logo
Pahalgam Attack: NIA Launches Probe into Killing of Mastermind in Srinagar Encounter

Pahalgam Attack: NIA Launches Probe into Killing of Mastermind in Srinagar Encounter

The Hindu29-07-2025
A team of NIA sleuths on Tuesday launched a probe into the killing of the alleged mastermind of the Pahalgam terror attack and his two associates in an encounter with security forces near Srinagar, officials said here.
The National Investigation Agency (NIA) team arrived at the Police Control Room (PCR) in Srinagar early Tuesday (July 28, 2025) for the identification of the bodies of the three terrorists, they said.
In a major breakthrough, the Army's elite para commandos on Monday gunned down Sulieman alias Asif, the alleged mastermind of the April 22 attack, along with two of his associates, in an encounter at Mulnar in Harwan area near Dachigam National Park here.
The security forces launched a surprise action, codenamed 'Operation Mahadev', following a technical signal indicating the use of a satellite phone that was used by the perpetrators of the Pahalgam attack.
3 Terrorists Killed in J&K Encounter Near Srinagar
The other terrorists killed in the action have been identified as Jibran, who was allegedly involved in the Sonamarg Tunnel attack last year, and Hamza Afghani.
As many as 26 people, mostly tourists, were shot dead by terrorists at Baisaran meadows in Pahalgam, which prompted the armed forces to launch Operation Sindoor on May 7 against the terror infrastructure in Pakistan.
The bodies of the slain terrorists were brought from the encounter site to the PCR here late Monday.
The NIA team is taking witnesses in batches of two to three people "for ensuring a cent per cent confirmation that the slain terrorists include Sulieman Shah", officials said.
Meanwhile, the operation is ongoing as intelligence inputs have suggested the presence of another group of terrorists in the area, officials said.
Jibran was allegedly involved in the terror strike at the Sonamarg tunnel project at Gagangir in October last year. Seven people, including a doctor, were killed in the attack.
An M4 carbine rifle, two AK rifles and other munitions were seized from the site of Monday's encounter.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

ED attaches Rs 29,000 from Mangaluru blast suspect's account, says bomb was supposed to be planted at Dharmasthala temple
ED attaches Rs 29,000 from Mangaluru blast suspect's account, says bomb was supposed to be planted at Dharmasthala temple

Indian Express

time12 minutes ago

  • Indian Express

ED attaches Rs 29,000 from Mangaluru blast suspect's account, says bomb was supposed to be planted at Dharmasthala temple

The Bengaluru zonal office of the Enforcement Directorate (ED) on Tuesday provisionally attached Rs 29,176 kept in the bank account of Syed Yasin, one of the accused in the 2022 case in which a pressure-cooker bomb accidentally exploded in an autorickshaw in Mangaluru. The agency said the bomb was meant to be planted at the Dharmasthala Manjunatha Swamy Temple. 'Investigations conducted revealed that the ISIS online handler named 'Colonel' had given training over Wicker app/ Telegram etc. to the main accused Mohammad Shariq alias Premraj and other accused persons, to make improvised explosive device (IED)/Bomb and also arranged funds through certain mute accounts and also through crypto currencies which were at times encashed by Syed Yasin and Mohammad Shariq, through PoS agents, for a commission and at some instances the encashed cryptocurrencies were routed through the fraudulently opened mule accounts in FINO Payments Bank,' ED said in a statement on Wednesday, citing the investigation done by the National Investigation Agency (NIA). The NIA, which took over the investigation from the Karnataka Police, has said in its chargesheet filed in the case that the blast was part of an ISIS terrorist plot. According to ED, Rs 2,86,008 was deposited by different cryptocurrency dealers in the mule accounts and Rs 41,680 was collected in cash from point-of-sale agents as part of the terror plot. The amounts were used for buying items online to assemble the improvised explosive device (IED), hiring hideouts in Mysuru city and other places, and also for conducting reconnaissance at various places in Tamil Nadu, Kerala and Karnataka. The bomb was supposed to be planted at the Dharmasthala Manjunatha Swamy Temple, the agency said in its statement. Also, the police had seized Rs 39,228 from Mohammed Shariq at Father Muller Hospital in Mangaluru. On November 19, 2022, Mohammed Shariq, 24, suffered 40 per cent burns after an IED he was carrying in a bag kept on his lap while travelling in an autorickshaw accidentally went off in Mangaluru. It exploded as the bomb timer was set for 09 seconds, instead of 90 minutes, according to the NIA. The police arrested Shariq after the blast. Another accused in the case, Maaz Munir, allegedly provided details of the mule accounts to Shariq to receive payments sent by the online handler, 'Colonel'. Further investigation in the case is in progress, the agency said.

