logo
From Abbottabad Via Muzaffarabad: What Route Did Pahalgam Terrorists Take To Reach Attack Site?

From Abbottabad Via Muzaffarabad: What Route Did Pahalgam Terrorists Take To Reach Attack Site?

News184 hours ago

The NIA investigation has confirmed that the terrorists involved in the Pahalgam massacre were of Pakistani origin. Central agencies are now working to determine the probable route these terrorists took before reaching the attack site.
According to sources, terrorists were highly trained and may have been involved in multiple attacks, including the Spiner attacks in Jammu and Kashmir. Their training reportedly included advanced combat skills, concealment techniques, and survival tactics.
A source said there is credible information suggesting a specific route starting from Abbottabad, a city known for hosting multiple academies of the Pakistani armed forces. From there, they are believed to have moved to Muzaffarabad before infiltrating India, possibly via the Poonch-Rajouri route. Various intelligence agencies have reported this route.
The sources said these terrorists might have been in the region for an extended period and could have been involved in other attacks alongside different terror groups. The NIA is now examining their potential links to previous incidents, including those that occurred last year.
However, the exact timeline of their entry into Indian territory has not yet been established. Agencies are analysing digital footprints to track the terrorists' movements, an approach that has yielded critical leads in the past. Investigators believe the group stayed at multiple locations across Jammu.
'Suleman, a Pakistani national, was involved in the attack. Central agencies have traced a group's movement through digital footprints in the past, and they are using a specialised communications system that is difficult to intercept," a senior official involved in the investigation told News18 on the condition of anonymity.
The official said while road routes are longer, the distance can be reduced by 60 to 70 per cent through hilly terrain.
The NIA is also investigating the role of local collaborators, who may have assisted the terrorists during their journey by providing logistical support, helping them flee, or aiding in the concealment of weapons.
The agency has gathered substantial evidence regarding the identities of the terrorists. This includes eyewitness accounts from victims, video footage, technical evidence, and sketches released by the Jammu and Kashmir police. All this evidence is being carefully analysed, and the NIA has not yet reached any conclusions.
On Sunday (June 22), the NIA arrested two local men who allegedly helped the terrorists. 'In a major breakthrough in the Pahalgam terror attack case, the National Investigation Agency (NIA) has arrested two men for harbouring the terrorists who carried out the horrendous attack that killed 26 innocent tourists and grievously injured 16 others," the NIA said.
The two men, Parvaiz Ahmad Jothar from Batkote, Pahalgam, and Bashir Ahmad Jothar of Hill Park, Pahalgam, disclosed the identities of the three armed terrorists involved in the attack and confirmed that they were Pakistani nationals affiliated with the proscribed terrorist outfit Lashkar-e-Taiba (LeT).
'Parvaiz and Bashir had knowingly harboured the three-armed terrorists at a seasonal dhok (hut) at Hill Park before the attack," the NIA said. 'The two men provided food, shelter, and logistical support to the terrorists, who, on the fateful afternoon, selectively killed the tourists based on their religious identity, making it one of the most gruesome terrorist attacks ever."

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

AI 171 crash: Kerala minister V Sivankutty, ministers pay homage to victim
AI 171 crash: Kerala minister V Sivankutty, ministers pay homage to victim

India Gazette

time21 minutes ago

  • India Gazette

AI 171 crash: Kerala minister V Sivankutty, ministers pay homage to victim

Thiruvananthapuram (Kerala) [India], June 24 (ANI): Kerala Ministers V Sivankutty, GR Anil, CPI (M) General Secretary MA Baby and State Secretary MV Govindan, along with other party leaders paid homage to Ranjitha, one of the passengers who died on the ill-fated Air India 171 flight. Mortal remains of Ranjitha were brought to Thiruvananthapuram for the last rites. Earlier on June 22, the DNA samples of 251 victims were identified and handed over to concerned families. Speaking to mediapersons, Ahmedabad Civil Hospital Superintendent Rakesh Joshi said, 'DNA samples of 251 dead bodies of the plane crash have been matched. So far, a total of 245 bodies have been handed over to the families, while six families, who are from the UK, will receive the bodies of their relatives in the near future.' 'The 245 dead include 176 Indian citizens, 7 Portuguese, 49 British citizens, one Canadian and 12 non-passengers. Dr Rakesh Joshi gave details of the bodies handed over,' he added. On June 12, a London-bound Air India Boeing 787-8 Dreamliner crashed into a hostel complex of BJ Medical College in the Meghani Nagar area of Gujarat's Ahmedabad shortly after takeoff from Sardar Vallabhbhai Patel International Airport. Former Gujarat Chief Minister Vijay Rupani was among the passengers who died in the plane crash. Two days ago, Air India CEO and Managing Director Campbell Wilson reassured the public and employees that the airline's fleet--particularly its Boeing 787 aircraft--remains safe to operate following comprehensive checks and that the carrier is exercising maximum caution in the wake of the AI171 tragedy. In an official communication, Campbell said, 'Have our aircraft been deemed safe? Yes. We have completed the additional precautionary checks on our operating Boeing 787 fleet as requested by the DGCA, who have publicly declared that they meet required standards.' 'We have also, as a matter of abundant precaution, voluntarily decided to continue additional pre-flight checks for the time being. Where there is any doubt, we will not release aircraft - of any type - for service,' said the CEO. (ANI)

