Shahid Latif was the most well-documented attack-to-elimination case in India’s covert campaign against terrorists sheltered on Pakistani soil. He masterminded the January 2016 assault on the Pathankot Indian Air Force base that killed seven Indian security personnel, an operation launched from the border city of Sialkot where Jaish-e-Mohammed maintained a forward operations hub barely fifteen kilometers from the international frontier. Seven years later, masked gunmen walked into a Sialkot mosque and shot Latif dead during prayers. Between those two events lies a chain that illuminates everything the shadow war represents: the attack creates the target, intelligence identifies the individual, diplomacy fails to deliver accountability, and the covert operation closes the file that Pakistan refused to open.

The seven-year interval separating the Pathankot airbase assault from Latif’s killing inside a Sialkot mosque is not a story of delay. It is a story of escalation by stages, of a country that exhausted every alternative before arriving at the one Pakistan feared most. India tried diplomacy first. Prime Minister Narendra Modi had made a surprise visit to Lahore on December 25, 2015, greeting his Pakistani counterpart Nawaz Sharif on his birthday, signaling that a new relationship was possible. Eight days later, JeM infiltrators crossed from the Sialkot sector into Indian territory and attacked the Pathankot airbase. India responded not with missiles but with an extraordinary offer: a Joint Investigation Team from Pakistan would be allowed to visit the attack site and examine the evidence. Pakistan’s JIT came, examined, and returned without a single arrest, a single prosecution, or a single public finding that acknowledged JeM’s responsibility. That failure sealed Latif’s fate. The diplomatic channel that Pathankot destroyed was never rebuilt, and the covert channel that replaced it eventually reached a mosque in Sialkot where Latif knelt in prayer for the last time.
The Killing
Sialkot is a city of contradictions. It manufactures the world’s sports equipment, stitches surgical instruments for export, and produces leather goods that fill European storefronts. It also sits fifteen kilometers from the Indian border, close enough that a person standing on the city’s eastern edge can see Indian territory on a clear day. For JeM, that proximity was the city’s defining feature. Sialkot was not just a residential address for operatives like Latif; it was a staging ground, a location from which infiltrators could be launched across the border and retrieved within hours if the mission was aborted.
Latif had lived in Sialkot for years. He was not hiding in the traditional sense. He attended a local mosque regularly, prayed at established times, and maintained a social presence consistent with a man who believed Pakistan’s security apparatus would protect him. That belief was rooted in experience. JeM operatives in Sialkot had enjoyed effective immunity for decades, shielded by the organization’s strategic utility to Pakistan’s military establishment and by the city’s proximity to the Line of Control, which made the area a semi-militarized zone where civilian policing was secondary to military considerations.
On a day in October 2023, Latif arrived at his regular mosque in Sialkot for prayers. The mosque was a neighborhood institution, unremarkable in its architecture but entirely predictable in its schedule. Prayer times in Pakistan follow the solar calendar with precision, varying by only a few minutes between seasons, and the faithful attend with regularity that borders on clockwork. For a surveillance team tracking a target’s daily patterns, the mosque visit represented the single most predictable window in Latif’s routine. He would be at a known location, at a known time, in a posture that limited his ability to react, surrounded by a congregation that would scatter at the first sign of violence. The prayer-time targeting pattern that had been observed in other eliminations across Pakistan was at work again.
Masked gunmen entered the mosque compound. Reports from Pakistani media indicate that the attackers were wearing face coverings and moved with the efficiency of men who had rehearsed the approach. They did not linger at the entrance or survey the congregation from a distance. Their movement suggested prior knowledge of where Latif would be seated, which section of the mosque he favored, and when the prayer cycle would place him in the most vulnerable position. The gunmen opened fire. Latif was struck multiple times and died at the scene or shortly after. The attackers withdrew from the mosque, and no arrests were made in the immediate aftermath. Pakistani police registered a case against unknown assailants, the standard bureaucratic response that followed virtually every targeted killing in the shadow war campaign.
The killing’s location carried symbolic weight that extended beyond operational convenience. Latif had used the Sialkot sector to launch attacks against India. Now the Sialkot sector had delivered his consequence. The city that served as JeM’s forward operations base had become the city where JeM’s most prominent cross-border handler was eliminated. Pravin Sawhney, editor of Force magazine and a close observer of JeM’s cross-border operational capability, had noted for years that Sialkot’s proximity to the Indian border made it both JeM’s greatest tactical asset and its greatest vulnerability. Infiltrators could cross quickly, but the same corridors that facilitated entry into India could facilitate entry into the areas where JeM personnel lived, prayed, and assumed they were beyond reach.
No group claimed responsibility for Latif’s killing. The pattern was consistent with every other elimination in the broader campaign: motorcycle-borne or masked gunmen arriving at a predictable location, executing the target with close-range gunfire, and disappearing into the urban landscape before any security response materialized. The absence of claims, the absence of arrests, and the absence of any credible investigation by Pakistani authorities followed the template precisely.
The forensic details that emerged from Pakistani media coverage were sparse but consistent with the campaign’s established methodology. The weapon used was a firearm, likely a pistol or compact automatic weapon suitable for close-quarters engagement in a crowded indoor space. The number of rounds fired suggested controlled, aimed shooting rather than indiscriminate spraying, indicating training and composure under the stress of operating inside a populated building with multiple potential witnesses. The attackers’ ability to identify Latif within the congregation implied either prior visits to the mosque to observe his seating pattern or intelligence from a source with direct knowledge of his prayer habits.
Sialkot’s security environment at the time of Latif’s killing merits examination. The city sits within the operational zone of the Pakistan Army’s Sialkot Cantonment, one of the largest military installations in Pakistani Punjab. The proximity of a major cantonment to the killing site raises questions about how armed men could operate, execute a targeted killing, and escape in an area with a significant military and paramilitary presence. One explanation is that the attackers blended with Sialkot’s civilian population before and after the operation, exploiting the same urban anonymity that made Karachi and Lahore permissive environments for similar operations. Another is that the security apparatus, while present in force, was not configured to prevent this specific type of attack, which required no vehicle checkpoints, no perimeter breaches, and no prolonged exposure to surveillance. The entire operation, from entry to execution to withdrawal, may have lasted fewer than three minutes.
The mosque itself was not a high-profile institution that would have attracted security attention. It was a neighborhood mosque, one of thousands across Sialkot, where local residents gathered for daily prayers without the heightened security measures that might protect a politically sensitive site. Latif’s choice to attend a local, unremarkable mosque rather than seeking the relative visibility of a larger institution may have reflected a desire for normalcy, or it may have been a security calculation that proved wrong: a larger, more visible mosque might have attracted police or military attention that could have deterred or complicated the attack, whereas a quiet neighborhood mosque offered the attackers an environment where their approach would not trigger alarm until the shooting began.
The reverberations of the killing extended beyond Sialkot. Pakistani security analysts who tracked the broader campaign noted that the Latif elimination raised the operational bar. Previous targets had been lower in organizational hierarchies, operatives whose deaths, while consistent with the pattern, did not carry the strategic weight of eliminating a man India had publicly identified as a major attack mastermind. Latif’s killing signaled that the campaign was prepared to take higher-value targets, operatives whose identification as targets by Indian intelligence agencies was a matter of public record, men whose deaths could not be attributed to random criminal violence or local factional disputes with any plausibility.
Who Was Shahid Latif
Shahid Latif occupied a specific and critical position within Jaish-e-Mohammed’s operational architecture. He was not a foot soldier, not a seminary instructor, not a financier. He was a cross-border handler, the category of JeM operative who sits at the intersection of strategic planning and tactical execution. Handlers in JeM’s structure receive operational directives from the organization’s senior leadership, translate those directives into specific attack plans, recruit and train the infiltration teams, select the infiltration routes, coordinate with guides and facilitators on both sides of the border, and manage the operation in real time until the attack team reaches its target. Latif’s role placed him above the fighters who died during the Pathankot assault but below the senior JeM leadership that authorized the operation from Bahawalpur.
Latif’s base in Sialkot was not coincidental. JeM’s operational geography distributes its functions across multiple Pakistani cities, with each city serving a distinct purpose. Bahawalpur is the organizational headquarters, the city where Masood Azhar founded JeM and where the Madrassa Usman-o-Ali complex houses the seminary, the administrative offices, and reportedly the weapons storage. Sialkot, by contrast, is the forward operations hub, the city closest to the Indian border where handlers like Latif managed the final phase of cross-border operations. The separation of functions is deliberate. If Indian strikes target Bahawalpur’s institutional infrastructure, the forward operations capability in Sialkot remains intact. If a handler in Sialkot is compromised, the organizational leadership in Bahawalpur is insulated by hundreds of kilometers.
Within this distributed architecture, Latif’s specific expertise lay in the Sialkot sector’s infiltration corridors. The terrain between Sialkot and the Indian border is predominantly agricultural flatland, interrupted by seasonal streams and irrigation channels that provide concealment for small teams moving at night. The international border in this sector is not uniformly fenced. Gaps exist, some caused by terrain features that make fencing impractical and others by the gradual degradation of border infrastructure in remote stretches. Latif’s operational knowledge included detailed familiarity with these gaps, with the patrol schedules of the Indian Border Security Force and the Pakistan Rangers, and with the network of guides who facilitated crossings for both smugglers and infiltrators. This knowledge was not academic. It had been tested and proven in the field, most devastatingly on the night the Pathankot attackers crossed from the Sialkot sector into Indian Punjab.
