Abstract
The Indian Mujahideen (IM) has carried out numerous bombings, including those at crowded city markets, transportation hubs, and commercial districts. This chapter discusses IM’s primary mode of attack, bombs planted at targets. This chapter shows close connections between bombings carried out by IM and prior arrests of IM operatives, IM communications about their operational campaign, membership of IM operatives in other groups such as SIMI, LeT and HuJI, as well as diplomatic initiatives between India’s government and the government of Pakistan. In addition, structural conditions such as Hindu-Muslim tensions within India play an important role in predicting bombings by IM.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Another possible suspect is HuJI, an Islamist group with origins in Pakistan from the early 1980s during the Soviet occupation of Afghanistan.
- 2.
And, of course, there are many who believe that IM is just an arm of LeT.
- 3.
It should be noted that the range of deaths of 0–69 includes bombings in which no one was killed, not months in which no bombings occurred.
- 4.
Many noted scholars however, including former CIA operative Bruce Reidel (2013), assert that Musharraf was playing a double game, using LeT as a proxy force to carry out his goals and then blaming them for whatever went wrong.
References
Associated Press (2009) Bombay mourns bombing victims. February 11. http://www.cbsnews.com/2100-202_162-1815512.html.
BBC News (2005) Hindus protest at Ayodhya attack., July 6 http://news.bbc.co.uk/2/hi/south_asia/4654593.stm.
Fair C (2010) Students Islamic Movement of India and the Indian Mujahideen: an assessment, Asia policy, January.
Gupta S (2011) Indian Mujahideen: the enemy within. Hachette, Gurgaon.
NDTV (2010) Pune blast: The Indian Mujahideen connection? February 15. http://www.ndtv.com/article/cities/pune-blast-the-indian-mujahideen-connection-16293.
Polgreen L, Mekhennet S (2009) Militant network is intact long after Mumbai siege. The New York Times September 29, 2009. http://www.nytimes.com/2009/09/30/world/asia/30mumbai.html?_r=1&ref=world.
Raman B (2011) past threats of Indian Mujahideen (IM) against judiciary analysis. Eurasia Review News and Analysis September 7. http://www.eurasiareview.com/07092011-past-threats-of-indian-mujahideen-im-against-judiciary-analysis/.
Roul A (2010) After Pune, details emerge on the Karachi Project and its threat to India. CTC Sentinel April 3 http://www.ctc.usma.edu/posts/after-pune-details-emerge-on-the-karachi-project-and-its-threat-to-india.
Subrahmanian VS, Mannes A, Shakarian J, Sliva A, Dickerson J (2012) Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer, New York.
Swami P (2008) Not just a claim, a manifesto for jihad, The Hindu May 17 http://www.hindu.com/2008/05/17/stories/2008051754761100.htm.
The News (2010) JUD not a soft underbelly: Musharraf, The News. October 10 http://www.thenews.com.pk/latest-news/2638.htm.
TNN (2008) Indian Mujahideen, another face of SIMI., Times of India August 17 http://articles.timesofindia.indiatimes.com/2008-08-17/ahmedabad/27929682_1_simi-members-serial-blasts-safdar-nagori.
TNN (2011) Mumbai blasts: Indian Mujahideen duo in focus, fears grow of bigger strike in Gujarat., Times of India July 16 http://articles.timesofindia.indiatimes.com/2011-07-16/india/29781629_1_im-operatives-im-module-terror-attacks.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Subrahmanian, V.S., Mannes, A., Roul, A., Raghavan, R.K. (2013). Bombings. In: Indian Mujahideen. Terrorism, Security, and Computation. Springer, Cham. https://doi.org/10.1007/978-3-319-02818-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-02818-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02817-0
Online ISBN: 978-3-319-02818-7
eBook Packages: Computer ScienceComputer Science (R0)