
Residences of Lashkar-e-Taiba commanders, Pahalgam attack suspects demolished across Kashmir
Residences of LeT commanders, Pahalgam attack suspects demolished across Kashmir - Photo: IANS
NEW DELHI: Security forces have intensified their crackdown on Lashkar-e-Taiba (LeT) operatives and suspects linked to the deadly Pahalgam terror attack that claimed 26 lives on Tuesday (April 22).
In a series of targeted actions, multiple houses of active terrorists across South Kashmir were demolished overnight as part of the counterterrorism operations, sources said.
On Friday night, the house of Shahid Ahmad Kuttay, a top LeT commander from Chotipora in Shopian, was reduced to rubble by authorities.
Kuttay has reportedly been active in terror-related activities for the past three to four years and is accused of playing a major role in coordinating anti-national operations, according to the sources.
In another operation, the house of active terrorist Zahid Ahmed from Matalhama in Kulgam was also demolished during the night, further escalating the campaign against terrorists operating in the region.
Meanwhile, in Pulwama district, the double-storey home of LeT terrorist Ehsan Ahmad Sheikh, active since June 2023, was torn down.
Another Lashkar terrorist, Haris Ahmad — also active since 2023 — had his residence destroyed in a blast in the Kachipora area of Pulwama.
In the Murran area of Pulwama, the house of Pahalgam attack suspect Ahsan Ul Haq Sheikh was also levelled in an explosion.
Ahsan, who underwent terror training in Pakistan in 2018, had recently re-entered the valley, raising concerns among intelligence agencies.
Earlier on Friday, a house in Monghama, Tral, linked to suspected terrorist Asif Sheikh, was destroyed in a powerful explosion.
Sheikh, reportedly a local LeT commander, is under investigation for his potential involvement in the Pahalgam attack.
Sources indicated that security forces discovered suspicious materials inside the house during a search operation and retreated for safety.
Shortly after, a massive blast tore through the building, suggesting the likely presence of explosive substances.
In another significant development, the residence of Lashkar-e-Taiba operative Adil Thokar, also known as Adil Guree, was demolished in Guree, Bijbehara.
Authorities believe Thokar played a crucial role in the April 22 attack.
He had legally visited Pakistan in 2018, where he is suspected to have received terror training, and returned to the region last year.
Since then, he has been on the radar of security and intelligence agencies for his involvement in insurgent activities.
The widespread demolition drive comes amid heightened counterterrorism efforts and follows sweeping retaliatory actions by India in the wake of the Pahalgam terror attack.
On April 22, terrorists affiliated with The Resistance Front (TRF), a proxy of the Pakistan-based terror organisation Lashkar-e-Taiba (LeT), carried out a massacre in the Baisaran meadow of Pahalgam. - The Straits Times/ANN

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


New Straits Times
18 hours ago
- New Straits Times
Mass graves: A journalist's journey Into Malaysia's darkest chapter
WHEN journalists dig deep, ask hard questions, and refuse to let go, they become more than storytellers — they become catalysts for truth. Their relentless pursuit can shine a light on hidden crimes, expose wrongdoing and give voice to those silenced by fear or power. In a world where so much is buried beneath spin, silence or indifference, journalism remains one of the last lines of defence against injustice. Veteran journalist Datuk S. Arulldas was on the trail of a Penang-based human trafficking syndicate in 2015 when information from his police contacts led him to Perlis. It was a lead that would take him deep into a chilling web of crime and silence. For journalists like Arulldas, the pursuit of truth isn't just a job; it's a calling. Their dogged determination to follow the facts, no matter how remote or risky, has the power to uncover buried truths, expose hidden atrocities and push authorities into action. In this case, that pursuit would bring him face to face with one of Malaysia's darkest chapters. Combing through dense jungle, steep terrain and a wall of bureaucracy — from uncooperative security personnel to high-ranking officials — Arulldas and his steadfast photographer, Sayuti Zainudin, pushed forward. What they uncovered were Malaysia's own killing fields: 139 remains buried in shallow graves, scattered across remote forested slopes. Their discovery led to the exposure of hidden human trafficking camps along the border — grim evidence of a cross-border trade in human misery that had flourished in silence for too long. He has chronicled his journey in a book titled Mass Graves: Uncovering the Killing Fields of Wang Kelian. The book is a compelling account of the investigation, pieced together with a collection of newspaper clippings, photographs, and personal