Thursday, May 21, 2026

The Dark Side of Bill Gates’ Philanthropy: Bill Gates Urges Government to Implement Mandates for Digital India and Control on AI

Date:

The Dark Side of Bill Gates’ Philanthropy in Digital India

Are Bill Gates and his foundation truly working for the betterment of India, or are there darker intentions hidden beneath the guise of philanthropy? Many experts and critics have raised concerns about Bill Gates’ influence on India through his extensive philanthropic endeavors. One of the most significant concerns raised by critics is Gates’ alleged agenda to depopulate countries like India under the guise of philanthropy. By promoting initiatives like Aadhaar and vaccine mandates, Gates is accused of using the Indian population as guinea pigs for his experimental projects.

Is Bill Gates using philanthropy as a means to wield political power without democratic accountability? Critics suggest that Gates’ philanthropic efforts are not purely altruistic but rather a mechanism to consolidate control over various sectors such as health, agriculture, technology, and education. By shaping public policy through his foundation, Gates can influence global agendas without facing the scrutiny of democratic processes.

Critics highlight potential conflicts of interest in Gates’ investments, particularly in companies that may not align with public health objectives. This raises concerns about the true motivations behind Gates’ philanthropic endeavors and whether they are truly benefiting those in need.

Aadhaar and the Risks of Digital Identity

Bill Gates’ involvement in India is his push for the Aadhaar biometric identification system. While Aadhaar was sold to the public as a means to provide every Indian citizen with a unique digital identity, critics argue that it poses serious risks to privacy and security. Aadhaar assigns a unique 12-digit number to residents, requiring biometric data like fingerprints and retina scans. It has enrolled around 1.2 billion people, making it one of the largest biometric databases globally. 
By linking biometric data to various government services, Aadhaar has created a massive database that could potentially be exploited for surveillance or identity theft.

Bill Gates endorses Aadhaar scheme; says it doesn’t pose privacy issues

Bill and Melinda want other countries to adopt the Aadhaar scheme. To undertake this level of project in other countries, the World Bank and the Gates Foundation have reportedly roped in multi-billionaire Nandan Nilekani.

Bill Gates and the Gates Foundation are promoting the adoption of India’s Aadhaar scheme in other countries, citing its potential to improve governance and economic growth, despite concerns over privacy and data misuse.

Perhaps most alarming is Gates’ open declaration of India as an “experimental laboratory” for his initiatives. By treating the country as a testing ground for new technologies and policies, Gates is essentially putting the lives and well-being of millions of Indians at risk. The idea of using a developing nation as a guinea pig for unproven ideas is not only unethical but also dangerous.

The Aadhaar Card: Cybersecurity Issues with India’s Biometric Experiment

https://jsis.washington.edu/news/the-aadhaar-card-cybersecurity-issues-with-indias-biometric-experiment/

Bill Gates Wants Governments to Drive Digital Transformation in India

India’s economy was one of the fastest-growing in 2018, but a large part of its 1.1 billion people live in poverty and rely on government subsidies for survival. 

Despite its potential to modernize India’s bureaucracy, Aadhaar faces serious concerns. These include privacy threats due to data leaks, its use as an identification substitute creating new vulnerabilities, and ethical dilemmas regarding the use of data for artificial intelligence. These issues could turn Aadhaar into a surveillance tool, raising significant worries among citizens. The Unique Identification Authority of India (UIDAI), established as part of India’s Planning Commission, oversees Aadhaar’s implementation. The project, led by Nandan Nilekani from Infosys, was designed to simplify the process of accessing government benefits. Before Aadhaar, the poor faced complex paperwork and long wait times to secure aid. Now, Aadhaar simplifies access by linking to various services such as scholarships, gas subsidies, and bank accounts. 

Aadhaar’s significance is immense since it holds personal data for billions. However, since its start, it has encountered numerous security problems, resulting in significant data leaks. The UIDAI has often had to shut down fraudulent websites posing as official sites to collect personal data. In 2018, around 200 government websites inadvertently exposed personal information from Aadhaar, enabling people to access sensitive information easily online. The government even had to block thousands of officials caught accessing Aadhaar data without authorization. Reports also surfaced of individuals selling Aadhaar details on WhatsApp for small amounts, revealing major flaws within the system. 

