Five Jaish-e-Mohammed operatives have been killed in Pakistan since March 2022, and the analytical question is not whether they were connected but why they were killed in the order they were. Zahoor Mistry, the IC-814 hijacker living under a false name in Karachi, fell first. Shahid Latif, the Pathankot airbase attack mastermind, fell second in a Sialkot mosque. Dawood Malik, Masood Azhar’s tribal-belt affiliate in Lashkar-e-Jabbar, fell third in North Waziristan. Raheem Ullah Tariq, a Karachi-based Azhar associate, fell fourth. Muhammad Tahir Anwar, Azhar’s own elder brother, died fifth under circumstances Pakistan has never adequately explained. The sequence, read as a sequence rather than as five isolated incidents, tells a story that no individual profile can tell on its own: a story of systematic organizational penetration that began at JeM’s historical periphery and worked inward toward its founder’s bloodline.

The purpose of comparing these five cases is not to rank them by some abstract measure of importance. It is to answer a precise analytical question: does the JeM targeting sequence reveal a deliberate strategy, or does it reflect opportunistic strikes against whoever happened to be vulnerable at a given moment? The answer matters because it determines whether the campaign against Jaish-e-Mohammed is a systematic decapitation effort or a series of fortunate coincidences. Vipin Narang at MIT has argued that strategic targeting in counter-terrorism campaigns follows organizational logic rather than target availability, and the JeM sequence is perhaps the clearest test case for that argument in the contemporary era. Sushant Sareen at the Observer Research Foundation has mapped JeM’s vulnerability points and concluded that the sequence tracks Azhar’s organizational dependency chain with uncomfortable precision. If both are right, what happened to Jaish-e-Mohammed between 2022 and 2024 was not a scattering of independent kills but a coordinated campaign that read JeM’s organizational chart and worked through it layer by layer.
This article holds all five JeM targets in a single analytical frame. It measures each across five dimensions: organizational seniority within JeM’s hierarchy, operational involvement in specific named attacks against India, the intelligence value their deaths produced, the operational difficulty of reaching them, and the strategic impact their removal had on JeM’s functioning capacity. The comparison is the analysis. No section examines a single target in isolation. Every section weaves all five into the same evaluative lens, because the pattern only becomes visible when the cases are read together.
The comparative approach is necessary because the existing coverage of JeM’s losses treats each killing as an isolated incident. Pakistani media reported each death separately, with varying levels of detail, and rarely connected one JeM killing to the others in an analytical framework. Indian media, when it covered the deaths at all, tended to treat them as confirmation of existing narratives (the shadow war is real, RAW is conducting operations in Pakistan) without examining what the sequence itself reveals about the campaign’s logic. No competitor publication has systematically compared the five cases across multiple analytical dimensions to extract the pattern that the individual reports obscure. The cross-target comparison is the findable artifact that this article produces: a framework for understanding not just what happened to five JeM operatives but why it happened in the order, the geography, and the organizational sequence that it did. The framework itself is the contribution, because the framework makes visible what sequential news coverage cannot.
The analytical stakes of this comparison extend beyond the JeM case. If the JeM targeting sequence reveals strategic planning, it establishes a template that can be applied to other organizations in the same campaign. Lashkar-e-Taiba, Hizbul Mujahideen, and the Khalistan-linked groups that have also experienced targeted killings in Pakistan can each be subjected to the same five-dimensional analysis, and the results can be compared across organizations to determine whether the campaign applies a single targeting doctrine universally or tailors its approach to each organization’s specific vulnerabilities. The JeM comparison is the test case. If the methodology produces analytically productive results for JeM, it validates the approach for application elsewhere. If it does not, the failure reveals the limitations of comparative frameworks when applied to covert campaigns whose operational details remain classified. Either way, the attempt to impose systematic analysis on a series of killings that the parties responsible have never publicly explained is more productive than treating each death as an inexplicable event in isolation.
The Shared Thread
Zahoor Mistry, Shahid Latif, Dawood Malik, Raheem Ullah Tariq, and Muhammad Tahir Anwar shared three characteristics that placed them in the same targeting category despite occupying very different positions within Jaish-e-Mohammed’s structure. All five maintained direct personal relationships with Masood Azhar. All five operated from Pakistani territory with varying degrees of state awareness. And all five died in circumstances that Pakistani authorities attributed to unknown assailants but never credibly investigated.
The personal connection to Azhar is the thread that binds the group. Mistry participated in the IC-814 hijacking of December 1999, the crisis that ended with India releasing Azhar from prison in exchange for 155 hostages on a tarmac in Kandahar. Without that hijacking, Azhar would have remained in an Indian jail, and Jaish-e-Mohammed would never have existed. Mistry’s connection to Azhar was foundational: he helped free the man who built the organization. Latif served Azhar in operational command, planning and executing the January 2016 assault on the Pathankot airbase that killed seven Indian security personnel and brought India and Pakistan to the edge of military confrontation. His connection to Azhar was functional: he turned Azhar’s strategic intent into tactical reality. Malik served Azhar through Lashkar-e-Jabbar, a JeM affiliate operating in the tribal belt of North Waziristan, extending Azhar’s organizational reach into Pakistan’s most ungoverned territory. His connection to Azhar was geographic: he represented JeM’s presence in spaces where the Pakistani state itself could not reliably operate. Tariq served Azhar as an associate in Karachi, the city that functions as JeM’s primary logistics and financial hub outside Bahawalpur. His connection was logistical: he sustained the infrastructure that kept Azhar’s organization running. Tahir Anwar was Azhar’s elder brother, a figure whose involvement in JeM’s affairs was less well documented but whose familial bond placed him at the center of an organization that has always operated as an extended family enterprise. His connection was biological: he shared Azhar’s blood.
Read together, these five connections map JeM’s organizational anatomy. The hijacking that created the organization. The operational command that executed its attacks. The tribal affiliate that extended its reach. The urban cell that managed its logistics. The family that governed its inner circle. If you wanted to understand JeM’s structural dependencies by studying which nodes an adversary chose to remove, these five eliminations provide the answer. They did not target random JeM foot soldiers. They targeted the connective tissue that held Azhar’s organization together.
The geographic spread reinforces the analytical point. Mistry was killed in Karachi’s Akhtar Colony. Latif was killed in a Sialkot mosque near the Indian border. Malik was killed in North Waziristan, deep in the tribal belt. Tariq was killed in Karachi, the same city as Mistry but in different circumstances and with different operational implications. Tahir Anwar died under mysterious circumstances whose location Pakistani authorities have been reluctant to specify in detail. Five deaths in at least three distinct geographic zones of Pakistan, from the country’s largest city to its most remote tribal frontier to its border corridor. The geographic diversity alone argues against coincidence. Separate operational environments require separate intelligence preparation, separate local assets, and separate extraction routes. Whatever force produced these five outcomes was not operating from a single base with a single set of capabilities. It was operating across Pakistan’s full territorial spectrum.
The chronological spread is equally revealing. Mistry was killed in March 2022. Latif, Malik, Tariq, and Tahir Anwar all died within a roughly twelve-month window beginning in October 2023. The eighteen-month gap between the first kill and the second is the interval that separates a proof-of-concept from a sustained campaign. Mistry was the opening salvo, the operation that demonstrated the campaign’s ability to locate and reach a JeM operative in Pakistan. Then silence. Then four deaths compressed into a period so tight that the operational tempo itself became a message. The gap-then-burst pattern suggests a campaign that used the intelligence harvest from the Mistry operation to develop targeting information on subsequent targets, spent eighteen months building the packages, and then executed in rapid sequence once the packages were ready. This is consistent with how state-level intelligence services operate. They do not maintain a constant operational tempo. They prepare in waves, building multiple targeting packages simultaneously, and execute when operational readiness aligns across multiple targets.
The methodological consistency across the five cases deserves attention alongside the geographic and chronological patterns. Where information is available, the killing methodology follows a recognizable pattern: close-range gunfire by assailants whose identities remain unknown, rapid departure from the scene, and absence of any claim of responsibility. This is the same operational signature that characterizes the broader shadow war pattern across organizations. The consistency argues against attribution to internal Pakistani factional violence, which tends to produce different methodological signatures: improvised explosive devices in the tribal belt, drive-by shootings with different vehicular profiles in Karachi’s gang wars, or sectarian attacks with distinct claim-of-responsibility conventions. The JeM killings follow none of these local patterns. They follow the pattern that has appeared in LeT, Hizbul Mujahideen, and Khalistan-linked eliminations across Pakistan, a pattern whose cross-organizational consistency is perhaps its most analytically significant feature.
The weapons used in the documented cases also merit comparison. Where Pakistani media reporting provides weapon details, the JeM killings employed handguns at close range. This is consistent with the operational methodology analysis that characterizes the broader campaign: handguns rather than assault rifles, close range rather than standoff distance, and rapid escape rather than sustained engagement. The choice of handguns is itself analytically significant. A handgun is concealable. It can be carried by a motorcycle passenger without attracting attention in most Pakistani urban settings. It is effective at the ranges at which these killings occur (typically under five meters). And it is deniable: handguns are ubiquitous in Pakistan’s private weapons market and cannot be traced to any state arsenal through caliber or manufacturer alone. The weapons discipline across the JeM sequence is consistent with a campaign that prioritizes deniability over firepower.
Dimension One: Organizational Seniority and Role Within JeM
The five targets occupied five distinct tiers of Jaish-e-Mohammed’s organizational hierarchy, and the progression from tier to tier reveals the campaign’s escalation logic.
