logo
Op Mahadev: How Chinese device gave Pahalgam mastermind away and led to his killing

Op Mahadev: How Chinese device gave Pahalgam mastermind away and led to his killing

First Post10 hours ago
A Chinese communication device that turned on two days ago helped Indian security officials track down three terrorists inside the Dachigam forest of Jammu and Kashmir. It took a team of highly-trained personnel less than three hours to complete the mission, resulting in the deaths of the three, who were reportedly linked to the Pahalgam attack, including the mastermind Hashim Musa read more
Security personnel keep vigil after after Operation Mahadev in which three terrorists were killed in an encounter, near Dachigam in Srinagar district, Jammu and Kashmir. PTI
'Those who are gone won't return, but terror must end. We are proud of the Indian Army.'
'The pain will never go, the closure may never come. But at least now, we can sleep a little better knowing that those who killed my husband are no more.'
These were just some of the reactions from families of the victims of the Pahalgam attack shortly after the Indian Army successfully eliminated three terrorists, including the mastermind of the April 22 tragedy, in an operation dubbed Operation Mahadev on Monday (July 28).
STORY CONTINUES BELOW THIS AD
The operation resulting in the deaths of the terrorists, was launched by the Chinar Corps of the Indian Army in the general area of Lidwas in Jammu and Kashmir.
Hours after the operation, the three slain terrorists were identified as Hashim Musa alias Suleiman, widely regarded as the mastermind behind the Pahalgam attack. The other two have also been identified as Yasir, Abu Hamza. All three of them were foreign nationals affiliated with the Pakistan-based terror outfit Lashkar-e-Taiba (LeT).
But how did Indian authorities track these three terrorists down and kill them? What's the significance of the name behind the operation? We get you all the answers and much, much more.
Tracking the 3 terrorists down
Ever since the April 22 Pahalgam attack in which 26 people were horrifically killed, the security personnel in Kashmir have been on high alert and been searching for any clues to find those involved in the attack.
They finally received a breakthrough 14 days ago when they received suspicious communication. The forces got a clue about a Chinese ultra radio communication being active, after which the operation was carried out. The LeT uses the Chinese radio for encrypted messages and reportedly even used them during the planning and execution of the Pahalgam terror attack.
Then two days ago, the group of terrorists activated the communication device once again, allowing for the security officials to pick up their precise location — the Dachigam forest area. Official sources revealed that local nomads also provided inputs, helping the forces to narrow down the location of the terrorists.
The encounter occurred in General Area Lidwas and drone footage showed three bodies, confirming that three terrorists were neutralised. PTI
Trapping the three terrorists
Narrowing down their location to the Dachigam forests in Jammu and Kashmir, officials deployed several units in the area to further pinpoint their exact spot. The Dachigam forest has two sides — one extending towards Pahalgam in south Kashmir's Anantnag district and another connecting Ganderbal district.
Once the terrorists were located, the security personnel launched a drone on Monday in that area to get a clear visual of the terrorists. Once they received visuals, personnel from the Rashtriya Rifles (RR) and Para Special Forces commandos and ascended the Mahadev hill.
STORY CONTINUES BELOW THIS AD
Then using the element of surprise, the team encircle the terrorists around 11.30 am and swiftly neutralised them.
An NDTV report states that 45 minutes later, a cleansing operation was launched in a two-kilometre radius of the encounter site. And at 12:45 pm, the terrorists' bodies were identified and photographed.
Sources told India Today that at the time of the encounter, the terrorists were napping and caught completely unaware.
OP MAHADEV - Update
Three terrorist have been neutralised in an intense firefight. Operation Continues.#Kashmir@adgpi@NorthernComd_IA pic.twitter.com/5LToapGKuf — Chinar Corps🍁 - Indian Army (@ChinarcorpsIA) July 28, 2025
Weapons, pots at encounter site
Amid the cleansing stage of Operation Mahadev, security troops also recovered weapons from the site. Preliminary reports suggest a US-made carbine, an AK-47, 17 rifle grenades, and other materials were recovered.
For those who don't know, rifle grenades are explosive devices fired from the barrel or grenade launcher of a rifle, not thrown by hand. They are capable of hitting targets that are over 200 metres away.
STORY CONTINUES BELOW THIS AD
The recovery of such weapons indicates that the terrorists were well-equipped and possibly planning another major strike. Eatables and cooking utensils were also spotted at the hideout.
Security personnel during the cordon and search operation, near Dachigam in Srinagar district. PTI
Reactions to Operation Mahadev
The killing of the three terrorists in Operation Mahadev led to many praising and congratulating those involved in it. J&K Lieutenant-Governor Manoj Sinha congratulated the security forces for the Dachigam operation. 'The police and security forces can provide more details after the operation will be over. Such operations have been ongoing for several months now, jointly carried out by the J&K Police, Army, and CRPF, in which terrorists are being eliminated.'
Meanwhile, families of the victims of the Pahalgam terror attack said they have received some kind of closure following the killing of the terrorists. Reacting to the news, Vikas Kumrawat, who lost his elder brother in the Pahalgam attack told PTI, 'We were thinking for a long time why the terrorists involved in the Pahalgam attack have not been caught yet? We are very happy and relieved with the news of the army killing the mastermind of this attack. This action is a special achievement of our government and the army.'
In Haryana's Nawal, Rajesh Narwal, father of slain Indian Navy officer Lt Vinay Narwal, praised the Armed Forces for their bravery. 'I want to salute the Army, our paramilitary and J-K police jawans for their bravery,' said Rajesh Narwal. 'The way they did not care for their lives and hunted them down is not an easy task. I salute them for their bravery. They should be honoured for this,' he further said.
STORY CONTINUES BELOW THIS AD
Significance of name behind Operation Mahadev
Carried out jointly by the Indian Army, Jammu and Kashmir Police and the CRPF, what's the reasoning behind the name of the operation?
The choice isn't just symbolic but also tactical. That's because it took place near Mahadev peak, which is part of the Zabarwan Range and holds both strategic and spiritual value.
Kashmiri folklore states that this is the path that Lord Shiva took to reach the Amarnath Cave, where he related the Amar Katha (the tale of immortality) to Goddess Parvati.
With inputs from agencies
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Security manager of Wankhede stadium arrested for `theft of IPL jerseys
Security manager of Wankhede stadium arrested for `theft of IPL jerseys