Additionally, various mishaps have led to wide exposure of confidential information. For example, a state website leaked personal data of 1.6 million pension beneficiaries. The Center for Internet and Society reported that 130 million Aadhaar numbers were made public due to government error. Critics argue that these incidents reflect the government’s careless handling of citizen data, showing a lack of accountability for the repercussions faced by the public. 

Another issue arises from the push to use Aadhaar as the primary photo ID. Although originally designed for biometric authentication, its widespread adoption as a photo ID increases the chances of duplication or forgery, as it lacks traditional security features. As a result, the vulnerabilities associated with Aadhaar require serious scrutiny to ensure citizens’ privacy and security.

Dr. Usha Ramanathan on “Identity, Privacy, Data, and Our Lives”

Usha Ramanathan

Usha Ramanathan works on the jurisprudence of law, poverty and rights. She writes and speaks on issues that include the nature of law, the Bhopal Gas Disaster, mass displacement, eminent domain, civil liberties including the death penalty, beggary, criminal law, custodial institutions, the environment, and the judicial process. She has been tracking and engaging with the UID project and has written and debated extensively on the subject. In July-September 2013, she wrote a 19-part series on the UID project that was published in The Statesman, a national daily.

Her work draws heavily upon non-governmental experience in its encounters with the state; a 6 year stint with a law journal (Supreme Court Cases) as reporter from the Supreme Court; and engagement with matters of law and public policy.

She was a member of: the Expert Group on Privacy set up by the Planning Commission of India which gave in its report in October 2012; a committee (2013-14) set up in the Department of Biotechnology to review the Draft Human DNA Profiling Bill 2012; and the Committee set up by the Prime Minister’s Office (2013-14) to study the socio-economic status of tribal communities which gave its report to the government in 2014

The Centre for Law & Policy Research hosted Dr. Usha Ramanathan for a talk on “Identity, Privacy, Data and Our Lives,” emphasizing concerns about the Aadhaar scheme. She criticized how Aadhaar was made mandatory without proper legal backing and pointed out ongoing issues related to data security and citizen dignity. Dr. Ramanathan highlighted the hardships faced by individuals who had to authenticate through Aadhaar to access essential services, mentioning that 18 citizens died due to complications with Aadhaar.

She explained that the Aadhaar scheme transitioned from a unique identity project to an identification project, where the government exercises control over citizens using unique identification numbers. Jayna Kothari shared her experience representing transgender activists in Aadhaar-related legal issues, noting that the collection of demographic data could lead to exclusion and surveillance of transgender people. Mr. Kiran from the ‘Save the Internet’ Foundation warned about the security risks of Aadhaar technology being exploited by corporations.

The various identification cards and Aadhaar numbers are in use. The government claims that making Aadhaar mandatory ensures that subsidies reach those in need; however, many people do not apply for any government subsidies. There are both advantages and disadvantages to this mandatory system. The government promises to transfer money to verified accounts, enhancing security. 

Initially, Aadhaar was introduced as an 11-digit unique number to easily identify individuals. It is important to differentiate between identity and identification projects; Aadhaar identifies but does not serve as proof of identity. Other IDs [Ration Card, Passport, Voter ID, PAN Card, Driving License, Birth Certificate, etc..] are required to prove one’s identity.

Now, what happens inside the UIDAI is, it sends information to the Central Identities Data Repository (CIDR), which checks whether the UID belongs to us or not. This system is completely independent of our identity.

Therefore, the identification changes, and we get full control over usage. Another thing is that this system is a way to shut down government settings through technology. This is very important. People have noticed that corporate tax and other matters are being handed over to technology companies holding our identities.

This project has been given to biometric companies and other tech companies so they can experiment on all the people in this country, from Shah Rukh Khan to the common man. If you visit, you will see that beneficiaries face difficulties in transferring money through this system because the biometrics are not functioning properly. Even after August 11, 2015, UIDAI itself has stated on its website that it has opened a biometric computer center for research because India’s population diversity makes biometrics a challenge. So, after few years, this is still an ongoing issue.

