIAMENT....

    THESE STUPID JUDGES DO NOT KNOW THAT OUR CONSTITUTION PROTECTS ONLY LAW ABIDING INDIAN CITIZENS.. OUR CONSTITUTION DOES NOT PROTECT TRAITOR INDIAN CITIZENS, ILLEGAL MUSLIM ROHINGYA IMMIGRANTS OR ANY ANIMAL EVEN IF IT IS INDIAN...


    WE ASK MODI TO IMMEDIATELY BAN STARE DECICIS, WHERE PAST STUPID JUDGMENTS OF JUDICIARY SANS CONTEXT ARE USED AS A LANGOT – NAY—ADDENDUM TO THE CONSTITUTION...


    THE NJAC BILL WAS PASSED UNANIMOUSLY BY BOTH LOK SABHA AND RAJYA SABHA WITH PRESIDENT SIGNING THE LAW.. YET ILLEGAL COLLEGIUM JUDICIARY USED A UNCONSTITUTIONAL JUDICIAL REVIEW PROCESS AND STRUCK IT DOWN...

    WE THE PEOPLE WARN THE ELECTED EXECUTIVE— JUDICIAL REVIEW IS AN UNDEMOCRATIC SYSTEM AND IT IS DANGEROUS TO THE WATAN WHEN COLLEGIUM JUDGES ARE CONTROLLED BY THE DEEP STATE..


    THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..

    THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..

    TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP.

    SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..

    https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html

    capt ajit vadakayil.

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      RAHUL GANDHI
      SONIA GANDHI
      PRIYANKA VADRA
      PMO
      PM MODI
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      STALIN
      ZAINAB SIKANDER
      RANA AYYUB
      BARKHA DUTT
      SHEHLA RASHID
      NIVEDITA MENON
      IRFAN HABIB
      NIDHI RAZDAN
      ASADDUDIN OWAISI
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA GANDI
      ARUNDHATI ROY
      SHOBHAA DE
      SUHEL SETH
      THOMAS ISAAS KERALA FINANCE MINISTER
      GITA GOPINATH ( IMF CHIEF )
      JOHN BRITAS
      KUNHALIKUTTY
      KODIYERI BALAKRISHNAN
      BRINDA KARAT
      JAVED AKHTAR
      SHABANA AZMI
      INDIRA JAISING
      VRINDA GROVER
      ANAND GROVER
      JOHN DAYAL
      KANCHA ILAIH
      ANNA VETTICKAD
      FATHER CEDRIC PEREIRA
      JULIO RIBEIRO
      PAGALIKA GHOSE
      SWARA TTR BHASKAR ( OR IS IT PRRR )
      IRA BHASKAR
      ANNIE RAJA
      ROMILA THAPAR
      THAMBI SUNDAR PICHAI
      KAMALAHASSAN
      RAVISH KUMAR
      NAVJOT SINGH SIDHU
      TAREK FATAH
      FAZAL GHAFOOR
      UDDHAV THACKTEY
      RAJ THACKREY
      SANJIV BHATT
      TEESTA SETALVAD
      NASEERUDDIN SHAH
      EX-VICE PRESIDENT ANSARI
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      KAVITA KRISHNAN
      JAIRAM RAMESH
      SHASHI THAROOR
      JNULIO RIBEIRO
      JEAN DREZE
      BELA BHATIA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MS SWAMINATHAN
      ARUNA ROY
      UMAR KHALID
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      DEREK O BRIEN
      ADHIR RANJAN CHOWDHURY
      RASHID ALVI
      AJOY KUMAR
      ASADDUDDIN OWAISI
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDA MITRA
      MANISH SISODIA
      ASHISH KHETAN
      SHATRUGHAN SINHA
      RAGHAV CHADDHA
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ATISHI MARLENA
      YOGENDRA YADAV
      SUDHANSHU TRIVEDI
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      CHID BABY
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      ASADDUDDIN OWAISI
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. https://twitter.com/shree1082002/status/1205496589596282880

      Delete
    3. Your Registration Number is : PMOPG/E/2019/0709428

      Delete
  86. https://www.google.com/amp/s/m.timesofindia.com/india/amit-shahs-visit-to-meghalaya-arunachal-cancelled/amp_articleshow/72529754.cms

    ReplyDelete
  87. Your Registration Number is : PMOPG/E/2019/0709194

    Ref : THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB ..

