On the night of April 2, 2026, Uttar Pradesh's Anti-Terrorism Squad quietly prevented what could have been one of the most damaging attacks on India's railway network in recent years. Four men were arrested. A plan was stopped. But the story behind those four arrests is far more disturbing than a single headline can convey.
The Uttar Pradesh Anti-Terrorism Squad arrested four members of a suspected terror module who were allegedly planning attacks on key installations, including railway infrastructure.
The immediate target was Lucknow's Charbagh railway station, one of the busiest railway hubs in northern India. On April 2, the group had allegedly planned to carry out an explosive attack near the Lucknow railway station, targeting railway signalling systems and other infrastructure. An ATS team intercepted and arrested the accused before the plan could be executed.
The four men arrested are Saqib alias "Devil" (25), a resident of Meerut; Vikas Gehlawat alias Raunak (27); Lokesh alias Papla Pandit alias Babu alias Sanju (19), both residents of Gautam Buddh Nagar; and Arbaab (20) from Meerut.
These are not high-profile names. They are young men, the oldest is 27, and the youngest is just 19. And that, in itself, is a troubling detail worth sitting with.
None of this, according to investigators, was homegrown. Acting on intelligence inputs, the ATS unearthed a network of individuals who were allegedly in contact with Pakistan-based handlers through social media platforms and engaged in anti-national activities aimed at spreading fear and causing economic damage.
The key figure linking the group to foreign direction appears to be a man named Abu Bakr, based in Pakistan. Abu Bakr allegedly radicalised the suspects by sending religious extremist videos and trained them in time-bomb making. A separate handler named Aqib was also identified, with a video surfacing showing him brandishing an AK-47, reportedly from Dubai.
The communication channels used were not casual. The main operative, Saqib, was in touch with handlers via encrypted platforms such as Telegram, Signal and Instagram, and had links with radical groups. Foreign phone numbers, including those from Afghanistan, were found in his contact list. This is a modern terror operation which is run not through secret meetings in dark rooms, but through apps that millions of ordinary people use every day.
What makes this case alarming is the scale of what was being plotted. Investigators say the group's ambitions went well beyond one railway station.
The suspects were allegedly planning serial blasts at various malls and buildings, setting fires in parking areas using chemical explosives, and sabotaging trains. Their plans also included targeting vehicles with Hindu religious symbols to incite communal violence and attacking leaders in West UP, including RSS members. On the railway front specifically, the suspects had plotted to derail long-distance trains by targeting signal boxes and railway tracks with explosives, potentially causing collisions. India's rail network carries millions of passengers every single day. A deliberate attack on signal infrastructure does not just destroy property; it can send trains into each other at full speed.
The group had also conducted an investigation in cities including Ghaziabad, Aligarh and Lucknow, sharing videos and Google location details of potential targets with their handlers. This was not impulsive. It was planned, mapped and reported back to foreign supervisors.
One of the most revealing aspects of this case is how the group was being funded and managed. The accused had carried out minor arson incidents at a few locations and sent videos of these acts to their handlers in exchange for money transferred through QR codes.
Think about that for a moment. Small fires, filmed on a phone, are uploaded to a Pakistani contact, and money arrives in return through a QR code scan. It is an effective system, and it shows how low the barrier to entry has become for this kind of activity. Investigations also revealed that funds were being sent from abroad to support large-scale attacks, with additional money expected soon.
When police examined the suspects' phones, they found that the accused had formatted their mobile phones to erase evidence. However, forensic teams successfully recovered data showing communication with Pakistani handlers, detailed tracking of time and location, and instructions to gather intelligence on India's security agencies and the National Security Advisor.
The attempt to wipe phones is telling, and these men knew what they were doing was serious enough to hide.
Perhaps the most unsettling element here is how ordinary these individuals appear. Vikas's family originally hailed from Haryana and relocated to Noida around 20 years ago. Villagers describe him as simple-natured, with no previous criminal record. The family works in brickwork and house maintenance.
There is no prior history of trouble. No red flags that neighbours noticed. This is exactly what makes radicalisation through social media so dangerous that it does not require a dramatic transformation. It happens quietly, through a phone screen, one video at a time.
A case has been registered under the relevant sections of the Bharatiya Nyaya Sanhita and the Unlawful Activities (Prevention) Act. Officials said the group was working with the intent to harm India's sovereignty, unity and integrity by rewriting acts of sabotage and terror under foreign directions.
This arrest is a reminder that India's internal security challenge is no longer just about borders or battlefields. It is about encrypted apps, QR code payments, YouTube-style radicalisation videos, and young men in ordinary neighbourhoods being turned into instruments of violence by people sitting safely in another country.
References: