logo
Pakistan Army Chief Attends Funeral Of Major Who Captured Abhinandan In 2019

Pakistan Army Chief Attends Funeral Of Major Who Captured Abhinandan In 2019

NDTV5 hours ago

Islamabad:
Pakistan Army Chief Asim Munir attended the funeral of a Pakistani military officer who had claimed to have captured Indian Air Force pilot, Abhinandan Varthaman, after his jet was shot down in a dogfight in 2019. Major Syed Moiz Abbas Shah, 37, was killed on Tuesday in a clash with the Taliban militants in the Sararogha area of South Waziristan near the Afghan border.
Shah's funeral prayers were held at his native village, Chaklala Garrison in Rawalpindi, and army chief Field Marshal Asim Munir attended it, according to a statement released by Pakistan's Inter-Services Public Relations (ISPR).
A picture from the funeral prayers has also surfaced on social media, where Azim can be spotted with other Army officers.
"Major Syed Moiz Abbas fought bravely in the face of resistance and ultimately laid down his life in the line of duty, upholding the highest traditions of bravery, sacrifice, and patriotism," the ISPR statement quoted Munir as saying.
Shah was laid to rest with full military honours, the statement added.
About Major Shah
Shah was commissioned into the Pakistani Army in 2011. However, he later became part of the Special Services Group (SSG) and was currently serving in the volatile Waziristan region.
After his death, it turned out that he was the same officer who had captured Abhinandan Varthaman and saved him from mob violence, local media reported.
An old clip of his interview with Geo TV on social media shows Shah, who was captain then, giving details of capturing Abhinandan Varthaman.
Operation Against Pakistan Taliban
Per the ISPR statement, the army troops killed 11 terrorists belonging to the Tehreek-e-Taliban Pakistan (TTP) and wounded seven others in the same operation.
Another jawan, Lance Naik Jibran Ullah, 27, was also killed in the same battle.
The TTP, also known as the Pakistan Taliban, was set up as an umbrella group of several terrorist outfits in 2007. Its main aim is to impose its strict brand of Islam across Pakistan.
The group, believed to be close to al-Qaeda, has been blamed for several deadly attacks across Pakistan, including an attack on army headquarters in 2009, assaults on military bases, and the 2008 bombing of the Marriott Hotel in Islamabad.
Pakistan describes TTP as "Fitna al-Khawarij", a reference to a group in earlier Islamic history which was involved in violence.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

₹50,000 for secrets: Navy staffer fell for ‘Priya', leaked Operation Sindoor information to Pakistan
₹50,000 for secrets: Navy staffer fell for ‘Priya', leaked Operation Sindoor information to Pakistan

Hindustan Times

time28 minutes ago

  • Hindustan Times

₹50,000 for secrets: Navy staffer fell for ‘Priya', leaked Operation Sindoor information to Pakistan

An Indian Navy staffer posted at the naval headquarters in Delhi has been arrested in Jaipur for allegedly leaking a range of classified defence information to a Pakistani handler, including details of Operation Sindoor, for which he received ₹ 50,000. Vishal Yadav was caught leaking Operation Sindoor details to a Pakistani handler(Representational image/ Pixabay ) Vishal Yadav, an upper division clerk (UDC) in the Directorate of Dockyard at the Navy building in Delhi, allegedly leaked classified information related to Operation Sindoor, a series of strikes carried out by the Indian Armed Forces in Pakistan and Pakistan-occupied Kashmir in retaliation for the Pahalgam terror attack, PTI reported. Yadav, a native of Rewari in Haryana, passed the sensitive information to a female Pakistani handler who had posed as an Indian woman, inspector general of police (CID-security) Vishnu Kant Gupta said. He was arrested on Wednesday in Jaipur and will now face a joint investigation involving multiple agencies. 'Yadav confessed to receiving approximately ₹ 2 lakh in total for the information he passed on. This included ₹ 50,000 for leaking information related to Operation Sindoor,' the IGP added, saying some of the payments had been made through cryptocurrency. Espionage trail began on Facebook Quoting intelligence sources, PTI also reported that the espionage trail began on Facebook, where the Pakistani handler using the fake identity 'Priya Sharma' sent Yadav a friend request. Their communication soon became regular and later shifted to WhatsApp, before eventually moving to Telegram, a platform known for its encryption features. Police said Yadav initially received small sums, ranging from ₹ 5,000 to ₹ 6,000, for lower-grade information. However, as the handler pushed him for more critical material, he began sharing classified defence data for higher payments. 'He was lured by money and ended up leaking sensitive information from the Navy headquarters,' Gupta said. 'After monitoring his social media activity and confirming his links with a Pakistani handler, he was detained in Jaipur for joint interrogation involving multiple national agencies,' the IGP added. Yadav, who hails from Punsika village in Haryana's Rewari district, is also said to be addicted to online gaming, an addiction investigators believe may have contributed to his vulnerability in falling into the espionage trap. Forensic analysis of his mobile phone has revealed substantial evidence, including financial transactions, encrypted chats, and classified defence material shared with the handler, the report added. The probe is ongoing, with authorities examining his cryptocurrency dealings and further connections. IG Gupta warned that Pakistan's intelligence networks are deploying increasingly sophisticated tactics to extract sensitive information. 'We are keeping a constant watch on such activities, and this arrest is a result of sustained monitoring and timely action,' he said. With PTI inputs

