&w=3840&q=100)
Security forces launch intelligence-based ops, recover arms, ammunition
The operations resulted in apprehension of 23 cadres from the hill and valley-based groups and recovery of 40 weapons, nine Improvised Explosive Devices (IED), grenades, ammunition and war-like stores.
Acting on specific intelligence inputs of movement of cadres and presence of IEDs in the general area of Chadong, Imphal East district, the Indian Army, using specialised resources like Explosive Detection Dog, launched an operation on 27 May and recovered 05 IEDs connected in tandem, with a total of 35 kg of explosives.
Meanwhile, in another operation, a team of the Indian Army discovered a concealed hideout nearby, from where two 12-bore rifles, explosives, ammunition and war-like stores were recovered.
Acting on specific intelligence regarding the presence of arms and warlike stores in the general area Khuangmun in Churachandpur District, a search operation was launched by the Indian Army and Manipur Police on June 1 and recovered two IEDs, seven weapons comprising leading to the recovery of a .303 rifle, four single-barrel rifles, three improvised mortars (Pompi), two IEDs, amunotion and other warlike stores.
In Kakching district, a joint operation launched by the Indian Army and Manipur Police on specific inputs in the general area Wangoo in Kakching District on June 2 led to the recovery of two IEDs (approx. 8 kg), five weapons comprising an INSAS rifle, three single-barrel rifles, a double-barrel rifle, ammunition and war-like stores.
In Jiribam district, an intelligence-based operation launched by Assam Rifles in coordination with Manipur Police carried out a joint operation in the general area of Rashidpur Forest, Jiribam District, on June 2 and recovered five weapons: two single-barrel rifles, one double-barrel rifle, one improvised mortar (Pompi), grenades, ammunition, and war-like stores.
On June 5, the Indian Army and Manipur Police launched a joint search operation after corroboration and specific inputs regarding the presence of arms and ammunition in the general area of Thamnapokpi near Loktak Lake in Bishnupur District. The operation recovered four weapons: a Self-Loading Rifle (SLR) rifle, a Sten machine gun, two 12-bore pistols, grenades, ammunition, and warlike stores.
Similarly, in the general area of Kotzim in Kangpokpi district, an intelligence-based operation by Assam Rifles on June 6 resulted in the recovery of eight weapons, comprising one M16, one bolt-action Rifle, three Improvised Mortars, three Pull-Mechanism Rifles, ammunition, and war-like stores.
On June 7, based on specific intelligence inputs, a joint team of the Indian Army and Majipur Police launched a search operation in the general area Itham Uyok in the fringe areas of Imphal East District, Manipur, and recovered nine weapons, comprising three Rifles, three Mortars, two Heavy-Calibre Launchers, one improvised mortar (Pompi), Grenades, ammunition, and war-like stores.
Intelligence-based operations in hill and valley regions also resulted in the apprehension of 23 cadres. The apprehended cadres and the recovered items have been handed over to the Manipur Police.
These coordinated efforts by security forces highlight their unwavering commitment to maintaining peace and security in Manipur.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


United News of India
5 hours ago
- United News of India
Kulgam op enters seventh day; Army Commander reviews counter-terror grid
Srinagar, Aug 7 (UNI) The ongoing anti-militancy operation in Jammu and Kashmir's Kulgam district entered its seventh day, with heavy firing and intermittent explosions continuing through the night. Army's Northern Commander Lt Gen Pratik Sharma visited South Kashmir to review the counter-terrorism grid. Launched last week based on specific intelligence about the presence of at least four heavily armed militants, the Akhal operation in the forested area has turned into one of the lengthiest anti-militancy offensives in the region in the recent past. According to officials, two militants — one of them suspected to be a local — have been killed so far, while four security personnel have sustained injuries during the operation. Officials said security forces are encountering stiff resistance as the militants are reportedly taking advantage of the rugged terrain, dense forests, and natural cave hideouts in the area, making the operation particularly challenging. Security forces are deploying drones to target suspected militant hideouts in the forested area, while Army helicopters continue to hover overhead, monitoring the operation. Amid the ongoing operation, Army's Northern Commander Lt Gen Pratik Sharma, reviewed the counter-terrorism grid in South Kashmir, where he was briefed about the security situation, operational readiness and ongoing operations. 'He (Northern Commander) complimented all ranks for their steadfastness and resilience enabling Indian Army's resolute commitment in ensuring peace and security in the region,' Army said in a post on X. Security officials said that due to the complexity of the terrain and the potential presence of more militants, the operation is likely to continue in the coming days. 'Troops are exercising maximum caution to avoid casualties while ensuring that no militant escapes,' said a senior police officer. Additional reinforcements remain deployed in the vast area to prevent any attempts of escape by the holed-up militants. The area has been under a strict security lockdown as the operation continues. UNI MJR PRS


