Foreign intelligence's activities in India discussion thread

Pakistan using its diplomatic missions to push fake currency into India, for terror financing
ANI | Updated: Oct 9, 2019, 7:52 IST
71498933.jpg

Pakistan using its diplomatic missions to push fake currency into India, for terror financing - Times of India
LONDON: Three years after India demonetised high currency notes to crackdown on black money, Pakistan has started producing, smuggling and circulating better quality Fake Indian Currency Notes (FICN) to finance illicit activities and militant groups, including the Lashkar-e-Taiba and its affiliates, Jaish-e-Mohammed.
Senior officials reveal that a large amount of counterfeit currency from Pakistan is making its way into India using pre-2016 system and infrastructure- of gangs, their syndicate, channels, and routes.
Most surprisingly, Pakistan has been misusing diplomatic channels in Nepal, Bangladesh and other countries to bring and distribute consignments of Fake Indian Currency Notes.
Sources reveal that Pakistan's secret agency, the ISI, manages to create this currency of better visual quality than the earlier photocopied notes.
In May 2019, a recently released D-company associate, Younus Ansari, was arrested with three Pakistan nationals at Kathmandu Airport with a huge consignment of Indian currency totaling Indian Rs 76.7 million.
The temerity of the couriers was obvious from the fact that the stash was not even concealed, as in the past, but was loosely dumped into checked-in baggage. The consignor was notorious Pakistan-based FICN smuggler Razzak Marfani.
Interestingly, the same Younus was arrested a few years ago in Nepal for conspiring to implement a hit-job on an Indian diplomat in Kathmandu.
On September 22, police in Indian Punjab seized FICN worth Rs.1 million from Sikh radical elements belonging to the Khalistan Zindabad Force (KZF), which had also received five AK 47 Rifles, 30 bore pistols, nine hand grenades, five satellite phones, two mobile phones and two wireless sets, sent across the international border with Pakistan, through Drones.
Again, on September 25, police in Dhaka seized FICN worth Indian Rs. 4.95 million.
A Dubai-based individual 'Salman Shera' had sent the parcel to Sylhet in Bangladesh, which was sent to Dhaka via a courier service 'SA Poribahan.'
The individuals apprehended revealed that from Sylhet the consignment was headed to Sreenagar Upazila in Munshiganj District in Dhaka.
The original consignor Salman Shera is the son of Aslam Shera, a notorious Pakistan-based ISI dealer in FICN, active since the late 1990s, said senior officials.
Before demonetisation, the Pakistani Embassy in Kathmandu was the nerve centre for FICN operations, and used Birgunj Town as its vital transit point for almost all fake currency notes entering India.
Sources reveal that ISI had set up a large network of agents from Kathmandu to Birganj and all along the border, to push consignments of FICN from Nepal into India. "ISI transported fake notes through the state-owned Pakistan International Airlines, or through the diplomatic bag to its Missions in Dubai, Kuala Lumpur, Hong Kong, and Doha", sources revealed.
They added, "From these locations, couriers brought consignments on PIA or other international flights to Kathmandu or Dhaka".
In Bangladesh, Pakistan has been misusing diplomatic channels to bring and distribute consignments of FICN. Mainstream Bangladeshi media is replete with incidents, wherein Pakistani nationals posted at its High Commission in Dhaka have been expelled, formally and informally, for ferrying FICN and for terror financing activities.
In late 2015, Second Secretary at the Pakistan High Commission in Dhaka Farina Arshad, was withdrawn after Idris Sheikh an operative of the militant organization Jamaat-ul-Mujahideen (JMB) admitted to having links with her.
Sources reveal that prior to this in January 2015, Mazhar Khan an Attache in the Consular Section of Pakistani Mission in Dhaka was similarly expelled after Bangladeshi intelligence accused him of peddling FICN and providing funds to terror outfits.
Mazhar Khan had cultivated a Bangladeshi national Mujibur Rahman, and had sent him to India 11 times and to Thailand 22 times in just a few years, to circulate FICN.
The above Pakistani Mission officials had also developed close ties with radicalized elements in Dhaka University, officers of Pakistan International Airlines and a section of Bangladeshi nationals residing along the border with India in places such as Lalmonirhat, Jessore, Thakurgaon, and Benapole, the main ingress points for FICN into India.
The earnings from FICN smuggling operations were further channeled to terror outfits operating from Bangladesh, like Hizb-ut-Tahrir, Ansurullah Bangla Team and Jamaat Shibir.
The Financial Action Task Force's (FATF) report on 'Money Laundering and Terrorist Financing Related to Counterfeiting of Currency', referred to Article 3 of the Currency Counterfeiting Convention (Geneva, 1929) which defined counterfeiting as "fraudulent making or altering of currency, whatever means are employed." FATF Recommendation 3 designates counterfeiting currency as a predicate offence for money laundering.
It identifies money laundering and terror financing as aspects associated with counterfeit currency, and these are, in turn, related with organized crime.
The report categorically stated, "India has also reported large scale use of counterfeit currency, by both State and non-State actors, to assist/fund terrorist acts. The case studies in this regard furnished by India, expose the scale and intensity of the problem. In particular, there is evidence of multiple bases being used to flood the country with counterfeit notes, thereby attempting to attack the 'economic security' of the country, besides using it to fund/assist specific terrorist acts".
The role of organized criminal groups in the production of counterfeit currency was elaborated in FATF's 2013 report. It cited the case of a seizure in February 2012 of counterfeit Indian Rupees concealed in a shipping consignment from Pakistan via Hong Kong, China to Nepal.
Latest Comment
Pakistani embassies are not diplomatic missions but a collective terror mission.
Shasti Brata
See All CommentsAdd comment

