{"id":479179,"date":"2023-07-02T19:18:35","date_gmt":"2023-07-02T13:48:35","guid":{"rendered":"https:\/\/apnlive.com\/?p=479179"},"modified":"2023-07-02T20:22:18","modified_gmt":"2023-07-02T14:52:18","slug":"nia-ghazwa-e-hind-terror-module","status":"publish","type":"post","link":"https:\/\/apnlive.com\/india-news\/nia-ghazwa-e-hind-terror-module\/","title":{"rendered":"NIA carries out raids in five locations in connection with Ghazwa-e-Hind terror module"},"content":{"rendered":"\n

The National Investigation Agency (NIA) carried out raids at five locations in three states, including one in Bareilly, on Sunday, in connection with the \u2018Ghazwa-e-Hind\u2019 terror module, allegedly run by Pakistan-based suspects.<\/p>\n\n\n\n

According to the NIA, the raids were carried out at one location in Bareilly (Uttar Pradesh), three locations in Bihar (one in Darbhanga and two in Patna), and another location in Surat (Gujarat). During the raids, incriminating material, and digital devices, including mobile phones, memory cards, SIM cards, and documents, were seized from all five locations, including Bareilly.<\/p>\n\n\n\n

The case came to light after the arrest of Marghoob Ahmad Danish \u2018Tahir\u2019 of the Phulwarisharif area of Patna by the Bihar police on July 14, 2022. The NIA took over the case and registered another FIR on July 22, 2022. It filed the chargesheet against Marghoob on January 6 this year under various sections of the IPC and Unlawful Activities (Prevention) Act, 1967.<\/p>\n\n\n\n

According to the NIA, Marghoob was found to be a member of the Ghazwa-e-Hind module, which was operated by Pak-based operatives to radicalise youth to establish of Ghazwa-e-Hind in India,. Investigations revealed that Marghoob was the admin of a WhatsApp Group \u2018Ghazwa-e-Hind\u2019 created by one Zain, a Pakistani national.<\/p>\n\n\n\n

The NIA said Marghoob had added several Indians, Pakistanis, Bangladeshis, and Yemeni nationals to the group intending to establish sleeper cells in the country for carrying out terrorist activities. The accused had created various social media groups of the \u2018Ghazwa-e-Hind\u2019 on WhatsApp, Telegram, and BiP Messenger. He had also created another WhatsApp group in the name of \u2018BDGhazwa-E-HindBD\u2019 and had added Bangladeshi nationals to it.<\/p>\n\n\n\n

Further investigations showed that various suspects involved in the case were in contact with Pakistan-based handlers. The NIA said the suspects were involved in propagating the idea of Ghazwa-e-Hind. According to the NIA the raids on Sunday in three states were conducted at the premises of these suspects across three states. <\/p>\n","protected":false},"excerpt":{"rendered":"

According to the NIA, the raids were carried out at one location in Bareilly (Uttar Pradesh), three locations in Bihar (one in Darbhanga and two in Patna), and another location in Surat (Gujarat).<\/p>\n","protected":false},"author":4,"featured_media":479191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":"","jetpack_publicize_message":"NIA carries out raids in five locations in connection with Ghazwa-e-Hind terror module \n#NationalInvestigationAgency ","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[1497],"tags":[23073,97860],"yst_prominent_words":[60929,6604,77983,8982,24293,21004,11267,5300,4254,29582,21244,5981,7236,6897,4630,8712],"ppma_author":[140543],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/d2r2ijn7njrktv.cloudfront.net\/apnlive\/uploads\/2023\/07\/02191630\/terror-1.jpg","jetpack_sharing_enabled":true,"authors":[{"term_id":140543,"user_id":4,"is_guest":0,"slug":"apnnewsdesk","display_name":"APN Live","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/478eacb893eda88aa6ed8d99b005bf58?s=96&r=g"}],"_links":{"self":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/posts\/479179"}],"collection":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/comments?post=479179"}],"version-history":[{"count":0,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/posts\/479179\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/media\/479191"}],"wp:attachment":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/media?parent=479179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/categories?post=479179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/tags?post=479179"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/yst_prominent_words?post=479179"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/ppma_author?post=479179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}