Indian Express
6 hours ago
- Indian Express
ED attaches Rs 29,000 from Mangaluru blast suspect's account, says bomb was supposed to be planted at Dharmasthala temple
The Bengaluru zonal office of the Enforcement Directorate (ED) on Tuesday provisionally attached Rs 29,176 kept in the bank account of Syed Yasin, one of the accused in the 2022 case in which a pressure-cooker bomb accidentally exploded in an autorickshaw in Mangaluru. The agency said the bomb was meant to be planted at the Dharmasthala Manjunatha Swamy Temple. 'Investigations conducted revealed that the ISIS online handler named 'Colonel' had given training over Wicker app/ Telegram etc. to the main accused Mohammad Shariq alias Premraj and other accused persons, to make improvised explosive device (IED)/Bomb and also arranged funds through certain mute accounts and also through crypto currencies which were at times encashed by Syed Yasin and Mohammad Shariq, through PoS agents, for a commission and at some instances the encashed cryptocurrencies were routed through the fraudulently opened mule accounts in FINO Payments Bank,' ED said in a statement on Wednesday, citing the investigation done by the National Investigation Agency (NIA). The NIA, which took over the investigation from the Karnataka Police, has said in its chargesheet filed in the case that the blast was part of an ISIS terrorist plot. According to ED, Rs 2,86,008 was deposited by different cryptocurrency dealers in the mule accounts and Rs 41,680 was collected in cash from point-of-sale agents as part of the terror plot. The amounts were used for buying items online to assemble the improvised explosive device (IED), hiring hideouts in Mysuru city and other places, and also for conducting reconnaissance at various places in Tamil Nadu, Kerala and Karnataka. The bomb was supposed to be planted at the Dharmasthala Manjunatha Swamy Temple, the agency said in its statement. Also, the police had seized Rs 39,228 from Mohammed Shariq at Father Muller Hospital in Mangaluru. On November 19, 2022, Mohammed Shariq, 24, suffered 40 per cent burns after an IED he was carrying in a bag kept on his lap while travelling in an autorickshaw accidentally went off in Mangaluru. It exploded as the bomb timer was set for 09 seconds, instead of 90 minutes, according to the NIA. The police arrested Shariq after the blast. Another accused in the case, Maaz Munir, allegedly provided details of the mule accounts to Shariq to receive payments sent by the online handler, 'Colonel'. Further investigation in the case is in progress, the agency said.


The Print
7 hours ago
- The Print
ED attaches Rs 29,176 from bank account used to receive ISIS funds for 2022 Mangaluru IED blast
At one time, the account received more than Rs 3 lakh of which the terror module had spent more than Rs 2 lakh. It was part of the overall funds passed on to terror accused Mohammed Shariq and his aides, including Syed Yasin, the ED spokesperson said. The bank account was used to allegedly fund various nefarious activities such as online purchase of items to assemble an Improvised Explosive Device (IED), hiring hideouts in Mysuru city as well as in conducting reconnaissance of different places in Tamil Nadu, Kerala and Karnataka, an ED spokesperson said Wednesday. New Delhi: The Enforcement Directorate (ED) has attached the money lying in the bank account of the 2022 Mangaluru bomb blast accused, who allegedly used to receive funds from his ISIS handler. The account came under the ED lens after the Karnataka police booked Shariq alias Premraj, a resident of Shivamogga district, for orchestrating an IED blast near Kankanady railway station in Mangaluru on 20 November, 2022. From the spot, the local police had found a pressure cooker, 9-volt batteries and circuits generally used for assembling IEDs. In the further course of investigation, chemicals, mechanical tools and electrical items—required to assemble IEDs—were seized from Shariq's rented accommodation in Mysuru. Days later, the case was handed over to the National Investigation Agency (NIA). In its charge sheet, the NIA submitted that Shariq was on the way to plant the IED concealed in pressure cooker outside Manjunatha temple in Dharmasthala. However, the IED went off because the timer was set at nine seconds instead of an initially planned time of 90 minutes, leaving Shariq with 40 percent burn injuries. All these accused are in judicial custody and are now facing trial. Also Read: 'Bare allegations'—how Malegaon ruling debunked ATS & NIA's theories on RDX, conspiracy meetings Online DIY classes A couple of months before the blast, the Shivamogga police booked Shariq, Yasin and Munir Ahmed alias Maz on the charge of hatching a conspiracy to spread the ISIS ideology. The trio, according to the FIR, was working to bring Sharia law as they believed India never really got independent. The trio had stored explosives and exploded a bomb outside Yasin's house in Shivamogga, it added. The NIA registered a case on 15 November, 2022—five days before the Mangaluru IED blast mistakenly triggered by Shariq. An ISIS handler with the pseudonym 'Colonel' radicalised the trio along with at least nine other youth from across Karnataka and gave them instructions through applications such as Wickr and Telegram on how to assemble IEDs, according to the counter-terrorism agency. The handler, it said, had also trained them online on carrying out reconnaissance of sensitive targets such as power sub-stations, railways, telephone access points, as well as business and industries belonging to individuals of the Hindu community. The handler had arranged payment channels through cryptocurrency, which were sold and deposited into mule bank accounts opened with Fino Payments Bank, the NIA alleged. Through the same method, the accused received Rs 2.86 lakh, while funds amounting to Rs 41,680 were collected in cash from PoS (Point of Sale) agents. The money was used to purchase items online to assemble the IED, for hiring hideouts in Mysuru city and other locations, and also for conducting reconnaissance in Tamil Nadu, Kerala, and Karnataka, the NIA said. The police seized Rs 39,228 in cash from Shriq's bag when he was admitted to a hospital after being injured in the IED blast. The remaining Rs 29,176 in Yasin's bank account was disabled on the ED's instruction. (Edited by Tony Rai) Also Read: Web of spoof sites, scam call centres. Crypto theft racket modus operandi in focus amid ED crackdown