    ReplyDelete
  88. Dear Capt Ajit sir,

    Project Joshua is in motion...for 15 NEW Indian origin MP's are elected in UK....including Rishi Sanak - son in law of NRN Murthy... so it's Indians taking global powershare albeit Rothschild way...;-)

    https://www.hindustantimes.com/india-news/more-indian-origin-mps-elected-to-house-of-commons/story-hGSYPdqEpresAFPL2Ti8RK.html?fbclid=IwAR25WgVIzVwWULEh1dW5Dd_8b_h-dk2bhulH0VZBV1ZFsv9GgtIubJ5draU

    ReplyDelete
  89. https://economictimes.indiatimes.com/news/politics-and-nation/parliament-has-right-to-undo-courts-verdicts-ravi-shankar-prasad/videoshow/72479956.cms

    THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB..

    IT DOES NOT END WITH THIS... PUNISH ALL JUDGES WHO STRUCK DOWN NJAC...

    NJAC STILL STANDS.. THE ILLEGAL COLLEGIUM JUDICIARY VERDICT VIA JUDICIAL REVIEW IS NULL AND VOID...

    SOME BODY ASKED ME – CAPTAIN WHY HAVE YOU WRITTEN THAT OUR JUDGES ARE 100% USELESS.

    THESE JUDGES DO NOT KNOW HOW TO PRIORITISE.

    BECOME AWARE WHERE YOU ARE INVESTING YOUR ENERGY AND TIME..

    WHEN YOU CAN PRIORITSE , HAPPINESS ALIGHTS ON YOU. IT IS ABOUT YOUR OWN VALUES.

    YOU CANNOT MANAGE TIME UNLESS YOU CAN PRIORTISE

    YOU CANNOT BE A CHANGE MANAGER IF YOU CANNOT PRIORITISE

    IF YOU DON’T HAVE THE ABILITY TO PRIORITISE YOU ARE NOT HUMAN— YOU ARE AT THE LEVEL OF AN ANMAL WHO HAS ONLY MOOLADHARA CHAKRA ( SURVIVAL SEAT ).

    NOT ONE SINGLE JUDGE CAN PRIORITISE.. “BODMAS” HAS TO BE APPLIED ON THE CONSTITUTION , TO FIND WHICH LAW HAS PREPONDERANCE ..

    AT SEA AS A CHEMICAL TANKER CAPTAIN, I HAVE TO FOLLOW MORE LAWS THAT THE SIMPLE INDIAN CONSTITUTION.

    IN FAT WE HAVE A WHOLE SHIP LIBRARY FULL OF BOOKS ON INTERNATIONAL LAWS. UNLESS YOU HAVE THIS LIBRARY, THE SHIP IS CONSIDERED UNSEAWORTHY.

    EXAMPLE TWO AMONG DOZENS ?

    http://tmrl.gov.tm/wp-content/uploads/2019/05/4.-solas.pdf

    http://www.mar.ist.utl.pt/mventura/projecto-navios-i/imo-conventions%20%28copies%29/marpol.pdf

    OUR JUDGES ARE THE BOTTOM DREGS OF THE SCHOOL CEREBRAL BARREL AND DISCARDS OF THE LOSER LAWYER POOL..

    MOST OF THESE JUDGES HAVE TAKEN UP THIS LOW PAYING JOB, JUST TO GET EVEN WITH THEIR MERCEDES DRIVING RICH LAWYER COLLEAGUES.

    AS SEA CAPT AJIT VADAKAYIL WAS A LEGENDARY TEACHER AS HE HAS THE ABILITY TO TRANSLATE LAWS ETC TO DIRTY SEX.. SAILORS AND DIRTY SEX ?—THEY ARE ALL EARS .

    FOR EXAMPLE- TASK: DESCRIBE A HUMAN BEING IN 100 POINTS

    NO 1 WOULD BE—A HUMAN HAS A SOUL WITHIN WHICH IS A PIECE OF THE FIELD OF BRAHMAN AT LOWER FREQUENCY

    NO 100 WOULD BE—A HUMAN HAS AN ASSHOLE IN WHICH A WHORE CAN SHOVE HER TONGUE AND DO ANALINGUS.

    FOR THESE STUPID JUDGES , PRIORITY WOULD BE NO 100.. IT IS NO LONGER FUNNY.