Latif’s connection to JeM’s senior leadership was direct. Indian intelligence identified him through intercepted communications that placed him in contact with JeM’s operational command during the Pathankot planning phase. The NIA, India’s National Investigation Agency, named Latif in its charge sheet for the Pathankot attack, citing handler communications that were intercepted in the weeks and months preceding the assault. These communications established that Latif was not a peripheral figure who had been tangentially involved; he was the operational coordinator who managed the infiltration from the Pakistani side of the border, the handler who ensured the attack team reached its target.
The question of whether Latif was the sole mastermind or one among several planners is analytically important. Indian intelligence named him specifically, and the NIA charge sheet treated his role as central rather than contributory. Pakistani authorities never produced an alternative attribution. The NIA’s identification rested on handler communications analysis, a methodology that identifies the specific individual coordinating an operation by examining the communication patterns, the content of exchanges, and the timeline of contacts between handler and attack team. This type of evidence is standard in counter-terrorism prosecutions and has been used in cases ranging from the Mumbai 26/11 investigation to prosecutions of Islamic State cells in Europe. When Indian intelligence named Latif, the identification carried the weight of a formal investigative finding, not a speculative assessment.
Latif’s radicalization trajectory, while less documented than his operational role, likely followed a path common among JeM recruits from Punjab. JeM’s recruitment pipeline draws heavily from the seminary system, particularly madrassas affiliated with the Deobandi tradition that emphasize a martial interpretation of Islam’s relationship to the Kashmir conflict. Sialkot’s proximity to the border, combined with its location in a region where JeM’s recruitment infrastructure is well-established, would have exposed Latif to JeM’s messaging from a relatively young age. The organization’s appeal in border districts is reinforced by proximity to the conflict itself. Residents of Sialkot can hear artillery exchanges during periods of heightened tension along the Line of Control, creating a lived experience of the India-Pakistan conflict that JeM’s recruiters exploit effectively.
What distinguished Latif from the hundreds of JeM recruits who pass through the organization’s seminary system was his progression into the handler tier, a promotion that requires demonstrated competence in fieldcraft, operational security, and the management of human networks. JeM’s handler cadre is not large. The specific skills required, fluency in terrain assessment, competence in communications security, ability to recruit and manage guides and facilitators, judgment under operational pressure, limit the pool of candidates. Latif’s rise to this tier suggested both organizational aptitude and a track record of successful operations prior to Pathankot, operations that have not been individually documented in public reporting but whose existence is implied by the seniority of the role he occupied when Pathankot was planned.
Pakistan’s response to Latif’s identified role in Pathankot was characteristic. Despite receiving evidence from India, despite hosting a JIT that visited the Pathankot airbase and examined the materials, Pakistan’s investigative and judicial machinery produced no prosecution of Latif, no detention, no travel restrictions, and no public acknowledgment that a JeM operative living in Sialkot had orchestrated an attack on an Indian military installation. Latif continued to live in Sialkot, attend his mosque, and maintain his role within JeM’s operational structure. This continued freedom was not an oversight. It was the product of a system in which JeM’s anti-India operations aligned with elements of Pakistan’s strategic calculus, making operatives like Latif useful assets rather than criminals to be prosecuted.
The dynamics of this protection system merit examination because they explain why Latif remained in Sialkot rather than seeking sanctuary in a less exposed location. Pakistan’s security establishment, centered on the military and the ISI, has maintained a dual relationship with JeM since the organization’s founding. On one hand, JeM’s cross-border operations serve Pakistan’s strategic objective of maintaining pressure on India over Kashmir, providing asymmetric capability that conventional military forces cannot replicate without risking escalation. On the other hand, JeM’s increasing operational ambition, particularly after the Parliament attack and the Pathankot assault, created diplomatic liabilities that complicated Pakistan’s international relationships. This dual relationship produced an inconsistent policy: JeM was neither fully supported nor fully restrained, its operatives neither actively protected by security details nor actively pursued by law enforcement.
For an operative like Latif, this inconsistency translated into a specific lived experience. He was free to move within Sialkot, attend his mosque, and maintain his JeM role without fear of arrest or prosecution by Pakistani authorities. But he was not assigned personal security, not provided with a safe house managed by the ISI, and not given the kind of active protection that might have deterred or detected the surveillance that preceded his killing. The protection was structural rather than personal: it consisted of the absence of prosecution rather than the presence of bodyguards. This structural protection was sufficient to shield Latif from Pakistan’s legal system but insufficient to shield him from the covert campaign that operated outside Pakistan’s legal framework entirely.
The contrast between Pakistan’s treatment of Latif and its treatment of other security threats within its borders illuminated the selectivity of the state’s protective instincts. Pakistan’s security forces aggressively pursued members of the Tehrik-i-Taliban Pakistan, the Afghan Taliban’s Pakistani affiliate, conducting military operations in the tribal areas that killed thousands of TTP fighters and displaced millions of civilians. The difference in treatment was not a function of capability but of policy. TTP threatened Pakistan’s internal security; JeM threatened India. Pakistan’s security establishment drew a sharp distinction between these two categories, investing heavily in neutralizing the first while sheltering the second. Latif’s freedom in Sialkot was a product of this categorical distinction, a distinction that India’s covert campaign was designed to make untenable.
Latif’s organizational trajectory within JeM reflected the group’s broader evolution. JeM was founded by Masood Azhar after his release from an Indian prison in the IC-814 hijacking exchange, a transaction that India has spent over two decades regretting. The organization quickly established itself as the most aggressive of Pakistan’s Kashmir-focused militant groups, distinguished from Lashkar-e-Taiba by its willingness to target Indian military installations rather than civilian soft targets. The Pathankot airbase, the Uri Army camp, the Pulwama CRPF convoy, each of JeM’s signature attacks targeted security forces, a pattern that reflected the organization’s self-image as a jihadist military force rather than a terrorist organization in the conventional sense. Latif’s role as a cross-border handler placed him at the cutting edge of this military self-conception, managing operations that treated the international border not as a sovereign boundary but as a tactical obstacle to be navigated.
The Attacks Shahid Latif Enabled
The Pathankot airbase attack began not on the night of January 2, 2016, when the infiltrators breached the perimeter, but weeks earlier in the Sialkot sector where Latif assembled the operational package. Understanding the full scope of the Pathankot assault requires reconstructing the chain from preparation through infiltration through execution, because each phase reveals a different dimension of Latif’s operational role.
The preparation phase involved selecting the target, recruiting the attack team, arranging the weapons and equipment, planning the infiltration route, and coordinating with guides on both sides of the border. The Pathankot airbase was not a randomly selected target. It housed Indian Air Force squadrons, including fighter aircraft, and its symbolic value as a military installation made it attractive to JeM’s leadership, which sought to demonstrate that India’s most sensitive defense facilities were vulnerable to cross-border infiltration. The target selection likely originated with JeM’s senior leadership in Bahawalpur, but the operational feasibility assessment, determining whether an attack team could actually reach the base, fell to handlers like Latif who understood the terrain and the security environment in the border sector.
The infiltration began on the night of December 31, 2015, extending into the early hours of January 1, 2016. A group of heavily armed men crossed the international border from the Sialkot sector into the Gurdaspur district of Indian Punjab. The route they took exploited gaps in the border fence and the reduced alertness that New Year’s Eve celebrations may have produced among some border security personnel. The infiltrators moved through agricultural land, crossing irrigation channels and avoiding roads where vehicle patrols operated. They were carrying assault rifles, grenades, and enough ammunition and supplies to sustain a prolonged firefight, indicating that the mission was conceived not as a quick strike but as a siege, a sustained assault on a hardened target that would maximize casualties and media attention.
The infiltration route from the Sialkot sector into Gurdaspur traversed terrain that Latif knew intimately. The international border in this sector runs through flat Punjab agricultural land where wheat and sugarcane fields provide seasonal cover for movement. The Ravi River and its tributaries cross the border zone, creating natural corridors that can be navigated by small teams moving on foot during hours of darkness. The Border Security Force maintains posts at intervals along the fence line, but the distances between posts, the limited night-vision capability available at some positions, and the vast expanse of agricultural terrain create gaps that a well-briefed infiltration team can exploit. Latif’s contribution to the Pathankot operation included identifying which specific sector of the border offered the optimal combination of fence gaps, patrol intervals, and terrain cover for the size and equipment load of the attack team.
The sophistication of the border crossing reflected years of accumulated knowledge. JeM had been infiltrating fighters across the Sialkot sector for decades, and each successful crossing refined the organization’s understanding of the security environment. Failed crossings, where teams were intercepted or detected, provided equally valuable lessons about which routes to avoid and which patrol schedules to account for. Latif’s handler role gave him access to this institutional memory, a database of successful and failed crossings that informed the specific route selection for the Pathankot infiltration. This accumulated expertise was not the product of a single operation or a single handler; it was the distilled knowledge of decades of cross-border activity, and Latif was the individual who held and applied that knowledge when the Pathankot team needed to cross.
