
Exclusive: Pak's VVIP jet near Indian Air Force strike zone on May 10, probe shows
The Pakistan government uses a white Gulfstream G450 (G-IV-X) almost exclusively for the Prime Minister, President and Foreign Ministers. The IAF targeted the air base in Rawalpindi that likely destroyed a command and control unit, satellite pictures showed.
Satellite image of the Nur Khan airbase in Rawalpindi destroyed.
advertisementThe aircraft in the imagery matches the profile of Pakistan's VVIP transport, notable for its length, tail shape and rear-mounted engines. It also lacks the visible blue tail marking the other Gulfstream operated by the Pakistan Army, often used by its army chief, General Asim Munir.PAK PM'S PUBLIC MOVEMENTS ALIGN WITH AIRCRAFT PATHSThe subsequent movement of the aircraft further supports its identification. On May 12, the aircraft flew from Lahore to Sialkot using the PAK02 callsign, typically reserved for the Prime Minister. The destination and timing align with the PM's publicly reported travel.
Flight tracking data shows movement of VVIP Gulfstream matching Pakistan Prime Minister Shehbaz Sharif's public itinerary.
Two days later, the same aircraft flew to Beijing using the PAK03 callsign, consistent with the Foreign Minister's itinerary.
Flight tracking data shows movement of VVIP Gulfstream matching Pakistan Prime Minister Shehbaz Sharif's public itinerary.
Pakistan operates three Gulfstreams for VVIP use. At the time of the IAF strikes, data indicates that two Gulfstreams could have been present at the Nur Khan base while the other was positioned in Lahore.
The satellite imagery taken hours after the impact, however, shows only one at the Rawalpindi base.
Flight tracking data shows movement of VVIP Gulfstream matching Pakistan Prime Minister Shehbaz Sharif's public itinerary.
REFUELLING TANKER ACTIVITY SEEN AFTER STRIKEThe same Satellogic imagery also reveals the presence of an Il-78 aerial refuelling tanker at Nur Khan following India's strike, indicating active military operations from the base even after the incident. The Il-78 is a key asset for in-flight refuelling and supports deep-strike or extended patrol operations by fighter aircraft.Nur Khan is not just an airbase, it is the nerve centre for Pakistan's VVIP and high-level military aviation. Its proximity to Islamabad, and its dual-use role, make it one of the most sensitive air installations in the country.advertisementAll the available satellite imagery following the strike has indicated absolute precision by the IAF so far, with no visible missed targets at any of the locations.This evidence offers context to why Pakistan sought a ceasefire so swiftly on May 10. The exposure of top government aircraft and aerial refuelling assets at the country's most critical base may have underscored the risk of further escalation.India's decision to strike with precision, without expanding the scope to high-value leadership targets, also suggests a deliberate signalling of capability without provocation - a message clearly received.
IN THIS STORY#Pakistan#India-Pakistan#Operation Sindoor
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
an hour ago
- Time of India
‘Operation Sindoor strikes timed to avoid civilian casualties during prayers'
Nagpur: During Operation Sindoor , the strikes on the Pakistani terror establishments were deliberately timed between the last and the first namaz (prayer). This was done to ensure that no innocent civilians, who would have gathered for prayers at that time, were harmed, said Lt General (retd) Vinod Khandare, former principal advisor to the ministry of defence. Khandare was in the advisor's post when India struck targets in Pakistan during Operation Sindoor. Talking to TOI on the sidelines of his lecture organised by Jan Manch, he explained that the last namaz of the day takes place in the night and the first happens early in the morning. The idea was to strike only the terrorists and not the civilians, who may have gathered after the prayer calls. Khandare said that as India hit nine terror establishments, it made the terrorists realise that they were not safe at their hideouts in Paksitan. They may have secured themselves from attacks on the ground, but India struck from the air, he said. The debris will remind even the locals or other visitors that India struck deep in their base, said Khandare. Replying to a question on concerns over cases against security forces personnel, Khandare said there was a time when the entire bar council of Jammu and Kashmir was radicalised. They would take up cases against security forces without any charges. This was from 2007 till as late as around 2016. The situation has changed now, he said.


