Muhammad Riaz, known to Indian intelligence as Abu Qasim, knelt in the second row of Al-Quds mosque in Rawalakot, Pakistan-occupied Kashmir, for Fajr prayers on September 8, 2023. A man wearing trousers, a shirt, and a helmet walked into the congregation, positioned himself behind Qasim, and fired four bullets into his head at point-blank range. A second man waited on the mosque’s veranda. The two fled together before the prayer leader, Qari Amjad Hashmi, could process what had happened. Qasim died on the floor of the mosque where he had slept overnight as a guest of the imam, scheduled to leave later that Friday morning. He had crossed into Pakistan-occupied Kashmir from India in 1999, risen through Lashkar-e-Taiba’s command structure to become the alleged mastermind of the January 2023 Dhangri village massacre in Rajouri district that killed seven civilians, and spent twenty-four years believing that the mosques of PoK placed him beyond the reach of consequence. The four bullets that struck him during Fajr prayer proved that belief fatally wrong.

Qasim’s killing inside Al-Quds mosque was not an isolated act of violence. It belongs to a distinct pattern within India’s shadow war against terror that has unfolded across Pakistani cities since 2021, a pattern in which mosques and prayer times have become the single most reliable targeting window for the elimination of wanted terrorists. Before Qasim’s death in September 2023, Jaish-e-Mohammed’s Zahoor Ibrahim Mistry had reportedly been killed during prayers in Karachi in March 2022. After Qasim, Shahid Latif, the Pathankot airbase attack mastermind and JeM launching commander in Sialkot, was gunned down alongside his security guard and a prayer leader while offering prayers at a mosque in Daska on October 11, 2023. Intelligence sources confirmed to The Tribune that before Latif’s killing, “JeM’s Ibrahim Mistry, Hizbul Mujahideen’s Imtiaz Alam, and Lashkar-e-Taiba’s Abu Qasim had been killed during prayers.” The recurrence is too consistent to be coincidental. Prayer times and religious congregations have become the operational cornerstone of the campaign because they solve the hardest problem in targeted killing: locating a target whose entire existence revolves around evading detection.
This article examines the prayer-time targeting pattern in forensic detail, analyzing each confirmed case, reconstructing the surveillance requirements that each killing implies, evaluating the legal and ethical dimensions, and assessing what the pattern reveals about the depth of intelligence penetration into Pakistan’s urban and semi-urban landscape. The argument advanced here is direct: mosques and prayer times represent the campaign’s most effective targeting window because they exploit the one behavioral constant that religious obligation makes inviolable. A target who varies his route, changes his sleeping location, and rotates his daily schedule will still attend the same mosque for the same prayer at roughly the same hour. The attackers have learned to exploit this predictability with lethal precision.
The Pattern Emerges
The first confirmed instance of what would become the prayer-time targeting pattern occurred in Karachi in early March 2022, when Zahoor Ibrahim Mistry, one of the five hijackers of Indian Airlines flight IC-814 in December 1999, was shot dead by unidentified gunmen. Mistry had lived under the alias Zahid Akhund for over two decades, operating a furniture business called Crescent Furniture in Karachi’s Akhtar Colony. He was shot twice in the head at point-blank range. Multiple bullet casings were recovered from the scene, and CCTV footage captured suspects in the vicinity. Mistry’s funeral was attended by senior JeM leadership including Rauf Asghar, the operational chief and brother of JeM founder Masood Azhar, an attendance that inadvertently confirmed both Mistry’s identity and the organizational network that had sheltered him. Indian intelligence sources noted that Mistry had been tracked for years before the operation that ended his life, suggesting a surveillance architecture that prioritized patience over urgency.
Within a year, the pattern accelerated. On February 20, 2023, Bashir Ahmed Peer, operating under the alias Imtiaz Alam, was killed in Rawalpindi. Peer was the third-ranking leader of Hizbul Mujahideen, a founding member of the organization, and a close confidant of HM chief Syed Salahuddin. He had been designated as a terrorist under India’s Unlawful Activities (Prevention) Act in October 2022. Two assailants on a motorcycle opened fire on him at point-blank range outside a shop in Rawalpindi’s commercial district during the evening. Intelligence sources later noted that Peer’s killing followed a predictable-location principle: he frequented the same shop at roughly the same hour each day, a pattern the attackers had mapped before striking. Pakistani media immediately accused India’s Research and Analysis Wing of orchestrating the operation, a charge consistent with the broader allegations that would accumulate throughout 2023.
By the summer of 2023, the pace had increased further. Sardar Hussain Arain, a leading figure of Jamaat-ud-Dawa and its militant wing Lashkar-e-Taiba, was targeted on August 1, 2023, in Qazi Ahmed city within the Nawabshah district of Sindh. Arain was shot while traveling from his residence to one of his shops, a daily route that the attackers had clearly surveilled. He sustained severe injuries and was shifted to a hospital in Nawabshah before being transferred to a private facility in Karachi, where he succumbed on August 5. Arain had been responsible for running Lashkar-e-Taiba’s madrassa network in the Sindh region, had contested the 2018 elections on the ticket of Hafiz Saeed’s political front, the Allah-o-Akbar Tahreek, and represented the campaign’s reach into LeT’s educational and recruitment infrastructure. The Sindhudesh Revolutionary Army claimed responsibility for Arain’s killing, though Pakistani and Indian analysts alike noted that such claims often serve as cover for operations whose true origin lies elsewhere.
Then came September 8, 2023, and the killing of Abu Qasim in Rawalakot’s Al-Quds mosque during Fajr prayer. The operational precision of this killing set it apart from everything that preceded it. The attackers knew which mosque Qasim would attend, which prayer he would offer, and that he would be seated in the second row of the congregation. They knew he had stayed overnight as a guest of the prayer leader. The timing, during the predawn Fajr prayer when the surrounding streets are empty and witnesses are drowsy, maximized both access and escape. Qasim’s death raised the prayer-time targeting pattern from an observed tendency to a confirmed operational doctrine.
One month later, on October 11, 2023, Shahid Latif, the JeM launching commander in Sialkot who had masterminded the January 2016 attack on the Indian Air Force base in Pathankot, was shot dead alongside his security guard Hashim Ali by three gunmen while offering prayers at a mosque in Daska, a town in Pakistan’s Punjab province roughly 100 kilometers from Lahore. A third person, Maulana Ahad, a prayer leader and close associate of Latif, was also struck and later died of his wounds in hospital. Latif had served as the administrator of Noori-e-Madina Masjid in Daska for years, his presence at the mosque so routine that the attackers could plan their operation around it with near-certainty. Sialkot’s District Police Officer classified the incident as a “targeted killing” and an “incident of terrorism.” Pakistan’s Inspector General of Police for Punjab stated that a “rogue nation and its hostile intelligence agency” bore responsibility, stopping just short of naming India directly.
The chronological trajectory from March 2022 through October 2023 reveals an escalation in both operational confidence and geographic reach. Mistry’s killing in Karachi in March 2022 occurred in Pakistan’s largest city, a sprawling metropolis of over fifteen million people where anonymity protects both terrorists and their killers equally. The Akhtar Colony neighborhood where Mistry operated his furniture business sits in a dense commercial zone where motorcycle-borne shootings, while shocking, are not unprecedented. Karachi’s history of political and sectarian violence provided operational cover for the killing. The subsequent Rawalpindi operation against Imtiaz Alam in February 2023 escalated geographically: Rawalpindi is Pakistan’s military headquarters, home to the General Headquarters of the Pakistan Army, a city where security infrastructure is dense and intelligence agencies maintain extensive surveillance networks. Killing a designated terrorist in Rawalpindi is operationally analogous to conducting a covert operation in the backyard of Pakistan’s military establishment.
The Nawabshah operation against Sardar Hussain Arain in August 2023 extended the campaign’s footprint into Sindh, demonstrating reach into a province that most analysts had assumed lay outside the operational theater. Arain’s position as the administrator of LeT’s madrassa network in the Sindh region connected his elimination to the broader campaign against terrorist infrastructure rather than just operational commanders. His death exposed the vulnerability of the organizational pipeline, not just its leadership.
The Rawalakot operation against Abu Qasim in September 2023 represented the most audacious geographic expansion: a killing inside Pakistan-occupied Kashmir, territory that Pakistan administers and where the Pakistan Army maintains substantial garrisons. PoK is not Karachi, where millions provide anonymity. Rawalakot is a small town where strangers are noticed and where military checkpoints constrain movement. Operating in Rawalakot required either local assets who could move freely or an infiltration capability that no previous elimination had demonstrated. The Daska operation against Shahid Latif one month later reinforced the Punjab theater, confirming that the campaign could sustain simultaneous pressure across multiple geographic zones.
The five killings between March 2022 and October 2023, Mistry in Karachi, Peer in Rawalpindi, Arain in Nawabshah, Qasim in Rawalakot, and Latif in Daska, established the prayer-time and predictable-location pattern as the campaign’s dominant tactical choice. Each killing exploited the same vulnerability: targets whose daily routines contained at least one fixed-time, fixed-location event that could not be altered without abandoning religious practice or commercial livelihood. The mosque, the shop, the daily commute, these became the fulcrums on which elimination operations pivoted.
Case-by-Case Breakdown
Abu Qasim: Fajr at Al-Quds Mosque, Rawalakot
The Qasim operation represents the purest expression of the prayer-time targeting doctrine. According to the FIR reviewed by Dawn newspaper, Muhammad Riaz alias Abu Qasim Kashmiri was offering Fajr prayer at Al-Quds mosque near Sabir Shaheed Stadium in Rawalakot when assailants fired four bullets at him. He died on the spot. The FIR, quoting prayer leader Qari Amjad Hashmi, stated that the victim was sitting in the second row when a man wearing trousers, a shirt, and a helmet opened fire. A second attacker waited on the mosque’s veranda. The two escaped together. Dawn described Qasim as a former activist associated with the proscribed Jamaatud Dawa, while Indian sources identified him as a LeT commander who had crossed into PoK in 1999 and risen to become the alleged planner behind the Dhangri village attack in Rajouri district on January 1, 2023, in which seven civilians were killed and thirteen injured by indiscriminate gunfire.