Before reaching the airbase, the infiltrators hijacked a vehicle from a police officer’s home in the Gurdaspur area on January 1. This hijacking served a dual purpose: it provided transportation for the final approach to the airbase, and it created an early alert that armed men were operating in the area. The vehicle hijacking was reported to local police, initiating a chain of alerts that should have placed the Pathankot airbase on heightened security status. Whether those alerts reached the airbase in time, and whether the airbase’s security apparatus responded adequately, became central questions in the aftermath. The hijacking also represented a departure from the ideal operational plan, suggesting that the infiltrators’ original transportation arrangements had failed or that circumstances on the ground required improvisation. Good handlers plan for contingencies, and Latif’s preparation of the Pathankot operation would have included backup transportation options, but the hijacking of a police officer’s vehicle introduced risk by alerting authorities to the presence of armed men in the area hours before the airbase assault began.
The attack on the Pathankot airbase began on January 2, 2016. The infiltrators breached the perimeter in a section that intelligence analysts later identified as inadequately surveilled. Indian security forces engaged the attackers in a firefight that lasted multiple days, as the heavily armed infiltrators took defensive positions within the base’s sprawling compound. The terrain inside the airbase, a mix of open tarmac, administrative buildings, and vegetation, allowed the attackers to establish multiple positions from which they could fire on approaching security forces while maintaining cover.
The Pathankot airbase was not an ordinary military target. It housed combat aircraft, including MiG-21 fighters, and its destruction or temporary neutralization would have constituted a direct degradation of Indian Air Force combat capability in the western sector. The symbolic dimension was equally significant: an airbase represents the pinnacle of military infrastructure, the type of facility that populations and governments associate with national defense capability. An attack on an airbase does not merely kill personnel; it challenges the assumption that the state’s most vital military assets are secure. JeM’s target selection for Pathankot was therefore both tactically ambitious and symbolically calculated, aimed at producing maximum psychological impact alongside operational damage.
The base compound sprawled across hundreds of acres, a characteristic of Indian military airbases that were designed during a period when land was available and the perimeter could be extended to create buffer zones between the runway and the civilian population. This sprawl, advantageous for aircraft operations, created a security challenge: the perimeter was extensive, portions of it abutted agricultural land or sparsely developed areas, and continuous surveillance of every meter was impractical without automated sensor systems that the base lacked in adequate density. The infiltrators exploited this gap, crossing the perimeter at a point where surveillance was intermittent and the response time from the nearest guard post was measured in minutes rather than seconds. Those minutes were sufficient for the attackers to establish their initial positions inside the compound.
Seven Indian security personnel were killed during the battle for the airbase. The casualties included members of the Defence Security Corps, a paramilitary organization responsible for guarding military installations, and the National Security Guard, an elite counter-terrorism unit that was deployed to the base after the initial breach. The Defence Security Corps personnel who died first were the men who encountered the infiltrators during the early phase of the attack, before the full scope of the breach was understood and before reinforcements arrived. Their engagement with heavily armed attackers at close range, often in conditions of limited visibility during the pre-dawn hours, represents a category of sacrifice that receives less public attention than the subsequent commando operations but was no less consequential.
The National Security Guard’s deployment to Pathankot followed the model established during the Mumbai 26/11 response: elite units flown in from distant bases to engage entrenched attackers in a prolonged clearance operation. The NSG commandos who arrived at Pathankot faced the same tactical challenge that had confronted their predecessors in Mumbai, attackers who had chosen defensive positions, were prepared to die, and were equipped with enough ammunition to sustain extended firefights. The clearance operation at Pathankot lasted considerably longer than initially anticipated, reflecting the difficulty of engaging determined defenders in a sprawling compound where visibility was limited and the attackers could reposition between engagements.
Each of the seven dead had a family, a service record, a life beyond the perimeter they were defending. Their deaths were the direct product of an operational chain that began with Latif’s planning in Sialkot, crossed the border through corridors Latif had mapped, and terminated in a firefight inside one of India’s most important military installations. Ajai Shukla, a defense journalist and former Indian Army officer, analyzed the security failures at Pathankot and concluded that inadequate perimeter surveillance, delayed initial response, and gaps in the intelligence-to-action chain all contributed to the attackers’ ability to penetrate the base. These failures were real, and an honest assessment of the Pathankot attack must acknowledge them alongside the attribution of blame to JeM and its Pakistani handlers. The attackers exploited vulnerabilities that should not have existed at a facility of Pathankot’s strategic importance, and the Indian military’s subsequent review of base security protocols was itself an acknowledgment that the defense had been inadequate.
The attackers themselves were all killed during the multi-day operation. Indian forces recovered their weapons, communication devices, and personal effects, which provided the forensic foundation for the subsequent investigation. Analysis of the communication devices yielded the intercepted handler communications that pointed to Latif as the operational coordinator on the Pakistani side. The NIA’s investigation established that the attack team had been in communication with handlers in Pakistan during the infiltration and in the hours preceding the assault, receiving guidance on timing, approach routes, and target priorities. Latif’s voice, or his communication signature, appeared in these intercepts.
The forensic recovery from the Pathankot attackers was more extensive than in many previous cross-border infiltration cases. The multi-day firefight, while costly in lives, preserved a substantial body of evidence that might have been destroyed in a shorter engagement. Weapons serial numbers, clothing labels, food supplies, and personal items all contributed to the intelligence picture. The communication devices were particularly valuable because they contained metadata, call records, and in some cases stored messages that allowed analysts to reconstruct the communication timeline between the attack team and their handlers in Pakistan. This reconstruction produced the evidence trail that led to Latif, a trail that would later be compiled into the NIA charge sheet and shared with Pakistani investigators through the JIT process.
The dual-use nature of the communication evidence deserves attention. The same intercepted communications that identified Latif as the handler also revealed the broader JeM communication architecture used for cross-border operations, including relay points, coded terminology, and fallback communication protocols. This architectural intelligence had value beyond the Pathankot case because it illuminated how JeM coordinated other operations from the Pakistani side. The intelligence derived from the Pathankot forensics therefore contributed not just to the identification of Latif but to the broader understanding of JeM’s operational methodology that informed the targeting of other JeM figures in subsequent years.
Pravin Sawhney, editor of Force magazine, analyzed the Pathankot operation through the lens of JeM’s cross-border doctrine and concluded that the attack represented a shift in JeM’s target selection from soft civilian targets to hardened military installations. This shift carried both tactical and strategic implications. Tactically, attacking a military base required more sophisticated planning, better-armed infiltrators, and a handler team with the capability to manage a more complex operation. Strategically, it signaled JeM’s ambition to be perceived as a military force capable of engaging Indian security infrastructure directly, a perception that served both recruitment and the organization’s relationship with elements of Pakistan’s military establishment that valued JeM’s ability to impose costs on India.
The aftermath of the Pathankot attack produced two parallel tracks. The first was military and diplomatic. India, despite the provocation of an attack on a major airbase, chose initially to pursue a diplomatic response. Prime Minister Modi’s government, mindful that the Lahore visit just eight days earlier had signaled a commitment to dialogue, offered Pakistan an extraordinary opportunity: a Joint Investigation Team that would be permitted to visit the Pathankot airbase, examine the forensic evidence, and conduct its own investigation into JeM’s role. This offer was unprecedented. India was essentially inviting Pakistani investigators onto a sensitive military installation that Pakistani-backed terrorists had just attacked, extending a level of trust that no previous attack had generated.
The second track was intelligence. Even as the diplomatic track proceeded, Indian intelligence agencies were compiling the evidence against Latif and other JeM operatives involved in the Pathankot planning. The intercepted communications, the forensic analysis of the attackers’ equipment, and the intelligence derived from the infiltration route all pointed to Latif’s central role. India shared portions of this evidence with Pakistan through the diplomatic channel, providing enough specificity that Pakistan could have identified, located, and detained Latif if the political will existed. The evidence included communication intercepts, handler identification data, and details of the infiltration route that could only have been planned by someone with intimate knowledge of the Sialkot sector’s border terrain.
Pakistan’s JIT visited Pathankot. The team examined the site, reviewed the materials India provided, and returned to Pakistan. What followed was a protracted process of non-investigation. Pakistan’s authorities did not arrest Latif. They did not publicly acknowledge JeM’s role in the attack. They did not produce any findings that contradicted India’s attribution or confirmed it. The JIT’s visit produced bureaucratic correspondence but no accountability. Vipin Narang of MIT, analyzing the post-Pathankot dynamics, noted that the JIT episode demonstrated the fundamental impossibility of India achieving accountability for cross-border terrorism through bilateral diplomatic mechanisms. When the very state apparatus that shelters the perpetrators is asked to investigate them, the outcome is predetermined.
The failure of the Pakistani JIT was the moment that reoriented India’s approach. If Pakistan could not, or would not, hold accountable the man who orchestrated an attack on an Indian airbase, even when presented with evidence and offered unprecedented access, then the bilateral accountability mechanism was not merely ineffective; it was structurally incapable of producing results. This conclusion, reached gradually through the months following the JIT’s empty-handed return, laid the intellectual foundation for the shift toward unilateral action that eventually produced the surgical strikes after Uri, the Balakot airstrike after Pulwama, and the covert elimination campaign that reached Latif in his Sialkot mosque seven years after Pathankot.
Network Connections
Latif’s position within JeM’s network connected him to three distinct operational layers: the senior leadership that authorized attacks, the mid-level handlers who planned and coordinated them, and the foot soldiers who executed them. Understanding these connections illuminates why Latif’s elimination was significant beyond the removal of a single operative.
