
Kulgam Police conducts mock drill with security forces, health and emergency teams to test preparedness for Amarnath Yatra 2025
Kulgam (Jammu and Kashmir) [India], June 25 (ANI): Ahead of the Amarnath Yatra 2025, Kulgam Police, in coordination with CRPF, BSF, Health Department, and Fire & Emergency Services, conducted a large-scale mock drill at key locations along the National Highway, including the Walnut Factory base camp in Qazigund and the FCI camp in Mirbazar, to assess emergency response, coordination, and security preparedness for the safe and smooth conduct of the annual pilgrimage, an official release from the Jammu and Kashmir police said.
In preparation for the upcoming Shri Amarnath Ji Yatra (SANJY-2025); Kulgam Police, along with CRPF, BSF, other security forces deployed for the yatra, the Health Department and Fire & Emergency Service, conducted a comprehensive mock drill exercise at various locations along NHW including Yatra base camps Walnut factory, Qazigund and FCI Mirbazar to evaluate emergency response mechanisms and readiness in handling critical situations, an official statement said.
The mock drill was conducted in the presence of SSP Kulgam, Sahil Sarangal-IPS
Further, as per the release, the main motive of the mock drill was to prepare forces to respond promptly to any untoward incident, especially of a terror nature, with a quick and safe response and to assess the security response time, coordination and effectiveness to ensure a safe and hassle-free yatra. The exercise also aimed to identify areas for improvement and streamline the response mechanism.
Kulgam Police reaffirms its commitment to ensure the safety and security of our people and our pilgrims coming for SANJY-2025.
Earlier in the day, the Inspector General of Police (IGP) for the Jammu Zone, Bhim Sen Tuti, IPS, presided over a security review meeting at the Zonal Police Headquarters (ZPHQ) in Jammu.
According to the release, the meeting was convened to assess counter-terrorism efforts, capacity building, and strategic direction for the Zone. Senior police officers, including all Range DIsG, District SSsP, SO to IGP Jammu, SSP Special Ops & Trg, all SsP (Operations), DySsP (Operations) of Jammu Zone, and PS/PA to IGP Jammu, attended the meeting in person and via virtual mode
.A comprehensive district-wise security assessment was conducted, during which the IGP reviewed each district's law and order situation and operational performance. The officers were directed to maintain high alertness and responsiveness to evolving security dynamics within their jurisdictions.
The meeting also featured a detailed review of counter-terrorism efforts across the Jammu Zone. Key highlights included recent encounters, seizures, and actionable intelligence-based operations. The IGP stressed the need for a continued offensive posture against terror elements and enhanced synergy with the Army and central armed forces, the release said.
The IGP emphasised aspects like personnel training and skill enhancement, placing importance on regular field training and survival skills. Officers were urged to institutionalise lessons learned and incorporate best practices into ongoing training modules, especially for SOG units and operational teams, it added.
In a performance-focused move, quarterly operational targets were assigned to all DySsPs (Operations).
These targets aim to foster accountability, mission focus, and outcome-driven execution at the operational level. The officers were advised to maintain close monitoring and ensure timely progress reviews, the release stated.
The meeting concluded with a shared roadmap to refine leadership roles, strengthen operational readiness, and enhance the effectiveness of intelligence-led and community-oriented policing across the Jammu Zone. (ANI)
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Indian Express
2 hours ago
- Indian Express
1 terrorist killed in ongoing encounter in J&K's Udhampur
One terrorist was killed on Thursday in an encounter with a joint team of security forces at Basantgarh in Jammu and Kashmir's Udhampur district, police said. According to sources, the slain man was part of a group allied to the Jaish-e-Mohammad, who security forces had been tracking for a while. Inspector General of Police (Jammu zone) Bhim Sen Tuti said, 'They are believed to be four in number, and we have been tracking (them) for the last one year.' Contact was established with them at around 8.30 am, he said. The ongoing operation is taking place amid rain and dense fog, hampering visibility. Reinforcements have been rushed to the area to keep terrorists from escaping the encounter site, officials said. The IG said the 'real picture will emerge once the weather improves'. The Nagrota-based White Knight Corps of the Army said in the morning that the encounter began during a joint operation by the Army and the Jammu and Kashmir Police. 'Op BIHALI. Based on specific intelligence, a joint operation was launched by the Indian Army and the Jammu and Kashmir Police in the BIHALI area of Basantgarh. Contact has been established with terrorists. The operation is in progress,' it said in the post. Meanwhile, sources said the holed up terrorists appeared to be Pakistani nationals who are likely to be involved in the killing of a village defence guard (VDG) and an Army soldier during separate encounters since last year. They said the group likely entered Basantgarh from the adjoining Kathua district and had come from across the International Border with Pakistan. The police and security forces have been tracking the group since last year and managed to intercept it on a number of occasions. The terrorists had, however, been managing to escape with the help of either dense forests or adverse weather conditions, officials said. Thursday's encounter comes days ahead of the annual Amarnath yatra to the south Kashmir Himalayas, beginning July 3 from both the Pahalgam and Baltal routes. The yatra, which is undertaken by lakhs of pilgrims from all over the country, will conclude on August 9. In 2024, a record number of more than 5.12 lakh pilgrims had visited the Amarnath shrine, situated at a height of 3,880 metres, during the 52-day yatra. In 2023, the number of pilgrims was 4.5 lakh. This year, the yatra is being organised under intensified security cover in view of the April 22 terrorist attack in Pahalgam, in which 25 tourists and a local man were killed. While multiple security layers have been established, the administration has declared both yatra routes from Pahalgam and Baltal no-fly zones.


