Bihar on Terror Alert: Jaish-e-Mohammed Operatives Sneak in From Nepal, Security Agencies on Edge Ahead of Elections

9
209

Patna: Bihar has been placed on maximum alert after intelligence agencies warned that three suspected terrorists linked to Pakistan-backed Jaish-e-Mohammed (JeM) have crossed into Indian territory from Nepal, allegedly to disrupt the upcoming Assembly elections.

According to a confidential report circulated to Superintendents of Police (SPs) in border districts, the operatives have been identified as Hasnain Ali (Rawalpindi), Adil Hussain (Umarkot), and Mohammad Usman (Bahawalpur) – all Pakistani nationals. Their sketches and passport details have been circulated to district police forces.

Investigators revealed that the three terrorists landed in Kathmandu in mid-August and slipped into India through porous border points in the third week with the help of a local Nepali resident. Authorities fear that the group may attempt to target poll-related gatherings to create chaos and panic.

“The SPs of Purnea, Katihar, Araria and Kishanganj – districts sharing borders with Nepal and Bangladesh – have been directed to maintain maximum alert and implement strict precautionary measures,” confirmed DIG Purnea, Pramod Kumar Mandal.

The alert comes as Bihar’s track record shows repeated infiltration attempts in the past. From Dawood Ibrahim’s aide Ezaz Yusuf Lakdawala arrested in Patna (2020), to JMB-linked Amir held in Gaya (2019) with links to the Burdwan blast, and ISIS sympathisers nabbed in Patna (2024), Bihar has long been a key node in cross-border terror networks.

Adding to the concerns, police recently arrested Nazre Saddam of Bhagalpur from Motihari in East Champaran (Sept 2024) for involvement in fake currency rackets tied to terror funding. Authorities recovered counterfeit notes of multiple denominations from his possession, heightening fears of coordinated networks operating in tandem with Pakistani outfits.

9 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here