In the modern times, to carry out an organized religio-ethnic cleansing and then to get away despite the present day media watching every event is indeed a great feat by any Goebellian standards. Keeping aside the question as to who was the prime mover of the Gujarat pogrom, the recent pronouncements of the special courts trying the major cases of violence like Gulberg Society, Naroda Patiya, Best Bakery, Sardarpura etc would undisputedly establish that the violence was lead by the saffron brotherhood. In the Naroda Patiya case, even the minister of Modi’s Government Mayaben Kodnani and the VHP leading activist like Babu Bajrangi etc have been convicted. Yet despite these and many other irrefutable evidence, the concerted effort by the rioters to paint the violence as a spontaneous reaction of the angry Hindu masses to the “barbaric” attack of the Muslims killing 59 Hindus in Godhra has found many takers and paid handsome dividends to BJP which presided over the violence.
The perception of the common man to willy-nilly accept the action-reaction theory was primarily because of the voluminous propaganda material that the rioters threw at the common man without any effective counter by the other political establishments in the country. We have tried to research the mode and manner adopted by the saffron brotherhood to dominate the cyberspace, and to our shock and surprise, we discovered that Narendra Modi through his closest aides has created a network of websites to disseminate propaganda on variety of topics and subjects.
India272.com, GujaratRiots.com, NitiCentral.com, BJPOne.com etc – All these websites are being run by Rajesh Jain’s team who is officially appointed by Narendra Modi to run his IT campaign. Their common roots can be seen from the fact that each one of these websites reside on the same server with the IP Address 184.108.40.206. Rajesh Jain’s blog Emergic.Org is also one of these several sites sitting on this server. India272.com which is regularly endorsed by Narendra Modi on twitter also sits on this same server.