ED attaches Rs 29,176 from bank account used to receive ISIS funds for 2022 Mangaluru IED blast
ED attaches Rs 29,176 from bank account used to receive ISIS funds for 2022 Mangaluru IED blast

The Print

timean hour ago

  • The Print

ED attaches Rs 29,176 from bank account used to receive ISIS funds for 2022 Mangaluru IED blast

At one time, the account received more than Rs 3 lakh of which the terror module had spent more than Rs 2 lakh. It was part of the overall funds passed on to terror accused Mohammed Shariq and his aides, including Syed Yasin, the ED spokesperson said. The bank account was used to allegedly fund various nefarious activities such as online purchase of items to assemble an Improvised Explosive Device (IED), hiring hideouts in Mysuru city as well as in conducting reconnaissance of different places in Tamil Nadu, Kerala and Karnataka, an ED spokesperson said Wednesday. New Delhi: The Enforcement Directorate (ED) has attached the money lying in the bank account of the 2022 Mangaluru bomb blast accused, who allegedly used to receive funds from his ISIS handler. The account came under the ED lens after the Karnataka police booked Shariq alias Premraj, a resident of Shivamogga district, for orchestrating an IED blast near Kankanady railway station in Mangaluru on 20 November, 2022. From the spot, the local police had found a pressure cooker, 9-volt batteries and circuits generally used for assembling IEDs. In the further course of investigation, chemicals, mechanical tools and electrical items—required to assemble IEDs—were seized from Shariq's rented accommodation in Mysuru. Days later, the case was handed over to the National Investigation Agency (NIA). In its charge sheet, the NIA submitted that Shariq was on the way to plant the IED concealed in pressure cooker outside Manjunatha temple in Dharmasthala. However, the IED went off because the timer was set at nine seconds instead of an initially planned time of 90 minutes, leaving Shariq with 40 percent burn injuries. All these accused are in judicial custody and are now facing trial. Also Read: 'Bare allegations'—how Malegaon ruling debunked ATS & NIA's theories on RDX, conspiracy meetings Online DIY classes A couple of months before the blast, the Shivamogga police booked Shariq, Yasin and Munir Ahmed alias Maz on the charge of hatching a conspiracy to spread the ISIS ideology. The trio, according to the FIR, was working to bring Sharia law as they believed India never really got independent. The trio had stored explosives and exploded a bomb outside Yasin's house in Shivamogga, it added. The NIA registered a case on 15 November, 2022—five days before the Mangaluru IED blast mistakenly triggered by Shariq. An ISIS handler with the pseudonym 'Colonel' radicalised the trio along with at least nine other youth from across Karnataka and gave them instructions through applications such as Wickr and Telegram on how to assemble IEDs, according to the counter-terrorism agency. The handler, it said, had also trained them online on carrying out reconnaissance of sensitive targets such as power sub-stations, railways, telephone access points, as well as business and industries belonging to individuals of the Hindu community. The handler had arranged payment channels through cryptocurrency, which were sold and deposited into mule bank accounts opened with Fino Payments Bank, the NIA alleged. Through the same method, the accused received Rs 2.86 lakh, while funds amounting to Rs 41,680 were collected in cash from PoS (Point of Sale) agents. The money was used to purchase items online to assemble the IED, for hiring hideouts in Mysuru city and other locations, and also for conducting reconnaissance in Tamil Nadu, Kerala, and Karnataka, the NIA said. The police seized Rs 39,228 in cash from Shriq's bag when he was admitted to a hospital after being injured in the IED blast. The remaining Rs 29,176 in Yasin's bank account was disabled on the ED's instruction. (Edited by Tony Rai) Also Read: Web of spoof sites, scam call centres. Crypto theft racket modus operandi in focus amid ED crackdown

Wanted Jharkhand criminal injured in police encounter in UP's Prayagraj
Wanted Jharkhand criminal injured in police encounter in UP's Prayagraj

India Today

time2 hours ago

  • India Today

Wanted Jharkhand criminal injured in police encounter in UP's Prayagraj

A criminal wanted for involvement in multiple murders was injured on Thursday in an encounter with the Special Task Force (STF) in Uttar Pradesh's Prayagraj, officials to the police, the STF received a tip off that the criminal, Ashish Ranjan alias Chhotu Singh, a resident of Jharkhand's Dhanbad, was expected to arrive in Prayagraj along with a partner to commit yet another crime. Acting on the tip off, the task force prepared and waited to capture Ranjan. On his eventual arrival, the task force tried to nab him near Shivrajpur upon realising the presence of the task force, started firing at them with an AK-47 assault rifle and a pistol. During the incident, three officers of the STF — JP Rai, Prabhanjan and Rohit — narrowly escaped the firing. The team fired back in self-defence and struck Ranjan, injuring him. As a result, he was arrested and rushed to the hospital for immediate the encounter, an AK-47 rifle, a 9-millimetre pistol, a large quantity of live and empty cartridges and a motorcycle were recovered by the task Director General, Law and order, Amitabh Yash said that further legal proceedings and investigations are underway.- EndsMust Watch IN THIS STORY#Uttar Pradesh

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store