Kim Jong-un Inspects Nuclear-Powered Missile Submarine
North Korea says Kim inspected an 8,700-ton nuclear-powered guided-missile submarine.
KCNA also referenced “new secret underwater weapon” R&D and missile-defense test.
North Korea says Kim inspected an 8,700-ton nuclear-powered guided-missile submarine.
KCNA also referenced “new secret underwater weapon” R&D and missile-defense test.
😱10
India’s first anti-terror policy to be released tomorrow
The Union government is finalising India’s first anti-terror policy, which will provide a template for all States to combat and respond to terror-related incidents
The Union government is finalising India’s first anti-terror policy, which will provide a template for all States to combat and respond to terror-related incidents
Key Issues in the Policy
- Digital Radicalisation: The policy addresses the increasing threat of online radicalisation, especially through social media platforms.
- Misuse of Open Borders: Concerns about the open border with Nepal and its exploitation by terrorists are highlighted.
- Foreign-Funded Conversion Networks: Networks funded by external entities that aim to radicalise individuals are a significant focus.
🔥7
🇨🇳 - Chinese car driver forced to drive at 115km/h for 4 hours straight, after his China-made smart car refused to stop or open doors.
Police escorted the man, cleared the road for him, and waited until the car ran out of fuel.
Police escorted the man, cleared the road for him, and waited until the car ran out of fuel.
🤣10
देवप्रस्थ
Reliance Industries,
Reliance resumes Russian oil imports
Reliance Industries has restarted buying discounted Russian crude oil. The company is sourcing barrels from suppliers not under sanctions. These shipments are heading to its refinery in Gujarat.
India's largest refiner contracted Aframax tankers from RusExport and is routing flows to a 660,000-barrel-a-day plant that supplies domestic customers.
Reliance Industries has restarted buying discounted Russian crude oil. The company is sourcing barrels from suppliers not under sanctions. These shipments are heading to its refinery in Gujarat.
India's largest refiner contracted Aframax tankers from RusExport and is routing flows to a 660,000-barrel-a-day plant that supplies domestic customers.
🔥11
देवप्रस्थ
Also, we observe "GOOD GOVERNANCE DAY" Today! 👓To commemorate the birth anniversary of Atal Bihari Vajpayee. 🎯Recognition: Padma Vibhushan, Best Parliamentarian (1994), Bharat Ratna (2015), Order of Ouissam Alaouite (Morocco)
This media is not supported in your browser
VIEW IN TELEGRAM
सरकारें आएंगी, जाएंगी, पार्टियां बनेंगी, बिगड़ेंगी मगर ये देश रहना चाहिए - अटल बिहारी वाजपेयी
❤14
44 year-old indian origin passes away in the hospital after waiting over 8 hours in the emergency room in Canadian hospital, due to negligence of hospital staff
He suffered extreme chest pain and suffered for 8 hours during which the nurses barely paid him attention. Then he passed away from cardiac arrest
He suffered extreme chest pain and suffered for 8 hours during which the nurses barely paid him attention. Then he passed away from cardiac arrest
🤬16
देवप्रस्थ
Video
Saar I'm good Endian, Plez Beliv Me, I'm high Quality Endian.
Endia has no sevik sense saar, Foreign country and foreign people are better 👅💦
Endia has no sevik sense saar, Foreign country and foreign people are better 👅💦
🤣19❤1
देवप्रस्थ
ever heard of him ?
Not your mistake, even admins of major geopolitics channels heard his name for the first time.
💯9
Pakistan's ISI and America's CIA have been running a concerted cyber warfare campaign within India for the last 15 years.
Between 2010 and 2014, the CIA utilized Pakistan as a proxy to execute cyber attacks in India.
During this period, the ISI developed a rudimentary cyber doctrine employing two primary methods. The first was website defacement, where government websites were hacked to display religious and political propaganda, anti-India slogans, and incitement regarding Kashmir.
The second strategy, deployed around 2013-14, involved phishing attacks using deceptive emails and fake servers. The objective was to steal passwords from government employees and leak them on social media platforms like Orkut and Facebook, causing institutional reputational damage.
The scenario changed significantly starting in 2015.
With the change in government in 2014 and a shift toward a more aggressive foreign policy, India's diplomatic profile began to rise globally, a development the CIA reportedly did not favor, preferring a docile India.
Consequently, the ISI, acting on behalf of the CIA, launched coordinated and professional cyber operations known as "Project Transparent Tribe" or APT 36 (Advanced Persistent Threats). This project targeted India's diplomatic missions, defense installations, and critical infrastructure using malware.