notes that offer a behind-the-scenes look at how investigative journalism operates in Malaysia. It not only documents the horrors uncovered in the Perlis jungle, but also sheds light on the perseverance, risks and resistance journalists often face when pursuing stories that challenge power and expose uncomfortable truths. Prompted by a spate of grisly murders involving Myanmar nationals in Penang, Arulldas began digging deeper. His investigation revealed troubling links between the killings and human trafficking networks, which soon led him to the country's northern border and a tip that would change everything. While seated at a coffee shop in Jitra, Kedah, just before heading to the border, Arulldas and Sayuti met a contact who dropped a bombshell. "He told us there were mass graves of migrants at Bukit Wang Burma, near Wang Kelian," Arulldas later wrote. Wang Kelian, located at the northernmost part of Perlis, shares a border with Wang Prachan in the Khuan Don District of Satun Province, southern Thailand. The contact revealed that a retired senior Thai army officer and his wife had recently been arrested by Thai authorities in connection with a human trafficking network and the discovery of mass graves. But when pressed for further details, he remained tight-lipped, insisting that if the journalist wanted answers, he'd have to find the graves himself. Sensing a story, Arulldas turned to his photographer and asked, "Shall we go?" Sayuti agreed without hesitation, and just like that, their journey veered off course. "It was a different kind of feeling when we arrived in Wang Kelian," Arulldas recalls. "It felt strange… like we weren't in Malaysia anymore. It was dusk. The houses were dark, the roads empty. Everything looked deserted." That evening, their first attempt to locate the mass graves was quickly called off. They had no maps, no landmarks and weren't equipped to navigate the forest reserve. "We didn't want to get lost in the jungle at night," he says wryly. Undeterred by the initial setback, Arulldas pressed on. He followed every lead, tracked down contacts and spoke to anyone who might help him find the mass graves believed to be hidden deep within the forest. Each encounter brought new challenges, from vague directions to hesitant sources. What stands out in his account isn't just the information he uncovered, but the relentless way he pursued it. Despite the uncertainty, the risks and the many obstacles, he never gave up. His tenacity, grounded in a journalist's instinct, carried him forward in search of a story that many would have walked away from. The then 60-year-old Arulldas went on to risk life and limb, trekking through dense forest terrain with guides he barely knew. "My legs were swollen and at that time, I nearly gave up so many times along the way," he recalls. "But my guides kept urging me on. They said, 'You've come this far. Just a little more.'" Eventually, he reached a small clearing where the ground had been crudely disturbed. Open graves lay before him, the surfaces loosely covered with palm fronds. He'd found the mass graves. "It was a human tragedy," he says soberly. "I feel it shouldn't have happened. These people were looking for greener pastures. They shouldn't have had to die or be killed. I felt such deep sadness and pity." Ten years on, the now 70-year-old reflects on that day and quietly admits it was the defining moment of his career. Yet a decade later, he concedes that more questions remain than answers. Still, the story demands to be told. "All we can do as journalists is expose the truth," he writes. "To put faces to a marginalised group that might otherwise remain nothing more than inconvenient statistics, too easily brushed aside." Arulldas' book is a courageous and unflinching account of a tragedy Malaysia has yet to fully confront. It stands as a testament to lives lost, justice denied, and the silence that continues to hang over Wang Kelian. Somewhere in Kedah, the victims lie buried under nameless headstones, marked only by DNA codes. Their stories remain untold, their identities unknown and the truth behind their deaths still cloaked in silence. Publisher: Gerakbudaya Enterprise 133 pages


Malay Mail
2 days ago
- Malay Mail
Tutor under investigation for allegedly buying vape for 13-year-old student in Singapore