The operational requirements of the Qasim killing reveal the depth of intelligence preparation. The attackers needed to know, first, that Qasim would be at Al-Quds mosque on that particular Friday morning. Qasim lived in Chakswari town of Mirpur district with his ten-member family in a rented accommodation, meaning he was not a regular attendee of the Rawalakot mosque but a visitor who had stayed overnight as the imam’s guest. The attackers had to track his movements from Chakswari to Rawalakot, confirm his overnight stay, and position themselves before the 4:30 AM Fajr call to prayer. They needed to enter a mosque in a small PoK town without being noticed, identify the target among a congregation of worshippers in dim predawn light, fire with lethal accuracy, and extract before the Pakistan Army, which was placed on high alert within minutes of the killing, could respond.
The Dhangri-to-Rawalakot chain also reveals a strategic logic. Qasim allegedly planned an attack that killed seven people in a Hindu-majority village on New Year’s Day 2023. Nine months later, he was killed inside a mosque in PoK. The attack-to-elimination timeline of nine months is among the fastest documented in the series, suggesting that Dhangri elevated Qasim from a mid-level operative to a priority target whose elimination justified the operational risk of striking inside Pakistan-occupied Kashmir, a territory where the Pakistan Army maintains substantial military presence.
The Dhangri attack itself warrants reconstruction because its brutality illuminates why Qasim became a priority target. On January 1, 2023, terrorists arrived at Dhangri village in Rajouri district, a predominantly Hindu settlement in a Muslim-majority region. They opened indiscriminate fire on civilians, killing seven people and wounding thirteen. An improvised explosive device was planted at the scene and detonated the following morning, amplifying the terror. The attack’s deliberate targeting of a Hindu village suggested sectarian intent, and Indian intelligence quickly identified Qasim as the alleged planner based on his known operational role commanding LeT activities in the Rajouri-Poonch sector from across the Line of Control in PoK. The Dhangri massacre produced intense political pressure within India for a response, and Qasim’s elimination nine months later fit the pattern documented by Myra MacDonald in “Defeat is an Orphan” of attacks generating specific demand for retribution against identified planners.
Qasim’s biography further contextualizes the targeting decision. He crossed into Pakistan-occupied Kashmir from India in 1999, during the same period of mass infiltration that followed the Kargil War. Over twenty-four years, he rose through LeT’s ranks to become a senior commander responsible for the Rajouri sector, a zone that has witnessed persistent infiltration attempts and occasional mass-casualty attacks. He had reportedly operated from LeT’s base camp in Muridke, the organization’s headquarters in Punjab, before relocating to Rawalakot, a move that may have been intended to reduce his exposure but instead placed him in a smaller operational environment where sustained surveillance was paradoxically easier. Indian media reported that his death marked the fourth top LeT commander killed that year, a statistic that underscored the campaign’s systematic approach to dismantling LeT’s command structure.
The PoK operational environment adds another analytical dimension. Pakistan-occupied Kashmir is not a province of Pakistan; it is an administered territory with its own governance structure, separate security apparatus, and distinctive political dynamics. Operating within PoK carries risks distinct from operating in Punjab or Sindh. The Pakistan Army’s Northern Areas command maintains checkpoints and patrol routines that constrain movement. Local populations in small PoK towns are tightly networked, and strangers attract attention. The fact that the Qasim operation succeeded despite these constraints implies either deeply embedded local assets or a surveillance chain sophisticated enough to guide external operators through the PoK security landscape to a specific mosque at a specific predawn hour.
Shahid Latif: Morning Prayers at Daska Mosque, Sialkot
The Latif operation on October 11, 2023, differed from the Qasim killing in one critical respect: it produced three casualties instead of one. Latif, his security guard Hashim Ali, and prayer leader Maulana Ahad were all hit during the attack. Three gunmen entered the mosque during morning prayers and opened fire. The presence of a dedicated security guard alongside Latif suggests that the JeM commander was aware of the threat he faced, a precaution that proved insufficient against attackers who were willing to engage multiple targets in a confined space.
Latif’s biography illuminated why he had risen to the top of the target list. He had infiltrated into the Kashmir Valley in 1993 and was arrested by Indian security forces in 1994. He served time in Jammu jail alongside Masood Azhar, JeM’s founder, until 2010, when he was deported to Pakistan following his release. He formally joined JeM after deportation and became the launching commander of the organization’s Sialkot sector. The National Investigation Agency wanted him for his role in planning and facilitating the Pathankot airbase attack of January 2016, in which one civilian and seven Indian security personnel were killed. Indian officials described his killing as “the biggest blow to JeM on Pakistan soil.”
Latif’s vulnerability derived from his dual role as JeM commander and mosque administrator. He had served as the administrator of Noori-e-Madina Masjid in Daska for years, making his presence at the mosque both predictable and publicly known. The attackers exploited this: a man who runs a mosque cannot avoid attending prayers at that mosque without abandoning his administrative role. Latif’s religious and organizational identities were inseparable, and the attack exploited the intersection. Pakistan’s Punjab Police registered an FIR against six unknown suspects and formed three separate investigation teams. Police recorded statements from worshippers present during the attack and obtained CCTV footage. The investigation later revealed, according to Pakistan’s Foreign Secretary, that an Indian agent named Yogesh Kumar, based in a third country, had orchestrated the assassination through recruited local criminals and a laborer named Muhammad Umair.
The Latif case also revealed the limitations of personal security measures against the prayer-time targeting doctrine. Latif traveled with an armed security guard, Hashim Ali, a precaution that indicated awareness of the threat environment. The presence of a bodyguard in a mosque congregation, however, creates an irresolvable tactical problem: the guard cannot effectively scan for threats while participating in communal prayers alongside worshippers, and drawing a weapon inside a mosque risks causing the very mass-casualty incident the guard is meant to prevent. When three gunmen entered and opened fire, Hashim Ali became a casualty rather than a protector. Maulana Ahad’s death compounded the operational fallout: a prayer leader killed alongside a JeM commander underscored the indiscriminate nature of close-quarter combat in confined spaces, providing Pakistan with a concrete example of civilian harm to present to international audiences.
The Pathankot connection deepened the strategic logic. On January 2, 2016, a group of JeM terrorists attacked the Indian Air Force base at Pathankot, Punjab. Seven Indian security personnel and one civilian were killed in a multi-day siege. Latif was identified as a key planner and launching commander who had facilitated the infiltration of the attackers from Pakistan. He had been arrested in India in 1994, served time in Jammu jail alongside Masood Azhar (where the two reportedly deepened their ideological and operational partnership), and was deported to Pakistan in 2010 after completing his sentence. Latif’s post-deportation career with JeM demonstrated the revolving-door problem that defines India-Pakistan counter-terrorism: a convicted terrorist, released and deported to Pakistan, immediately resumed operational activity and planned one of the most high-profile attacks on Indian military infrastructure in the post-Mumbai era. The Daska mosque killing closed that loop seven years after Pathankot, reinforcing the attack-to-elimination chain that connects specific attacks to specific consequences for their planners.
Zahoor Ibrahim Mistry: Akhtar Colony, Karachi
Mistry’s killing on March 1, 2022, in Karachi’s Akhtar Colony preceded the explicit prayer-time pattern but shares its underlying logic of predictable-location targeting. Mistry had lived under the alias Zahid Akhund for twenty-three years, running Crescent Furniture in Akhtar Colony while maintaining connections to JeM’s operational network. He was one of the five hijackers of IC-814, the Indian Airlines flight seized from Kathmandu on December 24, 1999, and flown to Kandahar, where India was forced to release Masood Azhar, Omar Saeed Sheikh, and Mushtaq Ahmed Zargar in exchange for the hostages. Mistry had personally played a role in the killing of honeymooning passenger Rupin Katyal during the hijacking.
Unidentified assailants on a motorcycle shot Mistry twice in the head at point-blank range near his furniture shop. Multiple bullet casings were recovered, and CCTV captured suspects in the area around the time of the incident. Intelligence sources indicated that Mistry had followed a daily routine centered on his furniture business, arriving at the shop at consistent hours, a pattern that provided the same kind of fixed-location predictability that mosques offered for other targets. His shop was his mosque, in the operational sense: the one place where his presence was guaranteed at known times.
The funeral that followed Mistry’s killing provided unexpected intelligence dividends. JeM’s operational chief Rauf Asghar attended the funeral procession in Karachi, confirming both the organizational hierarchy and the physical locations of senior JeM figures. After Mistry’s death, only two of the five IC-814 hijackers remained alive and at large in Pakistan: Ibrahim Azhar, the elder brother of Masood Azhar, and Rauf Asghar, both UN-designated terrorists. The IC-814 hijacking had forced India to release the terrorists who went on to found JeM and plan attacks including the 2001 Indian Parliament bombing, Pathankot, and Pulwama. Mistry’s killing twenty-three years later closed one link in that chain.
Imtiaz Alam: Evening in Rawalpindi
Bashir Ahmed Peer’s killing on February 20, 2023, in Rawalpindi operated on the shop-front variant of the predictable-location principle. Peer, the third-ranking leader of Hizbul Mujahideen, was standing in front of a shop in Rawalpindi’s commercial area during the evening when two motorcycle-borne assailants fired at him from point-blank range and fled. He was rushed to hospital but declared dead on arrival.