The report highlighted that high-quality counterfeit Indian notes were printed in Pakistan and then smuggled into India through transit points at Dhaka, Bangladesh as well. The other route to smuggle FICN was by smuggling through the India-Pakistan, India-Bangladesh and India-Nepal borders.
Production and smuggling of Fake Indian Currency Notes by Pakistan exposes its nefarious designs to destablise the Indian economy and support terrorism.
 
Pakistani users and bots had a hand in trending #GoBackModi on Twitter
By Ananya BhattacharyaOctober 16, 2019

India’s neighbour may be taking Twitter warfare pretty seriously.

When Indian prime minister Narendra Modi was holding an “informal summit” with Chinese president Xi Jinping in Chennai on Oct. 11, over 12,000 tweets under the #GobackModi hashtag originated from Pakistan, fact-checking firm Logically AI found. The company, which uses both human and artificial intelligence, traced this activity using network analysis.

Total engagement—likes and retweets—under this trending hashtag, which came from that country surpassed 80,000. These include accounts actively engaging with authentic tweets under the hashtag to boost them. After all, Twitter trends are region-specific so Indian tweets on the issue need to proliferate for impact.

“The primary objective to spread misinformation and disinformation through these accounts is to disturb the civil discourse,” said Lyric Jain, founder and promoter of Logically.

Using social media to churn out fake news was exploited during the Brexit debate as well as the 2016 US presidential election. Even in India, this nefarious activity surfaced in the first half of this year, during the Lok Sabha elections, the 23-year old Cambridge, MIT, Harvard graduate said. Logically had busted fake news accounts from China and Pakistan then.

Jain is convinced that, like in the past, there has been a concerted, targeted effort this time, too.

Locking the target
The hashtag isn’t brand new. It trended in January, when Modi went to lay the foundation for the All India Institute of Medical Sciences (AIIMS) in Madurai. A few weeks later, when Modi came to Tiruppur, it trended again. In March, when Modi was visiting Kanyakumari to launch projects, it resurfaced.

However, its recent revival seems planned. A lot of the activity Logically saw came from handles created on or after Sept. 30—nearly 34% of them—suggesting that they were created solely for this purpose.

There were a total of 1,273 accounts that originated from Pakistan. Out of them, majority (834) were bots. These accounts were identified because they are either completely automated or they use some script to do a lot of retweets and so on.

Then, some of the human run accounts from Pakistan, are posing as Indian users belonging to Maharashtra, Tamil Nadu, and Haryana. Logically found out that self-declared location of these accounts and the geolocation of each tweet were irregular and had discrepancies.

This location deception is “often done a lot to gain other users’ trust,” Jain, founder and promoter at Logically, told Quartz. “A lot of these bots end up being followed by (a) lot of authentic users. And if you’re in a similar area, you might expect similar world views.”


PS: what an implementation of the technology. Bravo Pakistanis for waking up lethargists in ministries of my country. Or else these military guys and babus were only misusing government funds to enjoy their life and lavish lifestyle to look cool. And I really thank Modi also that now he has started dismissing them. Jiyo Modi!!!
 
Pak ultras trying to enter via Nepal: Intel

Pak ultras trying to enter via Nepal: Intel


New Delhi, October 17
Intelligence agencies have alerted the government that at least five ISI-backed Pakistan terrorists, highly trained, are placed in Nepal to infiltrate into India either through Uttar Pradesh or Bihar border ahead of Diwali, sources said.
Sources in the agencies said telephonic intercepts of conversations between the terrorists in Nepal and their handlers in Pakistan suggest they have a plan to strike in India in a big way with the help of a few of the home-grown Kashmiri militants, who will meet them in Delhi.
Their last location was found to be near Gorakhpur on Nepal border, but for a few days they stayed at Beerganj, near Raxaul border in Bihar. Officials in the MHA said following the input, a high alert has been issued across the country.
On Wednesday, several defence bases in Jammu and Kashmir and Punjab were put on orange alert after intelligence inputs suggested a group of terrorists is planning to target these, they said, adding a general alert had already been issued on August 5, when the government took the decision to do away with special status to J&K under Article 370.
In the last week of September, the multi-agency centre that collates data and inputs from human intelligence, radio intercepts and other sources had indicated that 60 terrorists had infiltrated into India since the government’s decision on Article 370, but most of them could manage through LoC. — TNS
---------------------------------------------------------------------------------------
PS: This is basically their idea to create unrest in India amid Ayodhya verdict.
 