SINGAPORE, June 7 — A private tutor in Singapore is being investigated by authorities after allegedly helping a 13-year-old student purchase an e-cigarette. The incident came to light after the girl's secondary school contacted her father on May 21 to inform him that his daughter had been caught with a vape device. According to Shin Min Daily News, the school's discipline master said the girl had admitted to asking her Chinese tutor to help buy it online. The father, surnamed Zhu, 33, told the paper he was 'extremely shocked' and later checked his daughter's chat history with the tutor. 'I saw that the tutor purchased the e-cigarette online and even sent screenshots to my daughter. She handed the e-cigarette to my daughter on May 19,' he reportedly said. 'At the time, my daughter said she would pay S$78 (RM256) to her during the next lesson.' The tutor had been hired through an agency in 2024 to provide weekly Chinese lessons while the girl was in Primary 6. Lessons were conducted behind closed doors in the girl's room every Monday. Despite nearly a year of tuition, Zhu said her grades did not improve. 'My daughter's Chinese grades this year were failing. I originally thought it was her own fault, but now I know the tutor wasn't teaching seriously at all,' he said. He added that after the first three proper lessons, the tutor had spent most of her time chatting with the girl and even bought her snacks and cosmetics. Zhu said: 'Later I called the tutor directly, and she initially denied it. It wasn't until I told her I had already seen their chat records that she immediately hung up and blocked me.' He added, 'The tutor should have known better than to satisfy the curiosity of the girl by buying the vape on my daughter's behalf.' The Health Sciences Authority (HSA) confirmed with Shin Min that it is investigating the case. It reminded the public that importing, distributing, or selling e-cigarettes and their components is illegal in Singapore. First-time offenders face fines of up to S$10,000, jail of up to six months, or both. Repeat offenders face double the penalty. Zhu also reported the incident to the agency that had arranged the tuition. A spokesman told Shin Min that the agency has removed the tutor from its roster and taken steps to prevent similar incidents in future. Following the discovery, Zhu has taken stricter measures at home. He said he now leaves the door open during tuition sessions and regularly checks his daughter's school bag.


The Star
2 days ago
- The Star
This is the phishing scam that gets an identity theft expert in the US 'really, very angry'
Digital thieves are nothing if not persistent and innovative. They keep finding new ways to try to part you from your money. Phishing – where thieves pose as trusted entities or send legitimate looking emails or messages to trick you into giving them access to your accounts – is a widespread method. And it is constantly evolving. 'We've seen phishing go through the roof,' said Eva Velasquez, the CEO of the Identity Theft Resource Center, a San Diego-based national nonprofit. But knowledge is power. So here are three emerging phishing threats to look out for, according to Internet safety experts. All three threats target key parts of people's digital lives: email attachments that lead to fake login pages, multi-factor authentication trickery and deceptive calendar invites. Spending a few minutes reading these pointers could help you avoid getting your ID or money stolen and save you countless hours of dealing with the fallout. HTML attachments that open fake login pages Imagine a busy professional who is in email action mode. In the past 30 minutes on a Saturday morning, he has filled out emailed liability waivers for his seven children's summer camps, filed an expense report for work, answered a secure portal message from the veterinarian about his sick puppy's prescription, skimmed 182 email subject lines and paid five bills from his email inbox, including a car insurance premium and his beloved cheese-of-the-month club. Amid this flurry of inbound emails, ads, invoices and secure messages, he is working on autopilot: opening messages, skimming, clicking and signing in. What a perfect opportunity. Scammers are taking advantage of user distraction – and their trust – by sending emails with HTM or HTML attachments. When clicked, those open a browser file that looks like secure, familiar login page. These pages might look like secure invoice viewers, file-sharing services like DocuSign or Dropbox, or sign-in pages to platforms including Microsoft 365. 'Once the user enters their credentials, they are sent surreptitiously to the attacker's server,' said Vlad Cristescu, the head of cybersecurity with ZeroBounce, a Florida company that helps businesses lower their rate of bounced marketing emails. Why this method is especially insidious: 'There isn't a clickable link in the email, so standard email security filters (which scan for malicious URLs or attachments like PDFs and ZIPs) may not catch it,' Cristescu added. To prevent this, he added, companies should 'restrict HTML attachments unless essential, and users should treat unfamiliar HTML files the same way they'd treat a suspicious link – don't open it unless you're absolutely sure of the sender.' If you do receive incoming communication with an HTML link or attachment, don't engage, said Velasquez, with the ITRC. 