Peer’s operational significance stemmed from his role as Hizbul Mujahideen’s launching commander. Born in Babarpora, Kupwara district, Jammu and Kashmir, he had been controlling anti-India activities from Pakistan since 2000. The Indian government designated him a terrorist under UAPA on October 4, 2022, approximately four months before his killing. The designation specifically cited his involvement in providing logistics for terrorist infiltration into Kupwara, running online propaganda operations to unite former terrorists and cadres of Hizbul, LeT, and other Pakistan-backed groups, and instigating youth to implement Sharia law in Kashmir.
The Rawalpindi killing demonstrated that the predictable-location principle extends beyond mosques to any fixed-time, fixed-location activity. Peer frequented the same shop in the same commercial district during the same evening hours, a routine that offered attackers the same operational advantages as a mosque: confirmed presence, known timing, and an environment where a motorcycle can approach and depart without arousing suspicion. Pakistani media reported competing theories for the killing, with some outlets attributing it to inter-organizational rivalry and others accusing India’s RAW directly. The pattern of target selection, another India-designated terrorist killed by unidentified motorcycle-borne assailants, pointed toward the same campaign that produced the mosque killings.
Sardar Hussain Arain: The Commute in Nawabshah
Arain’s targeting on August 1, 2023, extended the geographic footprint of the campaign into Sindh, a province far from the Punjab and Kashmir theaters where most eliminations had occurred. Arain was a leading figure of JuD and LeT in the Sindh region, responsible for the madrassa network that served as both recruitment pipeline and organizational infrastructure. He was attacked while traveling from his residence to his shop in Qazi Ahmed city within Nawabshah district, a daily commute he had repeated for years.
The Sindhudesh Revolutionary Army’s claim of responsibility for Arain’s killing followed the pattern of third-party attribution that characterizes several eliminations in the campaign. Sindhi separatist groups have their own grievances against Punjabi-dominated organizations like LeT, providing plausible cover for operations whose true sponsors may lie elsewhere. Arain had contested the 2018 elections from Nawabshah’s PS-40 constituency under Hafiz Saeed’s Allah-o-Akbar Tahreek, making him a public figure whose daily movements were known to the community. His role in expanding JuD’s madrassa network in Sindh connected him to the organizational infrastructure that transforms radicalized students into operational recruits. Killing Arain struck at the pipeline’s local administrator, the person who ensured that madrassas in Nawabshah and surrounding areas continued producing the next generation of LeT operatives.
Modus Operandi Analysis
Five eliminations across four cities, three provinces, and two calendar years share operational characteristics too consistent to be coincidental. The modus operandi of the prayer-time and predictable-location pattern breaks into seven discrete elements, each of which implies a specific capability that the attackers must possess.
The first element is target identification and intelligence validation. Every target in the prayer-time pattern was on India’s official most-wanted list, designated under UAPA, or named in NIA charge sheets before being killed. Abu Qasim was linked to the Dhangri attack. Shahid Latif was wanted for Pathankot. Zahoor Mistry was an IC-814 hijacker. Imtiaz Alam was designated in October 2022. Arain ran LeT’s Sindh madrassa network. The target selection is not random; it follows India’s prioritized threat list with precision that rules out criminal opportunism or sectarian violence as primary motivators.
The second element is schedule mapping. Killing a person at a mosque during Fajr prayer requires knowing which mosque the target attends, which prayer they prioritize, and whether their attendance is daily or periodic. Abu Qasim was a visitor to Al-Quds mosque who stayed overnight as the imam’s guest, meaning the attackers tracked his movements from Chakswari to Rawalakot and confirmed his overnight stay. Shahid Latif administered the mosque in Daska, making his attendance almost certain but requiring the attackers to determine which prayer session would offer optimal conditions for the strike. Schedule mapping at this level of precision demands sustained surveillance over weeks, possibly months, before the operation.
The third element is physical reconnaissance of the target location. The Al-Quds mosque attack required knowledge of the mosque’s layout, including the veranda where the second attacker waited, the interior seating arrangement that placed Qasim in the second row, and the escape routes available from the mosque’s immediate vicinity. The Daska mosque attack required knowledge that Latif sat with his security guard during prayers, that the prayer leader Maulana Ahad sat in proximity, and that three gunmen could enter the mosque without being stopped at the entrance. This level of interior knowledge implies that someone connected to the operation visited the mosque beforehand, likely attending prayers to observe the layout, seating patterns, and security posture.
The fourth element is weapons procurement. Every killing in the pattern involved firearms used at close range, typically pistols or automatic weapons suitable for concealment under clothing. The attackers in the Qasim killing fired four rounds. The Latif killing involved enough firepower to hit three people. Weapons procurement in Pakistan, while not insurmountable, requires either local criminal contacts or pre-positioned caches. The consistency of close-range firearms across multiple cities suggests a procurement network or protocol that operates independently of the surveillance and execution teams.
The fifth element is team coordination. The Qasim killing involved two attackers: one who entered the mosque and fired, and one who waited on the veranda as lookout and escape facilitator. The Latif killing involved three gunmen who entered the mosque together. The Mistry killing involved motorcycle-borne assailants. Each operation required a minimum of two to three people with defined roles: trigger person, lookout, and driver. In the motorcycle assassination pattern that characterizes the broader campaign, the typical team consists of a shooter on the pillion seat and a driver who manages approach and escape. The mosque operations add complexity because the shooter must enter an enclosed space, execute, and rejoin the escape vehicle, requiring choreographed timing.
The sixth element is escape execution. Every attacker in the prayer-time pattern escaped successfully. No one has been apprehended at the scene of a mosque killing. The Qasim attackers fled from Al-Quds mosque before the Pakistan Army could respond despite the military being placed on high alert immediately afterward. The Latif attackers escaped from Daska despite three investigation teams being formed by Punjab Police. The Mistry attackers vanished into Karachi’s dense urban fabric. Successful escape from a mosque, where the entire congregation becomes a potential witness pool, requires pre-planned routes, positioned vehicles, and knowledge of local police response times. The escape planning is itself a form of intelligence: the attackers must know the average police response time for the specific neighborhood, the likely direction from which security forces will approach, and the alternative routes available if the primary escape path is blocked.
The Daska mosque escape is particularly instructive because the attack occurred in a small Punjab town, not in a megacity like Karachi where anonymity is ambient. Daska’s population is roughly 150,000, a size where strangers on motorcycles attract attention, where roads are few enough that checkpoints can be established quickly, and where the community’s social networks can rapidly spread descriptions of suspects. The three gunmen who killed Latif, Hashim Ali, and Maulana Ahad escaped this environment, which implies either local knowledge sufficient to navigate Daska’s streets at speed or prior mapping of escape routes that bypassed the town’s main thoroughfares. The contrast with the capture of Muhammad Abdullah Ali at Karachi airport seven days after the Qasim killing suggests that operational security varies across the campaign: the escape from the immediate scene is consistently successful, but the post-operation vulnerability of recruited proxies creates a window for Pakistani counterintelligence to apprehend executors, even if the operation itself succeeds.
The seventh element is operational deniability. No organization has claimed responsibility for the mosque killings. The Arain killing was attributed to the Sindhudesh Revolutionary Army, a Sindhi separatist group, but analysts noted the attribution’s convenience. India has categorically denied involvement in extrajudicial operations on Pakistani soil. Pakistani authorities have blamed India’s RAW, citing investigations that identified named Indian agents such as Yogesh Kumar and Ashok Kumar Anand, but these allegations remain contested internationally. The absence of claims is itself a signature: legitimate sectarian or criminal violence in Pakistan is almost always claimed or attributable. The TTP claims its attacks. Sectarian groups like Lashkar-e-Jhangvi claim their attacks. Criminal organizations leave identifiable patterns linked to territorial disputes. Operations where no one steps forward, where the killers vanish and the only attribution comes from Pakistani counterintelligence alleging foreign state involvement, fit the profile of state-sponsored covert action designed for plausible deniability. The pattern decoded across the broader campaign demonstrates that this deniability signature is not unique to mosque killings but characterizes every elimination in the series, a consistency that further undermines the criminal-violence or internal-rivalry explanations.
The convergence of all seven elements, target identification from official wanted lists, schedule mapping through sustained surveillance, physical reconnaissance of the mosque interior, weapons procurement through local criminal networks, team coordination involving two to three operatives with defined roles, pre-planned escape through urban terrain, and systematic deniability through absence of claims, constitutes a composite operational signature. Each element individually could be explained by organized criminal activity. Collectively, the seven elements together describe a capability that transcends criminal enterprise and implies institutional planning, sustained intelligence support, and doctrinal consistency across multiple operations in dispersed geographic theaters.
The Intelligence Architecture
The prayer-time targeting pattern implies an intelligence architecture operating at four distinct levels, each of which must function without failure for the operation to succeed.
At the first level sits strategic intelligence: identifying which targets to prioritize. This level operates within India’s national security establishment, where the UAPA designation list, NIA charge sheets, and intelligence assessments compiled by RAW and the Intelligence Bureau converge to produce a prioritized threat matrix. Abu Qasim was prioritized after the Dhangri attack. Shahid Latif had been on India’s radar since Pathankot in 2016. Mistry was wanted since IC-814 in 1999. The target list is not improvised; it reflects decades of accumulated intelligence on specific individuals and their operational roles within LeT, JeM, and Hizbul Mujahideen.
At the second level operates locational intelligence: determining where each target lives, works, prays, and socializes. This requires either human intelligence assets positioned within the target’s community or technical surveillance capabilities (phone tracking, communication intercepts, social media monitoring) that can map daily routines from a distance. For mosque-based killings, locational intelligence must answer three questions: Which mosque does the target attend? Which prayer does the target regularly observe? Is the target’s attendance pattern consistent enough to plan an operation around it? Answering these questions for Abu Qasim in Rawalakot, a small town in PoK where the Pakistan Army maintains substantial presence, implies intelligence penetration at a level that Pakistan’s security establishment finds deeply unsettling.
