BSF Jawan Injured in IED explosion in Chhattisgarh’s Kanker

A BSF jawan was injured in an IED blast by Naxalites during a defuse operation in Chhattisgarh's Kanker district in India. [Representational Image via Indian Express]

An improvised explosive device (IED) planted by Naxalites exploded while a Border Security Force (BSF) team was trying to defuse it, injuring a jawan in Chhattisgarh’s Kanker district on Sunday, police said.

The blast occurred around 9.30 am on the Hetarkasa village road near Panidobir camp. A team of security personnel was conducting an area domination operation at the time. Kanker Superintendent of Police, Indira Kalyan Elesela, said this. During patrolling, the BSF team detected an IED planted by Maoists, he said.

When the BSF team tried to neutralize the IED, it exploded, injuring BSF jawan B Ishwar Rao with minor injuries to his hand and face, police said.

The SP said that medical personnel administered preliminary treatment to the injured jawan and shifted him to a hospital for further medical attention.

Union Home Minister Amit Shah arrived at Raipur around 1.30 am on Sunday on a two-day visit to the state. He will attend programmes in Raipur and Bastar districts.

Also See: Bangladesh Summons Indian Envoy After Consular Building Attack

This news is sourced from Indian Express and is intended for informational purposes only.

News Desk

Your trusted source for insightful journalism. Stay informed with our compelling coverage of global affairs, business, technology, and more.

Recent

AI, Extremism, and the Weaponization of Hate: Islamophobia in India

AI, Extremism, and the Weaponization of Hate: Islamophobia in India

AI is no longer a neutral tool in India’s digital space. A growing body of research shows how artificial intelligence is being deliberately weaponized to mass-produce Islamophobic narratives, normalize harassment, and amplify Hindutva extremism. As online hate increasingly spills into real-world violence, India’s AI-driven propaganda ecosystem raises urgent questions about accountability, democracy, and the future of pluralism.

Read More »
AQAP’s Threat to China: Pathways Through Al-Qaeda’s Global Network

AQAP’s Threat to China: Pathways Through Al-Qaeda’s Global Network

AQAP’s threat against China marks a shift from rhetoric to execution, rooted in Al-Qaeda’s decentralized global architecture. By using Afghanistan as a coordination hub and relying on AQIS, TTP, and Uyghur militants of the Turkistan Islamic Party as local enablers, the threat is designed to be carried out far beyond Yemen. From CPEC projects in Pakistan to Chinese interests in Central Asia and Africa, the networked nature of Al-Qaeda allows a geographically dispersed yet strategically aligned campaign against Beijing.

Read More »
The Enduring Consequences of America’s Exit from Afghanistan

The Enduring Consequences of America’s Exit from Afghanistan

The 2021 US withdrawal from Afghanistan was more than the end of a long war, it was a poorly executed exit that triggered the rapid collapse of the Afghan state. The fall of Kabul, the Abbey Gate attack, and the return of militant groups exposed serious gaps in planning and coordination.

Read More »
The Afghan Crucible

The Afghan Crucible

Recent reporting underscores Afghanistan’s transformation into a strategic hub for transnational jihadist networks. Far from being a localized security problem, the Afghan landscape now functions as an ideological, logistical, and digital anchor linking extremist affiliates across Africa, Southeast Asia, and beyond, signaling the collapse of regional containment and the rise of a globalized threat architecture.

Read More »
Economic Statecraft and the New Geography of Power in Regional Politics

Economic Statecraft and the New Geography of Power in Regional Politics

Strategic competition has moved beyond decisive wars toward a subtler synthesis of economic leverage, proxy networks, and calibrated force. Infrastructure, finance, and trade routes now function as instruments of power, quietly reshaping regional orders while preserving the façade of restraint. In this environment, security is no longer confined to the battlefield but embedded in supply chains, data networks, and development choices, forcing states to rethink deterrence, sovereignty, and resilience.

Read More »