Pakistan's ISI directs overground workers in Kashmir to prepare new route for infiltration: Intel report

Pakistan's intelligence agency ISI has issued directives to its overground workers in Kashmir to prepare a route plan for infiltration, intelligence sources have said.


This comes amid heightened tension between India and Pakistan following the abrogation of Article 370 which Islamabad has tried to raise on every international forum. After failing to get any traction, the frustrated Pakistani Army is relying on other options and planning to launch terror attacks in Jammu and Kashmir.


Pakistan-based terrorists launch infiltration into Jammu and Kashmir every year during winter under the cover of snowfall. This year, the ISI has asked its overground workers in Kashmir to prepare a new route and start the recce ahead of winter.


According to an intelligence report, they have been asked to recce forward locations of Army in Gurez Sector and prepare a map to reach the location. They have also been asked to get the GPS locations of Indian Army camps and nallahs in the area.

Pakistan's ISI directs overground workers in Kashmir to prepare new route for infiltration: Intel report

Terrorists who are successful in infiltration are helped by local guides. These guides have links with different terror organisations operating in the region.


According to the intelligence report, ISI has provided the terrorists who are ready to infiltrate with details of overground workers, their contacts near the Line of Control (LoC).


The report also mentions the heightened movement of Pakistani Army in PoK. Areas such as Minimarg, Kamri, Dimel and Gultari, where both Pak army posts and terror camps exist, have seen these movements.


These areas have also received arms and ammunition recently.
 
Confirmed: North Korean malware found on Indian nuclear plant's network | ZDNet

The network of one of India's nuclear power plants was infected with malware created by North Korea's state-sponsored hackers, the Nuclear Power Corporation of India Ltd (NPCIL) confirmed today.
News that the Kudankulam Nuclear Power Plant (KNPP) might have been infected with a dangerous strain of malware first surfaced on Twitter on Monday.
Pukhraj Singh, a former security analyst for India's National Technical Research Organization (NTRO), pointed out that a recent VirusTotal upload was actually linked to a malware infection at the KNPP.
The particular malware sample included hardcoded credentials for KNPP's internal network, suggesting the malware was specifically compiled to spread and operate inside the power plant's IT network.
Malware linked to North Korea's Lazarus Group
Several security researchers identified the malware as a version of Dtrack, a backdoor trojan developed by the Lazarus Group, North Korea's elite hacking unit.

Singh's tweet and revelation immediately went viral because just days before, the same power plant had an unexpected shutdown of one of its reactors -- with many users conflating the two unrelated incidents as one.
Initially, KNPP officials denied that they've suffered any malware infection, issuing a statement to describe the tweets as "false information," and that a cyber-attack on the power plant was "not possible."
knpp-statement-1.png
Image: ZDNet
But today, NPCIL, the KNPP's parent company, admitted to the security breach in a separate statement.
"Identification of malware in NPCIL system is correct," the statement started.
NPCIL said the malware only infected its administrative network, but did not reach its critical internal network, the one used to control the power plant's nuclear reactors. NPCIL said the two networks were isolated.
In addition, NPCIL confirmed statements made by Singh on Twitter; that they received notification from CERT India back on September 4, when the malware was first spotted, and that they investigated the matter at the time of the report.
Not actually a big deal
According to an analysis of the Dtrack malware from Russian antivirus maker Kaspersky, this trojan includes features for:
  • keylogging,
  • retrieving browser history,
  • gathering host IP addresses, information about available networks and active connections,
  • listing all running processes,
  • listing all files on all available disk volumes.
As evident from its features, Dtrack is usually used for reconnaissance purposes and as a dropper for other malware payloads.
Previous Dtrack samples have been usually spotted in politically-motivated cyber-espionage operations, and in attacks on banks -- with a custom version of Dtrack, named AMTDtrack also being discovered last month.
Historically, the Lazarus Group or any other North Korean hacker group, have rarely gone after targets in the energy and industrial sector. When they did, they went after proprietary intellectual property, rather than sabotage.
Most of North Korea's offensive hacking efforts have been focused on attaining insight into diplomatic relations, tracking former North Korean citizens who fled the country, or hacking banks and cryptocurrency exchanges to gather funds for the Pyongyang regime to raise funds for its weapons and missile programs.
The KNPP incident looks more like an accidental infection, rather than a well-planned operation. This specifically seems to be the case, since Kaspersky reported last month that the Lazarus Group had been spotted spreading Dtrack and AMDtrack versions across India, targeting its financial sector.
Article updated shortly after publication to include link to McAfee research on previous North Korean campaigns targeting the energy and industrial sector.