At the apex of JeM’s hierarchy sat Masood Azhar, the organization’s founder and spiritual leader. Azhar’s release from an Indian prison following the IC-814 hijacking in 1999 provided the foundational grievance and the organizational energy that created JeM. From his base in Bahawalpur, Azhar directed JeM’s strategic priorities, authorized major operations, and maintained the relationship with elements of Pakistan’s military and intelligence establishment that provided JeM its operating space. Latif’s operational directives flowed from this apex, mediated through JeM’s command structure.
The network siege closing around Masood Azhar was not limited to Latif. In the weeks following Latif’s killing, Dawood Malik, a close aide to Azhar who operated through the Lashkar-e-Jabbar front, was shot dead by unknown gunmen in North Waziristan. The killing of Malik in one of Pakistan’s most remote and ungoverned regions, hundreds of kilometers from the urban theaters where most eliminations occurred, demonstrated that the campaign’s reach extended far beyond the major cities. Within the following month, Raheem Ullah Tariq, another JeM associate linked to Azhar, was killed in Karachi. The temporal clustering of these eliminations, three JeM-linked targets killed within a compressed timeframe, suggested not coincidence but a coordinated offensive against Azhar’s operational network.
Laterally, Latif’s operational connections extended to the broader ecosystem of JeM handlers operating in the Punjab border sector. Sialkot’s role as a forward operations hub meant that multiple handlers operated in the area, each managing different infiltration corridors and maintaining relationships with different guide networks. Latif was the most senior among them, but his elimination did not necessarily disable the entire Sialkot node. JeM’s distributed architecture included redundancy precisely for scenarios where a key operative was removed. The question raised by Latif’s killing, a question addressed more fully in the comparative analysis of JeM targets, was whether the cumulative elimination of multiple JeM operatives had degraded the organization’s cross-border capability or merely prompted the promotion of replacements.
Downward, Latif’s network included the guides, facilitators, and local contacts who made cross-border operations possible. These individuals occupied the lowest tier of JeM’s operational hierarchy but performed functions that no senior commander could replicate from a distance. Guides who knew the border terrain, farmers whose land abutted the fence line, vehicle owners who provided transportation on the Indian side, safe-house operators who sheltered infiltrators during daylight hours, all of these roles required local knowledge and local relationships that took years to cultivate. Latif’s elimination removed the handler who coordinated these assets, but the assets themselves remained in place, available to any successor handler who inherited Latif’s role.
The connection between Latif and other target profiles in the shadow war series reveals a pattern that extends beyond JeM. The campaign against Lashkar-e-Taiba operated simultaneously, targeting LeT operatives in Karachi, Lahore, and other cities with the same operational methodology: surveillance, identification of predictable routines, close-range gunfire by masked or motorcycle-borne attackers, clean escape, no claims. The parallel campaigns against JeM and LeT, running concurrently but targeting distinct networks in distinct cities, suggested a level of coordination and resource commitment that went far beyond ad hoc operations. Latif’s killing was one node in a campaign architecture that spanned organizations, cities, and years.
The organizational significance of Latif’s position within JeM’s handler cadre becomes clearer when viewed through the lens of counter-network theory. Paul Staniland of the University of Chicago has argued that armed groups’ resilience to leadership attrition depends on the depth of their organizational infrastructure, specifically whether the group can promote replacements with comparable expertise when key figures are removed. JeM’s handler cadre, the tier Latif occupied, is the group’s most skill-intensive layer. Foot soldiers can be recruited and trained in weeks. Seminary instructors can be replaced from the existing teaching staff. Financiers can be substituted through the hawala networks. But handlers require a combination of terrain knowledge, operational security competence, local relationships, and tactical judgment that takes years to develop. Latif’s removal from the Sialkot handler cadre was therefore not merely the subtraction of one individual; it was the removal of an accumulated body of operational knowledge that JeM cannot easily regenerate.
The relationship between Latif’s JeM node in Sialkot and the broader network of JeM cells operating across Pakistan illuminated the organization’s geographic distribution. JeM does not concentrate its operational assets in a single location. The Bahawalpur headquarters houses the institutional and ideological center. Sialkot houses the forward cross-border operations capability. Karachi hosts cells responsible for urban logistics and funding. Rawalpindi maintains connections to the security establishment. This distributed model means that eliminating a handler in Sialkot does not necessarily disrupt operations being planned from other nodes, but it does remove the specific capability that made the Sialkot sector the preferred infiltration corridor for cross-border attacks into Indian Punjab. The Pathankot attackers crossed from the Sialkot sector because Latif’s knowledge of that sector made it the optimal route. Without Latif, a successor handler would need to develop comparable terrain familiarity from scratch or rely on the knowledge of lower-level guides whose understanding of the border security environment may not match Latif’s depth.
The Hunt
The seven years between the Pathankot attack and Latif’s killing were not years of inaction. They were years of sequential failure on the diplomatic track that systematically eliminated every alternative to unilateral action, combined with years of intelligence preparation that built the operational capability to act when the decision was finally made. Reconstructing this seven-year chain reveals a decision tree in which each branch point led closer to the outcome in the Sialkot mosque.
The first branch point came immediately after Pathankot. India’s decision to invite a Pakistani JIT represented the diplomatic option in its purest form. The logic was straightforward: present Pakistan with evidence so compelling that denial would be unsustainable, allow Pakistani investigators to verify the evidence on Indian soil, and demand that Pakistan prosecute the perpetrators. If Pakistan cooperated, the bilateral mechanism would be validated, and future attacks could be addressed through similar channels. If Pakistan refused, India would have demonstrated to the international community that it had exhausted good-faith diplomatic options.
Pakistan’s JIT arrived at the Pathankot airbase and conducted what Indian officials later described as a performative investigation. The team examined the site, took notes, and requested materials. India provided access to forensic evidence, captured equipment, and intelligence assessments. The JIT returned to Pakistan, and the investigation entered a bureaucratic labyrinth from which no prosecution ever emerged. Indian investigators who had prepared the evidence packages for the JIT privately concluded within months that the exercise had been designed to fail. The JIT’s failure was not the result of insufficient evidence; it was the result of a political decision within Pakistan’s security establishment that prosecuting JeM operatives for the Pathankot attack was not in Pakistan’s strategic interest.
The second branch point arrived in September 2016. The Uri Army camp attack, another JeM operation that killed nineteen Indian soldiers, produced India’s first military response across the Line of Control: the surgical strikes. These strikes targeted JeM launch pads in Pakistan-administered Kashmir and established a precedent that India would use military force in response to cross-border terrorism. The surgical strikes were not directed at Latif specifically, but they represented the first manifestation of the unilateral doctrine that the Pathankot JIT failure had made inevitable. The diplomatic track was dead. The military track was alive.
The third branch point came in February 2019. The Pulwama attack, a JeM suicide bombing that killed forty CRPF personnel in Kashmir, triggered the Balakot airstrike, India’s first use of air power inside Pakistani territory since 1971. The Balakot strike targeted a JeM seminary, not an individual operative, but it demonstrated a capability escalation that had direct implications for the covert campaign. If India could send twelve Mirage 2000 jets across the border to strike a facility in Khyber Pakhtunkhwa, the barrier to conducting covert operations against individual JeM operatives in Pakistani Punjab was not technical but political. The capability existed. The question was when and how it would be directed at specific individuals.
The Balakot episode also carried a psychological dimension that directly affected the environment in which Latif operated. Before Balakot, Pakistani airspace had been inviolate since 1971. JeM operatives and their handlers lived and worked under the assumption that Pakistan’s sovereign territory was beyond India’s operational reach, an assumption reinforced by fifty years of precedent. Balakot shattered that assumption. The twelve Mirage 2000s that crossed into Pakistani airspace announced that the rules governing the India-Pakistan confrontation had changed permanently, that facilities on Pakistani soil were no longer exempt from Indian kinetic action. For a handler like Latif, whose operational value depended on Sialkot’s perceived safety as a staging ground, the Balakot precedent introduced a new variable into the risk calculus. Sialkot was no longer the rear area it had been. It was now, in strategic terms, within the blast radius.
The period between Balakot and the covert campaign’s acceleration saw a fourth branch point that is less discussed but analytically critical. The revocation of Article 370 in August 2019 altered the India-Pakistan dynamic in ways that removed remaining constraints on India’s willingness to pursue unilateral counter-terrorism operations. The revocation signaled that India was prepared to absorb diplomatic costs in pursuit of its strategic objectives in Kashmir, that international criticism would not deter actions New Delhi considered essential to its national security. The creation of The Resistance Front as a JeM and LeT proxy in the post-370 environment, an organization designed to provide deniable cover for continued operations in Kashmir, suggested that Pakistan’s militant infrastructure was adapting rather than retreating. This adaptation reinforced the case for targeting that infrastructure at its source.
Between these major escalation points, the intelligence preparation proceeded quietly. Tracking a specific individual inside Pakistan requires what intelligence professionals call a target package: confirmed identity, current location, residential pattern, daily routine, security posture, and operational window. Building this package for Latif required sustained intelligence collection in the Sialkot area, a task complicated by the city’s semi-militarized status near the border and by JeM’s own counterintelligence awareness. Latif knew he was a target. The NIA’s public identification of him as the Pathankot mastermind ensured he was aware that India considered him responsible. His decision to remain in Sialkot rather than relocating to a less exposed city suggests either confidence in Pakistan’s protective umbrella or a professional calculation that his operational role required him to remain close to the border.
