wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Pilgrimage at LOC: A privilege and a paradox

profile
Navin Karpe
May 22, 2022
3 Likes
4 Discussions
164 Reads

Chicken, rice and the traditional saag were packed in our picnic baskets. It was a day-long trip – food wouldn’t be available on the way. We left our guesthouse in Reshwari and walked to the assembly point, 10 minutes away. Ours was the last pick-up.

We had registered for this trip the previous day by submitting our identity cards and photographs. A tourism officer and his wife were also visiting Reshwari. They had asked us if we would be interested in visiting the shrine of Peer Baba. We had just returned from the Amarnath yatra and weren’t really kicked about another religious trip so soon. 

However, this was a day-long trip. And saying no to a chance of visiting a place we’d never heard of is sacrilege. We agreed to join them on this “outing” to Peer Baba.

A “convoy” to visit Peer Baba’s shrine

Soon, a fleet of seven Tata Sumos arrived. Each jeep had a list of passengers put up on the front. We were supposed to sit in the jeep assigned to us. We were impressed with the management of the tour company in this small village of Reshwari in northern Kashmir. 

The assembly point turned out to be gates of the Indian Army post. We were greeted by an officer, dressed impeccably in his Indian Army uniform. It was our first time shaking hands with an officer on duty. He asked us all to be seated in the jeeps. “Trucks aate hi honge”, (Trucks will be here soon), he said.

We assumed the trucks would be carrying supplies for the villages near the Peer Baba shrine. Since it was such a remote place that access to basic necessities would be tough, we figured.

Instead, what arrived were two trucks of the Indian Army. The seven jeeps now also started moving ahead, led and trailed by these trucks! This wasn’t a group tour – this was a convoy!

 

 

 


Comments ()


Sign in

Read Next

GraphQL

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Deadlocks in Operating Systems

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Importance Of Blockchain

Blog banner

Senseless Teeths

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

VPN

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Outlook.com

Blog banner

What is Amazon?

Blog banner

Modern Operating Systems

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Cyber Security Control

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Access management

Blog banner

What your Favorite colour says about You?

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

RACI model in IT services

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Busted : Common Web Security Myths

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Deadlock in Operating systems

Blog banner

Consumer to consumer business mode

Blog banner

Deadlock

Blog banner

INTRODUCTION TO C#

Blog banner

Modern Operating System

Blog banner

Love is in air.....

Blog banner

VIRTUAL MEMORY

Blog banner

What is thread and alse multithreading

Blog banner

Precision-Recall in Data Science

Blog banner

SESSION HIJACKING

Blog banner

Article on Fresh Book

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Cache Memory(142)

Blog banner

BUFFER OVERFLOW_142

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Deadlock and Starvation

Blog banner

Direct Memory Access

Blog banner