Usha has a basic question for us: many articles have been written in newspapers about Aadhaar, and viewers should read and research them. The government can reach me through Aadhaar, but it can also access others’ data via police stations, passport details, track phone numbers, or conduct surveillance. They may do these things, but what additional risks does this number pose? I feel it has freed me from the troubles faced by common people. All our identity proofs, such as passports or office numbers, are one thing. The other is, if you carefully read this bill, you will see it states that UID can decide when to suspend or deactivate any number.

Usha has a basic question for us: many articles have been written in newspapers about Aadhaar, and viewers should read and research them. The government can reach me through Aadhaar, but it can also access others’ data via police stations, passport details, track phone numbers, or conduct surveillance. They may do these things, but what additional risks does this number pose? I feel it has freed me from the troubles faced by common people. All our identity proofs, such as passports or office numbers, are one thing. The other is, if you carefully read this bill, you will see it states that UID can decide when to suspend or deactivate any number.

This is important because if someone dies or is no longer using the number, it should not be used by anyone else, so it is deactivated. However, this power is vaguely defined because it only says they can activate or deactivate the number. We consider death as simple enough to remove the number from the database. After that, the number can be deactivated. Such provisions could be misused in political situations and create difficulties for political divisions and, especially, poor people.

Dr. Usha Ramanathan concluded by highlighting the significance of citizen activism against the Aadhaar project and expressed hope that the upcoming Supreme Court decision on Aadhaar could restore democratic principles, urging that the project be viewed as a means to convert citizens into consumers.

Aadhaar Misuse Timeline

2018

  • January 2018: Reports emerged of a data breach where access to the Aadhaar database was being sold for a small sum, highlighting security vulnerabilities. This breach allowed access to personal details like names, addresses, photos, phone numbers, and emails. The Unique Identification Authority of India (UIDAI) initiated a police probe in response.
  • January 2018: The Tribune newspaper reported on the ease of accessing Aadhaar data, leading to the UIDAI blocking 5,000 officials from accessing the portal.
  • January 2018: Three Gujarat government websites were found to have exposed Aadhaar details publicly.
  • March 2018: A vulnerability in the Indane Gas website exposed Aadhaar and personal data of enrolled individuals.
  • March 2018: An Indian security researcher noted that a vulnerability in the website of Indane Gas, an Indian-government owned corporation supplying gas cylinders for domestic cooking, had resulted in exposing Aadhaar and personal data of every person enrolled with the Aadhaar database, and not just customers of Indane.
  • April 2018: A data leak of Andhra Pradesh women’s scheme data, including Aadhaar numbers, was reported.
  • May 2018: A government website in Andhra Pradesh leaked Aadhaar data linked to caste, religion, bank accounts, and personal details.
  • September 2018: The chairman of the Telecom Regulatory Authority of India (TRAI), R.S. Sharma, shared his Aadhaar number on Twitter, challenging misuse. His personal information was then accessed and disclosed, including his phone number, address, and other details.
  • September 2018: The Supreme Court upheld the constitutional validity of Aadhaar but limited its mandatory us

2020

  • The First American Financial Corp. data breach, discovered in 2019, exposed an astonishing 885 million records, affecting many individuals and exposing sensitive information.
  • The Verifications.io data breach, uncovered in early 2019, emerged as a striking example of the risks associated with data management and verification services. This incident exposed approximately 800 million records, marking it as one of the most significant data leaks from a single source.
  • In April 2019, Justdial, one of India’s leading local search engines, experienced a security lapse due to an unprotected API endpoint. This vulnerability resulted in the exposure of sensitive information belonging to nearly 100 million users, including names, mobile numbers, email addresses, physical addresses, and additional user profile details.
  • In January 2020, Unacademy, one of India’s largest online learning platforms, experienced a cybersecurity breach affecting over 11 million users. Cyber attackers gained unauthorized access to sensitive user data including email addresses, usernames, hashed passwords, account registration dates, and detailed user activity logs.

2024

  • October 2023: The Indian Council of Medical Research (ICMR) data breach exposed the COVID-19 testing data of 815 million individuals.

