Why in the News?
A year after the Pahalgam terror attack, there is a structural shift in Jammu & Kashmir’s security doctrine, from reactive containment in urban centres to a dispersed, intelligence-led grid extending into forests and high-altitude areas. This marks a significant transition from earlier patterns where militants operated with relative ease in remote terrains.
How has the security doctrine shifted post-Pahalgam?
- Doctrinal shift: Moves from urban containment to dispersed rural-forest operations, expanding counter-terror grid into difficult terrains.
- Proactive operations: Ensures pre-emptive neutralisation rather than post-incident response.
- Grid expansion: Strengthens multi-layered deployment across Pir Panjal and Kashmir Valley.
- Example: Increased presence in forested belts and high-altitude zones previously under-monitored.
What role has intelligence integration played in the new strategy?
- Intelligence-led operations: Enables targeted strikes against militant networks instead of broad sweeps.
- Human intelligence (HUMINT): Strengthens local informant networks for early warning signals.
- Inter-agency coordination: Ensures real-time intelligence sharing among Army, J&K Police, and central agencies.
- Example: Dismantling of overground worker (OGW) networks aiding militants.
How has technology transformed counter-terror operations?
- Drone surveillance: Enhances real-time monitoring of inaccessible terrains.
- Digital tracking: Facilitates data-driven identification of suspects and networks.
- Smart checkpoints: Ensures efficient screening through QR-based and digital systems.
- Data point: Over 50,000 individuals linked to terrorism brought under Aadhaar-linked identification systems.
- Example: Use of drones and surveillance tech in forest operations.
What are the key operational successes achieved?
- Neutralisation rates: Increases elimination of militants through targeted operations.
- Network disruption: Weakens logistical and recruitment channels.
- Area domination: Expands security presence into previously vulnerable regions.
- Example: Decline in large-scale coordinated attacks compared to earlier years.
What structural gaps and challenges persist?
- Intelligence gaps: Limits complete pre-emption of attacks, especially in remote zones.
- Terrain advantage: Continues to favour militants in dense forests and mountains.
- Adaptive tactics: Enables militants to shift to smaller, decentralised cells.
- Local support: Sustains residual overground networks aiding infiltration and logistics.
- Example: Sporadic attacks despite enhanced surveillance indicate operational limitations.
How sustainable is the current security model?
- Resource intensity: Requires continuous deployment and technological investment.
- Coordination dependency: Relies on seamless inter-agency collaboration.
- Civil-military balance: Necessitates public cooperation for intelligence gathering.
- Outcome: Ensures short-term control but demands long-term socio-political integration.
Conclusion
The post-Pahalgam shift reflects a strategic deepening of counter-terror operations, combining intelligence, technology, and terrain penetration. While operational successes are visible, persistent intelligence gaps and adaptive militant strategies underline the need for continuous innovation and socio-political stabilisation.
PYQ Relevance
[UPSC 2023] Winning of ‘Hearts and Minds’ in terrorism-affected areas is an essential step in restoring the trust of the population. Discuss the measures adopted by the Government in this respect as part of the conflict resolution in Jammu and Kashmir.
Linkage: The PYQ highlights the shift from kinetic counter-terrorism to intelligence-led, people-centric strategy in J&K, as seen post-Pahalgam. It links trust-building, OGW disruption, and civil-military outreach with improved intelligence flow and long-term conflict resolution.

