One year following the terror attack that claimed the lives of 26 people in Pahalgam, the Army and other security forces have made significant changes to improve the security apparatus of the region, which also includes the Baisaran Valley and other tourist destinations in Kashmir.Many of these changes—such as the deployment of troops, the procurement of modern weapons and technologies, improved intelligence gathering and sharing, and better coordination among all security agencies and better prevention of infiltration—have comprised both immediate reactive steps and subsequent proactive measures to prevent such incidents in the valley.Immediate measuresSoon after the Pahalgam attack, the Army conducted a security audit of popular tourist areas in the Valley. The audit was aimed at considering a limited redeployment of its existing troops in the hinterlands of Kashmir to areas deemed vulnerable.As many as 49 tourist spots were closed off to tourists after an audit of close to 87 places across the valley.It is also understood that a dynamic deployment of troops in the higher reaches was put into place in a bid to prevent infiltration of terrorists from across the border and to deny them hideouts.Additionally, extensive patrols for operations and area domination across the Valley floor and in the higher reaches were part of the Army’s summer strategy.Immediate measures implemented after the Pahalgam terror attack also included setting up more temporary operating bases — where troops can operate for a fixed period of 72-96 hours. The ones existing were put into maximum use so that security forces can dominate and carry out search operations in larger areas.Proactive stepsMultiple steps have been implemented over the last year to monitor and curb infiltration of terrorists from across the border, one of which is to enhance the existing infiltration grid by using the latest technologies.Story continues below this adAdditional cameras, smaller drones, and other night surveillance devices have been deployed to monitor the LoC and the areas across the border and prevent infiltration. The goal is to proactively strengthen security along the Line of Control, including reinforcing the fence by adding more surveillance devices in areas where there are gaps.In case of a probable breach, the likely routes into the hinterland are also being monitored, both by surveillance devices, including drones, and by enhanced physical patrolling by troops. Temporary Operating Bases are also established regularly at prominent locations, enabling troops to dominate areas away from their permanent bases.Additional changes include a focus on better human intelligence, putting in additional police and CRPF detachments closer to vulnerable areas and relocating some of the existing ones. Additionally, they have established lateral communication lines with the Army posts in the vicinity to reduce reaction time in the instance of an incident. The Area of Responsibility for all forces has been clearly demarcated since.Focus on dronesAside from real-time lateral communication between security forces to reduce response time in case of any incident, there has been a focus on better information and intelligence sharing between all agencies involved.Story continues below this adThe Army, both at the central and the command levels, have undertaken procurement of a variety of drones for surveillance of the LoC, identified vulnerable areas.Some of the drones being procured have surveillance cameras, offering them better coverage of the area. Drones that can be armed with grenades are also being procured.All-terrain vehicles are being procured for faster reaction time to any possible incident by the security forces, as they can travel through difficult terrains.Procurement of counter-drone systems to offer an effective umbrella against incoming aerial threats—a key lesson drawn from Operation Sindoor launched two weeks after the Pahalgam terror attack—is also being carried out in large scale.Story continues below this adAdditional deployment of Special Forces has been carried out in the higher reaches for operations. Seek and Destroy missions are being executed by troops by combing through areas, seeking encounters with terrorists in hiding, searching for hideouts. The hideouts are destroyed in such operations to deny the terrorists suitable places to hide, thus forcing them out in the open.The use of Integrated Command Control Systems, which include a strengthened fence, surveillance cameras and drones automatically launched using AI, is also being established, people familiar with the developments said.Amrita Nayak Dutta writes on defence and national security as part of the national bureau of The Indian Express. In the past, Amrita has extensively reported on the media industry and broadcasting matters, urban affairs, bureaucracy and government policies. In the last 14 years of her career, she has worked in newspapers as well as in the online media space and is well versed with the functioning of both newsrooms. Amrita has worked in the northeast, Mumbai and Delhi. She has travelled extensively across the country, including in far-flung border areas, to bring detailed reports from the ground and has written investigative reports on media and defence. She has been working for The Indian Express since January 2023. ... Read More © The Indian Express Pvt LtdTags:Express Explained