Jammu and Kashmir Lieutenant Governor Manoj Sinha on Wednesday asserted that the most dangerous terrorists are leveraging data encryption and encrypted networks to carry out their operations across borders. Speaking at a security review meeting in Srinagar, Sinha highlighted the evolving nature of threats in the region, emphasizing that modern technology has become a double-edged sword in the fight against terrorism.
Technological Challenges in Counter-Terrorism
The Lieutenant Governor noted that encrypted communication platforms have made it increasingly difficult for security agencies to monitor and intercept terrorist activities. He stressed that these networks allow terrorists to coordinate attacks, share intelligence, and evade surveillance with greater ease. Sinha called for enhanced cyber capabilities and international cooperation to counter this growing menace.
Security Review Meeting
The meeting was attended by top officials from the police, army, and intelligence agencies. Discussions focused on the current security scenario in the Union Territory, including the infiltration attempts from across the border. Sinha reiterated the government's commitment to zero tolerance towards terrorism and directed security forces to remain vigilant.
He also appreciated the efforts of security personnel in maintaining peace and stability in the region. The Lieutenant Governor urged for the adoption of advanced technologies to stay ahead of terrorist networks that are constantly adapting to new communication methods.
Cross-Border Operations
Sinha pointed out that many terrorist groups operate from safe havens in neighboring countries, using encrypted networks to maintain contact with their operatives in Jammu and Kashmir. He emphasized the need for a multi-pronged strategy involving diplomatic pressure, intelligence sharing, and technological innovation to dismantle these networks.
Call for Global Cooperation
The Lieutenant Governor called upon the international community to recognize the threat posed by encrypted communications used by terrorists. He advocated for a balanced approach that respects privacy while ensuring national security. Sinha concluded by stating that the fight against terrorism requires collective global efforts to prevent the misuse of technology for nefarious purposes.



