Kim Jong-un Inspects Nuclear-Powered Missile Submarine
North Korea says Kim inspected an 8,700-ton nuclear-powered guided-missile submarine.
KCNA also referenced “new secret underwater weapon” R&D and missile-defense test.
North Korea says Kim inspected an 8,700-ton nuclear-powered guided-missile submarine.
KCNA also referenced “new secret underwater weapon” R&D and missile-defense test.
😱10
India’s first anti-terror policy to be released tomorrow
The Union government is finalising India’s first anti-terror policy, which will provide a template for all States to combat and respond to terror-related incidents
The Union government is finalising India’s first anti-terror policy, which will provide a template for all States to combat and respond to terror-related incidents
Key Issues in the Policy
- Digital Radicalisation: The policy addresses the increasing threat of online radicalisation, especially through social media platforms.
- Misuse of Open Borders: Concerns about the open border with Nepal and its exploitation by terrorists are highlighted.
- Foreign-Funded Conversion Networks: Networks funded by external entities that aim to radicalise individuals are a significant focus.
🔥7
🇨🇳 - Chinese car driver forced to drive at 115km/h for 4 hours straight, after his China-made smart car refused to stop or open doors.
Police escorted the man, cleared the road for him, and waited until the car ran out of fuel.
Police escorted the man, cleared the road for him, and waited until the car ran out of fuel.
🤣10
देवप्रस्थ
Reliance Industries,
Reliance resumes Russian oil imports
Reliance Industries has restarted buying discounted Russian crude oil. The company is sourcing barrels from suppliers not under sanctions. These shipments are heading to its refinery in Gujarat.
India's largest refiner contracted Aframax tankers from RusExport and is routing flows to a 660,000-barrel-a-day plant that supplies domestic customers.
Reliance Industries has restarted buying discounted Russian crude oil. The company is sourcing barrels from suppliers not under sanctions. These shipments are heading to its refinery in Gujarat.
India's largest refiner contracted Aframax tankers from RusExport and is routing flows to a 660,000-barrel-a-day plant that supplies domestic customers.
🔥11
देवप्रस्थ
Also, we observe "GOOD GOVERNANCE DAY" Today! 👓To commemorate the birth anniversary of Atal Bihari Vajpayee. 🎯Recognition: Padma Vibhushan, Best Parliamentarian (1994), Bharat Ratna (2015), Order of Ouissam Alaouite (Morocco)
This media is not supported in your browser
VIEW IN TELEGRAM
सरकारें आएंगी, जाएंगी, पार्टियां बनेंगी, बिगड़ेंगी मगर ये देश रहना चाहिए - अटल बिहारी वाजपेयी
❤14
44 year-old indian origin passes away in the hospital after waiting over 8 hours in the emergency room in Canadian hospital, due to negligence of hospital staff
He suffered extreme chest pain and suffered for 8 hours during which the nurses barely paid him attention. Then he passed away from cardiac arrest
He suffered extreme chest pain and suffered for 8 hours during which the nurses barely paid him attention. Then he passed away from cardiac arrest
🤬16
देवप्रस्थ
Video
Saar I'm good Endian, Plez Beliv Me, I'm high Quality Endian.
Endia has no sevik sense saar, Foreign country and foreign people are better 👅💦
Endia has no sevik sense saar, Foreign country and foreign people are better 👅💦
🤣19❤1
देवप्रस्थ
ever heard of him ?
Not your mistake, even admins of major geopolitics channels heard his name for the first time.
💯9
Pakistan's ISI and America's CIA have been running a concerted cyber warfare campaign within India for the last 15 years.
Between 2010 and 2014, the CIA utilized Pakistan as a proxy to execute cyber attacks in India.
During this period, the ISI developed a rudimentary cyber doctrine employing two primary methods. The first was website defacement, where government websites were hacked to display religious and political propaganda, anti-India slogans, and incitement regarding Kashmir.
The second strategy, deployed around 2013-14, involved phishing attacks using deceptive emails and fake servers. The objective was to steal passwords from government employees and leak them on social media platforms like Orkut and Facebook, causing institutional reputational damage.
The scenario changed significantly starting in 2015.
