CIK Raids Srinagar Central Jail, Seizes Devices in Terror Case
Synopsis
Key Takeaways
Srinagar, April 25: The Counter-Intelligence Kashmir (CIK) wing conducted a major raid at Central Jail, Srinagar on Saturday, April 25, recovering digital communication devices suspected to be linked to active terror networks. The operation was executed under a warrant issued by a special court designated under the NIA Act, marking a significant escalation in counter-terror surveillance within high-security prison premises in Jammu & Kashmir.
What Triggered the Raid
Officials confirmed that the search operation was initiated following technical intelligence inputs indicating the presence of suspicious digital signatures inside the jail premises. The case is registered as FIR No. 06/2023 at Police Station CI Kashmir and involves charges under Sections 153-A, 505, 121, and 120-B of the Indian Penal Code (IPC), along with Sections 13 and 39 of the Unlawful Activities (Prevention) Act (UAPA).
The invocation of UAPA — India's most stringent anti-terror law — underscores the gravity of the alleged activities being investigated and the potential threat to national security posed by communication networks operating from within prison walls.
Key Developments During the Operation
CIK sleuths conducted thorough searches across multiple barracks and blocks of the jail in close coordination with jail authorities. The operation was described as methodical, targeting specific locations based on prior intelligence analysis.
Digital communication devices and other incriminating material were recovered and seized during the searches. These devices are now set to undergo forensic examination to trace communication trails, identify handlers, and map any broader terror network connected to the registered case.
"Acting on technical inputs about the presence of suspicious digital signatures inside the jail premises, search operations were conducted across multiple barracks and blocks in coordination with jail authorities," an official stated.
Inquiry Into Device Smuggling Launched
Authorities have simultaneously launched an internal inquiry to determine how the digital devices were smuggled into the high-security prison — a development that raises serious questions about security protocols and potential insider complicity. Officials confirmed that the role of any facilitators involved in smuggling the devices is being actively investigated.
This is not an isolated concern. Across Indian prisons, the smuggling of mobile phones and digital devices has been a persistent security challenge, often enabling incarcerated individuals to continue coordinating criminal or terror activities from behind bars. In J&K specifically, such risks are amplified given the active terror ecosystem in the region.
Role and Mandate of Counter-Intelligence Kashmir
The Counter-Intelligence Kashmir (CIK) wing operates as a specialized unit under the J&K Criminal Investigation Department (CID) of the police. It is exclusively tasked with counter-intelligence duties, including monitoring and neutralizing threats to India's sovereignty and territorial integrity from hostile foreign actors and domestic terror networks.
Over the years, the CIK has built a strong operational track record — unearthing plots, identifying sleeper cells, and conducting focused verification of individuals suspected of having terror links. Its work is considered critical to the broader national security architecture in the Union Territory of Jammu & Kashmir.
Broader Implications for Prison Security in J&K
This operation is part of what officials describe as ongoing efforts to curb the misuse of communication devices in sensitive establishments, including prisons. The recovery of devices from Central Jail Srinagar — one of the most high-profile detention facilities in the region — signals that security agencies are intensifying surveillance inside correctional facilities housing terror suspects.
Notably, this raid comes at a time of heightened security sensitivity in Jammu & Kashmir, with agencies on alert following recent incidents in the region. The forensic findings from the seized devices could potentially expose wider networks, lead to fresh arrests, or reveal communication links with handlers operating from across the border.
As the forensic examination of the seized devices progresses, investigators are expected to file supplementary charge sheets in the case, potentially widening the scope of the investigation and naming additional accused. The findings could also prompt a comprehensive review of security protocols at all major jails across the Union Territory.