--------------------------------------------------------------------------------------------------------------------------------------------------------------

PS: So there is a confirmed news about cyber attack on India's nuclear power plant. This means the Chinese are behind. Why? Because they are using Pakistanis as proxy for network and North Korea as origin of malware , for their misadventures. On this thread there have been good discussions on cyber war. Last time I mentioned about blocking the air India system at airports when the news came about them being nonfunctional, now we are more shocked by this news of malware injection into nuclear reactor.
This is not a one day task, they might have done complete home work , kind of analysis of the nuclear power plant, and if the system was airgapped, they might have found that it's not always airgapped. The culprits might have got the information about those vendors who supply computers or do repair stuff at the powerplant , and then they used them as carrier to create a bridge.

Other way could be they knew that perhaps the workers at the powerplant use separable devices for their personal task or connect those devices with online network of home and office, so they first infected their home and office system and then the malware got carried by the external devices into standalone systems.
 
  • Like
Reactions: vingensys and Paro
After accidents on India's two submarines, I was pretty sure that there are insiders in Indian Navy who are helping foreign intelligence and Indian Navy is on the hit list. Who ever is their handler, I have always been mentioning that the network of foreign intelligence MSS, ISI and others was very much big. I could not prove it but such news past so many years were pointing towards that. The subversion of the millitary assets and their analysis is the main task of them.



According to intel agencies, which busted the espionage racket being run by Pakistan, three sailors were arrested from Visakhapatnam, two from Karwar and two from Mumbai.
Pakistan spy ring busted, Indian Navy's critical assets exposed



NEW DELHI: The arrest of seven naval officials from Mumbai, Karwar (Karnataka) and Visakhapatnam on Friday for leaking sensitive information about the movements of warships and submarines to Pakistani agents has exposed lapses in the security apparatus placed around critical assets in India.
According to intelligence agencies, which busted the espionage racket being run by Pakistan, three sailors were arrested from Visakhapatnam, two from Karwar and two from Mumbai.
The agencies stated that both the Eastern and Western naval command centres, responsible for the security of maritime borders, were exposed to the Pakistani agents.
Intelligence agencies busted the espionage racket linked to Pakistan with the arrest of seven Indian Navy personnel and a hawala operator.
"Some more suspects are being questioned," the agencies said.
The agencies pointed out that Visakhapatnam, the headquarters of the Eastern Command of the Indian Navy and also the base of nuclear submarine Arihant, was exposed to the espionage racket. They also stated that the Eastern Command looks upon suspicious Chinese ship movements in Indian waters.
The Western naval command in Mumbai was also exposed along with Karwar, the naval centre which has the force's lone aircraft carrier Vikramaditya.
Indian Navy, however, maintained that their critical assets were intact and that there was no breach.
About the arrests, the force said: "In a joint operation with naval intelligence and Central intelligence agencies, the Andhra Pradesh Police arrested some junior naval personnel. The case is under investigation by Andhra Pradesh Police."
Meanwhile, the intelligence wing of Andhra Pradesh police also said that they have busted the racket under an operation named 'Dolphin's Nose' in association with the central intelligence agencies and naval intelligence.
The accused were produced before the National Investigation Agency court in Vijayawada on Friday. They were remanded to judicial custody till January 3. Further details are awaited.
The police said that all the arrested officials were in touch with Pakistani women who had befriended them on Facebook.
It is alleged that officials were paid through a hawala operator for providing information. The chats between these sailors who were being used by Pakistani agents were sexually explicit.
Sources said the honey trap with women posing as their friends on Facebook was set up by Pakistani intelligence operatives. The sailors were later blackmailed and forced to provide information.
"We are probing the matter and more people could be arrested," the probe agencies said.
 
Islamic organisations Popular Front of India`s (PFI), Islamic Youth Federation, and Kashmiri stone pelters are being used to create ruckus amid protests against the Citizenship Amendment Act (CAA) in the country, according to sources on Thursday. The sources added that Pakistan's spy agency Inter-Services Intelligence (ISI) is funding them.
According to security agencies, the nefarious conspiracy to spread violence in the country in the name of opposition to the Act is being done by these organisations. People from PFI organization from Kanyakumari and Kerala were sent to different parts of the country while people from Islamic Youth Federation, Maharashtra are also included. The location of the people of these groups was found in places of violence in Delhi and Uttar Pradesh.

--------------------------------------------------------------------------------------------------------------------------------------------------


PS: There is no doubt ISI is involved in this , why because PFI has been formed on the model of SIMI, and the founder of SIMI was getting funds from ISI to destabalize Lakshadweep in 90's , as Indian navy and Af had it's presence there. PFI, SIMI, HuJI , call them whatever, they have same motive.

Other, aspect is they did not do any such violent acts in congress ruled state, this points to the fact that, Pakistan is very much involved into political subversion and sabotage in India, and favors Congress of the current leadership under Sonia , Rahul and Priyanka.