2023

  • February 2024: boAt, a prominent Indian consumer electronics and lifestyle brand, experienced a cybersecurity incident leading to the exposure of sensitive personal data for over 7.5 million customers.
  • February 2024: Hathway, a leading Indian Internet Service Provider (ISP) and cable operator, experienced a major security breach that compromised the personal information of over 41.5 million customers.
  • July 2024: Bharat Sanchar Nigam Limited (BSNL), one of India’s largest state-owned telecommunications providers, suffered a data breach, compromising the sensitive data of millions of users.
  • June 2024: Telangana Police’s Hawk Eye mobile application, designed for citizens to report incidents and crimes, experienced a significant cybersecurity breach, compromising the personal data of approximately 200,000 users.
  • May 15, 2025: Alex created and updated the biggest data breaches in India, including the Aadhaar data breach.

Recent Aadhaar Misuse Cases in 2025

Several recent cases of Aadhaar misuse have been reported in 2025, highlighting the ongoing threat of cyber fraud and identity theft. These cases demonstrate various methods employed by scammers and the significant financial and personal consequences for victims.

One prominent case involved an 86-year-old woman in Mumbai who lost over ₹20 crore to fraudsters. The scammers, posing as police officials, convinced her that her Aadhaar card was misused and coerced her into transferring money under the threat of legal action against her and her family. The victim was placed under “digital arrest,” preventing her from discussing the situation with others. The police have since launched an investigation and arrested the individuals involved.

Another case involved a software engineer in Bengaluru who was defrauded of ₹11.83 crore. Cybercriminals impersonated TRAI officers and Mumbai Police officers, falsely claiming his Aadhaar card was misused in a money laundering case. They extracted personal and bank details, ultimately siphoning off a large sum of money.

In Uttar Pradesh, a group of four young men were arrested for tampering with Aadhaar systems. They manipulated the biometric data of over 1,500 Aadhaar cardholders. The group, led by a B.Tech dropout, had a network of “retailers” across multiple states who collected documents from individuals seeking to alter their Aadhaar details illegally. They charged between ₹2,000 and ₹5,000 per alteration.

The cases reveal common tactics employed by scammers to exploit Aadhaar cardholders. These include:

Common Tactics and Methods Used by Scammers

A man in Hyderabad was defrauded of ₹12 lakh in a parcel scam involving the misuse of his Aadhaar number. Fraudsters falsely informed him about the misuse of his Aadhaar for a courier from Mumbai to Saudi Arabia, purportedly containing illegal substances. They then coerced him into transferring funds under the guise of verifying his innocence.

How to Protect Yourself

  • Impersonation: Scammers often impersonate officials from government agencies like the police, TRAI, or UIDAI to gain trust and create a sense of urgency.
  • Threats and Coercion: Victims are threatened with legal action, arrest, or financial penalties to pressure them into providing personal and financial information or transferring money.
  • Digital Arrest: Scammers isolate victims by placing them under “digital arrest,” preventing them from seeking help or discussing the situation with others.
  • Social Engineering: Scammers use psychological manipulation, creating a sense of panic and confusion to cloud the victim’s judgment.
  • Fake Websites and Documents: Scammers create fake websites that mimic official portals and generate fraudulent documents to alter Aadhaar data.
  • Be Vigilant: Remain cautious of unsolicited calls, messages, and emails, especially those requesting personal information or financial details.
  • Verify Identities: Independently verify the identity of callers or senders by contacting the relevant organization through official channels.
  • Never Share Sensitive Information: Avoid sharing Aadhaar numbers, OTPs, or banking credentials with anyone over the phone or online unless you are certain of their legitimacy.
  • Report Suspicious Activity: Immediately report any suspected Aadhaar misuse or fraud to the UIDAI helpline (1947) or the cybercrime portal (cybercrime.gov.in).
  • Monitor Aadhaar Usage: Regularly check your Aadhaar authentication history through the myAadhaar portal to identify any unauthorized transactions.
  • Lock Biometrics: Consider locking your Aadhaar biometrics to prevent misuse, even if someone has access to your Aadhaar details.
  • Attest Photocopies: When providing Aadhaar photocopies, attest them with your signature, the purpose, and the date.
  • Use Masked Aadhaar: Utilize masked Aadhaar cards where the first 8 digits are hidden.

