Col Shiv Choudhary (Retd)
In recent years, the security situation in Jammu and Kashmir, particularly in the Jammu region, has become increasingly concerning due to a rising number of terrorist incidents. The shifting military deployments and reduced troop numbers have created vulnerabilities that terrorists are quick to exploit. The situation is further complicated by growing tensions along the Line of Actual Control (LAC), which have drawn forces away from Jammu, leaving security stretched thin. The recent terrorist activities in areas such as Akhnoor and Kathua have highlighted a disturbing trend: terrorists are now outpacing security forces in terms of speed, communication, and intelligence gathering. To counter these evolving threats effectively, a shift in strategy is urgently needed-one that focuses on speed, real-time intelligence, improved movement, and faster deployment capabilities.
A fundamental issue in the current counter terrorism framework is the timely acquisition and use of intelligence. A more effective, multi-layered intelligence system needs to be established to ensure better communication between security agencies, local law enforcement, and villagers. A cohesive, collaborative network between these entities will be essential for pre-empting and hindering terrorist activities.
One promising approach involves creating district-wise communication systems, especially through toll-free emergency hotlines. These systems, pre-fed with selected contacts from each village, could enable locals to quickly report suspicious activities. In addition, emergency broadcast systems-such as loudspeakers-could be used to alert nearby villages about any detected threats, including the number of terrorists, their location, and direction. This method, though seemingly outdated, was successfully employed by villagers in the Chhamb region, where frequent border intrusions demanded rapid inter-village communication and coordinated responses.
Integrating modern communication technologies into these efforts would enhance the speed and accuracy of intelligence sharing. Security agencies could set up a real-time feedback loop, constantly updating each other on emerging threats. Combining human intelligence with cutting-edge technology would yield better security outcomes. Extensive use of surveillance tools like drones, UAVs, and thermal cameras would be particularly useful in monitoring hard-to-reach areas, such as the rugged terrains north of Jammu and Kathua. By covering vast swathes of terrain and transmitting live footage, drones would enable security forces to track terrorist movements and respond more swiftly to potential threats.
The Border Security Force (BSF) plays a crucial role in preventing infiltration along Jammu’s borders, but recent incidents have exposed significant gaps in its operational effectiveness. Shortcomings like inadequate manpower, insufficient technological resources, poor coordination between agencies, and a lack of effective observation-particularly at night-have allowed terrorists to breach security lines.
To address these issues, a complete overhaul of the BSF’s approach is necessary. The force should prioritize continuous patrols, both on foot and by vehicle, and make better use of drones for surveillance. Coordination with local police, intelligence agencies, and even local communities can act as force multipliers, ensuring timely sharing of intelligence that can be acted upon before terrorists can strike. Importantly, the BSF must take full ownership of its operational areas. Shifting blame to neighbouringor states or open denial for terrorist infiltration only distracts from the task at hand. By improving internal drills, movement detection skills, and coordination with local forces, the BSF can better address the challenges it faces. Regular evaluations and accountability mechanisms will help eliminate complacency and improve overall operational efficiency.
Terrorism in Jammu and Kashmir is not just a local problem; it is a regional issue. Terrorist groups often operate across borders, making it essential to coordinate security efforts with neighbouring states. Synchronizing strategies and sharing intelligence can help close potential loopholes that terrorists may exploit. This approach will make it much more difficult for terrorist groups to infiltrate the region and operate with impunity.
As terrorist groups become more adept at blending into local populations and using the rugged terrain to their advantage, counterterrorism forces must focus on speed, real-time intelligence, and rapid mobility. By employing drones for surveillance, strengthening local intelligence networks, and ensuring the rapid deployment of select forces, security agencies can better respond to emerging threats.
Equally important is engaging the local population. Empowered locals can serve as early warning systems, identifying terrorists before they can launch attacks. With proper training, some locals can become key sources of intelligence, providing real-time information that can help thwart terrorist plans before they escalate. Maintaining a consistent intelligence network during troop rotations is crucial to ensuring that no valuable intel is lost in transition. Extending the tenure of key personnel during these periods can help preserve the continuity of these off the record networks and allow incoming units to build on the groundwork laid by their predecessors.
Multiple local forces units and police forces, play a crucial role in maintaining security in sensitive areas. However, over-familiarity with the environment can lead to complacency. To counter this, local forces should be rotated through different assignments to keep them engaged and avoid stagnation. Performance-based incentives and regular rotations will help maintain the effectiveness of these forces.
Another valuable resource in enhancing border security is the knowledge and experience of retired military personnel. Many veterans live in villages along the border and have an intimate understanding of the terrain, local culture, and the habits of both terrorists and local populations. By organizing these veterans and providing them with the necessary tools and training, they can become valuable assets in monitoring suspicious activities, gathering intelligence, and temporarily stalling terrorist direction, pace and movements.
One of the most critical elements of improving intelligence gathering is creating systems for sharing vital information while ensuring the confidentiality of informants. By offering discreet rewards and fostering a culture of trust, security agencies can encourage more people to cooperate. Villagers, particularly those living near borders, are often the first to observe unusual movements of uncommon people unlike urban localities. Arm the retired military soldiers, refresh them in basic intelligence gathering and retraining in communication techniques can help build a network of local informants who are invaluable in counterterrorism operations.
It is essential to take swift action against individuals who provide support to terrorist organizations within local communities. Sympathizers, logistics providers, and other co-conspirators often operate in the shadows, offering crucial assistance to terrorists. Rural communities have a natural vigilance, and unusual activities are quickly noticed. By capitalizing on this awareness, security forces can identify and neutralize local support networks, making it more difficult for terrorists to operate with ease.
The security challenges in Jammu and Kashmir require a comprehensive approach that blends modern technology with local knowledge and community engagement. By strengthening local intelligence networks, enhancing technological capabilities, and ensuring early detection, seamless reporting, and rapid responses to emerging threats, security forces can stay one step ahead of terrorists. Ultimately, focusing on speed, real-time intelligence, and mobility will help prevent terrorist groups from infiltrating, operating, and surviving in the region. Empowering local communities, improving coordination between agencies, and leveraging local expertise will be key to creating a more resilient and responsive defence system.
There is also a need for training the media to ensure discreet reporting while the operations are on. Some of the novice reports report what is not needed, half or prematurely. This is a technology era and enemy can use, misuse and exploit what is reported by our media. At least, the media should not indulge covering tactical and operational part during the thick of the such operations.
In conclusion, the future of counter terrorism in Jammu and Kashmir lies in adopting a holistic, multifaceted strategy that combines speed, intelligence, and local engagement. With the right blend of technology, human resources, and community cooperation, the security apparatus can overcome the growing threats posed by terrorism in the region. It is time, our leadership starts valuing the cost of soldiers and civilians who lose their lives in such a way.
(The writer is a motivational speaker)