The third level involves tactical intelligence: the day-of confirmation that the target is present at the planned location at the planned time. Killing Abu Qasim required confirming that he had traveled from Chakswari to Rawalakot and stayed overnight at Al-Quds mosque. Killing Shahid Latif required confirming that he would attend morning prayers at the Daska mosque on that particular October morning. This real-time intelligence cannot be pre-positioned; it requires either a human asset with same-day access to the target’s location or a technical capability that can track movement in near-real-time. The attacker who entered Al-Quds mosque wearing a helmet, as described in the FIR, suggests someone who arrived shortly before the prayer knowing that Qasim was inside. That knowledge had to come from somewhere.
At the fourth level sits what David Kilcullen, the counter-insurgency theorist and author of “The Accidental Guerrilla,” calls the exploitation of predictable behavior. Kilcullen’s framework posits that every person, regardless of their security awareness, retains at least one behavioral constant that cannot be eliminated without fundamentally altering their identity. For devout Muslims, that constant is prayer. The five daily prayers in Islam, Fajr (predawn), Dhuhr (noon), Asr (afternoon), Maghrib (sunset), and Isha (night), are obligatory, and congregational prayer at a mosque carries additional religious merit. A target who varies his route, changes his sleeping location, and rotates his daily schedule will still attend the same mosque for the same prayer at the same time. The prayer-time targeting pattern exploits this behavioral constant with clinical precision.
Pakistan’s Foreign Secretary, in January 2024 remarks that formally accused India of orchestrating assassinations on Pakistani soil, specifically linked the mosque killings to an operational pattern. The diplomatic presentation named the Shahid Latif and Muhammad Riaz (Abu Qasim) cases, describing how Indian agents recruited local criminals through intermediaries based in third countries and used social media platforms including Telegram for communication and payment. The investigation revealed that Muhammad Abdullah Ali, the recruited killer in the Qasim case, was apprehended on September 15, 2023, while boarding a flight at Jinnah International Airport in Karachi, just seven days after the killing. His interrogation allegedly revealed that Indian agents Ashok Kumar Anand and Yogesh Kumar had guided and funded the operation.
The intelligence architecture that emerges from these details operates across borders, using intermediaries in third countries (reportedly the UAE), social media for communication, hawala networks for payment, and locally recruited assets for execution. The attackers who pull the trigger are not Indian nationals; they are Pakistani citizens or third-country laborers recruited and directed remotely. This layered structure, in which the strategic intelligence originates in New Delhi, the operational coordination occurs through intermediaries abroad, and the execution is carried out by local proxies, mirrors the tradecraft documented in Ronen Bergman’s “Rise and Kill First” regarding Mossad’s historical methodology for targeted killings, adapted for a South Asian operational environment where direct insertion of foreign agents would be prohibitively risky.
The question of surveillance depth deserves particular attention. Martha Crenshaw, the Stanford terrorism scholar, has written extensively about the relationship between intelligence capability and targeting precision. In Crenshaw’s framework, the ability to target a person at a specific location at a specific time represents the highest tier of intelligence capability, one that requires sustained human networks embedded in the target environment. Remote surveillance, satellite imagery, or intercepted communications can identify where a target lives or which organization he belongs to. Only human intelligence, assets with direct or indirect visual access to the target, can confirm that he is seated in the second row of a specific mosque at 4:30 AM on a specific Friday morning. The prayer-time targeting pattern is, in Crenshaw’s taxonomy, a human-intelligence-intensive operation that could not be replicated through technical means alone.
The implications of this assessment for the ISI-RAW intelligence war are profound. Pakistan’s Inter-Services Intelligence directorate has historically maintained an intelligence advantage inside Pakistan’s own territory, operating the surveillance networks, managing the informant systems, and controlling the security infrastructure that governs daily life in cities like Karachi, Rawalpindi, and Lahore. The prayer-time targeting pattern, if executed by Indian intelligence through locally recruited proxies, suggests that RAW has developed an operational capability within ISI’s home territory that ISI has been unable to detect and neutralize. The apprehension of Muhammad Abdullah Ali seven days after the Qasim killing, while boarding a flight at Karachi airport, represents an ISI success in post-operation investigation. But the operation itself, the killing inside a PoK mosque during Fajr prayer, represents an ISI failure in pre-operation detection. The gap between ISI’s post-operation investigative capability and its pre-operation prevention capability is the space within which the prayer-time pattern operates.
The recruitment model deserves particular scrutiny. Pakistani investigators have described a pattern in which Indian intelligence officers recruit proxies through multiple layers of separation. In the Qasim case, Muhammad Abdullah Ali was recruited through the Telegram messaging platform by individuals he identified as Indian agents. He received weapons and payment through intermediaries in a third country. In the Latif case, Muhammad Umair was recruited as a laborer in the UAE and tasked with organizing a team of local killers in Pakistan. Both cases describe a low-cost, high-deniability model: the recruits are not trained intelligence operatives but ordinary individuals, laborers, petty criminals, and local proxies, who are given a specific target, provided with weapons and money, and directed to execute. The model’s weakness is its reliance on poorly trained contractors whose operational security is sometimes inadequate, as demonstrated by Ali’s capture and Umair’s reportedly clumsy initial attempts. Its strength is that it is scalable and replaceable: if one recruited proxy fails or is captured, another can be recruited through the same intermediary channels.
Avery Plaw, the author of “Targeting Terrorists” and a leading scholar on targeted killing methods globally, has categorized state-sponsored assassination programs into three operational models: direct action (state agents perform the killing), remote action (drones or technical means), and proxy action (locally recruited assets carry out the killing under state direction). India’s prayer-time targeting pattern fits squarely into the proxy-action model, sharing characteristics with Mossad’s historical use of local assets in operations where Israeli agents could not operate directly. The proxy model’s dependence on human intelligence for targeting and on local recruits for execution creates a distinctive operational signature: high intelligence precision (the target is correctly identified and located with specificity) combined with occasionally imprecise execution (collateral casualties, failed first attempts, captured operatives). This signature, visible across the prayer-time cases, is analytically diagnostic: it distinguishes the campaign from criminal or sectarian violence, which typically shows low targeting precision and variable execution quality, and from direct-action state operations, which typically show high precision in both targeting and execution.
The Vulnerability Matrix
The prayer-time targeting pattern illuminates a broader analytical framework: the relationship between location type and target vulnerability. Across the documented eliminations in India’s shadow war, five location types recur as targeting windows. Each offers a distinct combination of advantages and disadvantages for the attacker.
Mosques during prayer represent the highest-predictability targeting window. A devout target’s mosque attendance is fixed by religious obligation, occurs at set times corresponding to the five daily prayers, and involves a physical location that is publicly known and architecturally consistent across Pakistan. The target sits or kneels in a stationary position, surrounded by other worshippers who obstruct escape but also constrain the target’s ability to detect approaching threats. Entry into a mosque is unrestricted; any person dressed appropriately can join a congregation without challenge. Escape routes from mosque courtyards and surrounding streets are mappable in advance. The primary disadvantage of mosque targeting is the elevated collateral damage risk: Shahid Latif’s killing produced three deaths, including a prayer leader who was not a designated target. The ethical and legal complications of killing a person in a place of worship are substantial, a dimension explored in a subsequent section.
Mosque architecture across Pakistan follows patterns that create consistent operational conditions. Most Pakistani mosques feature an open courtyard leading to a covered prayer hall, with ablution facilities at the side, a mihrab (niche indicating the direction of Mecca) at the front wall, and one or more entrances that remain open during prayer times. Worshippers arrange themselves in parallel rows facing the mihrab, typically in a kneeling or prostrating position, with their backs to the entrance. This architectural layout means that an attacker entering from the rear can approach a target seated in the first or second row with the target’s back turned and attention directed forward in prayer. The Al-Quds mosque in Rawalakot, where Abu Qasim was killed, followed this standard layout: the attacker entered from behind while Qasim knelt in the second row facing the mihrab. The veranda where the second attacker waited is a feature common to PoK mosques, providing a staging area that is technically within the mosque compound but outside the prayer hall, offering both concealment and a direct route to the escape vehicle.
The five daily prayers, Fajr at predawn, Dhuhr at noon, Asr in the afternoon, Maghrib at sunset, and Isha at night, create five distinct windows of predictable presence every twenty-four hours. Friday Jumu’ah prayers add a sixth window with even higher certainty because Friday congregational attendance carries additional religious obligation. Among these, Fajr offers the optimal operational conditions because it occurs before dawn when streets are empty, bystander presence is minimal, visibility is reduced, and the surrounding community is largely asleep. Abu Qasim was killed during Fajr. Shahid Latif was killed during morning prayers that may have been Fajr or a post-Fajr session. The predawn timing maximizes the attacker’s advantage while minimizing the congregation’s ability to respond.
Street-level encounters during daily routines, such as Imtiaz Alam’s killing outside a shop in Rawalpindi, represent the second most common targeting window. The target’s presence at a shop, market, or habitual walking route offers moderate predictability. The street environment allows motorcycle approach and rapid escape through traffic. Collateral damage risk is lower than in enclosed spaces because bystanders can scatter. The disadvantage is reduced certainty: a target who varies his evening routine by even thirty minutes can invalidate an operation planned around his habitual schedule. Peer’s killing in Rawalpindi on February 20, 2023, demonstrated both the advantages and limitations of street-level targeting. The two motorcycle-borne assailants struck during the evening when the commercial district was populated, providing cover for their approach, but the fading daylight also complicated positive target identification. In Pakistani urban environments where men of similar build and dress frequent the same commercial areas, confirming the identity of a specific target from a moving motorcycle requires either prior visual contact with the target or guidance from a human asset positioned near the shop who can signal when the target is present.