Zahoor Mistry sat at Tier Three in JeM’s structure: a historical operative with foundational significance but no current command authority. Mistry participated in the IC-814 hijacking alongside four other hijackers, and after the crisis ended with Azhar’s release, Mistry’s operational utility to JeM declined. He had served his purpose. The organization owed him a debt of protection, and Karachi’s sprawling anonymity provided it. Mistry adopted the alias Zahid Akhund and lived quietly in Akhtar Colony for roughly two decades. He was not giving orders. He was not planning operations. He was, by every available account, retired from active service. His seniority within JeM was historical rather than operational, a distinction that matters for understanding why he was the first target rather than the last. Retired operatives are easier to locate because they stop taking the precautions that active operatives maintain. Mistry’s daily routine was stable. His address was fixed. His cover identity, while functional, had been in place long enough that neighbors knew his face and habits. From a targeting perspective, Mistry was the lowest-risk, highest-certainty option available in 2022.
Shahid Latif occupied Tier Two: an active operational commander with direct responsibility for major attacks. Latif was not merely a JeM member. He was the handler who planned and directed the January 2016 Pathankot airbase assault from across the border in Sialkot. Indian intelligence identified him through intercepted communications between the attack cell and its cross-border controller. The NIA investigation into Pathankot named Latif as a primary accused whose phone number matched intercepts captured during the firefight. Unlike Mistry, Latif was actively dangerous at the time of his death. He continued to operate from Sialkot, a border city that JeM has used as a forward staging area for cross-Line of Control operations for over a decade. His seniority was operational and current: he held command authority over JeM’s border-corridor capabilities, the exact capabilities that India considers the most direct physical threat to its security.
Dawood Malik occupied a lateral position that defies clean hierarchical placement: a Tier Two affiliate commander operating through Lashkar-e-Jabbar, JeM’s less-documented tribal-belt arm. Malik reported to Azhar through organizational channels that ran outside JeM’s Bahawalpur-centric mainstream structure. His role was to maintain JeM’s presence in North Waziristan, where the organization’s operatives could access training facilities, weapons caches, and the cross-border infiltration routes into Afghanistan that Pakistan’s tribal belt has provided to militant groups for decades. Malik’s seniority was geographic rather than hierarchical: he was senior because he controlled a territory that JeM needed but could not manage from its Punjab-based headquarters. The distinction matters because Malik’s death severed JeM’s connection to the tribal belt, a connection that mainstream analysis often overlooks because it runs through an affiliate rather than through JeM’s primary command chain.
Raheem Ullah Tariq occupied Tier Three in JeM’s present-day structure: a mid-level associate in Karachi whose exact operational portfolio remains less documented than Latif’s or even Malik’s. Tariq’s significance is less about his individual role and more about his position within JeM’s Karachi infrastructure, the network of safe houses, communications nodes, and financial channels that sustains JeM’s operations from Pakistan’s largest and most chaotic city. Tariq was an Azhar associate whose death in November 2023 occurred during the campaign’s densest operational window, a fortnight in which three JeM and Lashkar-e-Taiba operatives were killed in three different Pakistani cities. The temporal clustering gives Tariq’s death a significance that his individual organizational rank might not otherwise justify. He was part of a burst, and the burst itself is analytically important because it demonstrates multi-city operational tempo.
Muhammad Tahir Anwar occupied a position that no organizational chart can capture: Tier One by blood, if not by formal command. Azhar’s elder brother, Tahir Anwar was embedded in JeM’s affairs through the Azhar family’s comprehensive involvement in the organization’s governance. JeM has never been a purely bureaucratic organization. It is a family enterprise in which the Azhar clan occupies leadership positions at every level. Tahir Anwar’s death under mysterious circumstances struck at the most protected layer of JeM’s structure, the layer that even Pakistani state protection was designed to shield. Whether his death was a targeted killing in the same mold as Mistry’s and Latif’s or whether it resulted from other causes remains contested. Pakistani authorities have provided no credible explanation. What is not contested is that Azhar lost a brother, and that the loss occurred within a period when Azhar’s associates were dying at an unprecedented rate.
The hierarchical progression is striking. The campaign began with a retired historical operative (Tier Three), escalated to an active operational commander (Tier Two), extended laterally to an affiliate commander in ungoverned territory (Tier Two lateral), captured a mid-level logistics associate in the same burst (Tier Three present), and reached the founder’s own family (Tier One by blood). If the sequence reflects deliberate strategic logic, as Narang’s framework would predict, then the campaign read JeM’s hierarchy and worked through it in a pattern designed to demonstrate escalating reach rather than maximum immediate impact. Killing Tahir Anwar before Mistry would have sent a more dramatic message but would have also hardened every other target’s security before they could be reached. The observed sequence, periphery first and inner circle last, is consistent with a campaign that prioritized operational feasibility over symbolic impact in its early phases and shifted toward symbolic impact only after the peripheral targets had been removed.
The tier analysis also reveals something about JeM’s internal security architecture. Mistry, at Tier Three historical, had minimal personal security. He relied on anonymity rather than protection, living under a false name in a crowded neighborhood where his face blended into the urban mass. His security model was passive: do not attract attention, and attention will not find you. Latif, at Tier Two operational, had moderate personal security augmented by the JeM infrastructure in Sialkot. He operated within a city where JeM maintained a visible presence, meaning that local JeM members would notice unfamiliar surveillance or suspicious strangers. His security model was ambient: the organization’s footprint in Sialkot provided a warning network that supplemented whatever personal precautions he took. Malik, at Tier Two lateral, operated in an environment where the terrain itself provided security. Waziristan’s mountains, clan checkpoints, and armed population create barriers to entry that no organizational security apparatus could replicate. His security model was environmental: the landscape defended him. Tariq’s security in Karachi was similar to Mistry’s, passive anonymity in a large city, but degraded by the fact that the campaign had already demonstrated its ability to reach JeM operatives in Karachi eighteen months earlier. If Tariq did not enhance his personal security after Mistry’s death in the same city, his organizational superiors failed him. If he did enhance it and was killed nonetheless, the penetration of JeM’s Karachi network was deeper than a single killing could demonstrate.
Tahir Anwar’s security was presumably the highest of the five, because the Azhar family operates under both ISI protection and JeM’s internal security apparatus. Family members of designated global terrorists do not walk freely through Pakistani cities without escorts, safe houses, and communication protocols designed to prevent exactly the kind of targeting that the five-case sequence demonstrates. If Tahir Anwar’s death was a targeted killing, it penetrated the thickest security perimeter in the entire JeM structure. If it was not, and the “mysterious circumstances” of his death reflect natural causes or an accident, then the campaign against JeM stopped one layer short of its most protected tier. The security-model comparison across all five tiers suggests that the campaign was calibrated to each target’s specific vulnerability: exploiting anonymity against Mistry, prayer-time predictability against Latif, local assets against Malik, temporal clustering against Tariq, and whatever method proved effective against the Azhar family’s inner perimeter for Tahir Anwar.
Dimension Two: Operational Involvement in Named Attacks Against India
The five JeM targets vary dramatically in their documented involvement in specific attacks against Indian territory, and this variation reveals which organizational functions the campaign prioritized for removal.
Zahoor Mistry’s attack involvement is the most precisely documented of the five. He was one of five hijackers who seized Indian Airlines Flight IC-814 on December 24, 1999, a Boeing 737 carrying 178 passengers from Kathmandu to Delhi. The hijackers diverted the aircraft through multiple stops, including Amritsar, Lahore, and Dubai, before landing in Kandahar, Afghanistan, then under Taliban control. Over eight days, the hijackers negotiated the release of three imprisoned militants, including Masood Azhar, Ahmed Omar Saeed Sheikh, and Mushtaq Ahmed Zargar, in exchange for the passengers’ lives. One passenger, Rupin Katyal, was stabbed to death during the hijacking. Mistry’s involvement is not alleged or inferred. It is documented in Indian government records, flight crew testimony, and the extensive media coverage that the eight-day crisis generated. His was the most historically significant attack involvement of any of the five targets, because the IC-814 hijacking created Jaish-e-Mohammed itself. Without the hijacking, Azhar stays in prison. Without Azhar’s release, JeM is never founded. Without JeM, the Parliament attack of 2001, Pathankot in 2016, and Pulwama in 2019 never happen. Mistry’s attack involvement was not direct violence against India in the conventional sense. It was structural violence: the act that created the organization responsible for decades of subsequent carnage.
Shahid Latif’s attack involvement is the most operationally direct. He masterminded the January 2, 2016, assault on the Pathankot airbase in Punjab, India. Four JeM militants crossed the India-Pakistan border and infiltrated the heavily guarded Indian Air Force station, engaging security forces in a firefight that lasted nearly four days. Seven Indian security personnel were killed, including Lieutenant Colonel Niranjan Kumar of the National Security Guard. Indian intelligence identified Latif as the cross-border handler who directed the operation from Sialkot using mobile communications that were intercepted during and after the attack. The NIA chargesheet filed in connection with Pathankot named Latif as a primary accused. His operational involvement was hands-on: he selected the target, planned the infiltration route, communicated with the attackers during the operation, and managed the logistics from the Pakistani side. India subsequently invited a Pakistani Joint Investigation Team to visit Pathankot and examine the evidence, a diplomatic gesture that produced no Pakistani accountability and, in retrospect, confirmed India’s assessment that diplomatic channels would never deliver justice for Pathankot. Latif’s continued operation from Sialkot after the attack, openly and without apparent fear of Pakistani prosecution, crystallized the case for covert alternatives.
