Red Fort Blast Probe: 'Ghost' SIM Cards, Encrypted Apps Used by Educated Terror Module
Red Fort Blast: 'Ghost' SIM Cards, Encrypted Chats Exposed

Investigations into the shocking November 10 blast at Delhi's historic Red Fort have peeled back the layers on a highly sophisticated terror cell. Authorities have discovered that the module, composed of well-educated individuals, relied on a clandestine network of "ghost" SIM cards and encrypted communication channels to coordinate with handlers across the border in Pakistan.

The Dual-Phone System and 'Ghost' SIM Racket

Central to the module's operations was a meticulous dual-phone strategy. Each accused member maintained two separate devices: one for ordinary personal use and another dedicated exclusively to secret, encrypted conversations. To power these covert phones, they used fraudulently obtained SIM cards, often by misusing the Aadhaar details of unsuspecting civilians. This technique created "ghost" identities, allowing them to operate under the radar and evade detection by law enforcement agencies for a significant period.

Nationwide Crackdown and DoT's New Directive

The probe's findings have triggered immediate regulatory action. The Department of Telecommunications (DoT) has issued fresh directives to major messaging platforms, including WhatsApp, Telegram, and Signal. The new rules mandate that these apps must remain linked to an active, verified SIM card, a move aimed at preventing the anonymous use of such services for illicit activities. Parallel to the Delhi investigation, a separate SIM card racket was busted in Jammu and Kashmir, indicating a wider network of such fraudulent operations.

Key Arrests and Fatal Encounter

The National Investigation Agency (NIA) has made significant headway with several key arrests. Among those apprehended are Muzammil Ganaie and Adeel Rather. In a critical development, another key suspect, Dr Umar-un-Nabi, was killed during a security operation. He was reportedly involved in an explosives-laden vehicle plot, which was neutralized by security forces. The involvement of highly educated professionals in the module has raised serious concerns about the evolving face of terror networks in the region.

The revelations from the Red Fort blast case underscore a critical challenge for national security: the weaponization of technology and identity fraud by terror groups. The DoT's swift response highlights the ongoing effort to close these digital loopholes and enhance tracking capabilities in the era of encrypted communication.