    JUSTICE LOKUR HAS TOLD NDTV THAT ARTICLE 14 APPLIES TO CAB. SORRY, THE ENTIRE CONSTITUTION IS FOR LAW ABIDING INDIAN CITIZENS – NOT FOR ISI PAYROLL TERRORIST LIKE SOHRABUDDIN FOR WHOM HOME MINISTER AMIT SHAH WAS KICKED INTO JAIL..

    OUR CONSTITUTION DOES NOT APPLY TO ILLEGAL ROHINGYA MUSLIMS.

    WE MUST FORM MILITARY COURTS AND HANG JUDGES WHO WERE IN PAKISTANI ISA AND JEWISH DEEP STATE PAYROLL. HOW DID 20% OF INDIAN LANDMASS ( RED CORRIDOR ) COME UNDER NAXAL CONTROL?

    HOW WERE KASHMIRI PANDITS ETHNICALLY CLEANSED ?

    http://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html

    WE THE PEOPLE WHO ARE ABOVE THE CONSTITUTION WARN THE JUDGES— “GET YOUR ACT TOGETHER..YOU ARE IN CONTEMPT OF THE CONSTITUTION ITSELF “

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      RAHUL GANDHI
      SONIA GANDHI
      PRIYANKA VADRA
      PMO
      PM MODI
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      STALIN
      ZAINAB SIKANDER
      RANA AYYUB
      BARKHA DUTT
      SHEHLA RASHID
      NIVEDITA MENON
      IRFAN HABIB
      NIDHI RAZDAN
      ASADDUDIN OWAISI
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA GANDI
      ARUNDHATI ROY
      SHOBHAA DE
      SUHEL SETH
      THOMAS ISAAS KERALA FINANCE MINISTER
      GITA GOPINATH ( IMF CHIEF )
      JOHN BRITAS
      KUNHALIKUTTY
      KODIYERI BALAKRISHNAN
      BRINDA KARAT
      JAVED AKHTAR
      SHABANA AZMI
      INDIRA JAISING
      VRINDA GROVER
      ANAND GROVER
      JOHN DAYAL
      KANCHA ILAIH
      ANNA VETTICKAD
      FATHER CEDRIC PEREIRA
      JULIO RIBEIRO
      PAGALIKA GHOSE
      SWARA TTR BHASKAR ( OR IS IT PRRR )
      IRA BHASKAR
      ANNIE RAJA
      ROMILA THAPAR
      THAMBI SUNDAR PICHAI
      KAMALAHASSAN
      RAVISH KUMAR
      NAVJOT SINGH SIDHU
      TAREK FATAH
      FAZAL GHAFOOR
      UDDHAV THACKTEY
      RAJ THACKREY
      SANJIV BHATT
      TEESTA SETALVAD
      NASEERUDDIN SHAH
      EX-VICE PRESIDENT ANSARI
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      KAVITA KRISHNAN
      JAIRAM RAMESH
      SHASHI THAROOR
      JNULIO RIBEIRO
      JEAN DREZE
      BELA BHATIA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MS SWAMINATHAN
      ARUNA ROY
      UMAR KHALID
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      DEREK O BRIEN
      ADHIR RANJAN CHOWDHURY
      RASHID ALVI
      AJOY KUMAR
      ASADDUDDIN OWAISI
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDA MITRA
      MANISH SISODIA
      ASHISH KHETAN
      SHATRUGHAN SINHA
      RAGHAV CHADDHA
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ATISHI MARLENA
      YOGENDRA YADAV
      SUDHANSHU TRIVEDI
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      CHID BABY
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      PMO
      PM MODI
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      UDDHAV THACKREY
      RAJ THACKREY
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      JAVED AKHTAR
      ASDDUDDIN OWAISI
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      SHEHLA RASHID
      FATHER CEDRIC PRAKASH
      ANNA VETTICKAD
      ANNIE RAJA
      JOHN BRITTAS
      ASADDUDDIN OWAISI
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Your Registration Number is : PMOPG/E/2019/0709424

      Delete
    3. "THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB..THIS IS THE FIRST TIME IN FIVE YEARS LAW MINISTER RAVI SHANKAR PRASAD HAS UNDERSTOOD AND DONE HIS JOB.."

      thanks only to an old sea salt

      Delete
  90. https://timesofindia.indiatimes.com/entertainment/hindi/bollywood/news/kareena-kapoor-khan-reveals-taimur-ali-khans-birthday-plans-he-has-demanded-two-cakes/articleshow/72527436.cms

    TOH MEIN NACHOON ?

    PAID NEWS !