The counterintelligence environment that Latif navigated deserves attention. JeM, like all organizations that have experienced leadership attrition, adapted its security protocols in response to the campaign. Operatives were reportedly instructed to vary their routines, change residences periodically, limit their use of electronic communications, and maintain awareness of unfamiliar individuals in their vicinity. These measures, standard in any organization facing targeting pressure, complicate intelligence collection but do not make it impossible. The history of targeted-killing campaigns, from Israel’s operations against Palestinian militant leaders to the American drone program in Pakistan’s tribal areas, demonstrates that even well-warned targets eventually fall into predictable patterns. Daily life imposes its own routines. Mosque attendance, family visits, market trips, the rhythms of existence reassert themselves regardless of security awareness, creating the windows that patient surveillance teams exploit.
Latif’s specific vulnerability was his mosque attendance. Religious obligation in an observant Muslim’s life is not optional, and the community pressure to attend congregational prayers, particularly Friday prayers, creates a pattern that counterintelligence measures cannot fully disrupt without fundamentally altering the target’s social existence. Latif could have prayed at home. He could have attended different mosques on different days. He could have avoided prayer times entirely and performed his obligations in private. Each of these adaptations would have reduced his vulnerability but at the cost of social isolation, community suspicion, and a departure from the daily life that provided his cover as a resident of Sialkot rather than a hunted operative. The tension between security and normalcy is one that every targeted individual faces, and it is a tension that typically resolves in favor of normalcy as weeks and months pass without incident, eroding the vigilance that the initial threat provoked.
The intelligence collection that eventually produced Latif’s target package likely drew on multiple streams. Signals intelligence, the interception of communications, was the stream that had initially identified Latif’s role in Pathankot and would have remained a primary collection method. Human intelligence, information from sources with access to JeM’s Sialkot network, was essential for confirming Latif’s current location, his mosque attendance pattern, and the security environment around him. Open-source intelligence, including social media, local media reports, and community information, may have provided corroborating details. The synthesis of these streams into an actionable target package was the invisible work that preceded the visible act in the mosque.
The timing of Latif’s elimination in October 2023 placed it within a period of accelerating activity in the broader campaign. By late 2023, the shadow war had moved well beyond its tentative early phase. Zahoor Mistry, the IC-814 hijacker, had been killed in Karachi. Multiple LeT operatives had been eliminated across Pakistan’s major cities. The operational tempo had increased, and the target selection had climbed higher up the organizational hierarchies of both JeM and LeT. Latif’s elimination fit this escalation pattern: he was not a foot soldier or a mid-ranking functionary but a senior handler directly linked to one of the most prominent terrorist attacks against India in the preceding decade.
The acceleration in operational tempo during this period reflected several converging factors. Intelligence networks that had been built over years were producing actionable intelligence with increasing frequency, as sources matured and technical collection capabilities expanded. Operational teams had accumulated experience from previous eliminations, developing the tradecraft, local knowledge, and confidence necessary to operate in increasingly challenging environments. The political environment in India had evolved to a point where the covert campaign was understood and accepted as a component of national security strategy rather than an aberration requiring special justification. These factors created a self-reinforcing cycle: successful operations demonstrated capability, demonstrated capability attracted resources, additional resources expanded the target set, and the expanded target set produced more successful operations.
The decision tree that connects Pathankot to the Sialkot mosque reveals a logic of progressive elimination of alternatives. Diplomacy was attempted and failed. Pakistan was given evidence and refused to act. Bilateral investigation was offered and wasted. Military strikes escalated from cross-LoC raids to airstrikes inside Pakistani territory, establishing precedents for unilateral action. Through all of these stages, Latif remained free, active, and presumably operational in Sialkot. Each failed alternative, each unused off-ramp, each Pakistani refusal to hold JeM accountable, narrowed the range of remaining options until the covert elimination became not just viable but, from the perspective of the campaign’s architects, inevitable. The decision tree’s endpoint was a mosque in Sialkot. Every branch that preceded it pointed in the same direction.
The convergence of intelligence readiness and political will is the variable that determines when a specific target is eliminated. For some targets in the campaign, the intelligence was available long before the political will crystallized, resulting in long intervals between identification and action. For others, political will was present but intelligence gaps delayed the operation. In Latif’s case, the reconstruction suggests that both variables matured gradually over the seven-year period, with the intelligence becoming actionable only after the political and operational environment had evolved sufficiently to support the operation. The Pathankot-to-Sialkot chain was not a single decision but a cascade of decisions, each building on the one before, each removing a constraint that had previously made the operation impractical or premature.
Pakistan’s Response
Pakistan’s response to Latif’s killing followed the template established by every other targeted killing in the shadow war: local police registered a case against unknown perpetrators, media reported the basic facts, and the state’s investigative and judicial machinery produced no arrests, no suspects, and no resolution. The template was so consistent across dozens of eliminations in multiple cities that it constituted a pattern in itself, one that raised questions about whether Pakistan’s security establishment was unable to solve these cases or unwilling to investigate them seriously.
At the political level, Pakistan’s response to the broader pattern of targeted killings oscillated between denial and accusation. Pakistani officials periodically accused India of conducting extrajudicial killings on Pakistani soil, framing the campaign as a violation of sovereignty and international law. These accusations were most forceful when directed at international audiences, particularly during diplomatic engagements where Pakistan sought to portray itself as a victim of Indian aggression rather than a state that harbored the terrorists being targeted. The argument had a surface plausibility: targeted killings conducted by one state inside another state’s territory do raise legitimate questions of sovereignty and legality, regardless of the targets’ criminal histories.
The counterargument, advanced by Indian strategic commentators and by some international analysts, was that Pakistan’s sovereignty claim was undermined by its own failure to exercise sovereign responsibility over the terrorists living within its borders. Sovereignty implies obligation. A state that claims sovereign jurisdiction over its territory also claims the responsibility to prevent that territory from being used as a base for terrorist operations against neighboring countries. Pakistan’s decades-long refusal to dismantle JeM and LeT’s operational infrastructure, despite international sanctions, despite United Nations designations, despite repeated attacks planned and launched from Pakistani soil, eroded the moral force of its sovereignty argument. The Pathankot JIT episode was the specific instance that illustrated this erosion most clearly. India offered Pakistan the chance to exercise its sovereign responsibility by investigating and prosecuting Latif. Pakistan declined. The sovereignty that Pakistan asserted in protesting Latif’s killing was the same sovereignty it had refused to exercise when asked to hold Latif accountable through legal channels.
Pakistan’s domestic media coverage of Latif’s killing was sparse. Unlike the high-profile eliminations that attracted sustained journalistic attention, Latif’s killing received relatively brief coverage in Pakistani outlets. The reporting identified him as a JeM figure, noted the manner of his death, and moved on. The comparative lack of coverage may have reflected multiple factors: the frequency of such killings had dulled their news value; Pakistani media faced implicit constraints on reporting that highlighted the government’s inability to protect militants who served the state’s strategic interests; and the specifics of Latif’s JeM role, particularly his connection to the Pathankot attack, made him a figure whose death Pakistani media could not easily frame as the loss of an innocent citizen.
Within the Sialkot community, the killing reportedly produced anxiety among individuals associated with JeM’s local infrastructure. If Latif, a senior handler who had operated in the city for years, could be reached inside his regular mosque, the implicit guarantee that Pakistan’s security establishment provided to JeM operatives was no longer reliable. This erosion of perceived safety was, arguably, as strategically significant as the elimination itself. The campaign’s effect extended beyond the individuals killed to the organizational psychology of those who remained. Handlers who once moved freely through cities like Sialkot now faced the calculation that their daily routines, their mosque attendance, their predictable movements might be under surveillance by adversaries they could not see and could not deter.
Pakistan’s intelligence establishment, the Inter-Services Intelligence directorate, maintained public silence on Latif’s killing, as it did on the broader campaign. The ISI’s silence was itself informative. An intelligence agency that detected foreign operatives conducting targeted killings on its soil would be expected to mount a visible counterintelligence response: arrests, public statements, diplomatic protests backed by evidence. The ISI’s relative quiet suggested either that the agency was unable to identify and disrupt the operational networks conducting the killings or that some element of the ISI’s institutional calculus made aggressive counterintelligence less attractive than it appeared. Some analysts speculated that certain factions within Pakistan’s security establishment viewed the elimination of JeM operatives with less alarm than the public rhetoric suggested, particularly as JeM’s activities had occasionally created diplomatic crises that Pakistan’s civilian government wished to avoid.
The judicial dimension of Pakistan’s response was nonexistent. No court proceedings related to Latif’s killing reached public attention. No judicial inquiry was ordered. No commission was established to investigate the pattern of targeted killings in Sialkot or elsewhere. The judicial vacuum was consistent with the treatment of every other elimination in the campaign: the cases entered the police system as unsolved murders and remained there, accumulating dust alongside hundreds of other files that Pakistan’s law enforcement apparatus lacked either the capacity or the mandate to resolve.