Anti-Citizenship Act protests: Islamic outfits, Kashmiri stone pelters behind violence, mayhem, say sources
 
Code Red
_______________

It's been more than four years since the first protest in JNU started against the Modi government where jehadis and leftists shook hand and chanted slogans of "Bharat tere tukde honge inshallah inshallah". This is the 5th year in the running and seeing the momentum of the protest and it's pattern matching the Hong Kong protest way, it's been clear that there is a foreign hand involved. There are sleeper cells behind this game supports by domestic political parties. Had it been limited to JNU , one could still be calm, but IIT's IISc and BHU have been penetrated by these goons which are technical unis as well.

Motive: Create unrest, make India academically handicapped and ruin the education and youth, ultimately the economy
---------------------------------------------------------------------------------------------------------------------------------------

If no action taken now, it can become a head ache and many bright brains who can contribute to India's technological growth will be devastated.
 
Please read carefully, although this forum is regulated but there are other defence forums, facebook, twitter, and other social media componets where defence enthusist, military people are vulnerable to foreign intelligence. The Pakistanis posing as Indians, or themselves , they are present on such forums and what happens next is they provoke the forum members who are somehow related to military or some ministry or army brats. Or they provoke the members on lines of religion, and it is very easy to provoke a Hindu when it comes to the history of past 600 years. This has been tested. They get trapped and then to show an upper hand they start revealing details some how to show the machoism.

A recent report at **** states the specifics


" Defence enthusiasts are knowingly or unknowingly leaking top secret information, Videos of troop operations and Photographs of Military Operations and installations gathered by themselves or from the above sources. They have also been bragging about their know-how of Militaryand posting the photos, videos and information online simply to drive traffic to their pages for popularity and money. The officers of the forces the must be aware all the time that whenever they are logging in to a social media website or app, they still represent the Indian Armed Forces. The forces need to develop a social media code of conduct that implies equally on officers as well as Soldiers. It’s difficult to build an open-source picture of foreign espionage operations against India, the authorities appear to keep the trials of such espionage cases, away from public and media glare to save themselves from embarrassment. In the recent past, the Army chief has been very vocal about how the enemies of the country use social media for their own benefits. Earlier this year, he warned his forces about the misuse of social media by those with propaganda. Last year, he had stated that social media is being used to mislead the youth of the country. Social media is in a true leveler. It doesn’t discriminate between two users, be it an officer (oppressor) or his sewadar (the oppressed). It feels good that the Army Chief has accepted that a ban on social media will not work, instead its usage should be brought under certain guidelines, Do’s and Don’ts to avoid imminent dangers from misuse, violations and release of any sensitive information. We also have to develop thorough guidelines in order to protect classified and unclassified information from miscreants. Our adversaries constantly look forward to get access to critical information about India’s military operations, whether they are in the planning process, being carried out or already completed. Data is the king in modern world and one insignificant looking social media post can end-up compromising our operational security. And, it is not the uniformed personnel only who are at risk of leaking such information. As the flow of data and social media has evolved into a giant, it is imperative to see if the forces really have an official social media policy? No! One is not talking about the social media restrictions that are applied very-very stringently upon the Soldiers, Sailors and Airmen. This Veteran senior Sailor’s concern is rather huge. Factually speaking, the senior officers are the one who are privy to sensitive information. Enemy spies are able to take advantage of the explosion of internet connectivity. The digital Indian state is now a very leaky place and the most of the reported National security leakage cases have an online component to them. The biggest National Security challenge for us is of ensuring that sensitive information does not leak onto public servers. Often, news about latest military technology is first available on online forums. Leaked photographs of new technologies are generally assumed to have the tacit approval of defence officials. Now, it seems that our adversaries are taking advantage of our tendency to unofficially reveal military secrets online. "

**** .Read more at India No 1 Defence News Website Indian Military & Media – Indian Defence Research Wing .

-----------------------------------------------------------------------------------------------------------------------------------------
Advice is, don't be an emotional fool
 
Pakistan’s ISI Training 40 Rohingya Men In Bangladesh With JMB’s Help; Plans To Push Them Into India: Intel


Pakistan’s ISI Training 40 Rohingya Men In Bangladesh With JMB’s Help; Plans To Push Them Into India: Intel