Home-based killings, where attackers strike at or near a target’s residence, offer high certainty of target presence but elevated security risk. Residential areas in Pakistan are often patrolled by private security, neighborhood watchmen, or, for high-value targets, armed guards. Approach to a residence is more conspicuous than approach to a public space like a mosque or market. Paramjit Singh Panjwar, the chief of the Khalistan Commando Force, was assassinated near his home in Lahore in May 2023, demonstrating that residential targeting is operationally feasible but carries higher detection risk. Panjwar’s killing in Lahore, Pakistan’s second-largest city, required the attackers to navigate a residential neighborhood where potential detection from neighbors, cameras, or guards created additional risk. The operational preference for mosques and commercial locations over residences, observable across the campaign’s documented killings, suggests a systematic aversion to residential targeting driven by the higher counter-surveillance burden that such locations impose.
Commercial locations, including shops and businesses, served as the targeting window for Zahoor Mistry (furniture shop in Akhtar Colony) and Sardar Hussain Arain (commute to shop in Nawabshah). Commercial spaces offer moderate predictability (business hours constrain when the target will be present) and moderate escape options (commercial districts provide traffic cover). The disadvantage is that business districts may have CCTV coverage, as the Mistry killing demonstrated when cameras captured suspects in the vicinity. Arain’s killing in Nawabshah highlights another characteristic of commercial targeting: the daily commute itself becomes the vulnerability window. Arain was attacked while traveling from his residence to his shop, a route he had repeated for years without incident. Commute-based targeting requires knowledge not just of the destination but of the route and timing, a higher intelligence burden than mosque targeting where only the destination and the prayer schedule need to be confirmed.
Travel routes, including commutes between residence and mosque, residence and shop, or intercity travel, offer the lowest predictability but the broadest window. Arain was attacked while traveling from home to shop, a daily commute he had repeated for years. Travel-route attacks require knowledge of the target’s route and timing but allow ambush at a point of the attacker’s choosing, potentially selecting a stretch with minimal witnesses and optimal escape options. Abu Qasim’s travel from Chakswari to Rawalakot, an intercity journey of significant distance within PoK, was itself tracked by the attackers, who confirmed his arrival at Al-Quds mosque and his overnight stay. The ability to monitor intercity travel in PoK, where the Pakistan Army maintains checkpoints and controls major roads, implies either assets positioned along the route or technical surveillance of Qasim’s phone or vehicle. The safe haven network that terrorist commanders rely upon for protection becomes, paradoxically, a vulnerability when their movements between safe locations are monitored by hostile intelligence.
The interplay between location types reveals a progressive escalation in targeting complexity. In the campaign’s earliest documented operations, targets were killed at commercial locations (Mistry at his furniture shop) and street-level encounters (Alam outside a shop), locations that are operationally simpler because they require less precision in timing and less knowledge of interior layouts. The transition to mosque-based killings, beginning with the Qasim operation in September 2023 and continuing with the Latif operation in October 2023, represents an escalation into a more demanding tactical environment. Mosque operations require interior knowledge, real-time confirmation of the target’s presence inside the prayer hall, willingness to engage in a confined space, and acceptance of higher collateral damage risk. The escalation suggests that the campaign’s capabilities have grown over time, that its intelligence networks have deepened, and that its operational confidence has expanded to match.
The vulnerability matrix that emerges from this analysis shows why mosques dominate the targeting pattern. Across five dimensions, predictability of target presence, surveillance ease, approach options, escape routes, and collateral damage risk, mosques score highest on the first four and highest also on the fifth. The campaign’s apparent willingness to accept elevated collateral damage risk in exchange for near-certainty of target presence and optimal approach conditions reveals a doctrine that prioritizes operational effectiveness above all other considerations. The attackers calculate, apparently correctly, that a target killed in a mosque is a target killed, regardless of the ethical and diplomatic consequences.
Competing Theories
The prayer-time targeting pattern has generated three competing explanations within Pakistan’s security and analytical community, each of which offers a different account of who is responsible and what the pattern means.
The first theory, advanced by Pakistan’s government, military, and intelligence establishment, attributes the killings directly to India’s RAW. Pakistan’s Foreign Secretary presented detailed evidence in January 2024, naming Indian agents Yogesh Kumar and Ashok Kumar Anand and describing the recruitment chains used to carry out the Shahid Latif and Muhammad Riaz killings. Pakistani investigators claimed to have apprehended operatives, recovered communications from encrypted platforms, and traced payments through informal hawala networks linking Indian handlers to local executors. This theory positions the prayer-time pattern as a deliberate RAW methodology, a signature of India’s covert operations doctrine applied through locally recruited proxies.
The evidence supporting Pakistan’s attribution includes the consistent target selection (every victim was on India’s wanted list), the operational similarities across geographically dispersed killings, and the confessional statements of apprehended suspects. Asad Durrani, the former director general of Pakistan’s ISI, told The Washington Post that the shadow war reflected a mutual willingness to destabilize, stating that “any state, or non-state actor, that can get away with an act would do so” and that “neither side is willing to pay the price of peace.” The evidentiary foundation of Pakistan’s theory has been strengthened by parallel allegations from the United States and Canada against Indian intelligence for plots against Sikh separatists Gurpatwant Singh Pannun and Hardeep Singh Nijjar, respectively, which share operational characteristics (use of intermediaries, recruitment through social media, payment via informal channels) with the Pakistan killings.
The second theory, favored by some Pakistani analysts and occasionally promoted in Pakistani media, attributes the killings to internal rivalries: inter-organizational competition between LeT, JeM, and Hizbul Mujahideen, or intra-organizational purges driven by disputes over funding, territory, or leadership succession. This theory notes that Pakistan’s militant ecosystem is riven by factional conflicts, that leaders have been killed by rival factions before, and that attributing every killing to India may serve the Pakistani establishment’s interest in avoiding accountability for its own failure to control the groups it created. The Imtiaz Alam killing in Rawalpindi was initially attributed by some Pakistani outlets to “infighting among terror groups” before the RAW attribution gained precedence.
The internal-rivalry theory has serious weaknesses. It fails to explain why every victim is specifically on India’s designated terrorist list, a coincidence that strains credibility if the killers are domestic Pakistani actors with no access to India’s intelligence priorities. It fails to account for the consistent modus operandi across multiple cities and organizational targets: LeT commanders in Karachi, JeM commanders in Sialkot, HM commanders in Rawalpindi, all killed by the same method (motorcycle-borne assailants using close-range firearms) with the same deniability signature (no claim of responsibility). Internal rivalries produce killings, but they produce killings with sectarian or organizational signatures that differ from the clinical uniformity of the prayer-time pattern.
The third theory, advanced principally by India’s government through strategic silence, holds that India has no involvement in extrajudicial killings on foreign soil. India has categorically denied participation in the killings in Pakistan, just as it initially denied the allegations from the US and Canada. This position maintains that the killings may be the product of Pakistan’s internal instabilities, criminal violence, or factional competition, and that attributing them to India serves Pakistan’s strategic interest in portraying itself as a victim of Indian aggression rather than as the state whose territory shelters UN-designated terrorist organizations. India’s Defense Minister Rajnath Singh complicated this deniability posture in April 2024 by stating publicly that “if any terrorist from a neighbouring country tries to disturb India, he will be given a fitting reply. If he escapes to Pakistan, we will go to Pakistan and kill him there,” a statement that Pakistani officials cited as implicit confirmation of state-directed assassination.
Adjudicating between these theories requires examining the totality of evidence rather than individual cases in isolation. The Guardian’s April 2024 investigation, based on interviews with Indian and Pakistani intelligence officials, reported that RAW had organized up to twenty killings in Pakistan between 2020 and 2024 using “unknown gunmen.” The Washington Post’s detailed December 2024 reporting described a “methodical assassination program” deployed by RAW since 2021 to “kill at least a half dozen people deep within Pakistan.” Pakistani investigators’ confessional evidence and the US/Canada parallel cases collectively make the internal-rivalry theory untenable as a comprehensive explanation, though individual killings may involve mixed motivations. The most analytically defensible conclusion is that the prayer-time targeting pattern reflects a coordinated campaign with state-level intelligence backing, executed through locally recruited proxies, and designed to exploit the behavioral predictability that religious practice creates.
The recruitment methodology described by Pakistani investigators warrants closer examination because it reveals the operational architecture that makes the prayer-time pattern possible. In the Qasim case, Muhammad Abdullah Ali was recruited through Telegram, a messaging platform that offers encrypted communication and disappearing messages. He was provided with weapons and ammunition through intermediaries, received payments through middlemen based in a third country, and was given specific instructions on target identification and location. The recruitment chain operated through multiple cutouts: an Indian intelligence officer (allegedly Ashok Kumar Anand or Yogesh Kumar) communicated with a middleman, who communicated with the recruited executor, who carried out the physical killing. Each layer of separation insulated the sponsoring intelligence agency from direct connection to the execution.
In the Latif case, the recruitment was more complex. Muhammad Umair, a laborer in a third country (reportedly the UAE), was initially recruited by the Indian agent Yogesh Kumar to act as a contact with local criminals in Pakistan who would trace and assassinate Latif. When the first set of hired killers failed to execute, Umair was personally sent to Pakistan to organize a team of five target killers. The team made a failed attempt on October 9, 2023, two days before the successful operation at the Daska mosque. The failed first attempt is analytically significant: it demonstrates that the operation was not a single, surgically precise strike but an iterative process involving failed attempts, personnel reorganization, and persistent pursuit over multiple days. The prayer-time pattern, from this perspective, represents not a guaranteed method of assassination but the most reliable one available after other approaches have been attempted and failed.