The contrast between Pakistan’s judicial response to Latif’s killing and its judicial response to Latif’s role in Pathankot is instructive. India provided evidence of Latif’s involvement in a terrorist attack that killed seven people. Pakistan’s judicial system produced no prosecution. When Latif himself was killed, Pakistan’s judicial system produced no investigation of consequence. The symmetry is not coincidental. It reflects a system in which the judicial apparatus operates within constraints set by the security establishment, constraints that make both the prosecution of useful terrorists and the investigation of their assassinations equally unwelcome. A genuine investigation into Latif’s killing might reveal operational details about the campaign conducting the eliminations, information that Pakistan’s security establishment would find strategically valuable but politically uncomfortable, since acknowledging the campaign’s existence would require acknowledging the security failures that enabled it.
The media environment surrounding Latif’s killing operated under its own constraints. Pakistan’s media landscape, while diverse and often combative, operates within boundaries defined by the security establishment’s red lines. Coverage of JeM and its relationship to the state falls squarely within these boundaries. Journalists who probe too deeply into JeM’s operational connections to the ISI, or who report details suggesting that Pakistan’s security apparatus was complicit in the failures that allowed targeted killings to occur, face professional and sometimes physical consequences. The sparse coverage of Latif’s killing reflected these constraints: report the basic facts, identify the victim’s organizational affiliation, note the police response, and move on without the investigative follow-up that would explore either JeM’s continuing operational presence in Sialkot or the implications of a senior operative being killed within the operational zone of a major military cantonment.
Pakistan’s formal diplomatic response to the broader campaign, when it surfaced in international forums, sought to frame the targeted killings as acts of Indian state terrorism. This framing had specific strategic objectives. By positioning Pakistan as a victim of extra-territorial assassination operations, Pakistan sought to deflect attention from its own role in harboring the terrorists being targeted, to build sympathy among states that prioritize sovereignty norms, and to create a diplomatic framework that might eventually constrain India’s ability to conduct future operations. The argument’s effectiveness was limited by Pakistan’s own record. A state that has provided sanctuary to organizations like JeM and LeT, that has allowed designated terrorists to operate freely within its borders despite United Nations sanctions, and that has demonstrably failed to investigate either the terrorists’ activities or their deaths, faces a credibility deficit when appealing to international norms of sovereignty and territorial integrity.
What This Elimination Reveals
Shahid Latif’s killing reveals the shadow war’s central logic more clearly than perhaps any other single case in the campaign. The clarity comes from the completeness of the chain: a specific terrorist attack on Indian soil, a specific individual identified as the mastermind, a specific diplomatic effort to secure accountability, a specific failure of that diplomatic effort, and a specific covert response that closed the loop Pakistan had refused to close. Every link in the chain is documented, attributed, and traceable. Most cases in the campaign involve operatives whose roles are less precisely established, whose connections to specific attacks are more inferential, and whose elimination therefore carries more analytical ambiguity. Latif’s case carries almost none. He planned Pathankot. India proved it. Pakistan ignored it. Latif was killed. The chain is as direct as the shadow war produces.
What makes this directness analytically valuable is the way it strips away the ambiguities that cloud most discussions of targeted killing. In many elimination cases, the debate centers on whether the target was correctly identified, whether the attribution of responsibility was sound, whether the individual’s organizational role justified the operation. In Latif’s case, these debates have less traction. The NIA charge sheet, the intercepted communications, the JIT evidence package, all of these established Latif’s role with a specificity that went beyond inference. The debate over Latif’s case therefore shifts from questions of identification to questions of response: given that Latif’s role was established, what was the appropriate response when Pakistan refused to act? This is a cleaner and more consequential question than the identification debates that dominate most targeted-killing discussions, and Latif’s case forces engagement with it.
The seven-year interval is itself analytically significant. Targeted-killing campaigns operate on timescales that are unfamiliar to conventional military operations. A drone strike can be authorized, planned, and executed within hours. A covert elimination of a specific individual inside a hostile state’s territory operates on a timescale measured in months or years, constrained by the speed of intelligence collection, the availability of operational windows, and the political calculus that governs when and how force is applied. The seven years between Pathankot and the Sialkot mosque were not a period of strategic patience for its own sake; they were a period during which the political and operational prerequisites for the elimination were being assembled. The political prerequisite was the exhaustion of diplomatic alternatives, a process that the Pathankot JIT failure initiated and the Uri and Pulwama attacks accelerated. The operational prerequisite was a target package of sufficient quality to identify Latif’s location, routine, and vulnerability with the precision necessary for a close-range operation in a populated urban area.
The seven years also encompassed a transformation in India’s institutional willingness to conduct such operations. In January 2016, when the Pathankot attack occurred, India’s response repertoire was limited to diplomatic protest and evidence sharing. By October 2023, when Latif was killed, India had conducted surgical strikes across the Line of Control, an airstrike inside Pakistani territory at Balakot, and a sustained covert campaign that had eliminated dozens of targets across Pakistan’s major cities. The institutional evolution from the India that offered a JIT in 2016 to the India that reached Latif in 2023 was profound, driven by the accumulation of operational precedents, the erosion of domestic political constraints on assertive action, and the growing international acceptance of India’s right to act against terrorist threats emanating from Pakistani soil.
The mosque location raises questions that the campaign’s analysts cannot avoid. David Kilcullen, the counter-insurgency theorist, has written extensively about how targeted-killing campaigns exploit the predictable behaviors of their targets. Prayer is among the most predictable behaviors in an observant Muslim’s daily routine, occurring at fixed times in fixed locations with a regularity that surveillance teams find invaluable. The operational logic of targeting individuals at mosques is clear: the target’s presence can be predicted with high confidence, the approach can be planned around the prayer schedule, and the target’s physical posture during prayer limits reactive capability. The ethical dimensions are equally clear. Killing a person inside a place of worship, during an act of religious devotion, crosses a threshold that many observers find morally troubling regardless of the target’s criminal history. Martha Crenshaw of Stanford, a leading scholar of terrorism studies, has noted that the methods employed in targeted-killing campaigns can undermine the moral authority that distinguishes state action from the terrorism it opposes. The campaign’s architects face a tension between operational effectiveness, which favors mosque targeting, and moral legitimacy, which is complicated by it.
Latif’s case also illuminates the attribution debate that pervades the shadow war. Indian officials have never publicly claimed responsibility for the covert campaign. Pakistani officials have periodically attributed the killings to Indian intelligence, specifically to the Research and Analysis Wing, but these attributions have not been accompanied by publicly released evidence sufficient to establish responsibility in a legal or diplomatic forum. The circumstantial case is substantial: the targets are exclusively individuals designated by India as terrorists, the operational pattern is consistent across organizations and cities, and the campaign’s acceleration has correlated with India’s stated shift toward a more assertive counter-terrorism posture. But circumstantial evidence is not formal attribution, and the gap between the two is the space in which the campaign operates, benefiting from the plausible deniability that official silence provides while achieving the strategic objectives that official acknowledgment would make legally and diplomatically complicated.
The comparison between Latif’s case and other attack-to-elimination chains in the campaign highlights both the pattern’s consistency and its variations. Zahoor Mistry, the IC-814 hijacker killed in Karachi, represents a much longer chain: the IC-814 hijacking occurred in 1999, Mistry’s killing came over two decades later. The interval in Mistry’s case was driven less by diplomatic process than by the sheer difficulty of locating a man living under a false identity in one of the world’s largest cities. Latif’s interval was shorter because his identity was known, his location was established, and the obstacle was political will rather than intelligence gaps. The comparison suggests that the campaign treats different targets according to different operational logics: some are intelligence-intensive targets who take years to locate, while others, like Latif, are will-intensive targets whose location is known but whose elimination requires the accumulation of political justification.
The Mistry and Latif cases sit at opposite ends of a spectrum that defines the campaign’s operational character. Mistry required the intelligence community to find a man who had changed his name, moved to a new city, and embedded himself in a community that did not know his true identity. That search required years of painstaking intelligence work, the kind of patient collection and analysis that yields results slowly if at all. Latif required something different: not the discovery of a hidden target but the political and operational maturation necessary to act against a visible one. Latif’s location in Sialkot was not a secret. His mosque attendance was not concealed. His role in JeM was a matter of public record through the NIA charge sheet. What he lacked was not concealment but rather the political prerequisite for his elimination, a prerequisite that materialized only after the diplomatic track was exhausted and the military precedents were established. This distinction between intelligence-constrained and will-constrained eliminations is important for understanding the campaign’s internal logic, because it suggests that the target list is not simply a queue ordered by intelligence availability but a more complex matrix in which political timing, operational precedent, and strategic signaling all influence the sequence of eliminations.
The category of will-constrained targeting also illuminates why some high-value targets remain uneliminated despite being identifiable and locatable. Masood Azhar himself is the most obvious example. Azhar’s location in Bahawalpur is broadly known. His organizational role is not contested. His responsibility for multiple attacks on India is established beyond reasonable doubt. Yet Azhar remains alive, a fact that suggests the campaign’s architects have made a deliberate calculation that his elimination, given his seniority and the scale of response it might provoke, requires a different calculus than the one applied to handlers like Latif. The distinction between Latif and Azhar is not one of identification but of consequence management: eliminating a handler produces a tactical impact that the campaign can absorb; eliminating an organizational founder produces a strategic shock whose consequences are less predictable.