Dawood Malik’s attack involvement is the least precisely documented of the five, a fact that reflects both the opacity of Lashkar-e-Jabbar’s operations and the difficulty of attributing specific attacks to tribal-belt affiliates whose primary function is logistical rather than operational. Malik was identified as a close Masood Azhar aide operating through Lashkar-e-Jabbar in North Waziristan, but open-source reporting does not link him to a specific named attack against Indian territory in the way that Mistry is linked to IC-814 or Latif is linked to Pathankot. His involvement was enabling rather than executing. The tribal belt provides JeM with access to weapons, training infrastructure, and cross-border routes that the organization cannot maintain from its Punjab base. Malik managed that access. His anti-India activities were systemic rather than event-specific, making him harder to characterize in a comparison matrix but no less important to JeM’s functional capacity. Sushant Sareen has noted that JeM’s tribal-belt connections are among its least-studied but most operationally consequential assets, because they provide the organization with redundancy that its Punjab-based structure alone cannot guarantee. Malik’s death severed one channel of that redundancy.
Raheem Ullah Tariq’s attack involvement is similarly indirect but for different reasons. Tariq was a Masood Azhar associate based in Karachi whose documented role centered on JeM’s urban support infrastructure rather than on specific attack planning. Karachi functions as JeM’s logistics hub: the city where financial transfers are processed, where communication equipment is sourced, where safe houses are maintained for operatives transiting between Bahawalpur and the tribal belt or the Line of Control. Tariq’s operational contribution was to the system that enabled attacks rather than to the attacks themselves. His death in November 2023 occurred alongside two other killings in the same fortnight, suggesting that the campaign’s planners viewed JeM’s logistics infrastructure as a target set equal in priority to its operational commanders. The distinction between triggermen and support networks is analytically important. Counter-terrorism doctrine has shifted over the past two decades from targeting the individuals who pull triggers toward targeting the networks that arm, fund, and deploy them. Tariq’s inclusion in the JeM target set reflects that doctrinal evolution.
Muhammad Tahir Anwar’s attack involvement is the most ambiguous. As Masood Azhar’s elder brother, he occupied a position within JeM that blurred the boundaries between organizational governance and family authority. The Azhar family’s involvement in JeM extends well beyond Masood himself. Multiple Azhar brothers and relatives have held positions within the organization, and the family’s compound in Bahawalpur has functioned as JeM’s de facto headquarters since the organization’s founding. Tahir Anwar’s specific operational portfolio, if any, has not been established in open-source reporting with the precision that characterizes the Mistry or Latif cases. His significance lies not in what he did operationally but in who he was structurally: the elder brother of JeM’s founder, a figure whose death struck at the organization’s biological core. Ashley Tellis at the Carnegie Endowment has argued that leadership attrition in organizations structured around family networks produces qualitatively different organizational effects than attrition in bureaucratic organizations, because family members cannot be replaced through promotion the way staff officers can.
The attack-involvement dimension thus reveals a clear analytical pattern. The campaign targeted a historical attack participant (Mistry), an active attack commander (Latif), an enabling infrastructure manager (Malik), a logistics coordinator (Tariq), and a family-governance figure (Anwar). These five categories map JeM’s complete attack lifecycle: the historical act that created the organization, the operational commander who executes current attacks, the tribal affiliate who provides material support, the urban cell that manages logistics, and the family structure that governs the enterprise. No single category is dispensable. Remove any one, and JeM’s attack capability is degraded in a specific, identifiable way.
The attack-involvement comparison also illuminates a distinction between the JeM targeting sequence and the approach taken against Lashkar-e-Taiba in the parallel campaign. LeT’s eliminated members tend to have more direct and recent operational involvement in attacks against India. Several were linked to the 26/11 Mumbai attacks of 2008, the Reasi bus attack of 2024, or ongoing cross-Line of Control infiltration attempts. The LeT target set is weighted toward triggermen and active planners. The JeM target set is weighted differently: only Latif qualifies as an active triggerman, while the remaining four represent historical, enabling, logistical, and governance functions. This difference reflects the two organizations’ structural dissimilarities. LeT maintains a larger roster of active operational commanders distributed across Pakistan’s Punjab and Khyber Pakhtunkhwa regions, providing more targets in the direct-involvement category. JeM, smaller and more centralized around the Azhar family, concentrates operational authority in fewer individuals, which means that degrading JeM requires reaching into functional categories that a pure operational-targeting approach would miss.
The shift from targeting triggermen to targeting entire organizational ecosystems represents a doctrinal evolution that intelligence scholars have tracked across multiple counter-terrorism campaigns globally. Daniel Byman at Brookings has documented how Israel’s targeted killing doctrine evolved from assassinating individual bomb-makers in the 1990s to targeting Hamas’s financial, logistical, and governance infrastructure in the 2000s. The United States’ drone campaign in the GWOT underwent a similar evolution, expanding from the initial focus on al-Qaeda’s senior leadership to a broader campaign against mid-level facilitators, couriers, and financiers whose removal degraded the network’s operational capacity more reliably than leadership decapitation alone. The JeM targeting sequence, with its inclusion of a logistics associate (Tariq) and a tribal-belt infrastructure manager (Malik) alongside the more traditional targets of a hijacker (Mistry) and an attack planner (Latif), suggests that whoever is conducting the campaign has absorbed these global lessons. The targeting criteria are ecosystem-wide, not leadership-focused. The goal is organizational degradation, not symbolic decapitation.
Dimension Three: Intelligence Value of Each Elimination
Every targeted killing produces two kinds of value: the tactical value of removing a threat and the intelligence value of what the killing reveals about the target organization’s structure, security protocols, and human geography. The five JeM eliminations produced radically different intelligence yields, and comparing those yields reveals what the campaign learned from each successive operation.
Mistry’s killing in March 2022 produced the foundational intelligence yield for the entire JeM targeting sequence. His death established that JeM operatives could be located in Pakistan’s urban landscape despite decades-old cover identities. The fact that Mistry had lived as Zahid Akhund in Akhtar Colony for approximately twenty years without detection by Pakistani authorities (or with their passive acquiescence) and was nonetheless found and killed demonstrated a penetration capability that subsequent targets could not ignore. More critically, Mistry’s death triggered a JeM response that inadvertently revealed organizational connections. JeM leadership figures attended Mistry’s funeral in Karachi, a social convention that provided any observing intelligence service with a visual confirmation of which senior JeM figures were present in the city, where they traveled from, and what security measures accompanied their movements. Funerals are intelligence goldmines precisely because they compel attendance. Organizations that have lost a member face a choice between honoring their dead and exposing their living, and JeM chose honor. The intelligence value of Mistry’s funeral attendance roster may have exceeded the tactical value of Mistry’s death itself, because it placed named JeM figures in specific locations at specific times.
Latif’s killing in October 2023 produced intelligence value of a different kind: proof that JeM’s most operationally active commanders could be reached even in cities with active JeM infrastructure and Pakistani security presence. Sialkot is not Karachi. It is a smaller city near the Indian border where JeM’s presence is concentrated rather than diffused, and where the local security environment includes both Pakistani military patrols and JeM’s own surveillance networks. Killing Latif inside a mosque during prayers demonstrated two capabilities simultaneously: the ability to track a target’s prayer schedule with sufficient precision to predict his location at a specific hour, and the willingness to execute an operation in a religious setting where the social environment provides natural cover for close-range approach. The intelligence value of Latif’s death extended beyond JeM to the campaign’s broader understanding of how JeM commanders manage personal security in border-corridor cities. The fact that Latif was accessible in a mosque, a semi-public space with predictable daily patterns, suggested that JeM’s security protocols for active commanders were less rigorous than the organization’s threat environment warranted. The mosque pattern that appeared in Latif’s case repeated in at least one other targeting incident in Rawalakot, where Abu Qasim of Lashkar-e-Taiba was shot inside a Pakistan-occupied Kashmir mosque, suggesting the attackers identified prayer-time vulnerability as a cross-organizational weakness.
Malik’s killing in North Waziristan produced intelligence value that was geographic rather than organizational. The tribal belt is Pakistan’s most opaque operational environment, a region where the Pakistani state itself struggles to maintain surveillance coverage and where multiple armed groups, including TTP remnants, al-Qaeda affiliates, and various JeM and Lashkar-e-Taiba cells, operate in overlapping and sometimes competing territorial arrangements. Successfully executing a killing in North Waziristan demonstrated that the campaign possessed local assets or at minimum reliable informants in a region where outsiders are immediately identified and where tribal loyalties make penetration exceptionally difficult. The intelligence value of Malik’s death was the proof of geographic reach. Prior to Malik’s killing, every JeM target had been reached in an urban setting: Karachi for Mistry, Sialkot for Latif. Waziristan is not urban. It is a landscape of mountain passes, armed checkpoints, and clan-based surveillance systems that have defeated the operational ambitions of significantly larger intelligence services than whatever force is conducting this campaign. Reaching Malik in that environment required either long-term cultivation of tribal-belt sources or a level of signals intelligence access that could compensate for the absence of physical human assets on the ground.
Tariq’s killing in Karachi in November 2023 produced intelligence value through temporal clustering rather than through the individual target’s organizational importance. Tariq was the third person killed in a fourteen-day period that also included the deaths of two Lashkar-e-Taiba operatives in different Pakistani cities. The cluster demonstrated multi-city, multi-organization operational tempo, a capability that no previous sequence of killings had established. The intelligence revelation was about the campaign’s command-and-control architecture. Executing three operations in fourteen days across geographically dispersed locations requires either three independent teams operating simultaneously or a single command with the logistical capacity to pre-position assets in multiple cities and trigger operations in rapid succession. The question of which model applies remains unresolved, but both possibilities imply a level of organizational sophistication that exceeds what a single rogue handler or a small freelance team could sustain. Tariq’s individual intelligence yield was modest compared to Mistry’s funeral-attendance revelation or Latif’s mosque-pattern confirmation, but his death’s temporal context transformed its analytical significance.