Pakistan's Inter-Services Intelligence (ISI) is now training around 40 Rohingya Muslims with the help of terror outfit Jamaat-ul Mujahideen Bangladesh (JMB) in Bangladesh so that they can push them into India to carry out terror activities, intelligence agencies have warned Indian armed and border guarding forces on Thursday (9 January).
"Pakistan is plotting a big conspiracy against India from the Bangladesh border. The Bangladeshi terrorist organisation Jamaat-ul Mujahideen is getting funds from Pakistan's Inter-Services Intelligence," said the agencies adding "ISI is providing terror training to 40 Rohingyas living in Cox's Bazar, Bangladesh."
Pakistan has funded terror training through Saudi Arabia and Malaysia. "In the first instalment, JMB has received funds worth 1 crore takas for terror training," the agencies said.
The intelligence agencies have also shared this information with National Investigation Agency for further probe.
The plan to fund training of Rohingya Muslims started after Pakistan was unable to push in terrorists through Line of Control in Jammu & Kashmir with Indian Army and border guarding forces taking an offensive approach.
Last year, NIA chief Y C Modi said that JMB is making all attempts to spread its tentacles across India and a list of 125 suspects have been shared with different states.
Modi had said the JMB has spread its activities in states like Jharkhand, Bihar, Maharashtra, Karnataka, and Kerala in the guise of Bangladeshi immigrants.
"The NIA has shared with states concerned a list of 125 suspected activists who have close links with the JMB leadership," he said. The list, which was shared with the states, contains 130 suspects.
NIA Inspector General Alok Mittal added that the JMB has set up 20-22 hideouts in Bangalore and tried to spread its bases in South India from 2014 to 2018.
"The JMB even conducted a trial of rocket launchers in the Krishnagiri hills along the Karnataka border," he said.
He added, the JMB was keen to attack Buddhist temples to take revenge for the plight of Rohingya Muslims in Myanmar. The JMB had started its activities first in 2007, initially in West Bengal and Assam, and then in other parts of the country.
(With inputs from IANS)
 
With grieve in heart I am writing this post that our government and India as a society has failed to counter Chinese ideology of expansionism. The world expansion has been misinterpreted by the Indian policy makers and only half interpretation is been taken while formulating policy.

Most people think that Chinese expansion means, land grabbing, which is just a part of this ideology. The Chinese expansion has far more reach and objectives than only land grabbing. The economic giant has very cleverly implemented the ideology of expansion in every field of a society.
The Chinese when we look at their academics, they have reached to all the renowned universities in the worlds and have penetrated their system. They have trained their students for this purpose and flooded the chinese students into every university possible, through out the world thus increasing the chinese footprint into world academics. And bring the professors and academicians into chinese influence. Where as Indians have failed in this aspect due to two reasons
1. Lack of initiative
2. Lack in understanding the mind set of the host country

I give you an example of a country in europe , lets say Norway. The Chinese and Indian students have good strength into the academic institutions. But the basic difference between Indian and Chinese students is very much worth consedering the Chinese take courses in the local language where as Indian students study the same course in English. When it comes to Job market in the host country, the Chinese have upper hand in that's where Indians fail. The Chinese are clever and initiators, they identify the structure find loop holes and only then they decide to act.

Same is the difference between Indian diplomacy and the Chinese art of diplomacy. And there fore, the Chinese really do not have to work on the espionage because that get's camouflaged by the cultural, business and diplomatic activities. This is where they have expanded into academics and technological aspect and area of their expansionist mind set.
 
Last edited:
Indian police officer suspected of aiding Kashmir rebels arrested

Davinder Singh's arrest along with rebels rattles Indian security apparatus and raises questions about his activities.
Mushtaq, who was arrested with Singh, was also a member of the Jammu and Kashmir police until 2017, two senior police officers told Reuters on Sunday.

A senior police officer has been arrested in Indian-administered Kashmir and accused of aiding rebels after he was found driving two rebels towards Jammu city, the region's chief of police told reporters.
Deputy Superintendent of Police Davinder Singh, a long-serving officer in the disputed region, was arrested after police intercepted a fast-moving car in southern Kashmir on Saturday night, police chief Vijay Kumar said.

Kumar called the arrests a "big operation" and named one of those Singh was arrested with as Naveed Mushtaq Baba, calling him a top commander of Kashmir's largest rebel group, Hizbul Mujahideen.
"We have registered a case against [Singh] under the arms, explosives and unlawful activities acts," Kumar said. "It is a sensitive case and we don't want any loopholes."
He added that Singh would be treated as a rebel and jointly interrogated by all the intelligence agencies.
Mushtaq, who was arrested with Singh, was also a member of the Jammu and Kashmir police until 2017, two senior police officers told Reuters on Sunday.

READ MORE
Why Europe's far right supports India on the Kashmir issue
Police officers said they believe Mushtaq was involved in the killing of 11 apple traders, drivers and labourers last year.
Reuters news agency said it was unable to contact Singh, Mushtaq or their representatives for comment. Hizbul Mujahideen has not publicly commented and could not be reached.
Who is Davinder Singh?
It was not immediately clear how or why Singh came to be traveling with the suspected rebels.
The case has rattled the Indian security apparatus that administers the tense region, where rebels have waged an armed campaign for decades demanding independence or a merger with neighbouring Pakistan, which administers a part of Kashmir.
Singh has long served in the police's Special Operations Group, a dreaded counterinsurgency unit that has been accused by Kashmiris and human rights groups of summary executions, torture and rape to holding suspects as well as civilians for ransom.
Indian media reports said Afzal Guru - hanged in 2013 for planning a 2001 attack on the Indian parliament - had claimed that Singh had asked him to accompany one of the attackers to New Delhi and arrange his stay there.
Singh was once injured in a police operation and was given the Indian president’s gallantry award in 2019.
He was most recently working at the anti-hijacking unit at Srinagar's airport, one of the most fortified and heavily guarded airports in India.
Last week, he was among the officers who received New Delhi-based foreign envoys of 15 countries who came to visit the region, which is under a communications and security lockdown.

