Doctors Used Ghost SIMs, Encrypted Apps for Delhi Red Fort Blast: Probe
Doctors Used Ghost SIMs for Delhi Red Fort Blast Plot

Investigations into a sophisticated 'white-collar' terror module, linked to an explosion near Delhi's historic Red Fort on November 10 last year, have uncovered a chilling plot. Officials revealed on Sunday that highly educated doctors allegedly used a complex network of 'ghost' SIM cards and encrypted messaging applications to coordinate with their handlers based in Pakistan.

The Digital Blueprint of Terror

The findings from this high-profile probe directly prompted a significant regulatory move. On November 28, 2023, the Department of Telecommunications (DoT) issued a sweeping directive. This new mandate requires that popular app-based communication services like WhatsApp, Telegram, and Signal must be continuously linked to an active, physical SIM card within the device. This action aims to dismantle a key digital loophole exploited by terror networks.

Officials detailed that the investigation into the blast led authorities to a web of fraudulent SIM cards operated by the arrested individuals, including Muzammil Ganaie and Adeel Rather. The module employed a tactical 'dual-phone' protocol specifically designed to evade detection by security agencies. Each accused, including Dr Umar-un-Nabi who was killed while driving the explosives-laden vehicle near the Red Fort, was found to be carrying two to three mobile handsets.

Clean Phones and Terror Phones

The accused maintained a clear separation between their personal and operational communications. They carried one 'clean' phone registered in their own names for routine personal and professional use, which helped them avoid suspicion. The second device was a dedicated 'terror phone' used exclusively for communication via WhatsApp and Telegram with their Pakistani handlers. These handlers were identified by the codenames 'Ukasa', 'Faizan', and 'Hashmi'.

The SIM cards for these secondary operational phones were not registered to the accused. Instead, they were issued in the names of unsuspecting ordinary citizens whose Aadhaar details were misused. In a separate but related racket unearthed by the Jammu and Kashmir Police, SIMs were also fraudulently obtained using completely fake Aadhaar cards.

Exploiting App Features for Deadly Plots

By exploiting features in messaging apps that allowed them to function without a physical SIM card in the device, the Pakistani handlers were able to direct the module remotely. This digital coordination included guiding the accused to learn how to assemble Improvised Explosive Devices (IEDs) through YouTube tutorials and to plot potential 'hinterland' attacks across India.

While officials acknowledge that it will take considerable time and effort to identify and deactivate all fraudulent SIMs circulating in the system, the new DoT directive is viewed as a critical first strike. It aims to deliver a substantial blow to the digital infrastructure that modern terror networks have come to rely on for secure, untraceable communication.