Tahir Anwar’s death produced intelligence value of an entirely different character: a signal about the campaign’s escalatory trajectory. When an operational campaign reaches the target’s family, it has crossed a threshold that organizational-level targeting does not require. Killing a commander degrades an organization’s capability. Killing a founder’s brother sends a message about personal vulnerability that no organizational restructuring can address. Azhar cannot replace Latif through promotion. But Latif’s death does not threaten Azhar’s personal existence in the way that his brother’s death does. The intelligence value of Tahir Anwar’s death is therefore primarily communicative: it tells Azhar, and by extension every other JeM leader, that the campaign’s targeting criteria extend beyond organizational function to familial connection. The behavioral implications are significant. An organization whose leader believes his family members are targets will reallocate security resources from operational functions to family protection, creating organizational distortions that further degrade the group’s capacity to plan and execute attacks. Paul Staniland at the University of Chicago has studied how armed groups respond to leadership threats, and his findings suggest that family-targeting produces disproportionate organizational disruption because it forces leaders to choose between institutional survival and personal survival, a choice that bureaucratic organizations never face but family enterprises confront directly.
The intelligence accumulation across the five cases is itself a strategic asset worth examining. Each killing produced information that made subsequent killings more feasible. Mistry’s death produced funeral attendance data. Latif’s death confirmed vulnerability patterns in religious settings. Malik’s death proved geographic reach into denied territory. Tariq’s death demonstrated multi-target tempo. Tahir Anwar’s death signaled willingness to cross the family threshold. Read as a cumulative intelligence product, the five killings have generated a comprehensive map of JeM’s personnel geography, security habits, organizational communication protocols, and behavioral responses to targeting pressure. This map, refined with each successive operation, becomes the foundation for every future operation against JeM. The campaign’s intelligence baseline against JeM in 2024 is qualitatively different from its baseline in early 2022 before the Mistry killing, and the difference is attributable to what the five operations themselves revealed. Intelligence campaigns are self-reinforcing: each operation generates information that enables the next, creating a positive feedback loop that accelerates organizational penetration over time.
The intelligence comparison also reveals a distinction between the types of intelligence that different targeting environments produce. Urban operations (Mistry in Karachi, Tariq in Karachi) produce intelligence about an organization’s safe-house infrastructure, communication patterns, and daily routines. Border-corridor operations (Latif in Sialkot) produce intelligence about an organization’s operational command protocols and cross-border coordination mechanisms. Tribal-belt operations (Malik in Waziristan) produce intelligence about an organization’s geographic redundancy and affiliate relationships. Family-level operations (Tahir Anwar) produce intelligence about an organization’s governance structure and leadership succession protocols. The five JeM killings, precisely because they occurred in five distinct operational environments against five targets with five different organizational functions, have collectively produced the most comprehensive intelligence portrait of JeM’s internal workings that any external actor has assembled since the organization’s founding. Each killing was a sensor as well as a weapon, and the five sensors together cover JeM’s entire operational spectrum.
Dimension Four: Operational Difficulty and Geographic Reach
The five JeM killings required five distinct operational profiles, and comparing those profiles reveals the campaign’s expanding capability envelope across Pakistan’s diverse security environments.
Mistry’s killing in Karachi’s Akhtar Colony represented the lowest operational difficulty among the five cases. Akhtar Colony is a dense, lower-middle-class residential neighborhood in a city of over fifteen million people where targeted killings by unknown gunmen are not unusual. Karachi’s pervasive street violence provides natural cover for assassination operations because the city’s police are overwhelmed, response times are slow, and motorcycle-borne shootings occur frequently enough that they do not automatically trigger heightened security alerts. The attackers who killed Mistry used the standard methodology: two men on a motorcycle, approach on foot, multiple gunshots, departure on the same motorcycle, disappearance into Karachi’s labyrinthine street network. The operational requirements were a confirmed address, a reliable motorcycle, a handgun, and the anonymity that Karachi provides to anyone willing to wear a helmet. This is not to minimize the intelligence preparation required to locate a man who had lived under a false identity for two decades. Finding Mistry was hard. Reaching him once found was relatively straightforward, because Karachi’s environment is permissive for this type of operation.
Latif’s killing in Sialkot required a substantially higher operational investment. Sialkot is a border city with an active military presence, JeM infrastructure, and a population density low enough that unfamiliar faces attract notice. Unlike Karachi, where anonymity is default, Sialkot’s social landscape makes outsiders visible. The operation took place inside a mosque during prayers, which required the attackers to either enter the mosque as apparent worshippers or position themselves at a point where they could intercept Latif as he entered or exited. Masked gunmen inside a mosque suggests the former: they entered the prayer space, identified Latif, and opened fire at close range. The operational difficulty was compounded by the escape requirement. Leaving a mosque after a shooting in a smaller border city is categorically different from leaving a residential street after a shooting in Karachi. The local population is more cohesive, more likely to give chase, and more likely to have connections to the local security apparatus. That the attackers escaped without identification or apprehension speaks to either meticulous route planning or local assistance that facilitated their extraction.
Malik’s killing in North Waziristan represented the highest operational difficulty of all five cases by a considerable margin. Waziristan is not a city. It is a mountainous tribal region where the Pakistani Army itself has conducted multiple military operations (Zarb-e-Azb, Radd-ul-Fasaad) and still does not exercise full territorial control. Armed groups maintain checkpoints on secondary roads. Clan-based social structures mean that strangers are noticed, questioned, and reported. The weapons density in the local population is among the highest in the world. Executing a targeted killing in this environment requires assets that can pass as local, weapons that do not attract attention in a region where everyone is armed, and an extraction route through territory controlled by multiple competing armed factions. The fact that Malik was killed in this environment is the single most impressive operational achievement in the JeM targeting sequence, and possibly in the broader campaign against all organizations. Narang’s framework would characterize this as a capability demonstration: an operation designed not only to remove a target but to prove that no geographic sanctuary in Pakistan is beyond reach. If the campaign can reach North Waziristan, it can reach anywhere.
Tariq’s killing in Karachi returned to the lower end of the operational difficulty spectrum. Like Mistry before him, Tariq was killed in a city whose chaotic security environment provides permissive conditions for targeted shootings. The operational profile was consistent with the standard methodology: unknown men, gunfire, rapid departure. The difficulty was marginally higher than Mistry’s case only because Tariq’s killing occurred during the November 2023 cluster, meaning the operational planners were executing multiple operations in compressed timeframes. Sustaining operational security across three near-simultaneous operations in different cities is harder than executing a single standalone operation because each additional target creates additional communication requirements, additional logistics chains, and additional opportunities for exposure. The difficulty of Tariq’s killing was not in reaching him individually but in reaching him as part of a burst.
Tahir Anwar’s death presents the highest difficulty of assessment because the circumstances remain the most ambiguous. Pakistani authorities have described his death as occurring under mysterious circumstances without providing the operational detail that characterizes the Mistry, Latif, Malik, and Tariq cases. There are no reported motorcycle gunmen. There is no mosque shooting. There is no confirmed geographic location for the killing in the precise way that Akhtar Colony or the Sialkot mosque are confirmed. The operational difficulty therefore depends on which interpretation of his death one accepts. If Tahir Anwar was assassinated in the manner of the other four targets, then the operational difficulty was extreme, because Azhar’s family members are among the most heavily protected individuals in JeM’s orbit, and reaching one of them implies penetration of the inner security perimeter that the ISI and JeM jointly maintain around the Azhar clan. If his death resulted from other causes, including the possibility of health-related or accident-related mortality, then the operational difficulty question is moot. The analytical honest position is that Tahir Anwar’s case cannot be definitively categorized alongside the other four without additional information that Pakistani authorities have not provided.
The operational difficulty comparison across the five cases produces a capability envelope that is itself analytically significant. A capability envelope describes the range of operational environments in which a force can successfully execute missions. The JeM targeting sequence demonstrates a capability envelope that spans from permissive urban environments (Karachi) to semi-restricted border corridors (Sialkot) to denied tribal territory (North Waziristan) to the most heavily protected personal security perimeters in Pakistan’s militant ecosystem (the Azhar family). No single operational team could plausibly maintain this capability range without substantial institutional support, intelligence infrastructure, and local asset networks in multiple geographic zones. The capability envelope itself, independent of any individual killing, argues for state-level backing.
The comparison of operational difficulty also reveals a risk-management trajectory. Mistry was the lowest-risk target. Latif was higher risk. Malik was the highest risk. Tariq returned to lower risk. This oscillation between high-risk and low-risk operations is consistent with a campaign that manages its operational exposure deliberately, alternating between capability demonstrations (Malik in Waziristan) and lower-profile efficiency operations (Tariq in Karachi) to prevent the cumulative risk of exposure from exceeding the campaign’s security margins. Ronen Bergman, in his history of Mossad’s targeted killing program, documented a similar oscillation in Israel’s operational tempo: periods of high-risk, high-visibility operations (the Lillehammer affair, the Dubai assassination of Mahmoud al-Mabhouh) alternating with periods of quieter, lower-risk operations that maintained pressure without generating the international attention that high-risk operations inevitably produce. Whether the JeM sequence reflects the same conscious risk management or simply the vagaries of operational opportunity is an open question, but the pattern is consistent with the Mossad precedent.
The escape-and-extraction dimension of operational difficulty deserves separate treatment. In every documented JeM killing, the attackers departed the scene without being apprehended, identified, or (as far as open-source reporting indicates) even pursued effectively. This perfect extraction record across five operations in three geographic zones is remarkable. Karachi’s chaotic traffic and overwhelmed police force explain the escape success in the Mistry and Tariq cases. Sialkot’s smaller size and more cohesive social structure make Latif’s attackers’ escape more impressive. Waziristan’s armed terrain makes Malik’s attackers’ escape the most impressive of all. The extraction success rate implies either pre-positioned vehicles at calculated distances from each target location, local confederates who provided immediate cover and redirection, or both. The planning granularity required for reliable extraction, separate routes, backup vehicles, safe houses within thirty minutes’ drive of each target, represents an investment that exceeds what ad hoc or freelance operations could sustain across five cases.