The Washington Post’s reporting added another dimension. It described how RAW officers employed businessmen in Dubai as intermediaries and deployed “separate, siloed teams to surveil targets, execute killings and funnel payments from dozens of informal, unregulated banking networks known as hawalas set up in multiple continents.” The silo structure, in which surveillance teams, execution teams, and payment teams operate independently without knowledge of each other’s identities, mirrors the compartmentalization practices documented in Ronen Bergman’s research on Mossad’s operational methodology. The Post also noted that “the RAW also at times used sloppy tradecraft and poorly trained contractors,” a characterization consistent with the failed first attempt on Latif and the capture of Muhammad Abdullah Ali at Karachi airport just seven days after the Qasim killing. The contrast between the operational ambition of the campaign and the occasionally amateurish execution suggests a program that is expanding faster than its operational capacity, deploying resources against multiple targets simultaneously while relying on recruited proxies whose tradecraft does not match the sophistication of the intelligence that identifies the targets.
The Ethics of Targeting at Sacred Sites
Mosque targeting is the ethically most fraught element of the shadow war. Killing a person during prayer, in a place of worship, while they kneel before God, raises moral and legal questions that the operational rationale does not resolve.
International humanitarian law provides explicit protections for religious sites. Additional Protocol I to the Geneva Conventions, Article 53, prohibits acts of hostility directed against places of worship. The Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict (1954) extends protections to religious architecture. However, these protections apply in the context of armed conflict between states, and whether the shadow war qualifies as an armed conflict under international law is itself contested. Targeted killing conducted outside the framework of armed conflict falls under the law enforcement paradigm, where the use of lethal force is governed by human rights law rather than IHL, and the location of the killing, whether in a mosque, a shop, or a street, is legally less significant than the question of whether lethal force was necessary and proportionate.
Daniel Byman of the Brookings Institution, writing on targeted killing methodology in comparative context, has noted that the ethics of location selection in targeted killings operate on a sliding scale. At one end sits the drone strike in an open field, where collateral damage risk is minimal. At the other end sits the targeted killing in a crowded market or place of worship, where collateral damage risk is high and the symbolic violation is profound. The prayer-time targeting pattern occupies the extreme end of this scale. The Shahid Latif killing, in which a prayer leader was killed alongside the target, illustrates the collateral damage risk in concrete terms: Maulana Ahad was not on any wanted list, had no connection to terrorism that has been publicly alleged, and died because he was praying in proximity to a designated target.
The ethical analysis is complicated by the targets’ own use of mosques as protective spaces. Christine Fair, the Georgetown professor who has studied Pakistan’s militant organizations extensively, has argued that terrorist organizations in Pakistan deliberately embed their leadership within civilian and religious infrastructure precisely because they understand that attacks on mosques carry disproportionate political and diplomatic costs for the attacker. Abu Qasim lived in a community where his presence at the mosque was both socially expected and operationally useful: a mosque provides social cover, community protection, and the moral deterrent of sacred space. When a person uses a mosque as a shield, the ethical calculus shifts: the target has chosen to place himself in a protected location knowing that this placement raises the moral cost of any strike against him.
This does not resolve the ethical question; it reframes it. The attackers face a choice between accepting the target’s use of sacred space as an effective veto on the operation or proceeding despite the moral and legal complications. The prayer-time pattern suggests they have consistently chosen the latter. Whether this choice reflects a defensible application of the principle of military necessity, a concept borrowed from just war theory in which an otherwise prohibited action becomes permissible because no alternative exists, or represents a violation of norms that no military necessity can justify, depends on analytical assumptions about the availability of alternative targeting windows. If the mosque is genuinely the only location where the target can be reliably found, the necessity argument carries greater weight. If alternative windows exist but are rejected for operational convenience, the ethical case weakens considerably.
Historical comparison offers limited guidance. Israel’s Mossad, in its Operation Wrath of God campaign following the 1972 Munich Olympics massacre, targeted Palestinian operatives in apartments, on streets, and at hotel rooms, but there is no documented case of Mossad killing a target inside a mosque or during religious services. The operational reason was partly tactical, Mossad’s targets in European cities rarely attended mosques with the regularity that would create reliable targeting windows, but partly doctrinal: Israeli intelligence operated under internal guidelines that placed religious sites in a restricted category, not because of formal legal prohibitions but because of the anticipated political fallout from killing a person in a place of worship in a Western European city. The US drone campaign in the tribal areas of Pakistan and Yemen struck targets at residential compounds, vehicle convoys, and training camps but generally avoided targeting at religious sites, partly due to the collateral damage implications and partly because drone surveillance could track targets to less complicated locations. A Predator drone loitering at 15,000 feet has the patience to wait for a target to leave a mosque and enter a vehicle; the prayer-time targeting pattern in India’s shadow war suggests that the campaign’s ground-level assets lack this patience or the capability to maintain sustained real-time surveillance that would allow targeting at a less complicated location.
The comparison with Israel’s legal framework is instructive in another respect. The Israeli Supreme Court’s 2006 ruling on targeted killings, the most comprehensive judicial examination of the practice in any democracy, established a proportionality test that requires the expected military advantage of a targeted killing to be proportionate to the expected harm to civilians. Under this framework, killing Shahid Latif at a mosque, with the resultant death of prayer leader Maulana Ahad, would trigger a proportionality analysis: did the military advantage of eliminating the Pathankot attack mastermind outweigh the harm of killing a non-combatant prayer leader? India’s shadow war operates without any such legal framework. There is no published doctrine, no judicial review, no proportionality test, and no accountability mechanism for collateral damage. The total deniability under which the campaign operates means that the ethical questions it raises have no institutional forum in which they can be adjudicated, a gap that Happymon Jacob of JNU and George Perkovich of the Carnegie Endowment have both described as creating a “dangerous legal vacuum.”
The sacred-space-as-shield dynamic warrants extended analysis because it illuminates a tension that has no clean resolution. Pakistan’s terrorist organizations have, for decades, operated from within the civilian and religious infrastructure of Pakistani cities. LeT headquarters in Muridke functions as a vast campus with mosques, madrassas, hospitals, and residential compounds. JeM’s Bahawalpur headquarters similarly embeds itself within religious and educational infrastructure. Individual commanders attend neighborhood mosques not merely for worship but because mosque attendance reinforces their standing within the communities that shelter them. A LeT commander who prays at the local mosque five times daily is performing both religious obligation and social theater: he is demonstrating to the neighborhood that he is a devout, community-embedded figure deserving of protection and respect. When the campaign’s attackers enter these mosques and kill these commanders during prayer, they are disrupting not just an individual’s life but the social compact between terrorist organizations and the communities that host them.
India’s shadow war, if the prayer-time pattern is correctly attributed, represents a more aggressive approach to location selection than either the Israeli or American precedents, one that reflects either operational constraints (the targets in Pakistan are harder to isolate in non-religious settings) or a doctrinal choice that prioritizes certainty of elimination over ethical restraint. The distinction matters. If the mosque is genuinely the only feasible targeting location, the operational-necessity argument carries weight. If alternative windows exist but mosques are chosen for convenience or certainty, the ethical case weakens. The available evidence suggests that both factors are at work: mosques offer the highest certainty, and alternative locations have been used when circumstances allow (Mistry at his shop, Alam at a commercial area), but the mosque remains the preferred window for high-value targets whose security precautions have closed other avenues.
The ethical dimension carries strategic consequences. Pakistan has used the mosque killings as a centerpiece of its diplomatic campaign against India, presenting the prayer-time targeting pattern to international audiences as evidence of India’s disregard for sacred spaces and religious norms. The killing of prayer leader Maulana Ahad alongside Shahid Latif in Daska provided Pakistan with a concrete example of collateral damage at a religious site, a case it has cited in international forums. Whether this diplomatic cost outweighs the operational gains of the prayer-time pattern is a calculation that only the campaign’s planners can make, but the pattern’s continuation despite the diplomatic fallout suggests that the operational calculus has, so far, favored effectiveness over caution.
Strategic Implications
The prayer-time targeting pattern carries implications that extend beyond the individual killings and into the structural relationship between India and Pakistan, the future of covert counter-terrorism, and the behavioral adaptation of terrorist organizations in response to the campaign.
The first implication is doctrinal. The prayer-time pattern reveals that the shadow war operates on a targeting doctrine that prioritizes behavioral predictability above all other operational variables. Location type, collateral damage risk, diplomatic consequences, and ethical considerations are subordinated to the question: Can we confirm the target’s presence at a specific place at a specific time? Mosques answer this question more reliably than any alternative location because religious obligation creates behavioral constraints that security awareness cannot override. This doctrine, if it indeed originates from India’s intelligence establishment, represents a departure from India’s historical posture of strategic restraint and an alignment with the operational philosophies of Israel and the United States, both of which have conducted sustained targeted-killing campaigns against designated terrorists on foreign soil.
The second implication is organizational. The prayer-time pattern has forced Pakistan-based terrorist organizations to confront a new threat environment. Happymon Jacob of Jawaharlal Nehru University, writing on India-Pakistan security dynamics, has noted that the eliminations since 2021 have created a “deterrence by punishment” effect in which senior terrorist commanders now face personal risk for their involvement in attacks on India. Before the shadow war, a LeT or JeM commander who planned an attack on Indian soil could expect to live openly in Pakistan indefinitely, protected by the ISI, sheltered by the organizational infrastructure, and insulated from consequences by Pakistan’s refusal to prosecute. The prayer-time pattern has shattered that assumption. Abu Qasim planned the Dhangri attack in January 2023 and was killed nine months later. The attack-to-elimination chain has tightened to the point where planning an attack on India now carries a measurable probability of personal lethal consequence.