Indian Express
3 hours ago
- Indian Express
Iranian woman held for duping US national of USD 700 at Delhi airport
A 52-year-old Iranian woman was arrested at the Indira Gandhi International (IGI) Airport for allegedly cheating a US citizen of USD 700 through an elaborate currency swap scam. The accused, Fatemah Akbari, was arrested from a guest house in Saket following a police probe. Her husband and co-accused, Mojtaba Zolfaghari, is on the run, police said. The case came to light when Baldev Singh, a 70-year-old US citizen of Indian origin, filed a complaint at the IGI Airport Police Station. The incident took place on the night of June 20 when Singh was going to board a flight to the United States. Singh said he was approached by a couple with a child near one of the departure gates. The pair engaged him in friendly conversation and asked to see Indian currency, allegedly to show their child. Singh obliged by handing over a Rs 50 note. The couple then asked to see US dollars. Trusting them, he showed them nine $100 notes from his bag. The couple returned the notes after showing them to the child. It was later that Singh discovered only two genuine notes remained, while the rest had been swapped with Rs 500 Indian currency notes sandwiched between dollar bills to create an illusion of authenticity. The FIR was registered on June 21 under sections 318(4) and 3(5) of the BNS, and a special investigation team was formed. Sharing details of the probe, Additional Commissioner of Police (IGI Airport), Usha Rangnani, said, 'The team analysed CCTV footage outside the airport and the vehicle used by the suspects was identified and traced. It was found registered in the name of one Beena, a resident of Vikaspuri. While the mobile number linked to the car was found inactive, the registered address was the Mahila Battalion of the CRPF at Vikaspuri. However, on visiting the CRPF Battalion, no Beena Kaur was found posted there,' the ACP said. Police finally found that the phone number, though inactive, was in the name of a man called Param Singh. 'Beena was finally traced and examined. She said she is posted in the CRPF and Param Singh is her husband,' Rangnani said. 'Further examination revealed that the car was leased to an Iranian family in February 2025. However, the contact number available for the family was found to be switched off,' added Rangnani. Police then tracked the car's GPS location to Saket. 'The raiding team rushed to Saket, and based on local enquiry, it was found that the user of the offending car was staying in a guest house,' said Additional CP Rangnani. Police nabbed Akbari from the guest house. During questioning, the accused allegedly admitted to the fraud. According to police, Akbari and her husband struggled financially and devised a plan to target foreign nationals at locations such as the airport, Connaught Place, Khan Market, and Lajpat Nagar. She told police that her husband had a history of involvement in similar cases across multiple police jurisdictions, including Lajpat Nagar, RK Puram, and Gurgaon. According to police, Akbari holds refugee status under the United Nations High Commissioner for Refugees and is originally from Tehran. She remains in police custody, and efforts are underway to apprehend her husband. Police are probing the couple's financial transactions and looking into their links to similar scams in Delhi-NCR.


Time of India
4 hours ago
- Time of India
ESIC Hospital in Sodala evacuated after bomb threat email
Edited 359 Jaipur: ESIC Hospital, located near Orbit Mall on Ajmer Road, was evacuated Wednesday after an email, claiming to be from terrorist Ajmal Kasab, threatened a bomb attack on its premises. The hospital administration alerted police, who responded along with the fire brigade, bomb squad, civil defence, and other emergency teams. A full-scale search was launched, but no explosives or suspicious items were found. The cyber cell began investigating the origin and contents of the email, which claimed that an IPS officer from Tamil Nadu issued fake passports to former LTTE members with the help of his wife's travel agency. The message said these individuals were recruited by Pakistan and were carrying mobile phones and chemical-triggered fuses. The email also alleged they were travelling in a vehicle and intended to cause mass casualties at the hospital. The sender warned that if they suspected the plan was compromised, they would either trigger the fuse or release nerve gas through an IED. The message urged the Anti-Terrorism Squad to take immediate action and to contact the officer mentioned. The email stressed that the threat was not a hoax and that the fake passports could be traced to locations linked to the Assistant Commissioner of Intelligence in Madurai. It called for swift yet careful verification and response. When the email was received, the hospital was bustling with patients and staff. The premises were evacuated, and security measures were put in place. Wednesday's incident is the latest in a series of bomb threats targeting Jaipur. The city received at least 65 hoax threat emails in 2025, most of which targeted schools, with additional threats aimed at stadiums, court complexes, metro stations, hotels, medical colleges, and the airport. On May 8, 12, and 13, threatening emails warned of bombings at Sawai Man Singh Stadium. The May 13 threat also included a demand for justice for a rape survivor. A 30-year-old woman, identified as Rene Joshilda, was arrested last week by Ahmedabad police for sending these emails. On May 9, Jaipur Metro was also targeted with a similar threat via email, referring to "Operation Sindoor." That search, too, ended without any explosive device being found.