Dimension Five: Strategic Impact on JeM’s Capability
The cumulative strategic impact of the five eliminations must be assessed as a portfolio rather than as individual hits, because the damage to JeM’s capability is multiplicative rather than additive.
Mistry’s death removed a historical operative whose direct operational contribution to JeM had been negligible for years. If strategic impact were measured solely by the loss of current operational capability, Mistry’s killing would rank lowest of the five. But strategic impact has dimensions beyond current capability. Mistry’s death sent a message to every retired or semi-retired JeM operative living in Pakistan under assumed identities: retirement does not confer immunity. The twenty-year interval between Mistry’s IC-814 involvement and his death in Akhtar Colony established that the campaign’s institutional memory extends beyond the typical operational horizon of most intelligence services. Most counter-terrorism operations focus on current threats. The Mistry killing demonstrated that historical threats remain on the target list indefinitely. The behavioral impact on JeM’s broader network of retired operatives, individuals who had assumed their past involvement was forgotten and their current obscurity was protection, cannot be measured precisely but was almost certainly significant. If Mistry was not safe after twenty years, no one is safe.
Latif’s death removed JeM’s most documented active operational commander in the border corridor, a direct degradation of the organization’s attack-planning capacity. The Pathankot attack demonstrated JeM’s ability to infiltrate one of India’s most heavily defended military installations, a capability that required extensive cross-border coordination of exactly the kind Latif provided from Sialkot. With Latif gone, JeM lost the specific handler who had proven he could plan and execute a major cross-border assault. Replacing Latif requires not only finding someone with comparable tactical skills but someone with comparable institutional knowledge of the Sialkot corridor’s infiltration routes, border security patterns, and communication protocols. Pravin Sawhney, editor of Force magazine, has noted that JeM’s cross-border capability from Sialkot depends on a small number of handlers who have built their understanding of the border corridor over years of observation, and that each handler’s loss represents a proportional loss of accumulated operational intelligence that no replacement can immediately restore. Latif’s strategic impact was the highest of the five on the dimension of immediate capability degradation.
Malik’s death severed JeM’s connection to the tribal-belt infrastructure that Lashkar-e-Jabbar managed on the organization’s behalf. The strategic impact of this severance is harder to quantify than Latif’s because Lashkar-e-Jabbar’s contribution to JeM’s operational output was enabling rather than executing. Tribal-belt access provides JeM with training facilities, weapons storage, and personnel who can move through regions where the Pakistani state’s surveillance coverage is minimal. Losing Malik did not prevent JeM from planning its next attack, but it reduced the organization’s redundancy, its ability to fall back on alternative infrastructure if its primary Punjab-based facilities came under pressure, as they did during Operation Sindoor when Indian strikes targeted Bahawalpur’s JeM infrastructure. Organizations that lose redundancy become more fragile, and fragility compounds with each additional loss.
Tariq’s death degraded JeM’s Karachi logistics cell at a moment when the cell was already under pressure from the Mistry killing in the same city eighteen months earlier. Two JeM operatives killed in Karachi within less than two years suggests that JeM’s Karachi security apparatus had been comprehensively penetrated. The strategic impact of Tariq’s death is therefore institutional rather than individual: it confirmed that JeM cannot protect its personnel in Pakistan’s largest city, a conclusion that forces the organization to either withdraw its assets from Karachi (losing its primary logistics hub) or accept that Karachi-based operatives operate under constant threat (degrading recruitment and morale). Either response weakens the organization. JeM’s organizational structure depends on Karachi for functions that Bahawalpur cannot perform, including access to international communication networks, port-based logistics, and the financial infrastructure that Pakistan’s largest commercial city provides. Losing Karachi would not destroy JeM, but it would confine the organization to its Punjab heartland, reducing its operational reach.
Tahir Anwar’s death struck at JeM’s governance core with an impact that transcends organizational chart analysis. Azhar has built JeM as a family enterprise. His brothers, cousins, and in-laws occupy positions throughout the organization’s command structure. The death of an elder brother does not remove a replaceable staff officer. It removes a family member whose loss imposes psychological and organizational burdens that compound the existing pressure from Mistry, Latif, Malik, and Tariq’s deaths. Azhar, wherever he is (and the question of his current status is itself a consequence of the campaign’s pressure), now operates in an environment where his organization’s historical operatives, active commanders, tribal affiliates, urban logistics coordinators, and his own family have all been reached. The cumulative strategic impact of the five eliminations is the systematic contraction of Masood Azhar’s operational world. The circle that once extended from Karachi to Sialkot to Waziristan to Bahawalpur now has holes at every node.
The multiplicative nature of the cumulative impact requires elaboration. Each individual killing degrades a specific organizational function. But the five killings together produce compound effects that exceed the sum of their individual impacts. When Mistry was killed, JeM lost a historical figure but retained its operational command (Latif), its tribal infrastructure (Malik), its Karachi logistics (Tariq), and its family governance (Tahir Anwar). Each subsequent killing removed one more redundancy from the system. By the time Tahir Anwar died, JeM had lost personnel in every functional category simultaneously. An organization that has lost a single function can compensate by redistributing resources from intact functions to cover the gap. An organization that has lost all five functions simultaneously has no intact resources to redistribute. The system fails not because any single loss is lethal but because the losses have eliminated the organizational slack that resilient systems require to absorb damage and adapt.
The behavioral impact on JeM’s surviving personnel is the strategic dividend that no casualty count can capture. Organizations under sustained targeting pressure exhibit predictable behavioral changes: leaders reduce their public movement, alter their communication patterns, change residences more frequently, restrict the circle of individuals who know their locations, and redirect resources from offensive operations to personal security. Pakistani media reporting in the months following the November 2023 cluster described heightened security around known JeM and LeT figures in Punjab, including reports of increased armed escorts, changes in travel patterns, and the closure of several meeting locations that the organizations had previously used for coordination. These behavioral changes impose costs on JeM’s operational capacity that are separate from and additional to the direct capability losses caused by the five deaths. A commander who spends his days evading assassination is a commander who is not planning cross-border operations. A logistics coordinator who changes safe houses monthly is a logistics coordinator whose network suffers from instability. The campaign does not need to kill every JeM operative to degrade the organization. It needs only to force the surviving operatives into behavioral patterns that are incompatible with effective organizational functioning.
Christine Fair at Georgetown has argued that sustained targeting pressure produces what she terms “organizational paranoia,” a condition in which an armed group’s security apparatus consumes an increasing share of the group’s total resources, ultimately crowding out the offensive functions that justify the group’s existence. Fair’s argument, developed in the context of Pakistani militant groups’ response to US drone strikes in the tribal belt, applies with particular force to the JeM case. JeM is a smaller organization than LeT, with fewer personnel, fewer financial resources, and a narrower geographic footprint. It has less organizational slack to absorb the behavioral costs of sustained targeting pressure. If JeM is diverting commanders from attack planning to security coordination, diverting finances from weapons procurement to safe-house acquisition, and diverting recruitment efforts from training new operatives to replacing lost ones, the organizational capacity available for JeM’s core mission, conducting terror attacks against India, is contracting even before the direct capability losses from the five deaths are factored in.
The strategic impact comparison must also account for JeM’s relationship with Pakistan’s security establishment. JeM has historically operated with ISI support, receiving logistical assistance, intelligence sharing, and protective surveillance that supplemented the organization’s own security capabilities. The five killings have implications for this relationship that extend beyond JeM itself. Every successful killing of a JeM operative on Pakistani soil is also a demonstration that ISI’s protective apparatus has failed. The intelligence agency that Pakistan’s military relies on to project power through proxy groups has proven unable to protect those proxy groups’ personnel from a sustained external campaign. Whether this failure has produced changes in the ISI-JeM relationship, reduced ISI support for JeM, increased ISI investment in JeM’s protection, or created internal ISI debates about the costs and benefits of maintaining the relationship, is not knowable from open sources. What is knowable is that the five killings have imposed costs not only on JeM but on the state sponsor whose protection was supposed to make the campaign impossible.
Where the Comparison Breaks Down
The five-dimensional comparison produces a coherent analytical narrative, but intellectual honesty requires identifying where the framework strains under the available evidence.
The most significant limitation is information asymmetry across the five cases. Mistry and Latif are well-documented targets. Their organizational roles, attack involvements, and the circumstances of their deaths are established through multiple independent sources: Pakistani media reports, Indian NIA documents, international press coverage, and named analyst commentary. Malik and Tariq are substantially thinner in the evidentiary record. Malik’s connection to Lashkar-e-Jabbar is reported but not extensively documented. Tariq’s specific operational functions within JeM’s Karachi cell are described in general terms but lack the granularity that the Mistry and Latif cases provide. Tahir Anwar’s case is the thinnest of all: his death is confirmed, but the circumstances, location, and method remain officially unspecified. A comparison that weighs all five cases equally on dimensions like “operational involvement in named attacks” or “intelligence value of elimination” risks presenting inferences drawn from limited evidence with the same confidence as conclusions drawn from robust evidence. The comparison framework treats this unevenness by noting where specific assessments rest on incomplete information, but the structural limitation remains.
The second limitation is the question of attribution. This comparison implicitly treats the five killings as components of a single campaign, which is the most analytically productive interpretation but not the only defensible one. Malik’s killing in North Waziristan, in particular, occurred in a region where multiple armed groups (TTP, al-Qaeda remnants, rival tribal factions) maintain active operations and where factional violence produces casualties that are sometimes incorrectly attributed to external campaigns. The TTP has its own reasons to target JeM affiliates in the tribal belt, particularly when JeM’s relationship with the Pakistani state positions it as an adversary of organizations that the Pakistani state has designated as enemies. If Malik’s killing was an intra-militant factional hit rather than part of the India-linked campaign, then the comparison’s geographic-reach dimension loses its most impressive data point. The analytical judgment presented here, that Malik’s profile (anti-India activities, Azhar connection, targeting methodology) makes him pattern-consistent with the other four, is the stronger interpretation, but it is an interpretation, not a certainty.