The organizational response has been observable. Pakistani media reported that the Pakistan Army was placed on high alert after Qasim’s killing in Rawalakot. LeT commanders have reportedly altered their routines, reduced public appearances, and in some cases relocated from cities where eliminations have occurred. The behavioral adaptation creates its own intelligence challenge: as targets become more cautious, the prayer-time window may diminish in reliability, forcing the campaign to develop new targeting methodologies or accept longer surveillance timelines. The fundamental constraint, however, remains. A devout person cannot indefinitely avoid mosques without abandoning the religious identity that defines their organizational role. LeT and JeM are not secular organizations; they are jihadist movements whose leaders derive authority from religious legitimacy. A commander who stops attending mosque prayers undermines his own standing within the organization he leads.
The third implication is diplomatic. The prayer-time pattern has become a focal point in the escalating diplomatic confrontation between India and Pakistan over extrajudicial operations. Pakistan’s presentation of evidence to international audiences, including specific operational details of the Latif and Qasim killings, has attracted attention because the evidence parallels the allegations from the US and Canada against Indian intelligence. The convergence of three countries, Pakistan, the United States, and Canada, all alleging that Indian intelligence has engaged in targeted killings or assassination plots on their soil has created a diplomatic environment in which India’s categorical denials face increasing skepticism. The prayer-time pattern’s specificity, the named agents, the documented recruitment chains, the confessional statements, provides Pakistan with a stronger evidentiary foundation than the vague accusations of Indian involvement that characterized earlier decades of the bilateral conflict.
The fourth implication concerns the future of the targeting pattern itself. If the prayer-time window closes due to behavioral adaptation by targets, what replaces it? The vulnerability matrix analyzed in this article suggests several alternatives: commercial locations (shops, businesses), travel routes, and residential approaches. Each offers lower predictability than the mosque window but also lower collateral damage risk and reduced ethical complications. The campaign’s evolution will likely be determined by the interplay between target adaptation and attacker innovation, the same dynamic that has characterized every sustained targeted-killing campaign in history from Mossad’s Wrath of God to the US drone program in Waziristan.
The fifth implication concerns Pakistan’s security establishment and its internal contradictions. Pakistan’s ISI and military have sheltered, funded, and operationally directed groups like LeT, JeM, and Hizbul Mujahideen for decades, using them as instruments of proxy warfare against India. The prayer-time targeting pattern exposes the fundamental vulnerability of this strategy: the same state infrastructure that protects terrorist commanders also makes them locatable. A leader who is sheltered by the ISI must communicate with the ISI, receive funding from the ISI, and operate within a network that the ISI monitors. If that network has been penetrated, whether by human assets, communication intercepts, or compromised intermediaries, then the ISI’s protection becomes a tracking mechanism. The prayer-time pattern may reflect not the failure of Pakistan’s security apparatus to protect its assets but the inherent vulnerability of a proxy-warfare model in an era where the adversary possesses sophisticated intelligence capabilities and the willingness to use them.
Rana Banerji, the former special secretary of RAW, has observed in public commentary that India’s counter-terrorism posture has undergone a fundamental transformation since the 2019 Balakot airstrikes. Before Balakot, India’s response to cross-border terrorism was primarily diplomatic: demarches, international pressure campaigns, and occasional surgical strikes limited to the Line of Control. After Balakot demonstrated that India would conduct airstrikes inside Pakistani territory, the operational envelope expanded. The shadow war and its prayer-time targeting pattern represent a further expansion of that envelope into the domain of sustained covert operations, a domain in which India had historically been reluctant to operate. The prayer-time pattern is, in this reading, not merely a tactical choice but a doctrinal declaration: India will pursue designated terrorists wherever they are, including inside mosques, including during prayer, including in Pakistan-occupied Kashmir.
The sixth implication touches the information dimension. India’s pro-government television channels began reporting on killings of designated terrorists almost simultaneously with the operations, in some cases before Pakistani authorities had confirmed the deaths. This information speed, which Pakistani officials characterized as evidence of Indian foreknowledge, serves a dual function. Domestically, it reinforces the narrative that Prime Minister Narendra Modi’s government acts decisively against terrorism, a narrative with significant electoral value. Internationally, it signals capability and reach to potential adversaries. The prayer-time pattern’s publicity, paradoxically, may be as strategically important as the killings themselves. A covert campaign that remains truly secret achieves its tactical objectives (eliminating targets) but forfeits its strategic benefits (deterrence through demonstrated capability). By allowing the killings to become semi-public, the campaign communicates to every LeT, JeM, and HM commander in Pakistan that their government cannot protect them, that their mosque attendance has been mapped, and that the question is not whether they are being watched but when the watching will produce consequences.
The prayer-time targeting pattern ultimately reveals something that extends beyond operational analysis into a deeper observation about the nature of covert warfare. The attackers have identified the intersection between religious obligation and physical vulnerability, the precise point where a target’s spiritual identity creates a window for lethal exploitation. This intersection exists because the targets are human beings whose lives include both operational activities (planning attacks, running networks, managing finances) and personal practices (prayer, community, worship). The campaign does not distinguish between these dimensions. It exploits the personal to reach the operational. Whether this exploitation represents a legitimate application of counter-terrorism doctrine or a transgression that undermines the moral authority of the state conducting it is a question that the prayer-time pattern poses but does not resolve.
The resolution, if one comes, will emerge not from the killings themselves but from their long-term consequences: whether the campaign deters future terrorism against India, whether the diplomatic costs exceed the operational gains, and whether the ethical compromises of targeting at sacred sites are ones that India’s democratic society is prepared to sustain indefinitely. The four bullets that struck Abu Qasim in the second row of Al-Quds mosque on a September Friday morning in Rawalakot answered the immediate question of whether India could reach its enemies inside mosques in Pakistan-occupied Kashmir. The Daska mosque operation, one month later, confirmed that the Rawalakot killing was not an anomaly but a replicable method. The two operations together, separated by thirty-three days and over 300 kilometers of Pakistani territory, established that the prayer-time targeting doctrine is geographically portable, operationally consistent, and strategically deliberate. The larger questions, about the limits of state violence in sacred spaces, about the proportionality of a campaign that accepts collateral damage in places of worship, about whether the mosques of Pakistan will remain hunting grounds or revert to sanctuaries, remain open. The trajectory of the campaign since 2021 suggests that the answers will be written in the operational record of future eliminations, and that the prayer-time window, for all its ethical complications, will continue to draw the attackers back to the one location where their targets cannot avoid being found.
Frequently Asked Questions
Q: Why are terrorists killed during prayers in Pakistan?
Mosques and prayer times offer the highest certainty of target presence of any location type available to the attackers. A target who varies his daily routine, changes his sleeping location, and rotates his travel routes will still attend the same mosque for the same prayer at a fixed time determined by religious obligation. The five daily prayers in Islam, particularly Fajr (predawn) and Dhuhr (noon) prayers, occur at predictable hours that vary only marginally with seasonal changes in daylight. The attackers exploit this predictability because it solves the fundamental challenge of targeted killing: confirming the target’s exact location at a specific moment. Prayer time is the one daily event that religious obligation makes inviolable, creating a behavioral constant that security awareness cannot override without abandoning the target’s religious identity.
Q: How many targeted killings have occurred at mosques in Pakistan?
Between March 2022 and October 2023, at least four confirmed killings of India-designated terrorists occurred at or near mosques and prayer locations in Pakistan. Abu Qasim was shot during Fajr prayer at Al-Quds mosque in Rawalakot on September 8, 2023. Shahid Latif was killed during morning prayers at a mosque in Daska, Sialkot, on October 11, 2023. Intelligence sources cited by The Tribune confirmed that JeM’s Ibrahim Mistry and Hizbul Mujahideen’s Imtiaz Alam were also killed during prayers earlier in the same campaign. Additional killings at predictable locations such as shops and daily commute routes (Sardar Hussain Arain in Nawabshah, Zahoor Mistry in Karachi) follow the same operational logic of exploiting fixed-time, fixed-location behavioral patterns.
Q: How do the attackers know which mosque a target attends?
The attackers determine mosque attendance through sustained surveillance that likely combines human intelligence and technical monitoring. Human intelligence assets positioned within the target’s community or organizational network can report which mosque the target frequents, which prayer he prioritizes, and whether his attendance is daily or periodic. Technical surveillance, including phone tracking and communication intercepts, can corroborate human reporting. In the Abu Qasim case, the attackers knew not only which mosque he would attend but that he had stayed overnight as a guest of the prayer leader, intelligence that could only have come from someone with direct knowledge of Qasim’s movements on that specific evening.
Q: Does mosque targeting violate international law?
The legal status of mosque targeting depends on the applicable legal framework. International humanitarian law protections for religious sites, including Additional Protocol I to the Geneva Conventions, apply in armed conflicts. Whether the shadow war constitutes an armed conflict under international law is disputed. Outside armed conflict, targeted killings fall under the law enforcement paradigm governed by human rights law, where the location of a killing is less legally significant than whether lethal force was necessary and proportionate. The targeted killing of Hardeep Singh Nijjar outside a Sikh temple in Canada and the killing of Abu Qasim inside a mosque in PoK both occurred at places of worship, raising similar legal questions about whether protected religious spaces can serve as targeting locations.
Q: What time of day do most mosque killings occur?
The documented cases show a concentration during Fajr (predawn) and morning prayer times. Abu Qasim was killed during Fajr prayer at approximately 4:30 AM. Shahid Latif was killed during morning prayers. Fajr prayer offers the optimal operational window because it occurs before dawn when streets are empty, bystander presence is minimal, visibility is low, and the surrounding community is largely asleep. These conditions maximize the attacker’s ability to approach, execute, and escape without detection. The mosque itself is typically dimly lit during Fajr, further reducing the congregation’s ability to identify the attacker before the shooting begins.
