BJP IT cell official tweets: Shoot Anti National JNU students & Prof; later deletes it

New Delhi, Mar 9: After posters offering bounty on JNUSU president Kanhaiya Kumar, now a BJP worker in Gujarat has said that the JNU students and professors should be shot to close the whole matter.

According to a Indian Express report, "Sanjay Rathod, IT cell convener of BJP's Junagadh unit, posted on his Twitter handle Tuesday: "Shoot Anti National JNU students & Proff and close the chapter. But the problem is that Our Govt doesn't allow to kill Dogs #WakeUpIndia".

'Shoot anti-national JNU students'.
At 3.30 am, two minutes before his "shoot" suggestion, Rathod, 35, posted, "#Wake-UpIndia or it will be too late. There are big forces who want to break India. They are funding #antinationals & paid media."

Also read:JNU row: Delhi govt contemplating defamation case against TV channels

In yet another tweet in Hindi, he wrote, "Kal se jo 10 aatankwadi Gujarat mein ghuse hain, unme se kaun kiska beta, beti, bahu hai, yeh abhi se tay kar lein, baad mein Ishrat Jahan ki tarah lafda nahin chahiye.
(Decide son, daughter, daughter-in-law among the 10 terrorists who infiltrated Gujarat yesterday. Don't want an affair like Ishrat Jahan later.)"

Rathod's Twitter account says he is a "social media expert, director Gujarati TV, IT cell convener of Junagadh BJP and a member of state working committee of the Bharatiya Janata Yuva Morcha (BJYM). He works as a public relations consultant with an agency in Rajkot.

The tweets were later found deleted though Rathod told the daily that he stands by what was said on his Twitter account.

Kanhaiya Kumar was booked by Delhi Police for sedition after he along with other students allegedly raised "anti-India" slogans last month.

A day after Kanhaiya attacked Narendra Modi dispensation and RSS for implicating him in the sedition case, JNU students' union president Kanhaiya Kumar on Friday addressed the media saying attempts are being made to malign JNU.

OneIndia News

Please Wait while comments are loading...