The third limitation involves the comparison with Lashkar-e-Taiba’s parallel targeting sequence. The LeT leadership comparison reveals a campaign that has climbed that organization’s hierarchy from foot soldiers to regional commanders to co-founders, a progression that parallels the JeM sequence but differs in tempo, geographic distribution, and organizational impact. Ideally, this article would hold both sequences in the same frame to determine whether they reflect a single strategic logic applied to two organizations or two independent campaigns that happen to share operational characteristics. The data to make that determination rigorously is not yet available. The LeT sequence has produced more individual targets but has not reached the founder’s family in the way the JeM sequence reached Tahir Anwar. Whether that difference reflects strategic choice (JeM’s family structure makes family targeting productive, while LeT’s more bureaucratic structure makes hierarchical targeting more productive) or operational circumstance (LeT’s senior leadership is better protected than JeM’s) cannot be resolved without information that neither Indian nor Pakistani sources have provided.
The fourth limitation is temporal. This comparison assesses the JeM targeting sequence at a point in time when the campaign may still be unfolding. Additional eliminations that have not yet occurred could reshape the analytical conclusions. If a sixth JeM target is killed in a manner that contradicts the periphery-to-core thesis (for example, if a low-ranking foot soldier is killed after Tahir Anwar, reversing the hierarchical trajectory), the pattern identified here would need revision. Analytical frameworks imposed on incomplete data sets are inherently provisional. The comparison presented here is the strongest available at this moment, built on the five data points that the campaign has produced, but it should be treated as a working hypothesis rather than a settled conclusion. The JeM targeting sequence is not finished. Whatever force is conducting the campaign has demonstrated no sign of standing down, and the organizational nodes that remain viable targets, including Azhar’s surviving family members, replacement commanders, and the Bahawalpur-based infrastructure that Operation Sindoor partially degraded, provide a target-rich environment for continued operations.
A fifth complication deserves acknowledgment: JeM’s organizational opacity makes damage assessment inherently speculative. Unlike Lashkar-e-Taiba, which maintains a visible public presence through Jamaat-ud-Dawa’s welfare network, JeM operates with minimal public footprint. Azhar has not appeared publicly since the Balakot airstrike of February 2019. JeM does not publish organizational charts. Its personnel rosters, command relationships, and internal communications remain almost entirely opaque to outside observers. This opacity means that the comparison’s assessments of organizational seniority, operational involvement, and strategic impact are constructed from the outside using open-source reporting, Indian intelligence assessments (which have their own biases and limitations), and analytical inference. The alternative, refusing to analyze JeM because the evidence is imperfect, would be more honest but less useful. The comparison acknowledges what it does not know. It proceeds on the basis of what it can reasonably infer.
What the Comparison Reveals
The five-dimensional comparison of JeM’s targeted eliminations answers the article’s founding question with reasonable analytical confidence: the JeM targeting sequence reveals deliberate strategic planning rather than pragmatic opportunism.
The evidence for deliberate planning rests on three pillars. First, the hierarchical progression from peripheral historical operative to inner-circle family member maps JeM’s organizational chart in a way that random target availability would not produce. An opportunistic campaign would have killed targets in the order they became vulnerable, producing a random walk through the hierarchy. The observed sequence, historical periphery to operational command to tribal affiliate to urban logistics to family core, is too structurally coherent to be explained by coincidence alone. Second, the geographic expansion from Karachi to Sialkot to Waziristan to Karachi again maps JeM’s territorial footprint, and each geographic node was hit in an order that progressively revealed the campaign’s expanding reach. An opportunistic campaign operating from a single geographic base would cluster its kills in the most accessible city. The observed distribution across Pakistan’s full territorial spectrum implies multiple operational capabilities deployed sequentially. Third, the temporal spacing of the killings, roughly eighteen months between Mistry and the Latif-Malik-Tariq-Anwar cluster, is consistent with a campaign that used the intelligence yield from the first killing (Mistry’s funeral attendance, JeM’s internal communications in response to the killing) to develop targeting information for subsequent operations.
Against this evidence, the strongest counter-argument is that intelligence campaigns rarely operate with the strategic coherence that retrospective analysis attributes to them. The “fog of operations” produces opportunistic kills that analysts later arrange into neat sequences. A campaign that intended to kill Latif first but could only locate Mistry in 2022 would produce the same observed sequence as a campaign that deliberately targeted Mistry first for strategic reasons. The difference is invisible in the operational record. This counter-argument deserves respect, and the honest analytical position is that the observed sequence is more consistent with strategic planning than with opportunism, but that the distinction may be unfalsifiable with available evidence.
What is not in dispute is the cumulative result. By late 2024, Jaish-e-Mohammed had lost a founding-era hijacker, its most documented border-corridor commander, its tribal-belt affiliate manager, a Karachi logistics associate, and the founder’s elder brother. The systematic dismantling of Azhar’s inner circle had reached a point where the question shifted from whether the campaign was degrading JeM’s capability to how much regenerative capacity the organization retained.
JeM’s regenerative capacity is the critical uncertainty. Unlike Lashkar-e-Taiba, which maintains a visible public infrastructure through Jamaat-ud-Dawa’s network of madrassas, hospitals, and social services, JeM operates more covertly and depends more heavily on the Azhar family’s personal networks for leadership continuity. If those personal networks are being systematically degraded, JeM’s regenerative capacity is structurally limited in ways that purely bureaucratic organizations are not. A bureaucratic organization replaces its lost commanders through internal promotion. A family enterprise cannot replace its lost family members. The JeM targeting sequence has exploited exactly this structural vulnerability, and the comparison across all five cases makes the exploitation visible in a way that no individual profile can achieve.
The targeting sequence also establishes a predictive framework. If the campaign’s logic is organizational penetration from periphery to core, the next tier of JeM targets would include individuals who occupy the remaining nodes in Azhar’s operational network: his surviving family members, his remaining operational commanders (particularly those managing JeM’s Punjab-based infrastructure), and any replacements promoted to fill the vacancies left by Latif, Malik, and Tariq. Azhar himself, wherever he is, represents the ultimate target in the sequence’s logic, though reaching him would require penetrating whatever protective arrangement the ISI and JeM have constructed around the founder, an arrangement that the death of Tahir Anwar suggests may already be degrading.
The JeM comparison, read alongside the parallel LeT analysis, reveals a campaign that treats each organization’s specific structure as a targeting blueprint. JeM’s family-enterprise structure produces family targeting. LeT’s hierarchical-bureaucratic structure produces hierarchical targeting. The campaign is not applying a single template to all organizations. It is reading each organization’s anatomy and designing a targeting sequence that exploits the specific vulnerabilities that anatomy creates. That level of organizational intelligence, the ability to distinguish between a family enterprise and a bureaucratic hierarchy and to tailor the campaign accordingly, is the strongest evidence yet that the shadow war against Pakistan-based terror groups is being conducted by a sophisticated state-level intelligence apparatus rather than by freelance contractors or internal factional rivals.
The five JeM targets, held together in a single analytical frame, tell a story that their individual profiles cannot. Mistry alone is an old hijacker killed in Karachi. Latif alone is an attack mastermind killed in a mosque. Malik alone is a tribal affiliate killed in Waziristan. Tariq alone is a logistics associate killed in a burst. Tahir Anwar alone is a founder’s brother who died mysteriously. Together, they are the story of an organization being taken apart from the outside in, one structural node at a time, by an adversary that understands its architecture better than its protectors.
The predictive dimension of this comparison deserves elaboration. If the campaign’s logic is organizational penetration through concentric layers, the targeting criteria for the next phase become analytically derivable. The layers already penetrated include: historical operatives (Mistry), active operational commanders in the border corridor (Latif), tribal-belt affiliate managers (Malik), urban logistics associates (Tariq), and family governance (Tahir Anwar). The layers not yet penetrated include: JeM’s Bahawalpur-based training infrastructure command, the organization’s financial management cadre (which processes donations, real estate investments, and the agricultural income that JeM generates from land holdings in southern Punjab), the madrassa network that feeds JeM’s recruitment pipeline, and Azhar’s remaining family members who hold organizational authority. Each of these unpenetrated layers represents a structural dependency whose removal would further degrade JeM’s capacity to regenerate, recruit, train, and deploy operatives.
The financial management cadre deserves particular attention as a predictive target. JeM’s operational capacity depends on sustained funding, which flows through charitable front organizations, real estate holdings, and agricultural enterprises that the Azhar family manages from Punjab. Pakistani authorities have periodically claimed to freeze JeM’s assets in response to FATF pressure, but open-source reporting consistently indicates that the organization’s financial infrastructure reconstitutes itself under new names and new ownership structures within months of each enforcement action. If the campaign’s targeting logic extends to financial infrastructure, the next JeM targets might include individuals responsible for managing these financial channels, figures whose organizational profiles resemble Tariq’s logistics role but whose functions are fiscal rather than logistical.
The madrassa recruitment pipeline is another predictive target category. JeM operates madrassas in Punjab that function as both religious educational institutions and screening mechanisms for identifying recruits with the temperament and commitment that militant training requires. The individuals who manage these madrassas, selecting which students proceed from religious education to military training, occupy a structural position that is difficult to fill and critical to JeM’s long-term organizational survival. Tellis’s argument about family-network attrition applies with particular force to the madrassa pipeline, because the teachers and administrators who manage JeM’s madrassas are often personally vetted by Azhar or his family, making replacement through bureaucratic promotion an inadequate substitute for the personal relationships of trust that recruitment screening requires.