How Pakistani handler lured arrested Indian naval staffer for spying
How Pakistani handler lured arrested Indian naval staffer for spying

Hindustan Times

time28 minutes ago

  • Hindustan Times

How Pakistani handler lured arrested Indian naval staffer for spying

A Navy staffer, posted in the Naval headquarters, has been arrested in Jaipur for allegedly spying for Pakistan. The accused, identified as Vishal Yadav, was posted as an Upper Division Clerk (UDC) in the Directorate of Dockyard at the Navy building.(REUTERS/ Representational) The accused, identified as Vishal Yadav, was posted as an Upper Division Clerk (UDC) in the Directorate of Dockyard at the Navy building. According to the authorities, Yadav allegedly also shared details on Operation Sindoor carried out by the Indian Armed Forces in Pakistan and Pakistan-occupied Kashmir in response to the Pahalgam terror attack last month. How was the naval staffer lured to spy for Pakistan? According to a PTI report, Inspector General of Police (CID-Security) Vishnu Kant Gupta said Vishal Yadav leaked the classified information to a female Pakistani handler posing as an Indian woman. According to the report, the Pakistani handler first approached Yadav on Facebook. She sent him a friend request under the fake identity "Priya Sharma," and then the communication started. The two started communicating regularly on various social media platforms, from Facebook to WhatsApp. They later communicated through Telegram, a platform known for its encryption-enabled messages. Police said Yadav initially received small payments of ₹ 5,000- ₹ 6,000 for lower-grade information. However, the handler allegedly encouraged him to provide more valuable intelligence for higher compensation. That's when Yadav began sharing critical defence-related data. "He was lured by money and ended up leaking sensitive information from the Navy headquarters," the IG was quoted by PTI as saying. The accused is believed to have received around ₹ 2 lakhs for his spying. The authorities believe that the accused was addicted to online gaming, and that may have been what made him vulnerable to the trap of the Pakistani spy network. Various arrests after Operation Sindoor The authorities had busted a large spy network working for Pakistan after last month's Operation Sindoor. Several people from Punjab, Haryana and other places were arrested in connection with espionage, including influencers like Jyoti Malhotra. India had also declared some of the staff at the Pakistani High Commission in Delhi as persona non grata due to their connection to this network.

To derail probe? Uddav Sena slams Centre for wrong sketch of Pahalgam attackers
To derail probe? Uddav Sena slams Centre for wrong sketch of Pahalgam attackers

India Today

timean hour ago

  • India Today

To derail probe? Uddav Sena slams Centre for wrong sketch of Pahalgam attackers

The Shiv Sena (UBT) mouthpiece Saamna, in its latest edition, has launched a sharp attack on the Modi government over the botched identification of suspects in the Pahalgam terror attack, raising pointed questions about whether the release of incorrect sketches of the assailants was an error or a deliberate attempt to mislead security a hard-hitting editorial, the party asked, "If the real culprits of the Pahalgam carnage are finally being traced, that's welcome. But who was responsible for the grave mistake of issuing the wrong sketches? Who did it? And more importantly, was it a deliberate act to derail the investigation?"advertisementOn April 22, in one of the deadliest attacks in recent years in Kashmir, terrorists opened fire on a group of tourists in the Baisaran meadow of Pahalgam, killing 25 visitors and a local Kashmiri youth. Just 48 hours later, the government released sketches of three alleged attackers, which quickly circulated across social media. The release of these images was projected as proof of the Centre's prompt response, earning the government much praise. However, in a stunning reversal, the National Investigation Agency (NIA) later said the sketches were incorrect — none of the three men depicted were involved in the editorial likened the initial phase of the investigation to "beating a rope thinking it's a snake" and slammed the government for acting in haste without adequate verification. It was revealed that the sketches originally released, showing Kashmir's Adil Hussain Thokar and Pakistani nationals Ali Bhai alias Talha and Hashim Musa alias Suleman, were the basis of the manhunt that lasted two Affairs Minister S Jaishankar had even cited these identities in an international real twist in the case emerged when the NIA arrested two Kashmiris — Parvez Ahmad Jothar and Waseer Ahmad Jothar — who allegedly provided shelter and logistical support to the actual attackers. The investigation has revealed that the real perpetrators were Pakistani nationals affiliated with Lashkar-e-Taiba. One of the three attackers has been identified as Suleman Shah. The arrested locals confessed to giving refuge and food to the terrorists, and admitted that they were paid to remain Saamna editorial alleged that the central government's eagerness to showcase its speed may have come at the cost of credibility, suggesting that the premature release of inaccurate sketches not only derailed the investigation but also "damaged India's image globally". It called the NIA's revelation that the attackers were completely different individuals from those initially identified, 'startling' and "deeply embarrassing".As fresh evidence points conclusively to Lashkar-e-Taiba's involvement and a deliberate cross-border plot, Uddhav Sena has demanded accountability not just for the attack, but for what it called a "serious lapse" in the investigation process. The editorial closes with a demand for a thorough probe into how the sketches went wrong, and whether there was a hidden motive to mislead security agencies.- Ends(With inputs from Vidya Kumar.)Must Watch

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store