Indian Army soldier – Artifex.News https://artifexnews.net Stay Connected. Stay Informed. Mon, 02 Sep 2024 06:50:34 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://artifexnews.net/wp-content/uploads/2023/08/cropped-Artifex-Round-32x32.png Indian Army soldier – Artifex.News https://artifexnews.net 32 32 Soldier Injured After Terrorists Open Fire At Jammu’s Sunjwan Military Station https://artifexnews.net/soldier-injured-after-terrorists-open-fire-at-jammus-sunjwan-military-station-6471290rand29/ Mon, 02 Sep 2024 06:50:34 +0000 https://artifexnews.net/soldier-injured-after-terrorists-open-fire-at-jammus-sunjwan-military-station-6471290rand29/ Read More “Soldier Injured After Terrorists Open Fire At Jammu’s Sunjwan Military Station” »

]]>

An Army soldier was injured at Jammu’s Sunjwan military station after terrorists opened fire.

Jammu (Jammu and Kashmir):

One Indian Army soldier was injured on Monday at Jammu’s Sunjwan military station after terrorists opened fire, officials said.

As per Defence officials, terrorists fired from a stand-off distance from outside the base.

More details are awaited.

On Thursday, Indian Army successfully eliminated three terrorists attempting to infiltrate across the Line of Control (LoC) in Machhal and Tangdhar sector of Jammu and Kashmir.

“Credible inputs were received from intelligence agencies, which was further corroborated by J-K Police regarding likely infiltration attempts from these areas. Based on the inputs, troops of the Indian Army, JKP and BSF laid ambushes on likely infiltration routes in both Machhal and Tangdhar sector,” an official release said.

On the evening of August 28, suspicious movement was detected following which firing commenced that went on till early August 29 morning.

Notably, this is the 6th operation in the Kupwara district this year, which has now resulted in the killing of 10 terrorists including foreign infiltrators.

(Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)



Source link

]]>