NIA files chargesheet against 6 in Jaish Nagrota infiltration-transportation module case

NIA files chargesheet against 6 in Jaish Nagrota infiltration-transportation module case

New Delhi: The National Investigation Agency (NIA) on Monday (July 27) filed a cost sheet in opposition to six accused in reference to the Jaish-e-Mohammed (JeM)’s Nagrota Infiltration- transportation module case earlier than the NIA Special Court, Jammu. 

The cost sheet was filed u/s 120B, 121,121A, 122 and 307 IPC, Sections 16, 18, 19, 20, 38 and 39 of the Unlawful Activities (Prevention) Act, Sections 7, 25, 27 of the Arms Act, Sections 3,4,5 of Explosive Substances Act and Section 6(1A) of the Indian Wireless Telegraphy Act.

The six accused in opposition to whom the cost sheet was filed included 1. Sameer Ahmed Dar, s/o Abdul Rashid Dar r/o Kesrigram, Kakapora, Pulwama; 2. Asif Ahmed Malik, s/o Bashir Ahmed Malik r/o Quazigund, Kakapora, Pulwama; 3. Sartaj Ahmed Mantoo, s/o Firdous Ahmed Mantoo r/o Kesrigram, Kakapora Pulwama; 4. Suhaib Manzoor, s/o Manzoor Ahmed Wani r/o Karimabad Pulwama; 5. Zahoor Ahmed Khan, s/o Ghulam Hassan Khan r/o Bangund, Wanpora, Pulwama; and, 6. Suheel Javid, @Suhail Lone s/o Javid Maqbool Lone r/o Wagar, Khan Sahib, Budgam. 

The case was registered with Nagrota police station on January 31, 2020 (FIR No. 0045/2020) whereby a truck carrying three freshly infiltrated Pakistani terrorists was stopped for checking at Ban Toll Plaza, Nagrota, Jammu on Pathankot-Sringar Highway. The driver, Sameer Ahmad Dar, and his two associates–Asif Ahmad Malik and Sartaj Mantoo, escaped benefiting from pre-dawn darkness, the heavily-armed Pakistani terrorists hiding contained in the cargo cabin of the truck began firing on the police social gathering grievously injuring one safety personnel.

In the following search operation launched by the safety forces within the forest space, the three Pakistani terrorists had been later killed whereas the driving force and his two associates had been arrested. 

The NIA took up the investigation and arrested three extra terror associates of this Infiltration-Transportation module. Searches had been carried out at a number of locations in Kashmir valley and incriminating materials together with paperwork and digital units had been seized.

The probe revealed that other than their unsuccessful try in January 2020, this module had acquired a bunch of three Pakistani terrorists in December 2019 after they infiltrated into India from the International Border in Samba sector and ferried them to South Kashmir.

This module was in contact with Pakistan-based Jaish-e-Mohammad handlers and launch-pad commanders who used to ship the placement of freshly infiltrated terrorists and likewise share the code-words for receiving them to driver Sameer Ahmad Dar on safe messaging apps.

The different three arrested accused–Suhaib Manzoor, Zahoor Ahmad Khan and Suhail Javed @ Suhail Lone had been the over-ground staff (OGWs) of JeM and supplied secure shelter, logistics and communication back-up for the infiltration and transit of the Pakistani terrorists. 

These OGWs additionally bought ‘phirans’ for the infiltrated terrorists to make them seem like Kashmiris and to assist them conceal their weapons. 

The arms and ammunition consisting of two AK-47 rifles, 1 AK-56, 2 AK-74’s 1 M4 Carbine, 2 Glock pistols, 3 Chinese pistols, 35 grenades, 12 kg high-grade explosive, 3 Satellite telephones, 6 wi-fi units, 6 distant controls, 9 detonators and batteries introduced by the Pakistani terrorists have been seized, together with the vans and automotive used for his or her motion.  

$(function() { return $("[data-sticky_column]").stick_in_parent({ parent: "[data-sticky_parent]" }); });

reset_scroll = function() { var scroller; scroller = $("body,html"); scroller.stop(true); if ($(window).scrollTop() !== 0) { scroller.animate({ scrollTop: 0 }, "fast"); } return scroller; };

window.scroll_it = function() { var max; max = $(document).height() - $(window).height(); return reset_scroll().animate({ scrollTop: max }, max * 3).delay(100).animate({ scrollTop: 0 }, max * 3); };

window.scroll_it_wobble = function() { var max, third; max = $(document).height() - $(window).height(); third = Math.floor(max / 3); return reset_scroll().animate({ scrollTop: third * 2 }, max * 3).delay(100).animate({ scrollTop: third }, max * 3).delay(100).animate({ scrollTop: max }, max * 3).delay(100).animate({ scrollTop: 0 }, max * 3); };

$(window).on("resize", (function(_this) { return function(e) { return $(document.body).trigger("sticky_kit:recalc"); }; })(this));

}).call(this);

} on_load_google_ad(); function sendAdserverRequest() { try { if (pbjs && pbjs.adserverRequestSent) return; googletag.cmd.push(function() { googletag.pubads().refresh(); }); } catch (e) {

googletag.cmd.push(function() { googletag.pubads().refresh(); }); } } setTimeout(function() { sendAdserverRequest(); }, 5000);

function on_load_fb_twitter_widgets(){ (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.9"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));

window.twttr = (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0], t = window.twttr || {}; if (d.getElementById(id)) return t; js = d.createElement(s); js.id = id; js.src = "https://platform.twitter.com/widgets.js"; fjs.parentNode.insertBefore(js, fjs); t._e = []; t.ready = function(f) {

t._e.push(f); }; return t; }(document, "script", "twitter-wjs")); }

//setTimeout(function() { on_load_google_ad(); }, 5000); setTimeout(function() { on_load_fb_twitter_widgets(); }, 5000);

Source