“Recruit Hindus, don’t stop Ghazwa-e-Hind”: Uttar Pradesh terror module busted

6

A Pakistan-linked terror module operating out of Uttar Pradesh’s Meerut used Hindu recruits and coded identities to avoid suspicion and conduct reconnaissance at sensitive locations, investigators have found during questioning by the Uttar Pradesh ATS.

The details emerged during the remand of key accused Shakib, who is believed to have been in direct contact with handlers based in Pakistan. According to officials, he was instructed to evade capture and ensure the mission was not left incomplete, with references made to the concept of “Ghazwa-e-Hind”.

Hindu recruits used as cover

Investigators said Shakib was directed to recruit young Hindu men to reduce scrutiny. Acting on those instructions, he allegedly brought in Vikas and Lokesh, luring them with money and radical messaging.

The recruits were assigned coded identities — Lokesh was referred to as “Salim” and Vikas as “Zahid” — to conceal their roles within the network.

During interrogation, it was revealed that Lokesh was primarily used for reconnaissance, particularly in areas where his identity allowed easier access, including religious sites.

Dubai link and online radicalisation

The probe has also uncovered an overseas link. Investigators believe a handler identified as Aaqib, based in Dubai, played a key role in coordinating the module and facilitating contact with Pakistan-based operatives.

He allegedly used platforms such as Instagram and Telegram to recruit and influence youths, sharing content featuring weapons like AK-47 rifles and offering money to attract them.

Officials said such “motivational” content and imagery were used to normalise violence and draw recruits into anti-India activities.

Surveillance of defence sites

According to the ATS, the module conducted reconnaissance of multiple defence installations and cantonment areas across the state. Videos of these sites were recorded and sent to handlers.

Investigators said handlers shared precise Google locations, which Shakib and his associates visited to film and transmit footage, reportedly receiving payments in return.

There are also indications that the group gathered information related to the movement and security of prominent religious and Hindutva leaders.

Arrests and wider probe

The Uttar Pradesh ATS has arrested Shakib alias Devil, Arbab, Vikas alias Raunak from Gautam Buddh Nagar, and Lokesh alias Papla Pandit in connection with the case.

According to ADG (Law and Order) Amitabh Yash, Shakib had direct links with Aaqib, who has been operating from abroad for a prolonged period. His name has been included in the FIR, and further legal action is being initiated.

Pattern under scrutiny

Investigators say the methods seen in this case reflect a broader pattern. In recent months, multiple modules linked to Pakistan-based handlers and global terror outfits have been uncovered across Uttar Pradesh.

In one instance, the ATS arrested Harish Ali, a BDS student from Saharanpur, accused of promoting ISIS ideology and recruiting members through online platforms using apps such as Instagram, Session and Discord.

In another case, a Pakistan-linked group allegedly planning arson and sabotage was dismantled, with members found to be coordinating via Telegram, Signal and Instagram.

A separate crackdown in Lucknow led to the arrest of four suspects linked to an ISI-backed network allegedly planning attacks on key infrastructure, including railway systems.

Officials say the recurring use of social media for recruitment, overseas handlers, and targeting of critical infrastructure has prompted closer scrutiny, with agencies now examining possible links between these modules.

Comments are closed.