Pakistan, China Gather Critical Data on J-K Projects, Raising Security Concerns Over Terror Aid

Spread the love

The recent intelligence reveals a concerning escalation in terrorist activities and infiltration attempts in the Jammu region, with Pakistan’s intelligence agency and the Pakistani Army reportedly playing a significant role.

Collaboration between Pakistan and Chas also surfaced, suggesting that they are gathering sensitive data on strategic infrastructure in Jammu and Kashmir, such as tunnels, bridges, and other critical installations. This intelligence-gathering could facilitate future infiltration efforts or attacks, adding another layer of complexity to the security landscape in the region.

 

Approximately 20 terrorists have reportedly received specialized training in Pakistan-occupied Kashmir (PoK) in areas such as Hazira and Kali Ghati, under the supervision of Pakistani Army SSG commandos and ISI operatives. The training involved modern warfare techniques like GPS technology, map reading, jungle warfare, and first aid, further enhancing the operatives’ capabilities.

 

With winter approaching and cross-border movement becoming more challenging, Pakistan is reportedly attempting to maximize infiltration into Jammu before severe weather conditions set in. Notable Lashkar-e-Taiba figures like Abu Hamza, Abu Mosaib, and Kari Saifullah have been identified as being involved in these efforts, as well as a commander known as Abu Mohammed. Surveillance operations using drones and reconnaissance missions along the Line of Control (LoC) are reportedly active from PoK regions such as Kotli, Muzaffarabad, and Rawalakot.

 

These infiltration attempts and Border Action Team (BAT) operations are being actively supported by Pakistani forces, who are deploying alongside terrorists near the LoC. This increased collaboration and preparation suggest a potentially heightened threat in the coming months. Given the situation, Indian security forces are likely on high alert, and more robust monitoring and counter-infiltration operations are anticipated to curb these incursions and safeguard key infrastructures.

 

Related posts

Leave a Comment

1 + 8 =