    ReplyDelete
  91. https://timesofindia.indiatimes.com/city/bengaluru/bengaluru-pil-challenges-liquor-vend-opposite-mahatma-gandhi-statue-hc-orders-notice-to-state-bbmp/articleshow/72541880.cms

    WE THE PEOPLE DINT CARE FOR GANDHI

    ReplyDelete
    Replies
    1. He was a sargeant in the British military - why we would ever trust him?

      Delete
  92. https://twitter.com/CitizenKamran/status/1205530327973675009

    ReplyDelete
  93. Dear Capt Ajit sir,

    This is Yogi Adityananth sarkar of the masses...wants inclusivity of everyone to be part of Ram temple...what a great start..... https://www.opindia.com/2019/12/yogi-adityanath-jharkhand-family-donate-rs-11-stone-ram-mandir-ayodhya/?fbclid=IwAR38Mh8HLEYsnd7ETkXB31wXUoQCq4IwAYMiarJsyPXOAd81jmTWm8hVv1U

    ReplyDelete
  94. DATE -13TH DEC 2019
    TIME - 2230 IST
    TV CHANNEL - INDIA TODAY
    TV ANCHOR- RAHUL KANWAL
    SUBJECT -- INDIAN ECONOMICS

    TODAY FOR THE FIRST TIME I SAW A DISCUSSION WHERE ECONOMISTS HAVE DECLARED THERE IS A DIFFERENCE BETWEEN SWADESHI ECONOMICS ( VADAKAYIL ECONOMICS ) AND VIDESHI ECONOMICS ( ROTHSCHILD ECONOMICS)..

    YEARS OF MY EFFORTS HAVE BORNE FRUIT..

    HEY GITA GOPINATH-- YOU ARE IMF CHIEF ONLY BECAUSE YOU ARE A BLOOD RELATIVE OF ROTHSCHILD COMMIE AK GOPALAN.. SO LISTEN UP..

    INDIA IS ALREADY A 5 TRILLION ECONOMY

    INDIA IS GROWING TODAY AT 10.1%

    INDIA IS THIS PLANETs NO 3 ECONOMY TODAY..

    INDIA HAS THE BEST POTENTIAL AND BEST STRATEGIC LOCATION , WITH ENORMOUS NATURAL RESOURCES..

    INDIA IS TODAY THE ONLY ROARING ECONOMY ON THIS PLANET..

    INDIA DOES NOT CARE FOR ROTHSCHILDs RATING AGENCIES FITCH/ MOODYs / S&P ETC..

    G6 GROUP ( A BUNCH OF BEGGAR NATIONS PRETENDING TO BE RICH ) WITHOUT INDIAN AND CHINA IS A JOKE..

    READ CAPT AJIT VADAKAYILs QUESTIONS TO QUORA FROM 686 TO 820... YOU WILL NOTICE THAT ROTHSCHILDs ECONOMICS IS PURE BULLSHIT..

    YOU DONT NEED TO BE A HEN TO JUDGE AN OMELETTE. I HAVE TRAVELED THIS PLANET FOR 40 YEARS , CHECKED OUT EVERY BACKYARD...

    WE KNOW THE TRAITOR INDIAN ECONOMISTS.. WE THE PEOPLE HAVE A SHORT ROPE AND A LAMP POST EARMARKED FOR THEM.. DESH DROHIS IN THE PAYROLL OF THE JEWISH DEEP STATE..

    INDIA WILL BE THIS PLANETs NO 1 SUPERPOWER IN 14 YEARS , EVEN IF WE ARE ON AUTO PILOT... WE WERE SLAVES FOR 800 YEARS ..

    IN 200 YEARS FLAT JEW ROTHSCHILD CONVERTED INDIA FROM THE RICHEST NATION ON THE PLANET TO THE POOREST.. WE HAVE LEARNT OUR LESSONS .. WE HAVE PROFILE THE TRAITORS..

    PAIN AWAITS THESE TRAITORS..