Ref:

Cyber fraud, particularly through digital arrests, has become increasingly prevalent, with victims falling prey to these scams every day. [https://www.indiatvnews.com/technology/news/aadhaar-card-misuse-fraud-cost-a-software-engineer-12-crore-2024-12-24-967707]

  1. Mumbai woman gets a fake call about the misuse of her Aadhaar card, loses over Rs 20 crore in the scam. [https://www.indiatoday.in/technology/news/story/mumbai-woman-gets-fake-call-about-misuse-of-her-aadhaar-card-loses-over-rs-20-crore-in-scam-2694478-2025-03-17]
  2. The Aadhaar card is one of the most essential documents for an Indian resident. [https://cleartax.in/s/misuse-of-aadhaar-card]
  3. Scam in Hyderabad: Man loses ₹12 lakh over ‘misuse’ of Aadhaar Card after getting call from fake FedEx official. [https://www.livemint.com/news/india/scam-alert-hyderabad-man-defrauded-of-12-lakh-in-fedex-aadhar-card-cyber-police-cyber-crimes-fedex-official-11720339952091.html]
  4. Is someone using your Aadhaar without your knowledge? Here is how to check. [https://www.indiatoday.in/technology/tech-tips/story/is-someone-using-your-aadhaar-without-your-knowledge-here-is-how-to-check-2633968-2024-11-15]
  5. Woman loses ₹20 crores in Aadhaar ‘digital arrest’ scam: Why do people keep falling in traps? [ https://m.economictimes.com/news/new-updates/woman-loses-rs-20-crore-in-aadhaar-digital-arrest-scam-why-do-people-keep-falling-in-traps/articleshow/119105876.cms ]
  6. In yet another Aadhaar fraud case, four young men in their 20s were arrested in Uttar Pradesh for tampering with Aadhaar’s systems. [ https://www.medianama.com/2025/04/223-aadhaar-fraud-uttar-pradesh-1500-cards-compromised/ ]
  7. India probes breach of biometric identity database. [https://www.aljazeera.com/news/2018/1/5/india-probes-breach-of-biometric-identity-database]
  8. India’s Supreme Court upholds the legality of the Aadhaar program. [ https://www.cnn.com/2018/09/26/asia/india-aadhaar-ruling-intl]
  9. Digital Disasters: The Biggest Data Breaches of All Time. [ https://vipre.com/blog/digital-disasters-the-biggest-data-breaches-of-all-time/?srsltid=AfmBOoorvxSwi0sJXNOc2oRA1avKX6wakMWJIRzriZqNeEvrSwhUHzLv]
  10. Learn about the biggest data breaches in India, why India is an attractive target for cyber-attacks,, and how these could have been prevented. [ https://www.corbado.com/blog/data-breaches-India]
  11. Learn about the biggest data breaches in India, why India is an attractive target for cyber-attacks, and how these could have been prevented. [ https://www.corbado.com/blog/data-breaches-India ]
  12. Wikipedia and Youtube -image

A chronological timeline of events that led to the Supreme Court verdict:

*January 2009: Planning Commission notification on UIDAI.

* 2010-2011: National Identification Authority of India Bill, 2010 introduced.

* November 2012:  Retired Justice K.S. Puttaswamy filed a petition in the Supreme Court, challenging the validity of Aadhaar, arguing it violated fundamental rights to equality and privacy

* November 2013: Supreme Court orders all states and Union Territories be impleaded as respondents.

*3 March, 2016: The Aadhaar Bill, 2016 was introduced in Lok Sabha; later passed as a Money Bill.

*May 2017: Former Union minister and Congress leader Jairam Ramesh moves Supreme Court challenging the Centre’s decision to treat Aadhaar as a money bill.

*24 August, 2017: A nine-judge Supreme Court bench rules that the right to privacy is a fundamental right.

*15 December 2017: Supreme Court extends the deadline for mandatory linking of Aadhaar with various services and welfare schemes till 31 March 2018.

*17 January 2018: A five-judge bench of the Supreme Court begins hearing petitions on Aadhaar.

*25 January 2018: Supreme Court asks the Chhattisgarh High Court to modify in 10 days its order directing all trial courts in the state to mandatorily accept copies of the Aadhaar card for releasing an accused on bail.

*19 February 2018: Delhi BJP leader Ashwini Kumar Upadhyay seeks direction from the Election Commission to take appropriate steps to implement an ‘Aadhaar-based election voting system’.