The strategic significance of Latif’s elimination extends beyond the individual case to the signal it sends about the campaign’s doctrine. The Pathankot attack was one of the most consequential terrorist operations against India since 26/11. By eliminating the man India identified as its mastermind, the campaign communicated that no attack on Indian security forces would go unanswered indefinitely, that the passage of time would not erase accountability, and that Pakistan’s refusal to prosecute would be superseded by alternative forms of consequence. This communication was directed simultaneously at multiple audiences: at JeM’s remaining operatives, who could calculate that their organizational roles placed them on a similar trajectory; at Pakistan’s security establishment, which could observe that the protective umbrella it extended to militant operatives was increasingly permeable; and at India’s domestic audience, which could see that the government’s promise to hold terrorists accountable was being fulfilled through channels that bypassed the diplomatic gridlock that had defined India’s Pakistan policy for decades.
The Pathankot attack’s position in the broader escalation chain connects Latif’s case to the structural evolution of India’s counter-terrorism approach. Pathankot led to the surgical strikes after Uri. The surgical strikes established the precedent for the Balakot airstrike after Pulwama. Balakot established the precedent for Operation Sindoor after Pahalgam. Each escalation was a response to a specific attack, but the cumulative effect was the construction of an ever-expanding toolkit that included diplomatic isolation, surgical strikes, airstrikes, missile strikes, and covert eliminations. Latif’s killing belongs to the covert dimension of this toolkit, operating in parallel with the conventional military escalation rather than as an alternative to it. The shadow war and the open military responses are not competing strategies; they are complementary tracks of a single doctrine that treats Pakistan’s use of terrorist proxies as a problem requiring simultaneous pressure at multiple levels.
The decision tree that connects Pathankot to the Sialkot mosque can be reconstructed as a sequence of branching decisions, each producing a narrower range of outcomes that converged on the elimination. The first decision node was Pathankot itself, which created Latif as a target by establishing his role in a specific, attributable attack. Before Pathankot, Latif was a JeM handler, one among many, unremarkable in the intelligence landscape. After Pathankot, he was the identified mastermind of an attack on a strategically significant Indian military installation, a designation that elevated him from an anonymous operative to a named individual with a documented file. The second decision node was the JIT offer. India’s decision to pursue diplomacy, to give Pakistan the opportunity to demonstrate accountability, was a genuine fork in the path. If Pakistan’s JIT had produced a prosecution, the diplomatic mechanism would have been validated, and the case for covert action would have been weakened. The JIT’s failure closed the diplomatic branch and channeled all subsequent decision-making into the unilateral track. The third node was the accumulation of military precedents through Uri and Pulwama, which demonstrated that India was willing to use force against Pakistani targets and that the international costs of doing so were manageable. The fourth node was the maturation of the target package, the point at which intelligence collection had produced sufficient confidence in Latif’s location and routine to authorize an operation. The fifth node was the operational window itself, the specific day when Latif’s presence at the mosque coincided with the operational team’s readiness to execute.
This decision tree is analytically valuable because it demonstrates that the elimination was not an impulsive act but the product of a systematic process in which alternatives were considered and exhausted before force was applied. Critics of targeted-killing campaigns often characterize them as extrajudicial shortcuts that bypass the legal and diplomatic mechanisms designed to govern state behavior. Latif’s case complicates that characterization because the legal and diplomatic mechanisms were tried first and failed through no fault of India’s. The JIT was Pakistan’s opportunity to demonstrate that its legal system could hold JeM operatives accountable. Pakistan chose not to take that opportunity. The question that Latif’s decision tree poses is not whether targeted killing is preferable to legal accountability but what happens when legal accountability is structurally unavailable.
The broader implications of Latif’s case extend to the nuclear dimension that shadows every India-Pakistan interaction. Vipin Narang of MIT has written extensively about the escalation dynamics between nuclear-armed states, arguing that the nuclear umbrella, far from preventing all conflict, creates a space in which sub-nuclear operations can proliferate precisely because both sides understand that full-scale war is too dangerous. The shadow war operates within this sub-nuclear space. Covert eliminations, conducted with deniability and plausible ambiguity, fall below the threshold that would trigger a conventional military response from Pakistan, let alone a nuclear one. Latif’s killing inside a Sialkot mosque was an act of considerable operational boldness, but it was calibrated to remain within the parameters that nuclear deterrence defines. The campaign’s architects understand that every operation must be calibrated against the risk of escalation, and the covert methodology, with its built-in deniability, represents the operational form that this calibration takes. The question that haunts the campaign is whether the cumulative weight of dozens of such operations will eventually exceed the threshold that individual operations are designed to stay below.
Frequently Asked Questions
Q: Who was Shahid Latif of Jaish-e-Mohammed?
Shahid Latif was a senior Jaish-e-Mohammed operative who served as a cross-border handler based in Sialkot, Pakistan. His primary role within JeM’s operational architecture involved coordinating infiltration operations across the India-Pakistan border, exploiting the Sialkot sector’s proximity to the international frontier. Indian intelligence identified Latif as the mastermind of the January 2016 Pathankot airbase attack, which killed seven Indian security personnel. The NIA named him in its charge sheet, citing intercepted communications that placed him in direct contact with JeM’s operational command during the attack’s planning phase. Latif was shot dead by masked gunmen inside a Sialkot mosque in October 2023.
Q: How was Shahid Latif killed in Sialkot?
Masked gunmen entered a mosque in Sialkot where Latif regularly attended prayers. The attackers, wearing face coverings, moved directly to Latif’s position and opened fire at close range. Latif was struck multiple times and died at or near the scene. The gunmen withdrew from the mosque compound and escaped without being apprehended. Pakistani police registered a case against unknown assailants, consistent with the response pattern observed across dozens of similar targeted killings in Pakistan. No arrests were reported in connection with the killing.
Q: Was Latif definitively identified as the Pathankot airbase attack mastermind?
India’s National Investigation Agency identified Latif as the Pathankot mastermind based on intercepted communications that placed him in direct contact with JeM’s operational command during the attack’s planning and execution phases. The NIA’s charge sheet named Latif specifically, citing handler communications and operational coordination evidence recovered from the attackers’ communication devices. Pakistan’s investigations were inconclusive; the Pakistani JIT that visited the Pathankot airbase did not produce public findings that either confirmed or contradicted India’s attribution. The weight of available evidence, including the intercepted communications and Latif’s documented role as a Sialkot-based cross-border handler, supports India’s identification.
Q: Why was Latif killed inside a mosque rather than at another location?
Mosques provide a uniquely predictable targeting window. Prayer times follow the solar calendar with precision, and observant individuals attend with regularity that allows surveillance teams to predict their presence at specific locations at specific times. Latif attended his local Sialkot mosque regularly, making it the most reliable point of interception in his daily routine. The prayer posture also limits a target’s ability to react to an approaching threat. While mosque targeting raises ethical concerns due to the religious sanctity of the location, the operational logic is consistent with the broader campaign pattern where multiple eliminations have occurred at or near places of worship during prayer times.
Q: How many Indian security personnel were killed in the 2016 Pathankot airbase attack?
Seven Indian security personnel were killed during the multi-day battle to repel the JeM infiltrators from the Pathankot airbase. The casualties included members of the Defence Security Corps and the National Security Guard who engaged the heavily armed attackers at close range. The attackers themselves were all killed during the operation. The firefight lasted multiple days as the infiltrators established defensive positions within the airbase compound, exploiting the terrain to sustain their resistance against responding security forces.
Q: How long after Pathankot was Shahid Latif killed?
Approximately seven years separated the Pathankot airbase attack in January 2016 from Latif’s killing in October 2023. This interval was not a period of inaction but rather a period during which diplomatic alternatives were exhausted, military escalation established precedents for unilateral action, and intelligence preparation built the operational capability necessary for a targeted elimination inside Pakistan. The interval encompassed the Pakistani JIT failure, the Uri surgical strikes, the Pulwama-Balakot sequence, and the gradual acceleration of the covert campaign against terrorist operatives across Pakistan.
Q: Did Pakistan investigate Latif’s role in the Pathankot attack?
Pakistan sent a Joint Investigation Team to the Pathankot airbase to examine the evidence India provided. The JIT visited the site, reviewed materials, and returned to Pakistan. No prosecution of Latif resulted. No public findings were produced that acknowledged JeM’s role in the attack. India’s intelligence community and external analysts widely concluded that the JIT process was designed to create the appearance of cooperation without delivering actual accountability. Latif continued to live freely in Sialkot, attend his mosque, and maintain his operational role within JeM for seven more years after the JIT returned empty-handed.
Q: What happened to the masked gunmen who killed Latif?
The masked gunmen who killed Latif escaped from the mosque compound and were not apprehended. Their identities remain publicly unknown. No group claimed responsibility for the killing. Pakistani police registered a case against unknown perpetrators, but no arrests or subsequent investigative developments were publicly reported. The clean escape was consistent with the operational pattern observed in the broader campaign, where attackers typically withdrew successfully from the killing site before any security response materialized.
Q: What was the connection between PM Modi’s Lahore visit and the Pathankot attack?
Prime Minister Narendra Modi made a surprise visit to Lahore on December 25, 2015, stopping to greet Pakistani Prime Minister Nawaz Sharif on his birthday. The visit was widely interpreted as a significant diplomatic overture, signaling India’s willingness to restart dialogue with Pakistan. Eight days later, on January 2, 2016, JeM infiltrators from the Sialkot sector attacked the Pathankot airbase. The juxtaposition was devastating to the diplomatic process. India’s offer of a JIT was itself a product of the Lahore visit’s goodwill, an attempt to salvage the diplomatic channel that the attack had undermined. When the JIT failed, the diplomatic channel collapsed permanently.
