Shankar Singh

Shankar Singh is the commander of the North Bihar Liberation Army and a former member of the Bihar Legislative Assembly.[1] He was nominated as a candidate of the Lok Janshakti Party.[2]

Shankar Singh
Member of Bihar Legislative Assembly
In office
February 2005  November 2005
Preceded byBima Bharti
Succeeded byBima Bharti
ConstituencyRupauli
Personal details
Other political
affiliations
Lok Janshakti Party
Spouse(s)Pratima Kumari
OccupationCommander of the North Bihar Liberation Army

Personal life

Shankar Singh is married to Pratima Kumari, who is the district chairwoman of the Hindustani Awam Morcha in Purnia.[3]

Career

North Liberation Army

Following the murder of Butan Singh in 2000,[4] the command of the North Liberation Army was taken over by Shankar Singh. The North Liberation Army was a rajput militia formed by Butan Singh in opposition to the growing influence of Pappu Yadav in Purnia. Under Shankar Singh, the militia became politically influential by threatening and influencing voters as well as through booth capturing in the region. Upper caste candidates began seeking its support for their campaigns. The militia also groomed and supported Uday Pappu Singh who was inducted into the Bharatiya Janata Party[5] and became the member of parliament from the Purnia constituency for two terms from 2004–2014.[6][7] Shankar Singh was granted membership of the Lok Janshakti Party and stood as its candidate from the Rupauli constituency where he was elected in the in February 2005.[8]

Political influence

gollark: `pass` is the password input, `salt` is the salt, `iter` is how many times to run it (you want a value which makes it fairly slow but not so much that server admins will consume your soul), `dklen` is the... output key length? I'm not sure.
gollark: Er, you probably want that, yes.
gollark: I have no idea about that specific API, I'll check.
gollark: Modern password hashing functions are designed to be slow to run (and to be fastest on general-purpose computing hardware and not ASICs) to mitigate this sort of thing.
gollark: If you do *not* use that, then people can store a bunch of precalculated mappings from hashes to original passwords (rainbow tables, yes) and work out the original.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.