Jaish-e-Mohammad's New Playbook: How Proxy Modules Fuel Low-Visibility Terror

Security agencies have uncovered a dangerous new trend in terrorism. Groups like Jaish-e-Mohammad are now setting up proxy modules that operate with minimal direct oversight. This shift allows Pakistan's ISI to maintain plausible deniability while terror activities continue. The strategy specifically adapts to India's tougher stance of treating cross-border terror as an act of war.

Key Points: Jaish-e-Mohammad Proxy Modules ISI Low-Visibility Terror India

  • Proxy modules operate with limited direct command from parent terror groups like Jaish-e-Mohammad
  • The Faridabad module was largely self-sufficient in recruitment, funding, and logistics
  • Pakistan's ISI promotes this model for narrative control and plausible deniability
  • The strategy mirrors the Islamic State's lone-wolf inspiration through online propaganda
  • India's changed doctrine treating terror as an act of war prompted this tactical shift
  • Modules increasingly involve educated, white-collar individuals adept at using the dark web
4 min read

Jaish-e-Mohammad's new playbook: Proxy modules emerge as ISI pushes low-visibility terror in India

Intelligence reveals Jaish-e-Mohammad's shift to proxy terror modules in India, inspired by ISI strategy to ensure deniability and evade cross-border retaliation.

"Had this module not been busted, the ISI would hoped that similar modules would come up in the rest of the country at a rapid pace. - Intelligence Bureau Official"

New Delhi, Dec 12

The probe into the Faridabad module and the subsequent Delhi Red Fort blasts has found that the Jaish-e-Mohammad was in the process of setting up proxy modules in India.

An Intelligence Bureau official said that a proxy module is one where the involvement of the terror group’s command is limited, and the members of the module would be doing most of the work, with the terror group stepping in only at crunch moments, such as providing expertise.

The involvement of the terror group would not be from start to end.

The manner in which the Faridabad module operated makes it clear that it worked largely on its own. This included setting up the module, radicalisation, recruitment, arranging for the ammunition and even the logistics.

The module at Faridabad could be termed as either Jaish-e-Mohammad-inspired or linked, said an official.

The Jaish’s role in the module was limited to setting up and functioning of the module. The basic propaganda material was provided by the terror group. Further, there was limited interaction between the top command of the terror outfit and the members of the module.

The Jaish stepped in to provide a handler when it came to giving assistance about preparing the explosives, another official said.

An Intelligence Bureau official said that the country would increasingly witness this trend in future. Had this module not been busted, the ISI would hoped that similar modules would come up in the rest of the country at a rapid pace.

For Pakistan, such modules suit its narrative. It does not have to provide funds, as these self-inspired proxy modules would have arranged for the money. Further, it gives Pakistan the deniability factor, while also ensuring that acts of terror continue unabated in India.

This also has to do with the fact that the Narendra Modi government changed its doctrine on terror.

In the aftermath of the Pahalgam attack, the Modi government changed its doctrine, whereby it decided to consider an act of terror not as a cross-border strike, but as an act of war.

With such modules mushrooming, Pakistan can classify terror incidents as an internal incident.

Another official said that similar modules were to be replicated in Jammu and Kashmir as well. The infiltrations have become hard, and the ISI has failed to revive homegrown terror groups such as the Hizbul Mujahideen. It had hoped that the likes of Mufti Irfan Ahmed would pick the youth and radicalise them, following which they would be recruited into a fully homegrown module that has no direct association with terror groups such as the Lashkar-e-Taiba or the Jaish.

The security agencies have analysed and understood this risk. They say that the problem mainly lies with the large-scale propaganda that is on. This is an issue that has been tackled on a war footing, as this is the main reason why there are inspired and proxy modules that are coming up.

Officials say that this is more or less on the model that the Islamic State set up when it came to lone wolf terrorists. It was only the propaganda that the Islamic State put out. The rest of the work was all done by the lone wolf who was inspired by such propaganda. The same is happening with modules such as the one that was busted in Faridabad.

Although this module was busted and major terror attacks were averted, groups such as the Jaish would once again push their agenda in specific parts of the country so that more such self-inspired proxy modules come up.

Another issue that is associated with such modules it comprises white-collared criminals. These persons are educated, intelligent, capable of handling the dark web and have the resources to raise funds for terror attacks in addition to procuring the wherewithal for it.

vicky/vd

- IANS

Share this article:

Reader Comments

P
Priya S
The article rightly points out the propaganda war. Radicalisation starts online with slick videos and posts. We need a stronger counter-narrative, especially for the youth. Parents and teachers need to be more aware of what kids are consuming on their phones.
R
Rohit P
Pakistan's deniability game is old but effective. They create chaos while pretending their hands are clean. The Modi government's doctrine of treating terror as an act of war is the right response. We cannot show any weakness.
S
Sarah B
While the security threat is real, we must also be careful not to generalize or suspect every educated young person. The focus should be on intelligence and community engagement, not creating an atmosphere of fear. A balanced approach is crucial.
V
Vikram M
Salute to our IB and police forces. Busting such a module before it could strike is a huge success. But as the article says, this is a new model. Our cyber cells need massive upgrading to track this online radicalisation and dark web funding.
K
Karthik V
The "lone wolf" IS model is indeed the blueprint. It's cheap and effective for them. Our strength is our unity. We, as citizens, have to be the eyes and ears. If something seems off in our neighbourhood or workplace, we should report it. Jai Hind.

We welcome thoughtful discussions from our readers. Please keep comments respectful and on-topic.

Leave a Comment

Minimum 50 characters 0/50