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMMENT IN WEBSITES OF--
      RAHUL KANWAL
      AROON PURIE
      GITA GOPINATH
      BAIJAYANT PANDA
      SOUMYA JANTI GHOSH
      SAMIRAN CHAKRABORTY
      ASMIMA GOYAL
      RBI GOVERNOR
      RBI
      FINANCE MINISTRY CENTRE/ STATES
      FINANCE MINISTER CENTRE / STATES
      PMO
      PM MODI
      PIYUSH GOEL
      CHID BABY
      MONTEK SINGH AHLUWALIA
      MANMOHAN SINGH
      RAGHURAN RAJAN
      ABHIJEET BANNERJEE ( NOBEL )
      AMARTYA SEN
      YASHWANT SINHA
      PRANAB MUKHERJEE
      JAGDISH BHAGWATI
      JAYATI GHOSH
      ARVIND SUBRAMANIAN
      BIMAL JALAN
      ARVIND PANAGARIYA
      SUBRAMANIAN SWAMY
      AMIT MITRA
      BIBEK DEBROY
      JAIRAM RAMESH
      KAUSHIK BASU
      MS SUNDARA RAJAN
      REETIKA KHERA
      MIHIR SHAH
      JEAN DREZE
      PMO
      PM MODI
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      JOHN BRITAS
      RAVISH KUMAR
      TAREK FATAH
      UDDHAV THACKREY
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDA MITRA
      MANISH SISODIA
      RAGHAV CHADDHA
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ATISHI MARLENA
      YOGENDRA YADAV
      SUDHANSHU TRIVEDI
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      JACK DORSEY
      MARK ZUCKERBERG
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      LAW MINISTER PRASAD
      ATTORNEY GENERAL
      LAW MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL STATE HIGH COURT CHIEF JUSTICES
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      CHETAN BHAGAT
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      FAZAL GHAFOOL ( MES)
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      MAMMOOTTY
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PGURUS
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
  95. sir watch this -

    डिग्री जला दी तो हर जगह IIT Alumnus क्यूँ लिखता हूँ?

    https://www.youtube.com/watch?v=UqxxiXAYLy0

    ReplyDelete
  96. For 40 years Congress and BJP have been letting in illegal immigrants and NOW they want to take action. Is this a sick joke?

    The real issue is Border Security. Otherwise every 10 years we will have to do this CAB/NRC exercise. All a got up game. BJP is clearly controlled by foreign powers!

    ReplyDelete
  97. CFR President:
    https://twitter.com/RichardHaass/status/1205163308644524035?s=19

    ReplyDelete
  98. dear captain, tweet sent in response to the below thread
    https://ajitvadakayil.blogspot.com/2019/12/what-artificial-intelligence-cannot-do.html?showComment=1576231877257#c5382920697119669631
    https://twitter.com/rakeshsivan/status/1205661524150210560

    ReplyDelete
    Replies
    1. I ASK MY READERS

      TAKE THIS AS AN EXAMPLE OF HOW TO POST SCREEN SHOTS AND HOW TO REPORT BACK.

      capt ajit vadakayil
      ..

      Delete
  99. https://timesofindia.indiatimes.com/india/wont-direct-kerala-to-enforce-womens-sabari-entry-sc/articleshow/72561437.cms

    EVEN IF THE JUDICIARY AND KERALA CM ENFORCES IT-- WE THE PEOPLE WILL NOT OBEY.. ...

    WE THE PEOPLE ARE ABOVE THE CONSTITUTION.. ..

    WE THE PEOPLE CANNOT BE STRAIT JACKETED BY A STAGNANT CONSTITUTION , AS WE ARE ABOVE IT AS PER THE PREAMBLE..

    INDIA IS RUN BY RULE OF DHARMA AND LOVE FOR THE WATAN...

    CONSTITUTION IS A DYNAMIC DOCUMENT.. WE ARE IN THE QUANTUM COMPUTER ERA , NOT THE CALCULATOR ERA...

    AT SEA, THE SHIP CAPTAIN HAS TO FOLLOW 100 TIMES MORE REGULATIONS THAN WHAT EXISTS IN THE INDIAN CONSTITUTION... YET THE LOCAL LAWS AND LOCAL CULTURE TAKES PREPONDERANCE....

    THESE ARE UNWRITTEN RULES......

    go0gle for the blogpost below--.

    http://ajitvadakayil.blogspot.com/2018/11/5900-year-old-sabarimala-this-planets.html

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      CJI BOBDE
      CHANDRACHUD
      NARIMAN
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL SUPREME COURT LAWYERS
      LAW MINISTER/ MINISTRY CENTRE AND STATE
      ALL HIGH COURT CHIEF JUSTICES
      ALL COLLECTORS OF KERALA
      PMO
      PM MODI
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      PGURUS
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV

      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Why don't these female protesters protest against Freemason lodges that don't allow women in India (or for that matter in the rest of the world)?