*21 February 2018: Supreme Court says the alleged defect that citizens’ biometric details under the Aadhaar scheme were being collected without any law, could be cured by subsequently bringing a statute

*7 March 2018: Supreme Court says Aadhaar number not mandatory for enrollment of students in all India exams.

*13 March 2018: Supreme Court extends the 31 March deadline for Aadhaar linking till it gives its order.

*22 March 2018: UIDAI CEO says breaking the Aadhaar encryption may take “more than the age of the universe for the fastest computer on earth”.

*28 March 2018: Social activist Reshma Prasad seeks direction from the Centre to create a separate third-gender category option on PAN cards for transgenders.

*3 April 2018: The Centre tells the Supreme Court that the Aadhaar law is just, fair, and reasonable.

*17 April 2018: Supreme Court raises concerns that there is a threat of Aadhaar data misuse.

*25 April 2018: Supreme Court questions Centre on mandatory seeding of Aadhaar with mobile.

*10 May 2018: Supreme Court reserves verdict.

*26 September 2018: Supreme Court upholds constitutional validity of Aadhaar but strikes down certain provisions including its linking with bank accounts, mobile phones, and school admissions.

Should Private Companies Now Use Aadhaar Face Authentication In Apps?

Despite numerous shortcomings in the Aadhaar system, the ministry has introduced the Aadhaar Good Governance portal to enhance the approval process for Aadhaar authentication requests. This follows an amendment that reinstates access to the unique ID verification mechanism for private organizations.

Aadhaar holders in India will soon be able to share their identity electronically through a new mobile app, which will replace the need for photocopies. The Unique Identification Authority of India (UIDAI) is developing this app to allow users to share either a full or masked version of their Aadhaar information via a QR code. This system aims to streamline processes by enabling home updates for personal information like address, phone number, name, and date of birth. The only requirement for users will be to provide their fingerprints and iris scans at enrollment centers. 

UIDAI plans to have this home update protocol ready by November. The initiative seeks to reduce paperwork, minimize the risk of document fraud, and expedite the process for citizens. UIDAI will extract data directly from official records such as birth certificates, driving licenses, passports, PAN cards, PDS, and MNREGA. There are also discussions to link electricity bill databases to aid in verifying addresses. 

According to UIDAI CEO Bhuvnesh Kumar, around 2,000 of the existing enrollment machines are being transitioned to use the new app. This QR code system will facilitate tasks like hotel check-ins, property transactions, and identity verifications on trains. The QR code is designed to enhance security by allowing users to control their data and share it only with consent. UIDAI is encouraging state governments to adopt this method in property registration offices where document fraud is often an issue. 

In addition, UIDAI is focusing on updating biometric records for children, requiring updates at ages five to seven and again at 15 to 17. Officials estimate that there are approximately eight crore pending first-round updates and ten crore pending second-round updates for children’s records. Moreover, security agencies, hotels, and other service providers are in discussions with UIDAI to join the new system. 

They claim that UIDAI’s new app and system aim to improve identity verification processes while maintaining privacy and user control over personal data. These changes are intended to make Aadhaar updates more accessible and secure, ultimately benefiting[I should say experimenting] Indian citizens by modernizing their identification methods.

Ref: https://www.ndtvprofit.com/amp/nation/private-companies-can-now-use-aadhaar-face-authentication-in-apps

Online Data Breach: Bill Gates’ Push for Government Mandates

Should Indian Railways require Aadhar authentication for Tatkal ticket bookings?

Indian Railways is making significant changes to the Tatkal ticket booking system to promote transparency and fairness, starting July 1, 2025. All online Tatkal bookings will require mandatory Aadhaar authentication. Passengers will need to link their Aadhaar number with their IRCTC user profile to book tickets. Additionally, OTP (One-Time Password) verification will be necessary at reservation counters and for bookings done through agents starting July 15, 2025.

Other key points include that Aadhaar authentication becomes mandatory for online bookings starting July 1, 2025, and for all bookings from counters and agents starting July 15, 2025. The Ministry of Railways encourages all passengers to update their IRCTC profiles with their Aadhaar details to avoid issues.