Indian police officer suspected of aiding Kashmir rebels arrested
_________________________________________________________________________________________________________________________________________________________

PS: help bahane lapet diya jehadio ko :ROFLMAO:
 
Pro-Pakistan elements infiltrating anti-CAA protests in U.S.; pushing own agenda: Indian-Americans leader
Pro-Pakistan elements infiltrating anti-CAA protests in U.S.; pushing own agenda: Indian-Americans leader


Not only this, at least two Pakistani-Americans were among the main organisers of the anti-CAA protests in Washington DC on Sunday, claimed Indian-American community leader Adapa Prasad.
Pro-Pakistani elements have infiltrated the anti-CAA protests in the US to execute their hidden agenda against India, an Indian-American community leader has said.

During a recent protest against the CAA in Washington DC, posters were seen reflective of the presence of pro-Pakistani elements.

Not only this, at least two Pakistani-Americans were among the main organisers of the anti-CAA protests in Washington DC on Sunday, claimed Indian-American community leader Adapa Prasad.

Darakshan Raja, a Pakistani-American activist who also co-ordinates Kashmiri separatist protests in Washington DC area along with another Pakistani-American Muslim activist named Khudai Tanveer, were one of the main coordinators of the anti-CAA protests,” Mr. Prasad told PTI.

Mr. Prasad and his team shared videos and pictures of the individuals from the anti-CAA protests in Washington DC, which was attended by more than 500 Indian-Americans from in and around the city.

Mr. Prasad said one of the posters written in Urdu said Hans ke Liya hai Pakistan, Larr ke lengey Hindustan .

“This in English means we easily got Pakistan, now we will fight out to get India,” he said as he shared the picture of the said poster.

“This is disgusting. Pro-ISI and pro-Pakistani elements are using this protest to execute their hidden agenda which is depicted in their own poster,” Mr. Prasad said.

He said the protests are also being misused by pro-Khalistani activists to push their agenda.

“Arjun Sethi, a pro Khalistani activist, was also amongst the coordinators of the anti-CAA rally,” Prasad said.

Mr. Sethi had recently testified before a Congressional Committee on Kashmir.

In recent weeks, some of the Indian-Americans, during private conversation in WhatsApp groups, had expressed apprehensions that their anti-CAA protests could be misused by elements close to ISI and Pakistan.

There had been moments during which the organisers of these protests had increased scrutiny of those trying to lead the anti-CAA protests.

“It could be a trap to portray Indians and Indian Muslims in a negative light by someone, Mike Ghouse, an Indian-American who is the president of Washington DC-based Center for Pluralism, said in a recent blog.

Most of these anti-CAA protestors chant Bharat Mata Ki Jia and carry Indian national flag.

Some of the eye witnesses told PTI that the “Hindustan Pakistan” poster written in Urdu were withdrawn quickly after it came to the notice of some of the organizers.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------

PS: :ROFLMAO: ISI to ab humse mazey le rahi hai. Oh but we can't miss Kapil Sharma show in the evening with family.
 
Indian Navy's surveillance on intruders before 26/11 was abandoned in the mid and during aman ka tamasha meet b/w home secretary of India and Pakistan Raw had given inputs not to extend the meet and return before evening but Rehman Malik stopped them for special session and they returned when intruders had already entered India, and there are still sleeper cells working in Mumbai along with PFI who could be funded by Congress: RVS Mani

All of you should watch both the parts of the video to get some insights



 
Illegal VoIP exchanges busted in Noida and Kerala, link with Pakistan's ISI suspected; one arrested
Illegal VoIP exchanges busted in Noida and Kerala, link with Pakistan's ISI suspected; one arrested

New Delhi: In a joint operation, Mumbai Police along with the Military Intelligence of Jammu and Kashmir busted two illegal VoIP exchanges and SIM boxes which were being used to seek information from the defence personnel, and it is suspected that Pakistan's secret service agency, the Inter-Services Intelligence (ISI) was involved.
The raids were conducted in Uttar Pradesh's Noida and Kerala's Changaramukulam on Thursday during which two functional SIM boxes were recovered with 100 slots each and approximate 200 SIM cards, along with two routers, three modems, antennas, batteries and connectors, from Noida and Changaramukulam.
As per the sources, primary information about the drive was being obtained while one accused was arrested from Changermakulam during the raid.