      Delete
    3. Captain
      On Sabarimalai -- PMOPG/E/2019/0709930
      Cheers Ravi KL

      Delete
  100. SOMEBODY CALLED ME UP AND SAID...

    CAPTAIN , AMONG YOUR 10,000 REVELATIONS, I HAVE CHOSE ONE FOR THE NO 1 STATUS..

    YOU ARE THE FIRST PERSON ON THE PLANET TO WRITE DOWN

    ###################

    ALL HINDU GODS ARE COSMIC ALLEGORIES EXCEPT VIHNU AVATARS RAM/ KRISHNA / AYYAPPA WHO WERE MORTALS

    #############################

    INDEED !

    WHY DID JEW DARLING MODI GIVE INDIAs SECOND HIGHEST AWARD PADMA VIBHUSHAN TO TWO ROGUE FAKE GURUS , WHO HAVE MILKED SANATANA DHARMA AND BECOME RICH , RUNNING VOTE BANKS ?

    AAA- FAKE GURU STUPID FELLOW SADGURU JAGGI VASUDEV WROTE THAT SHIVA IS A MORTAL YOGI BORN 15,000 YEARS AGO.. HE MADE A HUGE STATUE AT COIMBATORE, AND GOT PM MODI TO INAUGURATE IT.. HE HAD PRESIDENT KOVIND AS CHIEF GUEST ON SHIVA RATRI DAY AND DANCED LIKE A CUNT IN HIS PRESENCE .. SADGURU JAGGI VASUDEV EVEN SAID ON YOU TUBE VIDEO THAT SHIVA IS LIKE SACHIN TENDULKAR WHO WAS GOOD AT DOING A PARTICULAR THING , SO PEOPLE LOVED HIM AND MADE HIM GOD..

    BBB -- FAKE GURU STUPID FELLOW SRI SRI RAVISHANKAR WROTE THAT SHIVA SCREWED VISHNU ANALLY AND PRODUCED LORD AYYAPPA.. WE KNOW WHERE THIS IS COMING FROM AS SRI SRI RAVISHANKAR HAS A EFFIMINATE VOICE AND GIRLIE SLENDER FINGERS .. SO SO SO, TWO COSMIC ALLEGORIES HAD HOMOSEXUAL SEX AND PRODUCED MORAL AYYAPPA ?.... WHY IS THIS CUNT NOT IN JAIL ?....

    https://www.firstpost.com/india/homosexuality-not-a-crime-in-hinduism-says-sri-sri-ravi-shankar-1283843.html

    ############################

    WE THE PEOPLE WARN DEVDUTT PATTANAIK AND AMISH TRIPATI.. DO NOT DENIGRATE HINDUISM..

    AND WE HAVE TWO DEEP STATE DARLING LIBERAL JUDGES CHANDRACHUD AND NARIMAN WANTING TO EQUATE WORLDs LARGEST PILGRIMAGE SABARIMALA TO WEE PARSI / BOHRA TEMPLES.. MIND YOU THESE ARE FOREIGN INVADER RELIGIONS.. WE HAVE TO PULL DOWN THE GREAT SANATANA DHARMA TO THIS LOW LEVEL ?

    APPIDIYAAAAAA ?

    WE WANT INSTANT JUDICIAL REFORMS .. WE MUST CREATE MILITARY COURTS TO QUICK TRY AND HANG DEEP STATE PAYROLL TRAITOR COLLEGIUM JUDGES..

    read all 8 parts of this unfinished post..