Q: What role did the Sialkot sector play in the Pathankot infiltration?
The Pathankot attack team crossed the international border from the Sialkot sector into the Gurdaspur district of Indian Punjab. The Sialkot sector offered specific tactical advantages for cross-border infiltration: agricultural flatland that provides concealment for small teams moving at night, seasonal streams and irrigation channels that offer natural corridors, and gaps in the border fence that existed due to terrain obstacles and infrastructure degradation. Latif’s detailed familiarity with these terrain features and border patrol patterns was central to the infiltration’s success. His role as a Sialkot-based handler meant he possessed the local knowledge necessary to identify the optimal crossing point and timing.
Q: How did the Pathankot attack change India’s counter-terrorism approach?
Pathankot marked the end of India’s engagement-based approach to Pakistan. The attack, following immediately after Modi’s Lahore overture, demonstrated that diplomatic signals from India did not deter cross-border terrorist operations. The JIT failure demonstrated that bilateral investigative mechanisms could not deliver accountability. These twin failures shifted India’s approach from engagement to confrontation, a shift that became visible in the surgical strikes after Uri in September 2016 and accelerated through the Balakot airstrike in February 2019. The covert elimination campaign, of which Latif’s killing is a part, represents the further evolution of this confrontational approach.
Q: Was the Pathankot JIT offer genuine or strategic?
This question divides analysts and reveals a genuine analytical ambiguity at the heart of India’s post-Pathankot decision-making. One view holds that India genuinely hoped the JIT would investigate and that its failure was a disappointment that forced a recalculation. This view notes that the JIT offer carried real costs for India, including allowing Pakistani investigators onto a sensitive military installation and sharing intelligence-grade evidence that revealed Indian collection capabilities. No government would absorb these costs if the outcome were predetermined. Another view holds that India’s intelligence community expected the JIT to fail based on the precedent of every previous bilateral investigative effort, and that the offer was designed to build the international case for future unilateral action by demonstrating Pakistan’s unwillingness to cooperate. Both perspectives may contain elements of truth. India’s civilian leadership may have genuinely desired cooperation while India’s intelligence establishment simultaneously prepared for the likelihood that cooperation would not materialize. Senior officials may have held both positions simultaneously, hoping for the best while planning for the worst. The practical consequence was identical regardless of which interpretation is correct: the JIT failed, the diplomatic option was exhausted, and the path to unilateral action was cleared of the most significant political objection, namely that India had not tried diplomacy first.
Q: How does Latif’s case compare to other targeted killings in the shadow war?
Latif’s case is among the most clearly documented attack-to-elimination chains in the campaign, and its distinctiveness warrants detailed comparison with other cases. Unlike some targets whose roles in specific attacks are inferred rather than proven, Latif’s identification as the Pathankot mastermind rests on intercepted communications and NIA charge-sheet evidence that meets the standard of formal attribution. The seven-year interval is shorter than the two-decade gap between the IC-814 hijacking and Zahoor Mistry’s killing but longer than the intervals observed in some LeT eliminations. The mosque setting connects Latif’s case to the broader pattern of prayer-time targeting observed across the campaign, a methodology documented in at least four other cases including Abu Qasim’s killing in Rawalakot. Among JeM-specific cases, Latif’s is the highest-profile due to the prominence of the Pathankot attack, which was a milestone in both Indian security policy and the India-Pakistan relationship. The case’s clarity makes it the single most useful example for understanding the campaign’s internal decision-making framework, because the complete chain from attributable attack to diplomatic exhaustion to covert response is fully documented.
Q: What impact did Latif’s elimination have on JeM’s operational capability?
Latif’s elimination removed JeM’s most experienced cross-border handler in the Sialkot sector, an operative whose knowledge of infiltration corridors, border patrol patterns, and local facilitator networks had been accumulated over years of operational activity. Whether this removal produced lasting operational degradation depends on JeM’s ability to promote a replacement with comparable expertise. Organizations like JeM maintain bench depth in their handler cadres, but the specific local knowledge that Latif possessed, the relationships with guides and facilitators, the detailed terrain familiarity, is not easily transferred through organizational channels. Knowledge of which specific sections of the border fence have gaps, which patrol routes are predictable, and which local contacts can be trusted are competencies built through direct experience, not classroom instruction. The cumulative effect of multiple JeM eliminations, including Latif, Malik, and Tariq in rapid succession, likely produced more significant degradation than any single killing could achieve. When an organization loses not one but several experienced operatives within a compressed timeframe, the replacement challenge becomes multiplicative rather than additive, because each replacement requires mentoring from experienced colleagues who are themselves being removed from the network.
Q: Did international observers react to Latif’s killing?
Latif’s killing did not generate significant international media coverage or diplomatic reaction. The broader pattern of targeted killings in Pakistan attracted more attention from international analysts and journalists than individual cases, except when the targets were exceptionally prominent or the circumstances particularly dramatic. Latif’s case was more significant analytically than it was newsworthy, because its importance lies in the completeness of the attack-to-elimination chain rather than in the circumstances of the killing itself, which followed the established pattern closely. International coverage of the shadow war has been shaped by the difficulty of attribution: without an official claim of responsibility, journalists are constrained to report the killings as unsolved crimes rather than as elements of a state-directed campaign, limiting the analytical depth that mainstream reporting can provide. Academic and defense-journal coverage, by contrast, has been more willing to engage with the circumstantial pattern and draw analytical conclusions about the campaign’s architecture.
Q: Could Latif have avoided elimination by relocating from Sialkot?
Relocation might have complicated the targeting process but would not necessarily have prevented it. Latif’s identity was known to Indian intelligence; moving to another city would have required establishing a new routine in an unfamiliar environment while potentially losing the operational access to the border sector that defined his role within JeM. Other targets in the campaign were killed in cities far from the border, including Karachi, which suggests that distance from the frontier did not provide immunity. Latif’s decision to remain in Sialkot likely reflected both professional necessity and a personal calculation that Pakistan’s security apparatus would continue to provide effective protection.
Q: What evidence links Latif specifically to the Pathankot attack planning?
The evidence against Latif included intercepted communications between JeM’s handler network and the Pathankot attack team, analysis of communication devices recovered from the killed attackers, and intelligence assessments that identified Latif as the operational coordinator on the Pakistani side of the border. The NIA’s charge sheet incorporated this evidence and named Latif as a primary accused. The intercepted communications reportedly included handler instructions on infiltration timing, route selection, and target approach that were consistent with Latif’s documented expertise in the Sialkot sector’s border terrain.
Q: How did the Pathankot attack compare to other JeM operations against India?
The Pathankot airbase attack was one of three major JeM operations against Indian security installations. The 2001 Parliament attack targeted India’s legislative center. The 2019 Pulwama attack used a vehicle-borne improvised explosive device against a CRPF convoy. Pathankot was distinctive in targeting a military airbase, a category of installation with higher security than either a government building or a highway convoy. The attack required a more complex infiltration because the target was a defended military facility rather than a civilian or paramilitary installation. The multi-day firefight that followed the breach was among the longest sustained engagements between infiltrators and Indian security forces in the modern era.
Q: Is the shadow war effective at deterring cross-border terrorism?
The effectiveness question remains contested among strategic analysts who study the India-Pakistan dynamic. The shadow war has removed dozens of operatives from JeM, LeT, and other organizations, degrading operational capability in measurable ways including the loss of institutional knowledge, handler expertise, and established facilitator networks. Whether this degradation has reduced the frequency or severity of cross-border terrorism is harder to establish with confidence, because the relationship between handler elimination and operational output is mediated by organizational resilience, replacement capacity, and the strategic decisions of Pakistan’s security establishment that ultimately authorize or constrain cross-border operations. Vipin Narang of MIT has argued that the campaign’s deterrent effect may operate less on the organizational level than on the individual level, making specific operatives more cautious about exposing themselves to targeting and thereby reducing the tempo of cross-border operations even if the organizational intent to conduct them remains unchanged. The individual-level deterrence argument carries weight: an operative who fears being tracked restricts movement, reduces communications, and limits engagement with subordinates, all of which impose operational friction that degrades capability even without direct elimination.
Q: What does Latif’s case reveal about Pakistan’s protection of JeM operatives?
Latif’s case demonstrates with unusual clarity that JeM operatives identified by foreign intelligence services as responsible for major terrorist attacks can live openly in Pakistani cities, attend regular mosques, and maintain their organizational roles without facing prosecution, detention, or meaningful surveillance by Pakistani authorities. The seven-year interval between India’s identification of Latif as the Pathankot mastermind and his killing was a period during which Pakistan could have arrested and prosecuted him using the evidence India provided through the JIT process. That evidence included intercepted communications, handler identification data, and infiltration route details that any competent law enforcement agency could have used to build a criminal case. The failure to do so was not a function of evidentiary insufficiency but of political choice, a choice consistent with Pakistan’s broader pattern of protecting JeM operatives whose anti-India activities serve the state’s strategic interests. This pattern extends from Masood Azhar’s own decades of freedom to the continued operation of JeM’s institutional infrastructure in Bahawalpur and Sialkot, and it constitutes the systemic failure that the covert campaign was designed to circumvent when all other channels of accountability proved structurally incapable of producing results.