Delhi | 25°C (windy)

Unveiling a New Terror Tactic: How Pahalgam Militants Used Online Shopping for Communication

  • Nishadil
  • September 25, 2025
  • 0 Comments
  • 2 minutes read
  • 3 Views
Unveiling a New Terror Tactic: How Pahalgam Militants Used Online Shopping for Communication

In a startling revelation that underscores the evolving tactics of terror groups, the Jammu and Kashmir Police have unearthed a sophisticated method employed by militants to maintain their vital communication links. The ongoing investigation into the December 2023 Pahalgam encounter has brought to light how terrorists leveraged the anonymity and convenience of online shopping platforms to procure essential supplies, specifically mobile phone chargers, to stay connected with their handlers.

The encounter, which took place in the dense forest area of Pahalgam in Anantnag district, resulted in the elimination of two hardened terrorists.

One was identified as Waseem Raja, a local militant, and the other as Qari Anas, a foreign operative belonging to the Pakistan-based Jaish-e-Mohammed (JeM) outfit. Another accomplice, Zahid Ahmad Rather, was neutralized in a separate operation in March.

What initially seemed like a routine post-encounter search led to a discovery that pointed towards a more complex narrative.

Among the debris and belongings at the encounter site, investigators found discarded packaging material from prominent online delivery companies like Flipkart and Amazon. This unusual find immediately piqued the interest of the police, suggesting an unconventional supply chain at play.

Further painstaking investigation meticulously pieced together the trail.

It was discovered that the terrorists, operating deep within the forest, desperately needed to recharge their mobile phones to communicate with their handlers, who are believed to be across the border. To facilitate this, they activated a local contact in Kulgam, Mohammad Asif Lone. Lone, acting as an overground worker (OGW), played a crucial role in bridging the physical divide to the digital world.

Lone’s modus operandi was equally cunning.

To obscure the transactions and avoid direct detection, he utilized the bank account of a relative – his cousin – for making the online purchases. Once the mobile chargers were delivered to a designated address, Lone would then retrieve the packages and undertake the perilous journey into the forested hideouts to deliver the crucial items to the waiting militants.

This intricate network allowed the terrorists to bypass traditional procurement methods that would typically expose them to security surveillance.

The militants, according to police sources, were heavily armed, possessing M4 carbines, AK-47 assault rifles, and multiple grenades, indicating their intent for significant subversive activities.

They were part of a newly formed JeM group, specifically tasked with reviving the dwindling militancy in the South Kashmir region. The use of online platforms for logistics marks a disturbing evolution in their operational strategies, allowing them to procure goods without drawing immediate attention to their physical movements or contacts.

This revelation poses a significant challenge for security forces, as it highlights the adaptation of terror groups to modern technologies and their willingness to exploit digital infrastructure for their nefarious purposes.

The Jammu and Kashmir Police are now broadening their investigation, scrutinizing the digital footprints and supply chains to identify any other individuals or networks involved in aiding and abetting these online logistics for terrorist activities. The ongoing probe aims to dismantle this new and increasingly sophisticated method of terror sustenance.

.

Disclaimer: This article was generated in part using artificial intelligence and may contain errors or omissions. The content is provided for informational purposes only and does not constitute professional advice. We makes no representations or warranties regarding its accuracy, completeness, or reliability. Readers are advised to verify the information independently before relying on