Virtual SIMs used in Pulwama attack : The Tribune India

Join Whatsapp Channel

Virtual SIMs used in Pulwama attack

SRINAGAR:A request would be sent to the US to seek details from a service provider of “virtual SIMs”, which were used by the JeM suicide bomber behind the Pulwama attack and his Pakistan and Kashmir-based handlers, officials said.

Virtual SIMs used in Pulwama attack


Srinagar, March 24

A request would be sent to the US to seek details from a service provider of “virtual SIMs”, which were used by the JeM suicide bomber behind the Pulwama attack and his Pakistan and Kashmir-based handlers, officials said.

Piecing together the probe from the site of the terror strike, searches carried out by the Jammu and Kashmir Police and central security agencies at an encounter site in Tral as well as other locations, it was found that the bomber, Adil Dar, was in constant touch with the JeM across the border, they said.

The main mastermind of the audacious attack, Mudassir Khan, was killed in the encounter in Tral.

Forty CRPF personnel were killed on February 14 when Dar rammed his explosive-laden vehicle into a paramilitary force bus at Pulwama in South Kashmir. India retaliated by bombing the Jaish terror group’s hideout in Balakot in Pakistan.

It was a fairly new modus operandi where terrorists across the border were using a “virtual SIM”, generated by a service provider in the United States. In this technology, the computer generates a telephone number and the user downloads an application of the service provider on their smartphone.

The number is linked to social networking sites like WhatsApp, Facebook, Telegram or Twitter. The verification code generated by these networking sites is received on the smartphone and the user is ready.

In case of Pulwama, Dar was in constant touch with the Jaish handler as well as Mudassir Khan using the same technology, the officials said. They said the numbers used were pre-fixed with “+1”, the Mobile Station International Subscriber Directory Number (MSISDN) number used for the United States.

The request to the US will include details of phone numbers that got in touch with the “Virtual SIM” and who had activated it, they said, adding that Internet Protocol addresses would also be sought.

While the security agencies would attempt to find who had paid for the virtual SIM, they were also aware that the terror groups used forged identities, as was done during the Mumbai 26/11 terror strikes. — PTI

Modus operandi

  • In this technology, the computer generates a telephone number and the user downloads an application of the service provider on their smartphone
  • The number is linked to social networking sites like WhatsApp. The verification code generated by networking sites is received on the smartphone and the user is ready

Top News

Deeply biased: MEA on US report citing human rights violations in India

Deeply biased: MEA on US report citing human rights violations in India

The annual report of the State Department highlights instanc...

Family meets Amritpal Singh in Assam jail after his lawyer claims he'll contest Lok Sabha poll from Punjab’s Khadoor Sahib

Couldn't talk due to strictness of jail authorities: Amritpal's family after meeting him in jail

Their visit comes a day after Singh's legal counsel Rajdev S...

Centre grants 'Y' category security cover to Phillaur MLA Vikramjit Chaudhary among 3 Punjab Congress rebels

Centre grants 'Y' category security to Phillaur MLA Vikramjit Chaudhary and 2 other Punjab Congress rebels

The Central Reserve Police Force has been directed by the Mi...

First Sikh court opens in UK to deal with family disputes: Report

First Sikh court opens in UK to deal with family disputes

According to ‘The Times’, the Sikh court was launched last w...


Cities

View All