    http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--

      NITI AYOG
      AMITABH KANT
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      RAJDEEP SARDESAI
      PAAGALIKA GHOSE
      NAVIKA KUMAR
      ANAND NARASIMHAN
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      FAYE DSOUZA
      ZAKKA JACOB
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      SWAMY
      RAJIV MALHOTRA
      I&B MINISTER/ MINISTRY
      NCERT
      EDUCATION MINISTER/ MINISTRY
      CMs OF ALL INDIAN STATES
      DGPs OF ALL STATES
      GOVERNORS OF ALL STATES
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      PUT ABOVE COMMENT IN WEBSITES OF--
      CJI BOBDE
      CHANDRACHUD
      NARIMAN
      ATTORNEY GENERAL
      ALL SUPREME COURT JUDGES
      ALL SUPREME COURT LAWYERS
      LAW MINISTER/ MINISTRY CENTRE AND STATE
      ALL HIGH COURT CHIEF JUSTICES
      ALL COLLECTORS OF KERALA
      PMO
      PM MODI
      NALIN KOHLI
      GVL NARASIMHA RAO
      SAMBIT PATRA
      DAVID FRAWLEY
      STEPHEN KNAPP
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      AJIT DOVAL
      RAW
      IB
      NIA
      ED
      CBI
      AMIT SHAH
      HOME MINISTRY
      DEFENCE MINISTER/ MINISTRY
      ALL 3 ARMED FORCE CHIEFS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      VIVEK OBEROI
      GAUTAM GAMBHIR
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      KIRON KHER
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      MADHUR BHANDARKAR
      SWAPAN DASGUPTA
      SONAL MANSINGH
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      SAMBIT PATRA
      RSN SINGH
      GVL NARASIMHA RAO
      E SREEDHARAN
      MOHANLAL
      SURESH GOPI
      PGURUS
      SRI SRI RAVISHANKAR
      SADGURU JAGGI VASUDEV
      MATA AMRITANANDA MAYI
      BABA RAMDEV
      SANJAY HEDGE
      KAPILSIBAL
      ABHI SEX MAANGTHA SINVI
      DIG VIJAY SINGH
      AK ANTONY
      TEHSIN POONAWAALA
      SANJAY JHA
      AATISH TASEER
      MANI SHANGARAN AIYYERAN
      JOHN BRITAS
      RAVISH KUMAR
      TAREK FATAH
      UDDHAV THACKREY
      SHEKHAR GUPTA
      KARAN THAPAR
      SIDDHARTH VARADARAJAN
      KUMAR KETKAR
      NIKHIL WAGLE
      NISHANT VERMA
      SUMEET CHOPRA
      ASHUTOSH
      DEEPAK CHAURASIA
      VINOD SHARMA
      FARAH NAQVI
      KIRAN MAJUMDAR SHAW
      RAHUL BAJAJ
      HARDH MANDER
      MANISH TEWARI
      PRIYANKA CHATURVEDI
      RAJIV SHUKLA
      SANJAY NIRUPAM
      PAVAN KHERA
      RANDEEP SURJEWALA
      MJ AKBAR
      ARUN SHOURIE
      SHAZIA ILMI
      CHANDAN MITRA
      THAMBI SUNDAR PICHAI
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      ALL MPs OF INDIA
      ALL MLAs OF INDIA
      KAPIL SIBAL
      ANAND SHARMA
      ABHI SEX MAANGTHA SINGHVI
      DIG VIJAY SINGH
      ADHIR RANJAN CHOWDHURY
      AK ANTONY
      SANJAY HEGDE
      SANJAY JHA
      TEHSEEN POONAWAALA
      SEHZAD POONAWALA
      MUKESH AMBANI
      RATA TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      AMISH TRIPATI
      PAVAN VARMA
      RAMACHANDRA GUHA
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      SONIA GANDHI
      PRIYANKA VADRA
      RAHUL GANDHI
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      PRAKASH KARAT
      SITARAM YECHURY
      BRINDA KARAT
      D RAJA
      RANA AYYUB
      DEVADUTT PATTANAIK
      WENDY DONIGER
      AUDREY TRUSCHKE
      SHELDON POLLOCK
      WEBSITES OF DESH BHAKTS
      SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.

      Delete
    2. Posted the screenshots:
      https://twitter.com/Avii02379630/status/1205688036610064384?s=19

      Delete
    3. Captain
      On push for urgent judicial reforms --PMOPG/E/2019/0709886
      Cheers Ravi KL

      Delete
  101. https://twitter.com/dastardicious/status/1205407891399692288?s=20
    https://twitter.com/dastardicious/status/1205408087663710208?s=20

    my reply to swamy on twitter, captain, who seems to be vehemently against the s400 but can't give a valid reason why we should not go ahead with it. Makes unfounded claims of chinese electronics on it which cannot be used against either pakistan or china. and then says usa will not grant us visas if we buy the s400.

    ReplyDelete
  102. Hi Captain,

    These days i dont regularly visit your blog as i dont find enough time.

    I dont know how to congratulate you or to express my gratitude.

    Most of the people think that BJP is so patriotic/nationalistic and has struck down Article 370, Got rid off China in Doklam,Got RamMandir, Passed CAB etc, but all these things are whole n sole hardwork of yours over the past Ten years, else by this time Modi would have sold off Bharatmata to his Jewish masters.