With the change in government in 2014 and a shift toward a more aggressive foreign policy, India's diplomatic profile began to rise globally, a development the CIA reportedly did not favor, preferring a docile India.
Consequently, the ISI, acting on behalf of the CIA, launched coordinated and professional cyber operations known as "Project Transparent Tribe" or APT 36 (Advanced Persistent Threats). This project targeted India's diplomatic missions, defense installations, and critical infrastructure using malware.
From 2015 to 2019, they utilized the "Watering Hole Attack" technique. This involved mapping websites frequently visited by Indian officials (defense, diplomatic, etc.) and infecting those specific sites to breach the officials' systems.
From 2020 to 2024, during the global COVID-19 lockdowns, the ISI and CIA initiated a "Cross-Platform Expansion." They targeted various operating systems, including Windows, Android, and Linux, exploiting the fact that the world had moved entirely to digital mediums. They tricked government officials into downloading fake applications to gain entry into their systems. The goal was not just to hijack the system, but to hijack the privilege of information access that specific officers held, shifting the focus towards intelligence collection.
In 2025, following "Operation Sindoor," dynamics shifted again. India had quietly undergone a digital revolution by migrating officials to the indigenous "BOSS" (Bharat Operating System Solutions) to reduce reliance on Western platforms and secure data. In response, the CIA and ISI began targeting BOSS using a technique called "Spear Phishing."
This involves sending fraudulent emails that appear to come from high-ranking officials (like a Secretary or Commissioner) containing a malicious PDF.
Two specific malwares are being used: "CURL," which copies downloadable information once the PDF is opened, and "XD," which encodes and transmits that data to ISI servers.
America's strategic objective here is not just intelligence gathering, but to discredit India's indigenous technology, portraying it as unsafe to ensure a continued market for
Western encrypted technologies and to create internal pressure against the use of Indian-made systems.
Between 2010 and 2014, the CIA utilized Pakistan as a proxy to execute cyber attacks in India.
During this period, the ISI developed a rudimentary cyber doctrine employing two primary methods. The first was website defacement, where government websites were hacked to display religious and political propaganda, anti-India slogans, and incitement regarding Kashmir.
The second strategy, deployed around 2013-14, involved phishing attacks using deceptive emails and fake servers. The objective was to steal passwords from government employees and leak them on social media platforms like Orkut and Facebook, causing institutional reputational damage.
The scenario changed significantly starting in 2015.
With the change in government in 2014 and a shift toward a more aggressive foreign policy, India's diplomatic profile began to rise globally, a development the CIA reportedly did not favor, preferring a docile India.
Consequently, the ISI, acting on behalf of the CIA, launched coordinated and professional cyber operations known as "Project Transparent Tribe" or APT 36 (Advanced Persistent Threats). This project targeted India's diplomatic missions, defense installations, and critical infrastructure using malware.
From 2015 to 2019, they utilized the "Watering Hole Attack" technique. This involved mapping websites frequently visited by Indian officials (defense, diplomatic, etc.) and infecting those specific sites to breach the officials' systems.
From 2020 to 2024, during the global COVID-19 lockdowns, the ISI and CIA initiated a "Cross-Platform Expansion." They targeted various operating systems, including Windows, Android, and Linux, exploiting the fact that the world had moved entirely to digital mediums. They tricked government officials into downloading fake applications to gain entry into their systems. The goal was not just to hijack the system, but to hijack the privilege of information access that specific officers held, shifting the focus towards intelligence collection.
In 2025, following "Operation Sindoor," dynamics shifted again. India had quietly undergone a digital revolution by migrating officials to the indigenous "BOSS" (Bharat Operating System Solutions) to reduce reliance on Western platforms and secure data. In response, the CIA and ISI began targeting BOSS using a technique called "Spear Phishing."
This involves sending fraudulent emails that appear to come from high-ranking officials (like a Secretary or Commissioner) containing a malicious PDF.
Two specific malwares are being used: "CURL," which copies downloadable information once the PDF is opened, and "XD," which encodes and transmits that data to ISI servers.
America's strategic objective here is not just intelligence gathering, but to discredit India's indigenous technology, portraying it as unsafe to ensure a continued market for
Western encrypted technologies and to create internal pressure against the use of Indian-made systems.
😱7