Frequently asked questions include inquiries about the recent changes, the requirement for Aadhaar verification, and the booking restrictions for agents. In summary, these new rules are designed to improve the booking experience for genuine passengers while reducing misuse of the Tatkal ticket system.

Overall, the recent changes in online security measures and the push for government mandates on online data security reflect a growing awareness of the importance of protecting personal information in the digital age. 

Stay informed about the latest updates to make sure your privacy is a top priority and protect your data right now.

Also Read:

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related articles

Kejriwal and Sanjay Singh face trouble over ‘insulting’ Judge Swaran Kanta Sharma; what happened in the High Court?

A double bench of the Delhi High Court on Tuesday issued notices to Aam Aadmi Party (AAP) national...

Rahul Gandhi should apologize; BJP furious over ‘PM traitor’ remark, says he’s remote controlled

Lok Sabha Leader of the Opposition Rahul Gandhi has referred to Prime Minister Narendra Modi and Union Home...

Is your home suitable for installing solar panels? Consider these factors before installing them.

Seeing the benefits of solar energy, everyone is now installing solar panels. Although solar energy system installations have...

Are your children playing outside during summer vacation? Don’t ignore these 9 signs of heat exhaustion.

As soon as summer vacation begins, children enjoy spending more time playing outside, but the intense sun, hot...
news-1701

