Skip to main content

Jaish terrorists attack CRPF convoy in Kashmir, kill at least 38 personnel

Jaish terrorists attack CRPF convoy in Kashmir, kill at least 38 personnel

HIGHLIGHTS

  • The Jaish-e-Mohammed has claimed responsibility for the attack
  • The terrorist driving a suicide vehicle was Adil Ahmad from Kakapora in Pulwama
  • The bus was blown up on Srinagar-Jammu highway in Awantipora area of the district
SRINAGAR: At least 38 
CRPF
 personnel were killed on Thursday in one of the deadliest terror attacks in Jammu and Kashmir when a Jaish suicide bomber rammed a vehicle carrying over 100 kg of explosives into their bus in 
Pulwama
 district that also left many critically wounded, officials said.

More than 2,500 Central Reserve Police Force personnel, many of them returning from leave to rejoin duty in the Valley, were travelling in the convoy of 78 vehicles when they were ambushed on the Srinagar-Jammu highway at Latoomode in 
Awantipora
 in south Kashmir around 3.15 pm.

Pulwama

The Pakistan-based Jaish-e-Mohammed terror group has claimed responsibility for the attack that took place about 20 km from Srinagar, officials said.

Police identified the suicide bomber as Adil Ahmed, who officials said joined the Jaish in 2018.

He was driving a vehicle packed with over 300 kg of explosives on the wrong side of the road and hit the bus, in which 39-44 personnel were travelling, head-on, an official at the spot said.

"There are no survivors from the bus," he said, adding that they were yet to ascertain exactly how many people were on the bus.

Condemning the terrorist attack, Prime Minister Narendra Modi said that the sacrifice of the brave security personnel will not go in vain.

Attack on CRPF personnel in Pulwama is despicable. I strongly condemn this dastardly attack. The sacrifices of our brave security personnel shall not go in vain. The entire nation stands shoulder to shoulder with the families of the brave martyrs. May the injured recover quickly.

The powerful explosion, which reduced the bus to a mangled heap of iron, was heard many kilometres away, including in some parts of Srinagar adjoining Pulwama district.

Body parts could be seen strewn around the area.


Officials said 38 CRPF personnel have lost their lives and some others are critical. They refused to give an exact number for those injured.

"The bodies are dismembered and mutilated making it difficult for doctors to give the exact number of casualties," a senior security establishment official told PTI in Delhi.

The bus that was the focus of the attack belongs to the 76th battalion of the force.

Over 20 people were injured in the terror attack, which reduced the bus to a mangled heap of iron. Several other buses were damaged in the attack.

Body parts could be seen strewn around the area.

"It was a large convoy and about 2,500 personnel were travelling in multiple vehicles. Some shots were also fired at the convoy," CRPF DG RR Bhatnagar told PTI.

The convoy started from Jammu around 3.30 am and was supposed to reach Srinagar before sunset, officials said.

"It was a large convoy and about 2,500 personnel were travelling in multiple vehicles. Some shots were also fired at the convoy," CRPF DG R R Bhatnagar told PTI.

The Cabinet Committee on Security will meet Friday morning to discuss the security situation in Jammu and Kashmir against the backdrop of the attack, sources said.

Prime Minister Narendra Modi, who spoke to Union Home Minister Rajnath Singh and top officials after the attack, termed it despicable and asserted that the sacrifices of security personnel will not go in vain.

In a statement , Singh said the government is determined to foil the designs of those who want to disrupt peace through such a terror attack "sponsored and sheltered by Pakistan".

"Jaish-e-Mohammed has carried out this terror attack. We assure the country that we will undertake whatever it takes to avenge this," he said.

DzXMbfIV4AAiESg (1)

His deputy Kiren Rijiju said the "cowardly" attack will not go unpunished and it will be avenged in "all way possible".

The convoy had started from Jammu around 3.30 am and was supposed to reach Srinagar before sunset, officials said.

