Security – ISI Strategy Shifts Focus to Punjab With Covert Tactics
Security – Recent intelligence assessments suggest that Pakistan’s Inter-Services Intelligence has intensified its activities in Punjab, adopting a carefully structured approach that revolves around three key elements: selective killings, drug distribution, and the covert movement of weapons. Officials tracking these developments indicate that the strategy appears deliberate and calibrated rather than aggressive or overt.

Low-Intensity Explosions Used as Tactical Distraction
In the past few months, Punjab has witnessed several minor blast incidents involving rudimentary explosive devices such as crude bombs and grenades. According to intelligence sources, these explosions are not intended to cause significant destruction or casualties. Instead, they are believed to function as diversionary tactics.
Security officials explain that such incidents are designed to occupy law enforcement agencies, diverting their attention while more critical operations—such as arms smuggling and network expansion—are carried out discreetly. This pattern has raised concerns among agencies responsible for maintaining internal security.
Financial Incentives Driving Local Recruitment
Investigations into recent cases have revealed a growing reliance on local recruits, particularly young individuals who are being offered substantial financial rewards. In some instances, payments reportedly reach up to Rs 4 lakh per operation.
Authorities believe this financial lure is a key factor behind the recruitment trend. Earlier attempts to attract youth through ideological messaging have not gained much traction. As a result, handlers appear to have shifted focus toward monetary motivation.
Officials also point out that certain socio-economic factors, including the desire for improved living standards and the existing drug problem in parts of Punjab, have made some young people more susceptible to such offers.
Shift Away From Large-Scale Attacks
Security agencies note a distinct change in operational patterns. Unlike previous years, there is currently no strong indication of plans for large-scale or high-impact attacks such as coordinated bombings or suicide missions.
Instead, the focus seems to be on smaller, targeted operations that can create fear without triggering a massive security response. Experts suggest that this measured approach allows hostile networks to operate under the radar while gradually strengthening their presence.
Targeted killings, in particular, are viewed as a strategic tool. These acts are precise and calculated, aimed at sending a message and creating an atmosphere of intimidation without escalating into widespread violence.
Drug Trade and Arms Supply Remain Core Activities
Apart from violent activities, drug trafficking continues to play a central role in sustaining these networks. The illegal trade not only generates significant funds but also helps establish connections that facilitate other operations.
Simultaneously, efforts to smuggle arms and ammunition into Indian territory remain ongoing. Intelligence inputs suggest that these weapons are often intended for use beyond Punjab, particularly in regions where operational capabilities already exist.
Changing Dynamics Along the Border
Security officials highlight that traditional smuggling routes, especially along sensitive border areas, have become increasingly difficult to use. Enhanced surveillance and tighter controls have significantly reduced the movement of contraband through conventional channels.
However, technological advancements have introduced new challenges. The use of drones for transporting weapons and narcotics has emerged as a growing concern, allowing operatives to bypass physical barriers and deliver consignments with greater ease.
Strengthened Security Measures and Their Impact
Following recent security operations carried out by Indian forces targeting terror infrastructure across the border, vigilance levels have been heightened considerably. These measures have led to multiple failed attempts by hostile operatives to infiltrate or move supplies.
Officials emphasize that while these efforts have disrupted several activities, the evolving tactics of adversarial networks require continuous monitoring and adaptive responses. The situation remains under close observation as agencies work to counter emerging threats effectively.