sabung ayam online

yakinjp

yakinjp

rtp yakinjp

slot thailand

yakinjp

yakinjp

yakin jp

yakinjp id

maujp

maujp

maujp

maujp

sabung ayam online

sabung ayam online

judi bola online

sabung ayam online

judi bola online

slot mahjong ways

slot mahjong

sabung ayam online

judi bola

live casino

sabung ayam online

judi bola

live casino

SGP Pools

slot mahjong

sabung ayam online

slot mahjong

SLOT THAILAND

berita 128000726

berita 128000727

berita 128000728

berita 128000729

berita 128000730

berita 128000731

berita 128000732

berita 128000733

berita 128000734

berita 128000735

berita 128000736

berita 128000737

berita 128000738

berita 128000739

berita 128000740

berita 128000741

berita 128000742

berita 128000743

berita 128000744

berita 128000745

berita 128000746

berita 128000747

berita 128000748

berita 128000749

berita 128000750

berita 128000751

berita 128000752

berita 128000753

berita 128000754

berita 128000755

artikel 128000821

artikel 128000822

artikel 128000823

artikel 128000824

artikel 128000825

artikel 128000826

artikel 128000827

artikel 128000828

artikel 128000829

artikel 128000830

artikel 128000831

artikel 128000832

artikel 128000833

artikel 128000834

artikel 128000835

artikel 128000836

artikel 128000837

artikel 128000838

artikel 128000839

artikel 128000840

artikel 128000841

artikel 128000842

artikel 128000843

artikel 128000844

artikel 128000845

artikel 128000846

artikel 128000847

artikel 128000848

artikel 128000849

artikel 128000850

article 138000756

article 138000757

article 138000758

article 138000759

article 138000760

article 138000761

article 138000762

article 138000763

article 138000764

article 138000765

article 138000766

article 138000767

article 138000768

article 138000769

article 138000770

article 138000771

article 138000772

article 138000773

article 138000774

article 138000775

article 138000776

article 138000777

article 138000778

article 138000779

article 138000780

article 138000781

article 138000782

article 138000783

article 138000784

article 138000785

article 138000816

article 138000817

article 138000818

article 138000819

article 138000820

article 138000821

article 138000822

article 138000823

article 138000824

article 138000825

article 138000826

article 138000827

article 138000828

article 138000829

article 138000830

article 138000831

article 138000832

article 138000833

article 138000834

article 138000835

article 138000836

article 138000837

article 138000838

article 138000839

article 138000840

article 138000841

article 138000842

article 138000843

article 138000844

article 138000845

article 138000786

article 138000787

article 138000788

article 138000789

article 138000790

article 138000791

article 138000792

article 138000793

article 138000794

article 138000795

article 138000796

article 138000797

article 138000798

article 138000799

article 138000800

article 138000801

article 138000802

article 138000803

article 138000804

article 138000805

article 138000806

article 138000807

article 138000808

article 138000809

article 138000810

article 138000811

article 138000812

article 138000813

article 138000814

article 138000815

story 138000816

story 138000817

story 138000818

story 138000819

story 138000820

story 138000821

story 138000822

story 138000823

story 138000824

story 138000825

story 138000826

story 138000827

story 138000828

story 138000829

story 138000830

story 138000831

story 138000832

story 138000833

story 138000834

story 138000835

story 138000836

story 138000837

story 138000838

story 138000839

story 138000840

story 138000841

story 138000842

story 138000843

story 138000844

story 138000845

article 138000726

article 138000727

article 138000728

article 138000729

article 138000730

article 138000731

article 138000732

article 138000733

article 138000734

article 138000735

article 138000736

article 138000737

article 138000738

article 138000739

article 138000740

article 138000741

article 138000742

article 138000743

article 138000744

article 138000745

article 208000456

article 208000457

article 208000458

article 208000459

article 208000460

article 208000461

article 208000462

article 208000463

article 208000464

article 208000465

article 208000466

article 208000467

article 208000468

article 208000469

article 208000470

journal-228000376

journal-228000377

journal-228000378

journal-228000379

journal-228000380

journal-228000381

journal-228000382

journal-228000383

journal-228000384

journal-228000385

journal-228000386

journal-228000387

journal-228000388

journal-228000389

journal-228000390

journal-228000391

journal-228000392

journal-228000393

journal-228000394

journal-228000395

journal-228000396

journal-228000397

journal-228000398

journal-228000399

journal-228000400

journal-228000401

journal-228000402

journal-228000403

journal-228000404

journal-228000405

article 228000376

article 228000377

article 228000378

article 228000379

article 228000380

article 228000381

article 228000382

article 228000383

article 228000384

article 228000385

article 228000386

article 228000387

article 228000388

article 228000389

article 228000390

article 228000391

article 228000392

article 228000393

article 228000394

article 228000395

article 228000396

article 228000397

article 228000398

article 228000399

article 228000400

article 228000401

article 228000402

article 228000403

article 228000404

article 228000405

article 228000406

article 228000407

article 228000408

article 228000409

article 228000410

article 228000411

article 228000412

article 228000413

article 228000414

article 228000415

article 228000416

article 228000417

article 228000418

article 228000419

article 228000420

article 228000421

article 228000422

article 228000423

article 228000424

article 228000425

article 228000426

article 228000427

article 228000428

article 228000429

article 228000430

article 228000431

article 228000432

article 228000433

article 228000434

article 228000435

article 238000461

article 238000462

article 238000463

article 238000464

article 238000465

article 238000466

article 238000467

article 238000468

article 238000469

article 238000470

article 238000471

article 238000472

article 238000473

article 238000474

article 238000475

article 238000476

article 238000477

article 238000478

article 238000479

article 238000480

article 238000481

article 238000482

article 238000483

article 238000484

article 238000485

article 238000486

article 238000487

article 238000488

article 238000489

article 238000490

article 238000491

article 238000492

article 238000493

article 238000494

article 238000495

article 238000496

article 238000497

article 238000498

article 238000499

article 238000500

article 238000501

article 238000502

article 238000503

article 238000504

article 238000505

article 238000506

article 238000507

article 238000508

article 238000509

article 238000510

article 238000511

article 238000512

article 238000513

article 238000514

article 238000515

article 238000516

article 238000517

article 238000518

article 238000519

article 238000520

update 238000492

update 238000493

update 238000494

update 238000495

update 238000496

update 238000497

update 238000498

update 238000499

update 238000500

update 238000501

update 238000502

update 238000503

update 238000504

update 238000505

update 238000506

update 238000507

update 238000508

update 238000509

update 238000510

update 238000511

update 238000512

update 238000513

update 238000514

update 238000515

update 238000516

update 238000517

update 238000518

update 238000519

update 238000520

update 238000521

sumbar-238000396

sumbar-238000397

sumbar-238000398

sumbar-238000399

sumbar-238000400

sumbar-238000401

sumbar-238000402

sumbar-238000403

sumbar-238000404

sumbar-238000405

sumbar-238000406

sumbar-238000407

sumbar-238000408

sumbar-238000409

sumbar-238000410

news-1701