The number of personnel travelling back to the Valley was high as there was no movement on the highway for the last two to three days because of bad weather and other administrative reasons, they said.

Usually, about 1,000 personnel are part of a convoy but this time it was a total of 2,547 personnel.

A road opening party was deployed and the convoy had armoured counter-terror vehicles, officials said.

As news of the magnitude of the attack came in, political leaders from across the spectrum spoke out in condemnation and to condole the deaths of the security personnel.

Congress president Rahul Gandhi said he was deeply disturbed by the cowardly attack on the convoy in which so many CRPF men were killed.

Stating that he was "pained beyond words", BJP chief Amit Shah described the terror strike as an "act of cowardice" and asserted that security forces will defeat those involved in terrorist activities.

"Our forces will remain firm against such acts of terror and defeat them," he said on Twitter.

Former Jammu and Kashmir chief ministers Omar Abdullah and Mehbooba Mufti also condemned the attack in the strongest terms.

Singh, who also spoke to Governor Satya Pal Malik and took stock of the situation, cancelled his engagements in Bihar on Friday. Union Home Secretary Rajiv Gauba cut short his visit to Bhutan.

A team of the National Investigation Agency and National Security Guards will leave for Kashmir on Friday morning to assist in the investigation.

This was the first suicide car bomb attack in Kashmir since the 2001 strike on the Jammu and Kashmir Legislative Assembly in which 41 people, including three suicide attackers, were killed.

The scene of Thursday's attack is not very far from the Commando Training Centre at Lethpora, which was stormed by Jaish militants on December 31, 2017, killing five CRPF personnel.

The Srinagar-Jammu national highway has been a favoured route for militants to target security forces.

The CRPF bore the brunt of a militant attack at Pampore, less than seven kilometres from Lethpora, in June 2016, losing eight jawans while 22 others sustained injuries.

In February of that year, militants attacked a CRPF convoy in Pampore area before taking refuge in a government building. The operation lasted more than two days and resulted in the death of nine persons, including three Army men.

In an attack on the Uri military base in September 2016, Jaish militants killed 18 Army jawans and injured dozens of others. The ferocity of the attack led to India conducting a surgical strike against Pakistan.
Click here to watch the video

Comments

Title

Link

https://amzn.to/3isoLUX https://www.amazon.in/gp/product/B082PFY9S7?smid=AT95IG9ONZD7S&psc=1&linkCode=sl1&tag=mywebsit0749e-21&linkId=5108a27204271760a5ba4d6108af7893&language=en_IN&ref_=as_li_ss_tl https://amzn.to/3ist5DR https://amzn.to/3s5ZcMQ

Information security policy

Information security policy To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An employee who uses the company workstations or systems to conduct business operations must:  Ensure that all equipment use is for business/professional reasons. Access only information that is needed to perform their jobs or assist others in doing so as part of the valid scope of their duties. Be responsible for the content of all data, including text, audio, and images they share internally or externally. All communications should have the employee’s name attached. Be responsible for all actions/transactions performed with their accounts. Use passwords and screen locks on company-owned systems or devices, or those

How to cloud-enable Enpass Password Manager

How to cloud-enable Enpass Password Manager Learn how to combine Enpass and Dropbox into a perfect, cloud-ready password manager. 0:00 Fullscreen We've reached a point in time where very strong (non-memorizable) passwords should no longer be considered an option. Because of this, I tell everyone I advise to use a password manager that includes a random password generator so that the chances of someone hacking into one or more of their accounts are lessened exponentially. One of the password managers that ticks off nearly all of my boxes is  Enpass . It's cross-platform (available for Linux, Android, iOS, macOS, and Windows), has a great password generator, and (best of all) can be made cloud-ready. Must-Read Cloud Google Cloud Platform: An insider’s guide (free PDF) It's that last option that really seals the deal for me. Because of this, I can link every instance of Enpass I