From 2015 to 2019, they utilized the "Watering Hole Attack" technique. This involved mapping websites frequently visited by Indian officials (defense, diplomatic, etc.) and infecting those specific sites to breach the officials' systems.
From 2020 to 2024, during the global COVID-19 lockdowns, the ISI and CIA initiated a "Cross-Platform Expansion." They targeted various operating systems, including Windows, Android, and Linux, exploiting the fact that the world had moved entirely to digital mediums. They tricked government officials into downloading fake applications to gain entry into their systems. The goal was not just to hijack the system, but to hijack the privilege of information access that specific officers held, shifting the focus towards intelligence collection.
In 2025, following "Operation Sindoor," dynamics shifted again. India had quietly undergone a digital revolution by migrating officials to the indigenous "BOSS" (Bharat Operating System Solutions) to reduce reliance on Western platforms and secure data. In response, the CIA and ISI began targeting BOSS using a technique called "Spear Phishing."
This involves sending fraudulent emails that appear to come from high-ranking officials (like a Secretary or Commissioner) containing a malicious PDF.
Two specific malwares are being used: "CURL," which copies downloadable information once the PDF is opened, and "XD," which encodes and transmits that data to ISI servers.
America's strategic objective here is not just intelligence gathering, but to discredit India's indigenous technology, portraying it as unsafe to ensure a continued market for
Western encrypted technologies and to create internal pressure against the use of Indian-made systems.
Between 2010 and 2014, the CIA utilized Pakistan as a proxy to execute cyber attacks in India.
During this period, the ISI developed a rudimentary cyber doctrine employing two primary methods. The first was website defacement, where government websites were hacked to display religious and political propaganda, anti-India slogans, and incitement regarding Kashmir.
The second strategy, deployed around 2013-14, involved phishing attacks using deceptive emails and fake servers. The objective was to steal passwords from government employees and leak them on social media platforms like Orkut and Facebook, causing institutional reputational damage.
The scenario changed significantly starting in 2015.
With the change in government in 2014 and a shift toward a more aggressive foreign policy, India's diplomatic profile began to rise globally, a development the CIA reportedly did not favor, preferring a docile India.
Consequently, the ISI, acting on behalf of the CIA, launched coordinated and professional cyber operations known as "Project Transparent Tribe" or APT 36 (Advanced Persistent Threats). This project targeted India's diplomatic missions, defense installations, and critical infrastructure using malware.
From 2015 to 2019, they utilized the "Watering Hole Attack" technique. This involved mapping websites frequently visited by Indian officials (defense, diplomatic, etc.) and infecting those specific sites to breach the officials' systems.
From 2020 to 2024, during the global COVID-19 lockdowns, the ISI and CIA initiated a "Cross-Platform Expansion." They targeted various operating systems, including Windows, Android, and Linux, exploiting the fact that the world had moved entirely to digital mediums. They tricked government officials into downloading fake applications to gain entry into their systems. The goal was not just to hijack the system, but to hijack the privilege of information access that specific officers held, shifting the focus towards intelligence collection.
In 2025, following "Operation Sindoor," dynamics shifted again. India had quietly undergone a digital revolution by migrating officials to the indigenous "BOSS" (Bharat Operating System Solutions) to reduce reliance on Western platforms and secure data. In response, the CIA and ISI began targeting BOSS using a technique called "Spear Phishing."
This involves sending fraudulent emails that appear to come from high-ranking officials (like a Secretary or Commissioner) containing a malicious PDF.
Two specific malwares are being used: "CURL," which copies downloadable information once the PDF is opened, and "XD," which encodes and transmits that data to ISI servers.
America's strategic objective here is not just intelligence gathering, but to discredit India's indigenous technology, portraying it as unsafe to ensure a continued market for
Western encrypted technologies and to create internal pressure against the use of Indian-made systems.
😱7
If I were to simply ask you about the activities that have been taking place in Bangladesh over the past week, what do you think the game plan is?
Is the objective of this process merely to present internal chaos within Bangladesh?
Absolutely not.
Whenever an intelligence agency observes such activities in its neighborhood, the first question that arises is: what is the ultimate objective of this entire game plan?
India’s external intelligence agency, the Research and Analysis Wing (R&AW), is viewing these activities in Bangladesh with a perspective that makes one thing very clear—something every ordinary citizen of India needs to understand.
The activities in Bangladesh are not just an internal problem or internal chaos; hidden behind this chaos is a massive signal regarding India's Siliguri Corridor.
Every internal chaos has an end objective, and here the goal is to plant chaotic activities in the Siliguri Corridor to demonstrate a capability to disrupt it.