How A Cyber Storm That Tried To Cripple India's Top Offices During Op Sindoor Was Crushed
How A Cyber Storm That Tried To Cripple India's Top Offices During Op Sindoor Was Crushed

News18

time2 hours ago

  • News18

How A Cyber Storm That Tried To Cripple India's Top Offices During Op Sindoor Was Crushed

Last Updated: The cyber onslaught, aimed at overwhelming and crashing India's top digital infrastructure, primarily originated from China, Pakistan and some other areas located in the Gulf The websites of a top Indian constitutional office faced over a 100-fold surge in DDoS (Distributed Denial of Service) attacks during the recent conflict between India and Pakistan, with the cyber-attacks being primarily traced to some regions of China and Pakistan, News18 has learnt. MeitY (Ministry of Electronics and Information Technology), along with other agencies, formed special teams and swiftly deployed advanced cyber-defence systems to neutralise the threat in real time to make the websites functional. According to sources in the government, the cyber onslaught, aimed at overwhelming and crashing India's top digital infrastructure, primarily originated from China, Pakistan and some other areas located in the Gulf. Such activities triggered a high alert across agencies, leading to the deployment of MeitY's advanced cyber-defence systems, equipped with next-gen firewalls and real-time threat neutralisation protocols. A senior officer, who is part of the special team, told News18: 'The attack was not just significant in scale but also in intent and timing. The attacks were strategically launched to disrupt critical digital infrastructure amid a high-stakes national security operation." Top cyber-intelligence sources added that the flood of fake traffic originated predominantly from two geopolitical hotspots. Both neighbouring regions were identified as the primary source of botnet-driven requests that targeted sites in an attempt to render them inaccessible to legitimate users. 'These were not isolated pings. The attack was persistent, coordinated, and sustained over several days," the officer added. The DDoS attack functions by overwhelming a server, website, or the network with a relentless stream of requests until the system is slowed down, or becomes unresponsive, and in the process, crashes entirely. In this case, the intensity of the attack forced the government's cyber security agencies and MeitY to deploy its cutting-edge defensive cyber protocol, activating high-grade firewall barricades and AI-enabled threat filters to neutralise incoming malicious traffic. 'Attack vectors were identified, analysed and isolated systematically. What could have been a full-blown digital blackout was prevented by swift deployment of our real-time cyber shield," a senior cyber official confirmed. Sources also revealed that India's National Critical Information Infrastructure Protection Centre (NCIIPC) was alerted, and counter-intrusion strategies were put in motion immediately after unusual traffic patterns were flagged. The PMO servers, fortified under Level-5 digital protection protocols, held steady due to rapid mitigation steps—but the scale of the attack has raised serious concerns about state-backed cyber warfare tactics being employed to coincide with India's internal security operations. This marks one of the most coordinated digital offensives targeting a top-level Indian government site in recent months. The timing—coinciding with Operation Sindoor's execution phase—is not viewed as a coincidence by officials. India's cyber agencies are now in the process of tracing the botnet networks, identifying compromised global nodes, and mapping the larger architecture of hostile cyber command centres. Preliminary indicators suggest that this was more than just digital mischief—it was a strategic attempt to distract, disrupt, and disable. First Published: June 24, 2025, 10:16 IST

Noshir Gowadia: Indian-origin engineer developed propulsion system of US B-2 Spirit bombers; jailed for helping China build cruise missile
Noshir Gowadia: Indian-origin engineer developed propulsion system of US B-2 Spirit bombers; jailed for helping China build cruise missile

Time of India

time2 hours ago

  • Time of India

Noshir Gowadia: Indian-origin engineer developed propulsion system of US B-2 Spirit bombers; jailed for helping China build cruise missile

Noshir Gowadia The United States deployed its B-2 Spirit bombers in Sunday's strikes on three key nuclear facilities in Iran. The aircraft, sometimes also referred to as the 'Stealth' bomber, has an Indian connection - a US citizen of Indian origin was involved in the development of the plane's propulsion system. The engineer, Mumbai-born Noshir Gowadia, was later sentenced to over 30 years in prison for sharing classified military information with China, with which Beijing developed a cruise missile exhaust system to make Chinese cruise missiles resistant to detection. Noshir Gowadia and the B-2 Spirit bomber According to the Federal Bureau of Investigation (FBI), Gowadia, now 81, was first arrested in October 2005 on a criminal complaint which alleged that he "wilfully communicated" national defense-related information to a person "not entitled to receive it." As per information produced during the trial, Gowadia worked with Northrop Grumman Corporation - the makers of B2 bombers - for almost 20 years, from approximately 1968 to 1986. During this time, he contributed to the development of the unique propulsion system and low observable capabilities of the B-2; the naturalized US national also continued to work on classified matters as a contractor with the with the United States government until 1997, when his security clearance was revoked. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Free P2,000 GCash eGift UnionBank Credit Card Apply Now Undo Noshir Gowadia and visits to China Evidence displayed at the trial showed that Gowadia visited China six times between June 2003 and July 2005 to provide defense services in the form of design, test support and test data analysis of technologies for the purpose of helping Beijing build a cruise missile system by developing a stealthy exhaust nozzle. At the time of his arrest, Gowadia had been paid at least $110,000 by the Chinese. The sentencing Gowadia was found guilty in August 2010, following six days of deliberation after a trial spanning nearly four months in Honolulu. In January 2011, he was handed a jail term of 32 years.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store