The comparison’s broadest implication is for the study of counter-terrorism campaigns in environments where the target organization enjoys state protection. The conventional wisdom holds that state-protected organizations are effectively immune to external counter-terrorism operations because the protecting state’s security apparatus creates an impenetrable buffer between the organization and its adversaries. The JeM targeting sequence challenges that wisdom directly. Five JeM operatives with documented connections to Masood Azhar have been killed in Pakistan despite whatever protective arrangement the ISI and Pakistani security services have provided. The buffer has been penetrated. The protection has failed. Not comprehensively, because Azhar himself and JeM’s core infrastructure in Bahawalpur remain intact (or remained intact until Operation Sindoor’s strikes targeted the physical facilities). But the human nodes of the organization have proven vulnerable in ways that Pakistan’s guarantee of sanctuary was supposed to prevent.
The JeM comparison thus contributes to a growing body of evidence that state-sponsored safe havens are degrading as an effective protective mechanism for terrorist organizations. The shadow war against JeM, against LeT, against Hizbul Mujahideen, and against Khalistan-linked figures all point to the same conclusion: the sanctuary that Pakistan provided to India’s enemies for three decades is no longer impenetrable. The JeM targets, analyzed comparatively, are five data points in a much larger argument about the transformation of Pakistan’s safe haven network from a strategic asset into a strategic liability.
The question that this comparison cannot answer, and that perhaps no analysis conducted from open sources can answer definitively, is whether JeM’s degradation has passed the point of organizational regeneration. Armed groups vary enormously in their resilience to leadership attrition. The Taliban regenerated after decades of US targeting. Al-Qaeda degraded significantly after sustained American decapitation efforts. Hamas rebuilt command structures after multiple rounds of Israeli targeted killing. JeM’s regenerative capacity depends on variables that are not observable from outside: the depth of its recruitment pool, the availability of replacement commanders with operational experience, the continued willingness of the ISI to provide material support, and the Azhar family’s capacity to govern the organization from whatever state of concealment or custody Masood Azhar currently occupies. What the five-target comparison can confirm is that the inputs to JeM’s regenerative process, experienced commanders, tribal-belt infrastructure, urban logistics networks, and family governance authority, have all been degraded simultaneously. Whether an organization can regenerate when its inputs are being removed faster than it can replace them is not a theoretical question. It is the question that the next phase of the campaign against Jaish-e-Mohammed will answer empirically.
Frequently Asked Questions
Q: Which JeM target was the most strategically important to eliminate?
Shahid Latif’s death had the most immediate impact on JeM’s operational capability. Latif was an active commander directly responsible for cross-border attack planning from Sialkot, and his institutional knowledge of border-corridor infiltration routes accumulated over years of observation. His loss degraded JeM’s ability to plan and execute major cross-border assaults in a way that no other individual elimination in the sequence matched. Mistry’s killing was historically more dramatic because of the IC-814 connection, and Tahir Anwar’s death was symbolically more devastating because it reached Azhar’s family, but on the dimension of immediate capability degradation, Latif’s removal was the most consequential.
Q: What pattern do the JeM eliminations reveal about the campaign’s strategy?
The pattern is organizational penetration from periphery to core. The campaign began with a historical operative who had retired from active service (Mistry), escalated to an active operational commander (Latif), extended laterally to a tribal-belt affiliate (Malik), captured a logistics associate during a multi-target burst (Tariq), and reached the founder’s own family (Tahir Anwar). This sequence maps JeM’s organizational layers in a way that random target availability would not produce, suggesting deliberate strategic planning that read JeM’s organizational chart and worked through it systematically.
Q: Were JeM targets killed in a deliberate order or were they killed as opportunities arose?
The available evidence is more consistent with deliberate ordering than with pure opportunism. The hierarchical progression, from historical periphery to inner-circle family, is too structurally coherent to be explained by coincidence alone. However, the strongest counter-argument notes that a campaign intending to kill Latif first but only able to locate Mistry in 2022 would produce the same observed sequence. The distinction between deliberate strategy and constrained opportunism may be unfalsifiable with current evidence. The most defensible position is that the sequence reflects strategic intent shaped by operational feasibility constraints.
Q: How do the JeM eliminations compare to the LeT eliminations in the same campaign?
The LeT campaign has produced more individual targets and has climbed that organization’s hierarchy from foot soldiers through regional commanders to a co-founder (Amir Hamza, who survived a shooting in Lahore). The JeM campaign has produced fewer targets but has reached a tier that the LeT campaign has not yet reached: the founder’s family. The difference likely reflects organizational structure. LeT is more bureaucratic, making hierarchical targeting productive. JeM is more of a family enterprise, making family targeting productive. Both campaigns appear tailored to the specific structural vulnerabilities of their respective target organizations.
Q: Which JeM killing was the most operationally difficult?
Dawood Malik’s killing in North Waziristan was the most operationally challenging. The tribal belt is Pakistan’s most opaque security environment, a mountainous region with clan-based surveillance, armed checkpoints, multiple competing armed groups, and minimal Pakistani state presence. Executing a targeted killing in Waziristan requires local assets who can pass as tribal members and an extraction route through territory controlled by factions whose cooperation cannot be assumed. Every other JeM killing occurred in an urban setting where anonymity is more accessible.
Q: Has the JeM targeting sequence achieved its strategic goal of degrading the organization?
The five eliminations have degraded JeM’s historical memory (Mistry), border-corridor attack capability (Latif), tribal-belt redundancy (Malik), Karachi logistics infrastructure (Tariq), and family governance stability (Tahir Anwar). Whether this degradation has reduced JeM’s operational output is harder to confirm because JeM’s opacity makes capability assessment difficult. The organization’s attack frequency against India between 2022 and 2024, relative to its pre-campaign baseline, would be the definitive metric, but comprehensive data on foiled plots and disrupted plans is not publicly available.
Q: Which JeM targets had the highest intelligence value when killed?
Mistry’s killing produced the highest intelligence yield because JeM leadership attended his funeral, inadvertently revealing which senior figures were present in Karachi, where they traveled from, and what security measures they employed. Funerals compel attendance from organizational members, creating observation opportunities that normal operational security protocols are designed to prevent. Latif’s killing confirmed the mosque-prayer vulnerability pattern, which has appeared in at least one other elimination across organizations.
Q: What does the JeM comparison reveal about the broader campaign’s logic?
The JeM comparison reveals that the campaign treats each target organization’s specific structure as a targeting blueprint. JeM’s family-enterprise structure produces family-focused targeting, while LeT’s more bureaucratic hierarchy produces hierarchical targeting. This structural sensitivity implies state-level organizational intelligence, the ability to distinguish between different organizational types and tailor campaigns to exploit their specific vulnerabilities. Freelance contractors or factional rivals would not possess this level of analytical sophistication.
Q: Can Jaish-e-Mohammed replace its killed commanders and associates?
JeM can replace functional roles through internal promotion, but it cannot replace family members, historical operatives, or the accumulated institutional knowledge that each target possessed. Shahid Latif’s understanding of the Sialkot border corridor accumulated over years of observation, and no replacement can instantly acquire that knowledge. Dawood Malik’s tribal-belt relationships depended on personal clan connections that organizational restructuring cannot replicate. Tahir Anwar’s familial role is irreplaceable by definition. JeM’s regenerative capacity is structurally limited by the personal and familial nature of the connections that the campaign has severed.
Q: Is Masood Azhar himself a target in this sequence?
The logical endpoint of a campaign that has progressed from periphery to core is the core itself, and Masood Azhar is JeM’s core. Whether he is operationally accessible is a separate question. Azhar disappeared from public view after the Balakot airstrike in February 2019, and his current location, whether he is in ISI custody, in independent hiding, or deceased, remains unconfirmed. If the campaign’s targeting logic follows the trajectory established by the five documented eliminations, Azhar would represent the final node. Whether the campaign possesses the capability to reach whatever protective arrangement surrounds him is unknown. The question of Azhar’s vulnerability is complicated by the possibility that the ISI has taken him into a form of protective custody that removes him from his own organization’s geography. If Azhar is being held in a military cantonment or an ISI safe house rather than at JeM’s Bahawalpur compound, the targeting challenge is qualitatively different from reaching a JeM operative in Karachi or Sialkot. Military cantonment security in Pakistan involves physical barriers, armed guards, surveillance perimeters, and restricted access zones that civilian neighborhoods do not provide. Reaching Azhar in such an environment would require either penetration of Pakistan’s military security infrastructure or a change in Azhar’s circumstances that returns him to a more accessible location.
Q: What organizational functions has JeM lost through these eliminations?
JeM has lost five distinct organizational functions: historical-foundational capability (Mistry’s IC-814 connection), active cross-border operational command (Latif’s Pathankot planning role), tribal-belt enabling infrastructure (Malik’s Lashkar-e-Jabbar management), urban logistics coordination (Tariq’s Karachi cell role), and family governance stability (Tahir Anwar’s familial bond). Each function represents a structural dependency that the organization cannot easily restore. The simultaneous loss of all five functions is more damaging than the sequential loss of each function individually would be, because the organization cannot compensate for one lost function by drawing on another when all functions are compromised at once. JeM’s remaining capacity is concentrated in its Bahawalpur-based training infrastructure, its Punjab financial management apparatus, and whatever command authority Azhar still exercises from his undisclosed location. These residual capabilities are under pressure from both the continuing covert campaign and the conventional military damage inflicted by Operation Sindoor.
Q: How does JeM’s degradation compare to other organizations targeted in the shadow war?
LeT has lost more individual operatives but retains its senior leadership (Hafiz Saeed is imprisoned but alive; Amir Hamza survived his shooting). Hizbul Mujahideen’s Pakistan-based command has been more thoroughly dismantled, with both its launching chief (Bashir Ahmad Peer) and an allied Al-Badr commander (Syed Khalid Raza) killed within a week of each other. JeM occupies a middle position: its losses are fewer than Hizbul’s relative to its exile-command size, but more structurally significant because they have reached the founder’s family in a way that no other organization’s losses have matched.