'Don't click on links, people. That's the big, overarching message,' she said. Instead, go to the source: call the phone number on the back of your credit card, visit the bank in person. Multifactor authentication tricks If you are one of the many people who uses multifactor authentication, take note. Multifactor authentication is still very helpful and should be used. But Cristescu flagged one way that scammers are taking this tool – which is designed to make people's online accounts more secure – and using it to slither in. As a refresher, multifactor authentication is an added layer of protection that prevents data thieves from logging into your accounts if they have your username and password. It helps ensure that you're the one who typed in your password when you log in, and not some scammer in the Philippines or Poughkeepsie. To use multifactor authentication, you typically download an app, such as Google Authenticator or Microsoft Authenticator. You register your sensitive online accounts, such as Facebook, bank or email, with that app. Then, every time you log into a registered website, the authenticator app generates a new, random code that you enter after your password as a second layer of verification. With the rise of this protection, a new threat has emerged: Scammers who have your username and password can send log-in requests to your authenticator app. Next, the scammer can pose as an IT expert from your workplace and ask you to approve the log-in request. If you fall for it, then boom – the scammer is in. This technique 'exploits a user's frustration and trust in IT. If you're receiving multiple (authenticator) prompts you didn't initiate, that's not a glitch – it's an attack,' Cristescu said. He recommends pausing, never approving these unexpected requests and flagging the interaction with IT. Velasquez added that if you get an authenticator notification and you didn't just log in yourself, 'That is a huge red flag. Stop and address it. Don't ignore it.' Anytime you interact with IT, be sure you're the one initiating that contact, she added. If someone from IT calls or emails you, disconnect and reach back out using a trusted method, such as the same phone number you always dial. Fake calendar invites A third technique data thieves are using is calendar invites. 'I just get really very angry about this one,' Velasquez said. 'It is super hard to detect.' Here's what to look out for. If you use an online calendar like Google calendar or the native iPhone calendar app, you might receive an invitation to an event you didn't see coming. Sometimes these meetings are legitimate. Sometimes, they are not. Scammers 'are now sending meeting requests with malicious links embedded in the invite or 'join' button. These invitations sync directly into calendars and often go unquestioned,' according to ZeroBounce. Scammers use calendar invites because they have 'built-in credibility – they're not usually scrutinised like emails,' Cristescu said. Look for meeting requests from unknown senders and vague event names like 'Sync' or 'Project Review,' he added. In some jobs or roles, meetings routinely get added to calendars by other people –clients, prospects, coworkers, bosses, peers. 'I have gotten these repeatedly,' said Velasquez, with the ITRC. 'Depending on your lifestyle and your job and how you work, these are going to be particularly challenging. They are real calendar invites. The problem is they have malicious software embedded in them – so when you click on portions of them, 'Click to join,' it's like opening an attachment (or) clicking on a suspicious link. It's the same principle.' Cristescu, with ZeroBounce, shared this tip: 'Treat those just like a phishing email. Disable auto-accept where possible and review every invite manually before clicking anything.' Never stop questioning what lands in your inbox or calendar, Cristescu added. 'Always verify the sender's email address, ensure that any link you click matches the legitimate domain, and look out for subtle red flags like spelling errors or unusual formatting.' A big picture pointer 'All three of these (scams) are so common that it has probably happened to every single person reading the article – at least one of them. That's how ubiquitous these are,' Velasquez said. She shared this broader thought: It's less important to know how to respond to each scenario and more important to pause, be skeptical, double check. It's important to be ever more sceptical, because AI makes it easier and easier for thieves to create convincing ruses, Cristescu and Velasquez both said. AI 'really helps with making these phishing offers look and sound so much more legitimate,' Velasquez said. 'And with the amount of data that is out there from public sources and from data breaches, it's very easy to see what relationships people have.' Where you bank, where you do business – that is all fodder for someone to create a copycat page designed to trick you into logging in. Adopt an 'investigator mindset,' Velasquez said. Use this helpful reminder: the acronym STAR, which stands for Stop. Think. Ask questions or ask for help. Reassess. – The San Diego Union-Tribune/Tribune News Service