Today, on 19.07.2025, searches at multiple locations across Kashmir were conducted by CIK officers after obtaining search warrant from the Hon’ble Court of Special Judge, Designated under NIA Act, Srinagar in a terror linked case FIR No. 07/2023 U/S 13, 18, 38, 39 ULA(P) Act r/w 120-B IPC of P/S CIK Srinagar.
During investigation of the instant case, suspicious technical signatures were traced at 10 locations falling in Districts Budgam, Pulwama, Ganderbal and Srinagar. The suspects were found using suspected encrypted messaging applications.
During further analysis, various suspects were found using a ‘specific encrypted messaging application’ which is widely used by terrorists/handlers from across for coordinating, financing and executing a variety of terrorist related activities including recruitment into terrorist ranks.These individuals /users are suspected to be in touch with adversaries including ‘Abdullah Gazi’, a Pak based LeT/ JeM terrorist handler across the border. As such, maintaining the element of surprise, the searches were meticulously planned and conducted in furtherance of the investigation by CIK into this terrorist recruitment/financing module of Jaish-e-Mohammad/LeT terrorist outfit, operating from a known city in Pakistan which has been established by peaking into the server of encrypted messaging application. The terrorist commander/ handler was in continuous touch with these local Kashmiri youth and reportedly trying to radicalize them for recruitment into terrorist ranks. The terrorist commander/handler is operating in close coordination with Pak ISI.
During searches, large number of documentary evidence and digital devices having bearing on the investigation of the case were seized. So far, 10 suspects have been rounded up. Analysis of the data would follow and leads that would emerge would become the basis for further investigation.
It is pertinent to mention here that the operation is primarily aimed on prevention, to save the precious lives and careers of local Kashmir youth from falling prey to the designs of terror organizations besides, to uncover crucial evidence, curb illicit activities, prevent the misuse of communication devices, such as mobile phones, and dismantling the terror ecosystem in the UT by identifying terrorist associates/ Over Ground Workers (OGWs) supporting and abetting terrorism and also ensuring legal action against them as envisaged by the law of the land.