
How Op Mahadev unfolded: A day-by-day account of how the net closed in on Pahalgam terrorists
Immediately after the attack, the Army had put in place a wide net to ensure the terrorists did not escape into Pakistan. So, according to security sources, the only option left to the terrorists was to move deeper into the Valley. And Dachigam forest, with its heavy foliage and difficult terrain, was the perfect hiding spot.
New Delhi: The killing of the three LeT terrorists behind the Pahalgam massacre was the culmination of an operation that started immediately after the attack. Finally, it was on 22 May that the Intelligence Bureau (IB)—which was among the several agencies tracking the movement of the Pahalgam terrorists—got a credible input about their presence in the general area of the Dachigam forest near Srinagar in Jammu and Kashmir.
On 22 May, the IB analysed what they had and decided that the human intelligence they had received was credible enough for them to focus on a particular area.
Sources say that the information was shared with the Centre and a multi-agency coordinated operation was launched—Operation Mahadev. Sources say the operation was named after a hilltop in the area, Mahadev.
'Three terrorists were killed in a joint operation of the Indian Army, CRPF and Jammu and Kashmir Police (on 28 July). One of the terrorists, Suleiman, was a Grade A category commander of LeT (Lashkar-e-Taiba), and our agencies have ample evidence of his involvement in the Pahalgam and Gagangir terrorist attacks. Both Afghan and Jibran were Grade A category terrorists,' Home Minister Amit Shah told the Lok Sabha on Tuesday. 'All three terrorists behind the Pahalgam terror attack have now been killed,' he added.
Giving details of the operation, Shah said that from May 22 to July 22, continuous efforts were made to verify the human intelligence generated by the IB.
He said that officers from the IB, Army, Jammu and Kashmir Police and the CRPF kept patrolling in the cold at high altitudes to pick up the communication signals of the terrorists. The tactical part of the operation was being led by 4 Para, an elite unit of the Indian Army.
As reported by ThePrint earlier, the terrorists were using a specialised communication system that was difficult to track. However, specialised interception systems were used by the forces and eventually they managed to track down the group of terrorists while they were communicating—a major success.
On 22 July, the joint team was able to pinpoint the location of the terrorists to a much smaller area. Based on this, security forces threw a multi-tier security ring to ensure that the terrorists could not escape. Finally, a crack team of the 4 Para managed to get to the terrorists and the Indian Army announced their killing in Operation Mahadev on 28 July.
'We received a successful confirmation from sensors on 22 July. Then, a joint team of CRPF, Jammu and Kashmir Police, led by jawans from 4 Para of the Indian Army, encircled the terrorists. The five human (intelligence) assets were also sent for operation, and the three terrorists were killed in the operation,' Shah told Lok Sabha.
He said that further identification of the terrorists was done once the bodies were taken to Srinagar. 'NIA earlier arrested those who sheltered these terrorists. When their bodies were brought to Srinagar, we got them to identify the bodies.' Shah said.
Shah added that the forces also matched the bullet casings from the Pahalgam massacre site to the weapons found on the terrorists to establish that the same weapons were used.
'After these terrorists were killed, their rifles were seized. One was an M9, the other two were AK-47s. We got these rifles flown to Chandigarh central FSL (forensic science laboratory) on a special plane,' Shah said, adding that these rifles were then fired to get empty bullet shells. 'These were then matched with those found in Pahalgam by the FSL personnel who worked through the night. It was then confirmed that these three rifles were used to murder our innocent civilians,' Shah said.
'I have the ballistic report, which has been cross-checked by six experts who confirmed on a video call at 4.46 am today that the rifles recovered from the terrorists are the same used in Pahalgam,' Shah added.
(Edited by Viny Mishra)
Also read: Pahalgam attack deserves retaliation. India can borrow from US, Israel playbook

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
3 hours ago
- Time of India
Drone found inside Army camp in J&K's Samba, handed over to police
. JAMMU : A small drone, suspected to have been used for wedding photography, was found inside an Army camp in Jammu & Kashmir's Samba district, officials said Saturday. The drone was found in the Bari Brahmana cantonment area late on Friday. Preliminary investigation suggested the drone might have been used for a wedding ceremony nearby and lost control, landing inside the camp. Troops handed over the drone to local police for further investigations, the officials said. Get the latest lifestyle updates on Times of India, along with Friendship Day wishes , messages and quotes !