New Amazon class certifies cloud pros in securing data on AWS

New Amazon class certifies cloud pros in securing data on AWS The AWS Certified Security - Specialty Exam could help tech professionals broaden their skills on the AWS platform. 0:00 Fullscreen Building a slide deck, pitch, or presentation? Here are the big takeaways: A new class from Amazon, the AWS Certified Security - Specialty Exam, will validate a cloud pro's ability to secure the AWS platform. Cloud skills are in high demand, but added security expertise could help set job seekers apart. A new professional exam from Amazon Web Services (AWS) will help cloud experts validate their ability to secure data on the platform, according to a  Monday blog post . The  AWS Certified Security - Specialty Exam  is now available to those who hold either an Associate or Cloud Practitioner certification from AWS. As noted in the post, AWS recommends that those taking the exam have at least five years

Some Hot New Technologies That Will Change Everything

Some Hot New Technologies That Will Change Everything Illustration: Randy Lyhus The Next Big thing? The  memristor , a microscopic component that can "remember" electrical states even when turned off. It's expected to be far cheaper and faster than flash storage. A theoretical concept since 1971, it has now been built in labs and is already starting to revolutionize everything we know about computing, possibly making flash memory, RAM, and even hard drives obsolete within a decade. The memristor is just one of the incredible technological advances sending shock waves through the world of computing. Other innovations in the works are more down-to-earth, but they also carry watershed significance. From the technologies that finally make  paperless offices  a reality to those that deliver  wireless power , these advances should make your humble PC a far different beast come the turn of the decade. In the following sec

Network security policy

Network security policy This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy  Summary Every company’s network is made up of devices that transmit and store information. This can include internal and external systems, either company-owned or leased/rented/subscribed to. To protect company data and reputation, it is essential to ensure that the network is secured from unauthorized access, data loss, malware infestations, and security breaches. This must be done via systematic end-to-end controls. Policy details The IT department will be responsible for implementing, adhering to, and maintaining these controls. For the purposes of this document, “all devices” refers to workstations, laptops, servers, switches, routers, firewalls, mobile devices, and wireless access points. Where possible, these guidelines will app

Top Java Interview Questions You Must Prepare In 2019(java interview questions and answers for freshers)

Top Java Interview Questions  You Must Prepare In 2019(java interview questions and answers for freshers) Java is today the most trusted language across the global developer community. With nearly all of the Fortune 1000 companies running applications on the Java Virtual Machine (JVM), Java has become a legendary language. Even while new languages and technology closely related to Java are popping up every now and then, they leverage capabilities of the JVM in some way. It is almost certain that Java will never go out of fashion. A career in Java will open up multiple opportunities in a wide range of job roles. We have curated a list of definitive Java questions that will help you breeze through your interview. In case you have attended Java interviews yourself or have any questions that you want us to answer for you, do feel free to add them as comments below. 1. What are the principle concepts of OOPS? Principle Concepts of OOPs Concept Description Abstraction Abstra

Google I/O 2019 schedule includes sessions on Stadia, dark mode, lots of Assistant, but no Wear OS

Google I/O 2019 schedule includes sessions on Stadia, dark mode, lots of Assistant, but no Wear OS Google I/O is one of the most exciting times of the year for us tech nerds, and as we near the 2019 event,  the schedule is now up for all to see . This isn't the full complement of sessions — many smaller talks and workshops will be added in due course — but it does give us a good idea of which areas Google is likely to focus on most this year. It all kicks off on May 7 at 10am with the Google Keynote at the Shoreline Amphitheatre where Sundar will talk us through some of Google's key goals for the year ahead, followed by a more developer focussed keynote. The rest of the first day is packed with sessions on gaming, Material Design, self-driving cars, Android, and a number on Assistant. The  3pm deep dive into the streaming tech behind Stadia  could be particularly interesting. There's also  a talk about building apps for foldable displays . Day two starts wit