A newly declassified OSINT Intelligence Report has exposed the high-security digital infrastructure of The Resistance Front (TRF) in Kashmir. This investigative audit reveals the transition of militant coordination from the battlefield to encrypted “Communication Centers” on platforms like WhatsApp, Signal, and Nandbox.
Active since late 2023, these networks are currently being used to coordinate “lightning strikes” against high-value targets. The intelligence confirms that the group has moved beyond mere propaganda, now conducting digital “drills” that mirror the real-world movements of security forces.
Critical findings in the full report include:
- Infrastructure Targets: Specific threat analysis regarding upcoming attacks on the Z-Morh Tunnel, railway projects, and foreign-funded installations.
- Operational Geography: Confirmed presence and surveillance activities in Sonamarg and Ganderbal.
- The “Hit List“: A detailed breakdown of identified “collaborators,” including intelligence informants and local figures marked for targeted violence.
- Network Forensics: A complete list of 83 Signal group members and usernames, providing a rare look into the cadre’s digital hierarchy.

Important Links
The TRF Kashmir centre has started a communication ccenter at (https://whatsa**************).
- ********** Members.
- Starting Date: 2*/2**/20** Till now.
Languages: **********
WhatsApp; https://whatsapp********
Signal; https://signal.group**********
Nandbox; https://join.ndbx.*************
-
Threat Analysis ;
Group name; The resistance front
location ; So**** and Gan*****, India
Coordinates; 34°1**************/ 34.*********************