Time of India
2 hours ago
- Time of India
J&K SIA narco-terror chargesheet exposes Pakistan plot
JAMMU: Jammu and Kashmir police's State Investigation Agency (SIA) has filed its first chargesheet in a narco-terror case involving the seizure of 46 kg of heroin in Jammu and Punjab in Aug last year, exposing the role of Pakistan-based terror outfit Lashkar-e-Taiba to foment unrest in the state and elsewhere in India. 'The case stems from the arrest of Sartaj Singh, a resident of Punjab's Tarn Taran district, along with the seizure of over 33.5 kg of heroin from Bus Stand area in Jammu, based on precise intelligence inputs on Aug 9 last year,' an SIA spokesperson told reporters in Jammu on Sunday. The investigation led to the identification and arrest of a second accused, Amritpal Singh alias Fouji, who initially fled the scene with another consignment but was later arrested by Punjab police, leading to the recovery of an additional 12.6 kg of heroin. Investigators unearthed critical evidence linking Amritpal to a Pakistani handler affiliated with Lashkar-e-Taiba, the spokesperson said. Both accused have been booked under NDPS Act and UAPA.


Time of India
3 hours ago
- Time of India
5 of cyber gang that sent 8cr into 30 Pak bank accounts nabbed
Lucknow: Balrampur police on Saturday night uncovered an international cyber fraud and terror funding racket involving cryptocurrency and cross-border transactions. It arrested five people for allegedly funnelling over Rs 8.15 crore to 30 Pakistani bank accounts using the Binance app. Tired of too many ads? go ad free now According to police, the transactions took place between Sept 2024 and July 2025. The mastermind, identified as Suspier Chaudhary, a resident of Bihar's Nawada district, was operating the network from New Delhi. He was arrested near Kodri Ghat bridge in Balrampur, along with co-accused Pradeep Kumar Singh from Fatehgarh (Farrukhabad), and Satyadev, Lavkush Verma, and Jai Prakash also from Balrampur. According to Balrampur SP Vikas Kumar, the gang used over 200 mule bank accounts created under fake or rented identities. Chaudhary managed at least four WhatsApp accounts to coordinate operations. Two Pakistani bank account details were found on his mobile phone. The funds were converted into cryptocurrency and routed using Chinese and Singapore-based mobile applications, prompting police to contact foreign agencies for further investigation. Each mule account was tasked with receiving Rs 1 lakh daily, which would be withdrawn via ATMs. Account holders were paid a 15% commission. The locals rented their bank accounts for Rs 10,000 per month, unaware of their usage in cyber fraud. The withdrawn cash was then redeposited via cash deposit machines and routed abroad through apps. "The apps—some of which include names like Udhar Loan, Rupee Factory, Quick Loan, Credit Bee, Evirtualpay, Revolut, Daisysms, Cybersource, Monzo UK, Nicepay, Pay Labs, Zelle, Ebl Gateway, and others—were distributed through Play Store, Telegram links, and WhatsApp messages," said Kumar. Tired of too many ads? go ad free now The victims, often in urgent need of small loans, would download these apps and submit personal documents such as bank account numbers, Aadhaar, and PAN cards. Once uploaded, the apps would auto-transfer small amounts (e.g., Rs 1,200) into their bank accounts, only to demand Rs 2,000 or more within 7 days. "If repayment was delayed, the apps would misuse the access granted during installation to retrieve contact lists, photos, and personal files. Victims were then subjected to blackmail, abuse, and threats of public shaming, coercing them to repay inflated amounts," he said. The scam proceeds were not transferred back to the fake loan apps. Instead, Chaudhary and his associates used bank accounts of individuals hired on commission. These accounts were accessed with ATM cards and SIMs collected covertly. The funds were withdrawn in cash and deposited into Cash Deposit Machines (CDMs) into middlemen's accounts, who then converted the money into USDT (a stable cryptocurrency) via the Binance exchange. Through Peer-to-Peer (P2P) crypto transactions, the fraudsters laundered the money abroad, often to Chinese handlers running the scam from offshore locations, the district police chief said. "Anil admitted to receiving a 10% commission from each transaction. He retained 5% for himself and distributed the remaining among account providers and agents like Pradeep, Satyadev, Lavkush, and JP Yadav, who supplied bank accounts, ATM cards, and SIMs. These details were often delivered anonymously via buses or porter services to Delhi, helping maintain operational secrecy," said the police.