    U always showed the Mirror to the BJP Stalwarts, that is why things are in place.
    U are the only reason i feel the world is not hooked on to WWIII by G7 beggar nations to wave off their debts.

    You are so big Captain.

    Regards,
    Santhosh.

    ReplyDelete
    Replies
    1. WHAT IS THE MODUS OPERANDI OF THE G6 NATIONS ??..

      HAVE INFLATED GDP.. SHOWCASE THEMSELVES AS RICH NATIONS.. LATER CAUSE WARS AND STEAL..

      GDP DOES NOT FACTOR IN EXTERNAL DEBT... WHAT A FUCKIN' JOKE..

      CHECK OUT THE TOP LEFT HAND CORNER OF THE LINK BELOW-- USA IS 23.1 TRILLION USD IN DEBT...

      AND INDIA IS STRUGGLING TO BE A 5 TRILLION ECONOMY..

      https://www.usdebtclock.org/

      CAPT AJIT VADAKAYIL IS THE ONLY MAN ON THE PLANET TO DECLARE THAT MODERN ECONOMICS IS 100% BULLSHIT

      READ QUESTIONS TO QUORA FROM 686 TO 820.. EVEN A SCHOOL BOY CAN UNDERSTAND..

      https://ajitvadakayil.blogspot.com/2019/06/archived-questions-to-quora-from-capt.html

      WHAT WAS MY MISSION STATEMENT TEN YEARS AGO BEFORE I STARTED MY FIRST BLOG POST?

      This blogsite will transform your mind . You yourself, are the teacher, the pupil, the messiah, the seeker, the traveller and the destination . It is no measure of health to be well adjusted to this profoundly sick society . I am from INDIA, the mother of all civilizations . I will be re-writing world history , and this will surely not gratify the evil hijackers of human history . Awaken your inner voice . Your own conscience is the best interpreter . In a time of universal deceit, telling the truth is a revolutionary act . The naked truth can never be hate speech or defamation. This blog site does not sacrifice truth on the altar of political correctness . Do not enter this blog site if you cannot handle the truth . Capt Ajit Vadakayil leads the only silent revolution on this planet .. STRENGTH AND HONOR - ALWAYS !.

      capt ajit vadakayil
      ..

      Delete
  103. another place which was populated by headhunter tribes is borneo who claim they're indigenous but i suspect they were brought here when dutch/spanish/portuguese were ruling the roost and killed off lots of bornean [kalimantan] hindus....this also happened in sumatra......most converted to christianity later on

    ReplyDelete
    Replies
    1. THE HINDUS OF BORNEO WERE MASSACRED ENMASSE.

      THERE WERE HUNDREDS OF HINDU TEMPLES IN BORNEO.. ALL BOMBED FROM THE SKY.. SOME TEMPLES HAVE BEEN CONVERTED..

      https://www.youtube.com/watch?v=72nAt5EfhDA

      IN CALICUT WE KNEW BORNEO IN ANCIENT TIMES AS KARPURA DWEEPAM ( LAND OF CAMPHOR )



      Delete
  104. sir i wanted to know more about the arunachal pradesh hindus who were ethnically cleansed 250 years ago by rothschild. i wonder what was the population of arunachal 250 years back

    ReplyDelete
  105. https://en.wikipedia.org/wiki/Chutia_people are they original hindu inhabitants of arunachal?

    ReplyDelete
    Replies
    1. NO

      THE ORIGINAL HINDUS LOOKED LIKE CURRENT DAY BENGALIS .. PLUS SOME HINDU TRIBALS..

      Delete
  106. https://en.wikipedia.org/wiki/Moamoria_rebellion

    ReplyDelete
  107. https://timesofindia.indiatimes.com/videos/news/cab-protests-footage-of-crpf-cops-beating-up-tv-news-journalists-in-guwahati-emerges/videoshow/72504499.cms

    WHEN THERE IS A SERIOUS INCIDENT ON MY SHIP, I BAN CAMERAS FROM THE SITE..

    NO CREW DARES TO DISOBEY MY ORDERS..

    WHERE THERE ARE CAMERAS OPPORTUNISTIC MICE BEHAVE LIKE LIONS..

    THE CHAIN IS AS GOOD AS THE WEAKEST LINK..

    THE WEAKEST LINK IS THE SELFISH FELLOW PLAYING TO THE GALLERY.

    ReplyDelete