NIA probe unearths how Pakistan-based groups use WhatsApp to fuel terror in Kashmir - News Summed Up

NIA probe unearths how Pakistan-based groups use WhatsApp to fuel terror in Kashmir


NEW DELHI: NIA, while analysing social media activity of “habitual” Kashmiri stone-pelters as part of its J&K terror funding probe, found at least 28 WhatsApp groups whose creators, administrators and some members are based in Pakistan and include identified cadres of terror outfit Jamaat-ud-Dawah.Sources in NIA on Tuesday told TOI that the WhatsApp groups together have 5,000 members, of which majority are local Kashmiris but a significant number are linked to Pakistani mobile numbers.Many of these groups have either been created by a Pakistani or have Pakistanis as their administrators. “We have identified Pakistani numbers in the WhatsApp groups. Some of these numbers also show up in JuD posters and publicity material, confirming JuD link to the J&K youth who regularly pelt stones to disrupt ongoing anti-terror operations, allegedly on payment arranged by Hurriyat separatists,” said an investigator.The origin of the funds is believed to be in Pakistan, though NIA says it can establish more specific details after questioning the seven arrested Hurriyat leaders.The messages on the 28 Whatsapp groups tracked by NIA range from religious posts, terror-inciting material to updates on J&K militancy and ongoing anti-terror operations.There are messages posted during encounters between the terrorists and security forces in J&K, telling the participants how “your brothers have been cornered” and sharing details of the encounter site. Eventually, the probe is expected to reach right up to the top leadership of both hardline and moderate factions of Hurriyat. In fact, sources indicated Tehreek-e-Hurriyat chairman Syed Ali Shah Geelani’s son Naeem Geelani may soon be summoned for questioning by NIA.


Source: Economic Times July 25, 2017 20:46 UTC



Loading...
Loading...
  

Loading...

                           
/* -------------------------- overlay advertisemnt -------------------------- */