Q: Could the November 2023 cluster of killings have been coincidental rather than coordinated?
Three JeM and LeT operatives were killed in three different Pakistani cities within fourteen days in November 2023. The compressed timeline suggests coordination, but each killing occurred in a different city with different operational requirements, which could argue for independent teams operating on their own schedules. The coordination hypothesis is stronger because sustaining three simultaneous operational profiles across geographically dispersed locations implies centralized command, but coincidental timing of independently planned operations cannot be definitively ruled out.
Q: Why was Zahoor Mistry targeted first despite being operationally retired?
Mistry was the most accessible target in the JeM portfolio. His cover identity was two decades old, his daily routine was stable, and Karachi’s chaotic security environment provides permissive conditions for motorcycle-borne shootings. From a campaign-planning perspective, beginning with the lowest-risk target makes operational sense: it establishes capability, generates intelligence through organizational response (JeM funeral attendance), and demonstrates reach without risking the exposure that a failed operation against a harder target would create. The campaign used Mistry as a proof of concept.
Q: What does targeting inside a mosque reveal about the campaign’s operational rules?
The killing of Shahid Latif inside a Sialkot mosque during prayers reveals that the campaign’s operational planners are willing to use religious settings as operational environments. Mosques offer two advantages for targeted killings: the target’s prayer schedule creates predictable presence at known locations, and the social convention of worship makes close-range approach by apparent fellow worshippers less suspicious than approach in a market or residential setting. The same prayer-time methodology appeared in the killing of Abu Qasim in Rawalakot, suggesting this is a recognized tactical pattern rather than an isolated decision. The mosque-targeting pattern also implies a level of surveillance sophistication that deserves attention. Confirming which mosque a target attends, which prayer times he frequents, where he sits or stands during prayers, and which entrance he uses requires extended observation over multiple days. The attackers who killed Latif did not stumble upon him in a mosque. They knew he would be there, when he would arrive, and where within the prayer space they could reach him. This surveillance investment, specific to a single target’s prayer habits, indicates a targeting process that allocates significant time and human-intelligence resources to each individual operation.
Q: How did Pakistan respond to these five eliminations?
Pakistan attributed all five deaths to unknown assailants and blamed India through official and media channels. Pakistani Foreign Secretary Muhammad Syrus Sajjad Qazi’s January 2024 press conference alleged that India was conducting targeted assassinations on Pakistani soil, a charge India has consistently denied. No Pakistani investigation has resulted in arrests or credible identification of the attackers in any of the five cases. JeM itself has not issued public statements attributing the killings to any specific adversary, though the organization’s internal response, including heightened security measures and altered movement patterns among surviving leaders, suggests that JeM leadership treats the campaign as an external threat rather than an internal factional matter. The gap between Pakistan’s diplomatic response (alleging Indian involvement) and its investigative response (no arrests, no forensic conclusions made public, no prosecution) is itself revealing. A state genuinely committed to solving the killings would have mobilized its substantial domestic intelligence apparatus to identify the perpetrators. Pakistan’s ISI maintains one of the most comprehensive domestic surveillance networks in South Asia, with human sources, technical intercept capabilities, and institutional knowledge of Pakistan’s armed-group landscape that should make solving targeted killings in its own cities a tractable intelligence problem. The absence of credible investigative outcomes suggests either that Pakistan cannot solve the killings (implying an adversary more capable than Pakistan’s domestic surveillance), or that Pakistan has chosen not to publicize what its investigations have revealed (implying that the findings would be diplomatically inconvenient). Neither interpretation is flattering to Pakistan’s security establishment.
Q: What evidence exists that these five killings are connected to each other?
The five killings share methodological consistency (motorcycle-borne or close-range gunmen, rapid escape, no claimed responsibility), organizational targeting logic (all five were JeM-affiliated with direct connections to Masood Azhar), and temporal clustering (all five occurred within a roughly two-year window from March 2022 to late 2024). No single piece of evidence proves coordination, but the cumulative pattern is significantly more consistent with a coordinated campaign than with five independent events. Pakistani authorities’ own allegations of Indian involvement implicitly treat the killings as connected. The methodological consistency is particularly telling: the same operational signature, close-range handgun fire by assailants who arrive on motorcycles and depart rapidly, appears not only in the five JeM cases but across the broader campaign against LeT, Hizbul Mujahideen, and Khalistan-linked targets in Pakistan. This cross-organizational methodological consistency makes internal JeM factional violence an unlikely explanation, because internal factions would not employ the same methodology used against rival organizations. The evidence is circumstantial rather than forensic, as no attacker has been captured or identified in any of the five cases, but the circumstantial case is strong enough that both Pakistani and Indian analytical communities treat the five deaths as components of a single campaign, differing only on who bears responsibility.
Q: Who remains in Masood Azhar’s inner circle after these eliminations?
JeM’s opacity makes a comprehensive assessment difficult, but the surviving inner circle likely includes Azhar’s other family members who hold organizational positions, remaining operational commanders managing JeM’s Punjab-based infrastructure (including training facilities in Bahawalpur), and whatever command structure the ISI has helped JeM reconstruct to replace lost capacity. The specific identities of replacement commanders, if any have been promoted to fill the vacancies left by Latif, Malik, and Tariq, have not been established in open-source reporting. The Azhar family’s involvement in JeM extends beyond Masood and the late Tahir Anwar to include multiple brothers and relatives whose organizational roles have been documented in Indian intelligence assessments and NIA charge sheets. Ibrahim Azhar, another of Masood’s brothers, has been named in connection with JeM’s operational planning and was reportedly involved in the organization’s response to the Balakot airstrike. Whether the surviving Azhar family members have assumed the functions previously performed by the eliminated associates, or whether JeM has promoted non-family members into those roles, would reveal whether the organization is maintaining its family-enterprise governance model or transitioning toward a more bureaucratic structure under pressure.
Q: What is the connection between the JeM elimination campaign and Operation Sindoor?
The JeM eliminations and Operation Sindoor represent two arms of the same strategic body. The covert campaign degraded JeM’s personnel through targeted killings. Operation Sindoor degraded JeM’s physical infrastructure through military strikes against Bahawalpur’s facilities. Together, they constitute a combined approach to organizational degradation: human assets through the shadow war and physical assets through conventional military force. The JeM comparison reveals that the covert arm was systematically weakening the organization long before the open military arm struck. The convergence of covert and conventional approaches is perhaps the most significant doctrinal development in India’s counter-terrorism posture since the 2016 surgical strikes across the Line of Control. India is no longer choosing between diplomatic protest, covert action, and military force. It is employing all three simultaneously against the same target set, with each approach reinforcing the others. The covert campaign identifies personnel and maps organizational geography. The military campaign destroys physical infrastructure. The diplomatic campaign (Simla Agreement suspension, Indus Waters Treaty invocation) isolates the target state politically. JeM has experienced all three approaches concurrently, and the organizational effect is compounding.
Q: Could JeM’s losses be attributed to internal Pakistani factional violence rather than external targeting?
This attribution question is strongest for Dawood Malik’s case in Waziristan, where TTP and other armed groups maintain active operations and have their own reasons to target JeM affiliates. For the other four cases, the attribution to internal factional violence is weaker: Mistry’s IC-814 connection, Latif’s Pathankot mastermind role, Tariq’s Azhar association, and Tahir Anwar’s familial bond all point toward an adversary whose targeting criteria center on anti-India activities rather than intra-Pakistani militant rivalries. The most parsimonious explanation for five JeM-connected deaths targeting India-focused operatives is an India-connected campaign, but parsimony is not proof. The factional-violence hypothesis faces a further challenge: it cannot explain the cross-organizational pattern. If internal JeM rivalries killed these five operatives, what explains the simultaneous deaths of LeT, Hizbul Mujahideen, and Khalistan-linked figures using identical methodologies in the same timeframe? Internal factional violence is organization-specific by nature. The campaign that produced the JeM deaths also produced LeT and Hizbul deaths, which means the explanation must account for a force operating against multiple organizations simultaneously, a profile that fits an external state-level adversary more comfortably than it fits any model of internal factionalism within Pakistan’s diverse militant ecosystem.
Q: What is Lashkar-e-Jabbar and why does its connection to JeM matter?
Lashkar-e-Jabbar is a JeM affiliate operating in Pakistan’s tribal belt, primarily in North Waziristan. The organization extends JeM’s reach into regions where the Punjab-based parent organization cannot operate directly. Its significance to the JeM comparison is that Dawood Malik’s role in Lashkar-e-Jabbar represents JeM’s geographic redundancy, the organization’s ability to maintain infrastructure outside its Bahawalpur-Karachi-Sialkot triangle. Malik’s death reduced that redundancy and confined JeM more tightly to its Punjab heartland, a strategic contraction that the other four eliminations compounded from different directions. Lashkar-e-Jabbar’s relationship with JeM is characteristic of how Pakistani militant groups manage their organizational geography. Rather than extending a single command hierarchy across Pakistan’s diverse territorial and tribal environments, JeM maintains affiliate relationships with locally rooted groups that understand their regions’ specific social codes, tribal dynamics, and security landscapes. These affiliates provide JeM with capabilities that a centralized Punjab-based organization could never develop independently: access to Waziristan’s training grounds, relationships with tribal leaders who control movement corridors, and local recruitment pipelines that feed personnel into JeM’s broader organization. The loss of Malik, and by extension JeM’s Lashkar-e-Jabbar connection, deprived the organization of these locally embedded capabilities, which took years to build and cannot be reconstituted through organizational decree from Bahawalpur.