The Hindu
3 hours ago
- The Hindu
Photos recovered from an encounter site in 2024 helped identify Pahalgam terrorists
The three Pahalgam terrorists who were killed during Operation Mahadev on July 28 were identified and tracked with the help of photographs recovered from a mobile phone seized by the security forces after an encounter in south Kashmir in 2024, a senior government official said. The phone contained several pictures of the three Lashkar-e-Taiba (LeT) terrorists identified as Suleman, alias Faizal Jatt, Hamza Afghani, and Zibran posing with guns and ammunition. Hid in Dachigam forest The photographs were then matched with the accounts of eyewitnesses present at the Baisaran meadow on April 22 and a search was launched for them in the Dachigam forest, around 20 km from Srinagar, where they were hiding after the terror attack. The terrorists were using a LoRa (long range) wireless module to communicate, and its signals helped the intelligence agencies track their device was likely assembled, and has been sent for forensic examination, the official said. Home Minister Amit Shah informed the Lok Sabha on July 29 that indigenous technology was used to track the three terrorists in the Dachigam forest. The Minister said that on May 22, the Intelligence Bureau (IB) received information about the presence of terrorists in the Dachigam area through human intelligence. He said 'continuous efforts were made by the IB and the Army from May 22 to July 22 to confirm the information with an equipment made by our agencies to capture ultra signals in Dachigam'. 'While all three are Pakistanis, Hamza Afghani belongs to Khyber Pakhtunkhwa region in north-west Pakistan,' the official said. The official said the terrorists were sighted multiple times in the forest but they always managed to get away. Security forces combed the forests and monitored areas close to streams and rivers as the terrorists came there to fetch water. As reported by The Hindu, a group of 20-25 hardened terrorists from Pakistan infiltrated around three years ago and are said to be operating in the forest and mountains across Pir Panjal in Jammu and the forests in south Kashmir. In 2024, the foreign terrorists split into two groups, one led by Suleman who was killed during Operation Mahadev on July 28 and the other group led by another Pakistani identified as Musa. Since 2021, around 150 security personnel have been killed in Jammu and Kashmir, likely carried out by the same group. 'After Operation Mahadev, we have received crucial information about the other foreign terrorists and we have launched operations to track them down,' said the official.


Time of India
3 hours ago
- Time of India
Senior citizen duped of Rs 98,000 in online scam
Udupi: A senior citizen allegedly lost Rs 98,000 in an online scam. In a complaint, SS Nayak, 71, claimed that he had uploaded information about renting out his house on the OLX app and the 99Acres app. On July 30, at around 7.30pm, an unknown person called him, claiming to be an Army officer. He said he was transferred to the Udupi district and was looking to rent a house. The caller told the complainant that his senior officer would transfer the advance rent amount to his account. During a conference call, another person posing as an Army officer spoke and sent an online form via WhatsApp. As the complainant began filling out the form, he was asked to deposit Rs 5 into his account to verify the process. After doing so, he received a message confirming the Rs 5 credit. The fraudster then convinced him that by continuing to fill out similar online forms, he would receive Rs 48,000 and Rs 50,000 in his account. As the complainant proceeded to fill in the forms, the caller asked for his internet banking user ID and password. When the complainant refused to share the details, the call was disconnected. The next morning, at around 7.30am, when the complainant checked his internet banking account, he discovered that Rs 98,000 had been fraudulently withdrawn. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like These Photos Captured the Exact Wrong Moment Read More Undo He complained. A case was registered at Manipal police station under Sections 316(2), 318(4), 319(2) of the BNS, and Sections 66(C), 66(D) of the IT Act. Man loses Rs 90,000 A man allegedly lost Rs 90,000 after being misled by a caller posing as a life insurance representative. Hariprasad, 59, in a complaint, said that he took a home loan from a private bank 10 years ago for the construction of a house. As part of the process, the same bank enrolled him in a personal insurance policy with a private life insurance company. The complainant paid one or two premium instalments initially, but later stopped payments and allegedly did not receive any further notices from the insurance company. On Feb 17, an unknown person called the complainant, claiming to be from the insurance company. The caller informed him that his personal insurance premium was overdue and instructed him to make the payment immediately. Believing the caller, the complainant clicked on a payment link sent by the accused and transferred Rs 90,000 through Google Pay. Later, when the complainant visited the insurance office to confirm the payment, the company staff informed him that no such amount was received. Realising he was cheated, the complainant filed a complaint. A case was registered at Udupi Town police station under Sections 318(4) of the BNS and 66(D) of the IT Act. Get the latest lifestyle updates on Times of India, along with Friendship Day wishes , messages and quotes !