News18

time12 minutes ago

  • News18

Security manager of Wankhede stadium arrested for `theft of IPL jerseys

Mumbai, Jul 29 (PTI) A 43-year-old security manager of the Wankhede stadium here has been arrested for allegedly stealing 261 Indian Premier League (IPL) jerseys worth Rs 6.52 lakh from the BCCI's store, police said on Tuesday. Accused Farooque Aslam Khan, a resident of Mira Road, was arrested a few days ago and is now out on bail, an official said. On June 13, Khan allegedly stole jerseys of IPL 2025 from the official merchandise store of the Board of Control for Cricket in India at the stadium in south Mumbai, and sold many of them online. The theft came to light during an audit of the inventory. BCCI officials approached Marine Drive Police Station with a complaint about the theft on July 17. Many of the jerseys were sold to a dealer in Haryana, the probe found. view comments First Published: July 29, 2025, 20:15 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

Wait, what? 261 IPL jerseys worth ₹6.5 lakh stolen from Wankhede Stadium
Wait, what? 261 IPL jerseys worth ₹6.5 lakh stolen from Wankhede Stadium

Mint

time22 minutes ago

  • Mint

Wait, what? 261 IPL jerseys worth ₹6.5 lakh stolen from Wankhede Stadium

A security guard at the Board of Control for Cricket in India (BCCI) office in Mumbai was arrested for stealing IPL 2025 team jerseys worth ₹ 6.5 lakh. The theft took place at the iconic Wankhede Stadium. The accused, identified as 40-year-old Farooque Aslam Khan, allegedly stole 261 jerseys, each valued at around ₹ 2,500. Police said Khan committed the theft to fund his online gambling habit. The incident reportedly occurred on June 13 but only came to light after a routine audit revealed missing stock from the storeroom. Upon checking CCTV footage, BCCI officials saw Khan walking out with a box full of jerseys. The stolen kits were of different IPL teams, though it remains unclear whether they were meant for players or for public sale. Investigators said Khan sold the jerseys to an online dealer based in Haryana, whom he had connected with through social media. "The guard claims he haggled a bit with the online dealer, but he hasn't yet specified how much he got for the deal," a police source told TOI. The police further stated that the jerseys were sent via courier to the Haryana-based dealer, who has now been summoned for questioning. "The online dealer says he was not aware that the jerseys had been stolen," a police official said. "The guard had told the man in Haryana that the jerseys were part of a stock clearance sale due to renovation work that was going on at the office." So far, 50 of the 261 stolen jerseys have been recovered. Khan has reportedly told police that he received payment directly into his bank account but lost all the money to online gambling. "He the guard claims he lost it all to online gambling," the police source added. Authorities are now verifying his bank details to confirm his version of events.

Pak security forces kill 15 militants in joint operations in KPK
Pak security forces kill 15 militants in joint operations in KPK

News18

time27 minutes ago

  • News18

Pak security forces kill 15 militants in joint operations in KPK

Peshawar, Jul 29 (PTI) Pakistani security forces have killed at least 15 militants and destroyed their hideouts in a series of operations in northwestern Khyber Pakhtunkhwa province, police said on Tuesday. Over 200 personnel from the Pakistan Army and police are participating in the 10-day operation across Hangu, Karak, Orakzai, and Kurram in the province, bordering Afghanistan. 'So far, 15 militants have been killed and several others injured," Kohat Regional Police Officer Abbas Majeed Marwat said. The security forces have also destroyed several hideouts of militants in the region, he said. The operations are still ongoing in the hilly regions of Chappri, Kundao, Shanawari, Zargari, Naryab, and adjoining forest areas, Marwat added. A search operation is also underway in Koh-e-Maidan, a no-go area in the Karak district, which has now been cleared of militants, he said. PTI AYZ RD ZH RD RD view comments First Published: July 29, 2025, 20:00 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store