There are many strategic spaces in the corridor they wish to exploit.
For this reason, R&AW has developed a "whole of government" approach to tackle this problem, collaborating with multiple stakeholders including the Indian Armed Forces, Military Intelligence, the Indian Air Force, and paramilitary forces.
India understands that the most urgent need in the Siliguri Corridor right now is to create a constant early warning coverage system. This system will detect every micro-level activity in the vicinity. This is being executed through three main avenues.
If any activity is attempted in these areas, it should be seen as part of a larger pattern of unfolding covert operations.
The critical task now is to shield these nodes because the adversary sitting in Bangladesh will try to sabotage this critical infrastructure bridges, railway junctions, fuel points, power points, and communication backbones.
It is crucial to understand that the internal chaos in Bangladesh is a diversionary tactic to build covert pressure.
This involves local smugglers, document forgers, safe houses, corrupt local fixers, and criminals—a "service pipeline" activated to destroy or sabotage infrastructure.
To counter this, India is focusing on reconnaissance to carefully observe choke points and schedules, checking penetration to prevent internal sabotage through preventive intelligence, and preparing for "deniable actions" where adversaries might try to disguise disruptions as accidents.
To prevent these "accidents" that are actually covert operations, a fusion of military intelligence, police, local networks, and human assets is at work.
Remember, the objective of the chaos in Bangladesh is to sabotage the Siliguri Corridor.
Is the objective of this process merely to present internal chaos within Bangladesh?
Absolutely not.
Whenever an intelligence agency observes such activities in its neighborhood, the first question that arises is: what is the ultimate objective of this entire game plan?
India’s external intelligence agency, the Research and Analysis Wing (R&AW), is viewing these activities in Bangladesh with a perspective that makes one thing very clear—something every ordinary citizen of India needs to understand.
The activities in Bangladesh are not just an internal problem or internal chaos; hidden behind this chaos is a massive signal regarding India's Siliguri Corridor.
The Siliguri Corridor is not just a narrow strip of land; if you understand its importance, you know it is a strategic mobility lifeline connecting Northeast India to the rest of the country.
At this moment, China and America are sitting in the Siliguri Corridor, specifically establishing their presence inside Bangladesh, trying to execute covert operations.
Their objective is not to choke the Siliguri Corridor because neither China nor America currently has the capability to do that but they definitely intend to slow it down. They want to plant chaos and create disruptions, utilizing the internal chaos in Bangladesh as a diversion.
Every internal chaos has an end objective, and here the goal is to plant chaotic activities in the Siliguri Corridor to demonstrate a capability to disrupt it.
There are many strategic spaces in the corridor they wish to exploit.
For this reason, R&AW has developed a "whole of government" approach to tackle this problem, collaborating with multiple stakeholders including the Indian Armed Forces, Military Intelligence, the Indian Air Force, and paramilitary forces.
India understands that the most urgent need in the Siliguri Corridor right now is to create a constant early warning coverage system. This system will detect every micro-level activity in the vicinity. This is being executed through three main avenues.
First is a Human Intelligence network involving locals, transport workers, and border village community elders to detect unusual activities.
Second is Technical Intelligence, where the military and intelligence agencies are increasing thermal and aerial observation.
Third is Field Reporting, where ground-level assets of the IB, R&AW, and Military Intelligence are working with the Border Security Force to establish a broad day-to-day picture.The adversary cannot choke the corridor, but they can target rail routes, highways, bridges, and infrastructure connecting the Northeast.
If any activity is attempted in these areas, it should be seen as part of a larger pattern of unfolding covert operations.
The critical task now is to shield these nodes because the adversary sitting in Bangladesh will try to sabotage this critical infrastructure bridges, railway junctions, fuel points, power points, and communication backbones.
It is crucial to understand that the internal chaos in Bangladesh is a diversionary tactic to build covert pressure.
The adversary does not need to send troops; they only need to activate local networks from within Bangladesh.
This involves local smugglers, document forgers, safe houses, corrupt local fixers, and criminals—a "service pipeline" activated to destroy or sabotage infrastructure.
To counter this, India is focusing on reconnaissance to carefully observe choke points and schedules, checking penetration to prevent internal sabotage through preventive intelligence, and preparing for "deniable actions" where adversaries might try to disguise disruptions as accidents.
To prevent these "accidents" that are actually covert operations, a fusion of military intelligence, police, local networks, and human assets is at work.
Remember, the objective of the chaos in Bangladesh is to sabotage the Siliguri Corridor.
🔥8❤1