The Dramatic Multi-State Bust
In a swift intelligence-led operation, the Delhi Police Special Cell arrested four individuals suspected of being part of an ISIS-inspired terror module operating across three states. The arrests, carried out over a weekend in early April 2026, prevented what could have been a major threat to the national capital. The suspects were nabbed from Maharashtra, Odisha, and Bihar, highlighting the interstate nature of the network and the growing challenge of online-driven extremism.
The operation underscores the vigilance of India's law enforcement amid rising concerns over digital radicalisation. Officials revealed that the group was in the early stages of planning but had already conducted reconnaissance at high-profile sites in Delhi, signaling potential for escalation.
Profiles of the Accused
The four men arrested hail from diverse backgrounds but share a common thread of online exposure to extremist ideologies. Mosaib Ahmad, also known by aliases Sonu and Kalam, from Thane in Maharashtra, was one of the key figures. Mohammad Hammad, another from Mumbai, was involved in coordinating communications. Sheikh Imran from Bhubaneswar, Odisha, and Mohammad Sohail from Katihar, Bihar, rounded out the group.
These individuals, mostly in their 20s and 30s, were reportedly ordinary citizens prior to radicalisation—some employed in regular jobs, others students or unemployed. Their transformation illustrates how everyday people can be drawn into dangerous paths through targeted online content, away from traditional recruitment hubs.
Online Radicalisation: The Digital Pathway
Central to this case is the role of encrypted social media groups and closed digital platforms where the suspects exchanged propaganda. They were influenced by sermons from preachers like Zakir Naik, Tareek Jameel, and Israr Ahmed, blending religious discourse with calls for violence. Discussions revolved around forming a 'Khurasan-based lashkar'—a reference to ISIS-Khorasan Province—and participating in 'Ghazwa-e-Hind', a prophesied conquest of India.
Investigators noted crowdfunding attempts via QR codes and bank transfers to fund activities. This mirrors a broader trend where platforms like Telegram and WhatsApp serve as echo chambers, amplifying extremist narratives without physical meetings. In India, such online modules have proliferated, evading traditional surveillance.
Seized Materials and Foiled Plot
Raids yielded critical evidence: materials for improvised explosive devices (IEDs), including ball bearings, nails, remote-controlled toy cars for detonation, and electronic components like motherboards and pH checkers. Mobile phones contained incriminating chats and reconnaissance photos from Delhi's Red Fort and India Gate, visited in December 2025.
Potential targets included symbolic sites like the Ram Mandir and Parliament. The module aimed to assemble locally sourced bombs for low-tech, high-impact attacks. A possible link to the Red Fort blast adds gravity, though unconfirmed. The FIR under Bharatiya Nyaya Sanhita provisions ensures rigorous prosecution. NDTV reports detailed the seizures.

Ideological Underpinnings: ISIS Echoes
The suspects espoused ISIS hallmarks: dreams of a caliphate, jihad against perceived enemies, and Ghazwa-e-Hind—a medieval prophecy twisted into modern propaganda for conquering India. ISIS-Khorasan's materials, disseminated online, fueled their resolve. While no direct overseas handlers were found yet, the ideology aligns with global jihadist calls.
This isn't isolated; NIA has dismantled dozens of similar modules since 2020, often inspired by ISIS propaganda magazines like 'Voice of Hind'.
Delhi Police Special Cell's Role
The Special Cell's proactive intel disrupted the network before execution. DCP Praveen Kumar Tripathi highlighted the encrypted groups' focus on extremism and recruitment. Ongoing probes trace finances and digital footprints, with possible expansions to other states. This success builds on their track record, including gallantry awards for prior ops in 2026.
Rising Tide of Online Radicalisation in India
Online radicalisation has surged, with India witnessing over 100 ISIS-related arrests since 2020 per NIA data. Kerala remains a hotspot, but cases span Maharashtra, UP, and beyond. Encrypted apps bypass monitoring, targeting youth via tailored content. Stats show 127 ISIS cases involved self-radicalisation via videos, per investigations.
Challenges include vast digital space and cross-border servers. ORF analysis notes early radicalisation roots.
Past Busts and National Response
- 2025: NIA raids 19 places across 8 states on ISIS module.
- 2024: Delhi Police nabbed Rizwan Ali, Rs 3 lakh bounty ISIS terrorist.
- 2023: UP ATS busted ISI-linked module with 4 arrests.
govt measures: MHA's Counter-Radicalisation Division, NIA's cyber focus, platform takedowns. Yet, modules persist, demanding AI surveillance and community outreach.
Expert Perspectives
Security analysts praise the bust but warn of sleeper cells. Counter-terror experts stress de-radicalisation programs and parental monitoring. Ajai Sahni notes online anonymity fuels growth, urging international cooperation. Balanced views emphasize distinguishing ideology from community to avoid alienation.

National Security Implications
This bust averts immediate danger but signals persistent ISIS appeal via digital means. Urban youth vulnerability raises alarms for soft targets. Interstate coordination shows maturing networks, straining resources. Links to past blasts like Red Fort underscore unresolved threads.
Photo by Martijn Vonk on Unsplash
Path Forward: Vigilance and Solutions
Strengthen cyber policing, AI content moderation, school awareness. International pacts against propaganda vital. Community leaders' role in counter-narratives key. India's robust framework—NIA, state ATS—must evolve with tech threats for safer future. NIA's ongoing efforts exemplify resolve.