Q: Do the attackers enter the mosque or wait outside?
Both approaches have been documented. In the Abu Qasim killing, the primary attacker entered the mosque and positioned himself behind Qasim in the congregation before firing, while a second attacker waited on the veranda. In the Shahid Latif killing, three gunmen entered the mosque and opened fire during prayers. In Pakistan’s Foreign Secretary’s presentation, the Muhammad Riaz (Abu Qasim) killing was described as occurring inside the mosque, while the Shahid Latif killing was described as occurring “outside a mosque.” This discrepancy may reflect different definitions of “inside” versus “outside” (the mosque courtyard, entrance area, or interior prayer hall) or differing accounts from Pakistani authorities.
Q: Has any mosque killing resulted in civilian casualties?
Yes. The Shahid Latif killing on October 11, 2023, in Daska produced three deaths: Latif himself, his security guard Hashim Ali, and prayer leader Maulana Ahad, who was shot during the attack and died of his wounds the following day in hospital. Maulana Ahad was not a designated terrorist or an alleged participant in any attack on India. His death represents confirmed collateral damage from a mosque-based targeted killing. No civilian casualties were reported in the Abu Qasim killing in Rawalakot, where the attacker appears to have fired exclusively at the designated target.
Q: Why does no group claim responsibility for the mosque killings?
The absence of responsibility claims is itself a signature of the campaign. Criminal violence in Pakistan, sectarian killings, inter-organizational warfare, and TTP attacks are almost always claimed or attributable to known groups. Operations where no organization steps forward, where the attackers vanish and the only attribution comes from state-level counterintelligence investigations alleging foreign intelligence involvement, fit the profile of state-sponsored covert action designed for plausible deniability. India has categorically denied involvement in all extrajudicial killings on Pakistani soil.
Q: Is the mosque targeting pattern evidence of a single orchestrating agency?
The consistency of the pattern across multiple cities (Karachi, Rawalpindi, Nawabshah, Rawalakot, Daska), multiple organizational targets (LeT, JeM, HM, JuD), and multiple provinces (Sindh, Punjab, PoK) argues strongly against coincidental or copycat violence. The shared characteristics, specifically the targeting of India-designated terrorists at predictable locations using motorcycle-borne or close-range firearm assailants with no subsequent claim of responsibility, suggest centralized planning and dispersed execution. Whether that central planning originates from India’s RAW, as Pakistan alleges, or from another source, the operational uniformity implies a single doctrine applied across different tactical environments.
Q: How does the prayer-time pattern compare to other targeted-killing campaigns globally?
Israel’s Mossad, in Operation Wrath of God and subsequent campaigns, targeted Palestinian operatives at apartments, hotels, and street locations but there is no documented case of Mossad killing a target inside a mosque during prayers. The US drone campaign in Pakistan’s tribal areas and Yemen struck targets at residential compounds, vehicle convoys, and training camps, generally avoiding religious sites partly due to collateral damage concerns and partly because drone surveillance could track targets to less complicated locations. India’s prayer-time pattern, if correctly attributed, represents a more aggressive approach to location selection than either precedent.
Q: What weapons are used in mosque killings?
The documented cases describe close-range firearms, likely pistols or compact automatic weapons. In the Abu Qasim killing, four rounds were fired at point-blank range. The Shahid Latif killing involved sufficient firepower to strike three people. Close-range weapons are consistent with the operational requirements of mosque targeting: the attacker must conceal the weapon while entering the congregation, fire at close range with lethal accuracy, and retain the weapon during escape (no documented cases describe weapons abandoned at the scene).
Q: Can Pakistani police prevent mosque killings?
Pakistani police have not prevented a single confirmed mosque killing in the shadow war pattern. The operational speed of the attacks, which involve entry, execution, and escape within seconds, makes real-time police intervention virtually impossible. The predawn timing of Fajr-prayer killings further reduces the likelihood of police presence near the mosque. Pakistan’s Inspector General of Police for Punjab acknowledged the challenge after the Shahid Latif killing, noting that three investigation teams were formed after the event but making no claim of advance intelligence or prevention capability. The Pakistan Army was placed on high alert after the Rawalakot killing, suggesting that military rather than police resources are viewed as the appropriate response tier.
Q: Did Pakistan arrest anyone for the mosque killings?
Pakistan claims to have apprehended Muhammad Abdullah Ali in connection with the Abu Qasim killing. According to Pakistan’s Foreign Secretary, Ali was captured on September 15, 2023, seven days after the killing, while boarding a flight at Jinnah International Airport in Karachi. His interrogation allegedly revealed recruitment by Indian agents through the Telegram messaging platform, with weapons and payments provided through intermediaries. In the Shahid Latif case, Pakistan’s Punjab Police IGP stated that “most of the suspects” had been arrested, though details of those arrests and any subsequent prosecution remain unclear.
Q: What does the prayer-time pattern reveal about India’s intelligence capability in Pakistan?
The prayer-time pattern implies a multi-layered intelligence capability operating within Pakistan. Strategic intelligence identifies and prioritizes targets from India’s most-wanted lists. Locational intelligence determines which mosque each target attends and which prayer they observe. Tactical intelligence provides day-of confirmation that the target is present. Execution relies on locally recruited assets who can enter Pakistani mosques without arousing suspicion. This capability suggests either embedded human intelligence networks in Pakistani cities or a sophisticated technical surveillance architecture, or both, operating continuously across multiple geographic regions.
Q: Are the mosque killings connected to the allegations from the US and Canada against Indian intelligence?
Pakistani officials and analysts have drawn explicit connections between the mosque killings in Pakistan and the US/Canada allegations regarding Gurpatwant Singh Pannun and Hardeep Singh Nijjar. The operational methodology shares common features: the use of intermediaries based in third countries, recruitment of local proxies through digital communication platforms, payment through informal hawala networks, and the targeting of individuals designated as threats by the Indian government. Pakistan’s Foreign Secretary presented these cases alongside the Pakistani killings as evidence of a global Indian assassination program. India has denied involvement in all cases.
Q: Is the prayer-time targeting pattern likely to continue?
The pattern’s continuation depends on the interplay between operational effectiveness and behavioral adaptation. As terrorist commanders become aware that mosques represent high-risk locations, they may alter their prayer habits, attend different mosques on irregular schedules, or pray at home rather than in congregations. Such adaptations reduce the reliability of the mosque window and force the campaign to develop alternative targeting methodologies. The fundamental constraint, however, is that abandoning mosque attendance carries organizational costs for leaders of jihadist movements whose authority derives partly from religious legitimacy. A commander who stops attending congregational prayers undermines his standing within his own organization.
Q: How do mosque killings affect Pakistan’s security establishment?
The mosque killings represent a direct challenge to Pakistan’s internal security apparatus. Each killing on Pakistani soil, particularly inside mosques in cities like Rawalakot (in PoK, which Pakistan administers) and Daska (in Punjab, Pakistan’s most populous province), demonstrates that Pakistan’s security services cannot protect even high-value individuals within their own territory. The Pakistan Army’s high-alert response after the Rawalakot killing and the Punjab Police’s formation of multiple investigation teams after the Daska killing reflect institutional awareness that these operations constitute a security failure with political consequences.
Q: What is the relationship between the Dhangri attack and Abu Qasim’s mosque killing?
Abu Qasim was identified by Indian intelligence as the alleged mastermind of the Dhangri village attack on January 1, 2023, in which terrorists opened indiscriminate fire in a Hindu-majority village in Rajouri district, Jammu and Kashmir, killing seven civilians and injuring thirteen. An IED placed at the scene detonated the following morning. Nine months after the Dhangri attack, Qasim was killed during Fajr prayers at Al-Quds mosque in Rawalakot. The nine-month timeline represents one of the fastest attack-to-elimination sequences documented in the shadow war, suggesting that the Dhangri massacre elevated Qasim from a regional commander to a priority target whose elimination justified the risk of operating inside Pakistan-occupied Kashmir.
Q: How does the prayer-time pattern affect Pakistan’s diplomatic position internationally?
Pakistan has used the mosque killings as a centerpiece of its international campaign against India. The specific details of the pattern, killing designated terrorists during prayer in places of worship, provide Pakistan with a morally charged narrative that resonates with Muslim-majority countries and international audiences concerned about religious site protections. The death of prayer leader Maulana Ahad alongside Shahid Latif in Daska gives Pakistan a concrete example of collateral civilian harm at a religious site. Pakistan’s Foreign Secretary’s January 2024 presentation placed the prayer-time killings alongside the US and Canada allegations against Indian intelligence, constructing a narrative of a systematic global Indian assassination program. India’s categorical denials face increasing scrutiny as multiple countries present similar allegations with converging operational details.
Q: Could the prayer-time targeting pattern be attributed to Pakistani internal security operations rather than India?
Pakistan’s own security forces and intelligence agencies have a documented history of extrajudicial operations against militants, particularly TTP fighters in the tribal areas and Baloch separatists in Balochistan. Some analysts have raised the possibility that the prayer-time killings could be conducted by Pakistani security forces seeking to eliminate liabilities, commanders whose continued existence creates diplomatic problems for Pakistan under FATF scrutiny. This theory is weakened by three factors: every target is specifically on India’s most-wanted list rather than Pakistan’s internal threat list, the Pakistani government has officially blamed India rather than claiming the operations as its own counter-terrorism success, and the operational methodology (recruited proxies directed through intermediaries in third countries) would be unnecessarily complex if Pakistani security forces were acting on their own territory.