Virtual SIMs used in Pulwama terror attack

In this technology, the computer generates a telephone number and the user downloads an application of the service provider on their smartphone

A request would be sent to the US to seek details from a service provider of “virtual SIMs”, which were used by the JeM suicide bomber behind the Pulwama attack and his Pakistan and Kashmir-based handlers, officials said.

It was a fairly new modus operandi where terrorists across the border were using a “virtual SIM”, generated by a service provider in the United States. In this technology, the computer generates a telephone number and the user downloads an application of the service provider on their smartphone.

The number is linked to social networking sites like WhatsApp, Facebook, Telegram or Twitter. The verification code generated by these networking sites is received on the smartphone and the user is ready.

In case of Pulwama, the suicide bomber Adil Dar was in constant touch with the Jaish handler as well as Mudassir Khan using the same technology, the officials said. They said the numbers used were pre-fixed with “+1”, the Mobile Station International Subscriber Directory Number (MSISDN) number used for the United States.

The request to the US will include details of phone numbers that got in touch with the “Virtual SIM” and who had activated it, they said, adding that Internet Protocol addresses would also be sought.

While the security agencies would attempt to find who had paid for the virtual SIM, they were also aware that the terror groups used forged identities, as was done during the Mumbai 26/11 terror strikes.

During an investigation of the 26/11 attacks, it was found that an amount of USD 229 was wired to Callphonex, via Western Union Money Transfer receipt number 8364307716-0, for activating the Voice Over Internet Protocol (VoIP) used during the strikes.

CRPFPulwama AttackVirtual SIMVoIP
Comments (0)
Add Comment