The Rise of Sophisticated Terror Networks: Unraveling the White-Collar Terror Module
Recent investigations have shed light on a “white-collar” terror module connected to the tragic blast near Delhi’s Red Fort on November 10 last year. What stands out is the involvement of highly educated doctors who utilized advanced tactics such as “ghost” SIM cards and encrypted apps to communicate with their handlers in Pakistan.
The findings of these investigations prompted the Department of Telecommunications (DoT) to issue a significant directive on November 28 last year. This directive mandated that app-based communication services like WhatsApp, Telegram, and Signal must be tied to an active physical SIM card to enhance security measures.
The probe into the “white-collar” terror module revealed a network of “ghost” SIM cards used by the arrested doctors, including Muzammil Ganaie, Adeel Rather, and others. These individuals employed a strategic “dual-phone” protocol, carrying multiple mobile handsets to avoid detection by security agencies.
Each accused member, including the deceased Dr. Umar-un-Nabi who was involved in the Red Fort blast, maintained two to three mobile devices. They used one device for personal and professional purposes under their own names and another as a dedicated “terror phone” for secure communication with their handlers in Pakistan.
These secondary devices were registered under unsuspecting civilians’ names, whose Aadhaar details were misused for this illegal activity. Moreover, a separate racket was uncovered by the Jammu and Kashmir Police where SIM cards were issued using fake Aadhaar cards.
The security agencies noticed a concerning trend where compromised SIM cards remained active on messaging platforms in Pakistan-occupied Kashmir (PoK) or Pakistan. By exploiting loopholes in messaging apps that allow operation without a physical SIM card, the handlers could instruct the module in IED assembly and plot attacks.
In response to these security vulnerabilities, the Centre invoked the Telecommunications Act, 2023, and Telecom Cyber Security Rules to safeguard the telecom ecosystem. This includes a directive that requires all Telecommunication Identifier User Entities (TIUEs) to ensure apps function only with an active SIM card within 90 days.
Additionally, telecom operators are mandated to log out users from apps like WhatsApp, Telegram, and Signal if no active SIM card is detected. Compliance reports must be submitted by all service providers to the DoT, encompassing platforms like Snapchat, Sharechat, and Jiochat.
The misuse of apps without a SIM card poses a significant threat to telecom cyber security, leading to cyber frauds and terror activities. The directive is being expedited in the Jammu and Kashmir telecom circle to deactivate expired or fraudulent SIMs, crippling the digital infrastructure used by terror networks.
Failure to adhere to these regulations will result in stringent action under the Telecom Cyber Security Rules and other applicable laws. The unraveling of the “white-collar” terror module commenced with the discovery of Jaish-e-Mohammad (JeM) posters in Srinagar, ultimately leading to arrests and significant seizures in Faridabad.
The car explosion near the Red Fort, which claimed 15 lives, is under investigation by the National Investigation Agency. The intricate web of terror activities orchestrated by educated individuals underscores the evolving nature of security threats in the digital age.