ISI link
It all started in September 2019 when defence persons started receiving calls from suspicious numbers, seeking information related to important defence installations. The person on the phone was posing fictitious identity and the involvement of the ISI was suspected.
Further investigation by the Military intelligence and Mumbai Police revealed few illegal VoIP exchanges in Uttar Pradesh and Kerala, had routed calls incoming from Pakistan to local numbers. These were then used to extract information from the Defence persons. Based on this information, the Mumbai Police carried out joint operation along with Military intelligence.
These exchanges were being used by hostile intelligence agencies to seek military information through calls and posed a great security threat to the country.
After the preliminary inquiry and the confirmation of the usage of unauthorised SIM box, the Dongri police station in Maharashtra's Thane registered the crime under sections 419, 420, 465, 468, 471, 120 (b) of the Indian Penal Code (IPC) with the clause 1 of the Indian Telegraph Act 1885, Sections 4, 20, 25, with section 3, 6 the Indian Wireless Telegraphy Act 1933, and forwarded the investigation to the crime branch.
 
I don't know whether it's a fake news or authentic one please confirm. But even if it's authentic , I won't be surprized.

11 Navy personnel caught leaking sensitive information to Pak
11 Navy personnel arrested for espionage after being honey-trapped by ISI

11 Navy personnel caught leaking sensitive information to Pak
Identify traitors by name, says social media post

New Delhi: Police have arrested 11 employees of the Indian Navy on the charges of having connections with a Pakistani espionage racket.



So far 13 people, including 11 Indian Navy employees, have been caught in the honey trap of Pakistani intelligence agency ISI.

The Navy personnel apprehended by the police are from the different naval bases including Mumbai, Karwar (Karnataka) and Visakhapatnam.

After being honey-trapped these men had leaked sensitive information related to the Indian Navy through their social media profiles.

After the misuse of social media by the naval personnel came to light, the Indian Navy imposed a strict ban on the use of smartphones and social media applications such as Facebook by its personnel.

However, a similar ban has not been enforced by the Indian Army and Air Force even though they have also faced similar cases in the last few months.
Sources in the Navy said the sudden ban on using smartphones has created issues for the personnel in establishing contact with families and undertaking other digital work for personnel use.

The Navy has allowed the use of older technology mobile phones using 2G connectivity which experts feel, is of limited use and can possibly be intercepted.

However, the Navy sources said the restrictions on the use of smartphones and social media revealing personnel identity have existed for a long time and they are just being strictly implemented at this time.

A post about the report is making rounds on social media with the question that why national media is silent on the report. There are no TV debates and no front page headline. The post asks, “Why? Because they are not Muslims?” The post further reads, “Kapdon ke alava desh ke gadaron ko naam se bhi pehchana jaa sakta hai…”

A post released by The Logical Indian Citizen contains names of all the arrested personnel with the tag line ‘Desh ka namak khaate hain Pakistan kaa gaan gaate hain’

------------------------------------------------------------------------

Fact is, before you buy any stuff before you even deploy it Pakistanis know it.
 
Irked with Donald Trump’s India visit, Pakistan’s ISI fuelling violence in Delhi – Mysuru Today
-----------------------------------------

And this is from December
ISI planning riots across India, funding illegal immigrants, Rohingyas: Intelligence sources

ISI planning riots across India, funding illegal immigrants, Rohingyas: Intelligence sources
Updated:

Dec 19, 2019, 15:38 PM IST
Pakistan's intelligence agency Inter-Services Intelligence (ISI) is funding illegal Muslim immigrants and Rohingyas to incite nationwide riots and violence across India, Indian security agencies told Zee Media sources.
NEW DELHI: Pakistan's intelligence agency Inter-Services Intelligence (ISI) is funding illegal Muslim immigrants and Rohingyas to incite nationwide riots and violence across India, Indian security agencies told Zee Media sources.
According to sources, ISI is conspiring for stone-pelting in sensitive cities across the country and disrupt the peace and normalcy in the country by financial funding.
The ISI angle is also being looked into the violence that erupted during the anti-Citizenship Amendment Act protests in Delhi's Jamia Nagar, Seelampur and Jafrabad areas of the country.
The sources suggest that anti-terror cells across the country are investigating as many possible suspicious phone calls and at least a 1000 WhatsApp groups are being constantly watched for any suspicious activities.
The sources added that, on the same lines as Jammu and Kashmir, ISI is planning stone-pelting incidents on a large scale across the nation.
Massive and violent protests against the Citizenship Amendment Act (CAA) have gripped the nation with the situation escalating in several places including Delhi, Maharashtra, West Bengal, Bihar and Northeastern states.
The Act aims to grant citizenship to Hindus, Sikhs, Jains, Parsis, Buddhists and Christians fleeing religious persecution from Pakistan, Afghanistan, and Bangladesh and came to India on or before December 31, 2014.