Cyber Jihad: Pakistan’s New Proxy Struggle Technique In Kashmir Uncovered | India Information

A brand new type of terrorism known as ‘Cyber Jihad’, reportedly orchestrated by ISI-backed terror masterminds throughout the border, has been launched to bypass the sturdy counter-terrorism framework in Jammu and Kashmir. The Counter Intelligence Kashmir (CIK) wing of the Jammu and Kashmir Police has uncovered and dismantled 5 digital modules that had been operating this operation. These modules had been a part of a broader technique aimed toward radicalizing native youth by means of encrypted on-line platforms, spreading extremist propaganda, and recruiting them into terrorist outfits.
Terrorist commanders have shifted their modus operandi, leveraging digital platforms underneath the banner of “Cyber Jihad.” They’re now focusing on weak youth on-line, spreading misinformation, and recruiting for terror organizations utilizing encrypted communication apps like Sign, Telegram, WhatsApp, Wire, and Session. These platforms are chosen particularly for his or her end-to-end encryption, making it troublesome for intelligence companies to intercept communications.
Preliminary contact is commonly made by means of public social media platforms reminiscent of X (previously Twitter), Instagram, or Fb. The handlers monitor posts expressing dissent or non secular fervour after which transfer the dialog to non-public encrypted apps for indoctrination and recruitment.
Propaganda supplies—starting from movies glorifying terrorism to fabricated tales of atrocities by Indian safety forces—are shared with potential recruits. Audio messages invoking non secular responsibility or “jihad” are additionally circulated. Terrorists usually exploit youth coping with political grievances, unemployment, or private challenges.
The youth focused are usually underneath 25 and are available from particular socio-economic backgrounds. Handlers work to make them really feel understood and related, usually posing as mentors or non secular guides.
Pakistan-Based mostly Community Behind Operations
Teams like Jaish-e-Mohammed (JeM), Lashkar-e-Taiba (LeT), The Resistance Entrance (TRF), and Hizbul Mujahideen (HM) are primarily behind these digital campaigns, with help from Pakistan’s Inter-Providers Intelligence (ISI). A key determine recognized in latest operations is Abdullah Ghazi, a senior Jaish-e-Mohammed member who ran a digital recruitment cell from Rawalpindi. Ghazi radicalized youth by means of encrypted chats, selling terrorism as a path of valor and spiritual responsibility. His operation was refined, involving step-by-step indoctrination, coaching, and job task.
The CIK, with help from Indian intelligence companies, lately launched a serious operation towards this digital terror module. Ten places throughout Srinagar, Budgam, Pulwama, and Ganderbal had been raided. The operation used superior surveillance instruments like deep packet inspection, protocol bypass, and geo-tracking to hint Ghazi’s digital actions and dismantle his community. This was the fifth main cyber module busted by CIK.
Earlier Cyber Modules Busted:
* Terror Funding Module (LeT): Operated by a Pakistani handler often called Sumama alias Babar alias Ilyas, this module targeted on smuggling funds from Gulf nations to help recruitment and operations in Kashmir.
* Extortion Module (Hizbul Mujahideen): Run by Janbaaz Ghazi alias Ghazi Baba, this unit extorted cash from native residents to fund terror actions.
* Courier Recruitment Module (Ansar Ghazwat-ul-Hind): * Managed by Baba Hamas alias Hanjullah, this group tried to recruit youth as couriers for arms and ammunition.
* Non secular Radicalization Module (Tehreek Labaik Ya Muslim – TLM): Led by the identical handler, Baba Hamas, this faction pushed radical narratives and inspired youth to affix terror outfits.
CIK’s Response and Challenges Forward
SSP Tahir Ashraf Butti of CIK confirmed that 5 digital modules have been neutralized to date, and several other people have been arrested. He emphasised, “Pakistan is making an attempt its greatest to radicalize native youth and push them in direction of terrorism, however our operations are ongoing to cease this recruitment drive. This effort will proceed.”
The shift towards digital recruitment comes within the wake of a steep decline in native terrorist recruitment in Jammu and Kashmir. Official information reveals that just one new native recruit has emerged in 2025—marking the bottom quantity up to now 36 years. A big portion of native terrorists recruited between 2019 and 2023 have been neutralized, and Over Floor Staff (OGWs) have additionally dwindled attributable to safety crackdowns. This has compelled Pakistan to depend on cyber techniques to maintain terrorism.
On-line Recruitment Ways
Handlers exploit private vulnerabilities—romantic points, household disputes, or a want for social recognition. Some youth are lured by non secular rhetoric, others by guarantees of fame or cash. As soon as radicalized, they’re assigned roles reminiscent of transporting weapons, gathering intelligence on safety forces, sharing propaganda materials on-line and executing low-level assaults like grenade lobbing or graffiti campaigns.
Encrypted directions usually use coded language—“books” for weapons, “conferences” for assaults, and “walks” for arms motion. Recruits are promised monetary rewards, with funds made by way of hawala, crypto, or nameless money drops, based on statements from arrested youth.
SSP Tahir Ashraf Butti reiterated, “Our mission is to forestall youth from being misled. These efforts by the enemy are deliberate and systematic, however we’re figuring out modules, monitoring communications, and taking well timed motion. We is not going to let our youth be used as pawns in a proxy struggle.”
“Cyber Jihad” has emerged as Pakistan’s newest tactic to proceed its disruptive agenda in Kashmir whereas sustaining believable deniability. The involvement of ISI, encrypted instruments, and sleeper cells showcases a harmful shift in terror operations, requiring steady vigilance and superior countermeasures.