logo
Bengal Police get details on how arrested spies helped Pak handlers get Indian numbers for WhatsApp

Bengal Police get details on how arrested spies helped Pak handlers get Indian numbers for WhatsApp

Hans India5 days ago
The sleuths of the Special Task Force (STF) of West Bengal Police have secured specific information on how Mukesh Rajak and Rakesh Kumar Gupta, the two suspected ISI linkmen arrested in the state earlier this week, used to help their handlers in Pakistan to get Indian mobile numbers for WhatsApp messaging purposes.
In the face of interrogation, the duo who are in police custody now have admitted that they used to procure prepaid mobile cards from the market using multiple Indian identity cards.
After those SIM cards and numbers were activated, the duo used to pass them to their Pakistani handlers. Subsequently, those numbers were used to open fake WhatsApp accounts. The duo also used to share the OTPs with their Pakistani handlers, required to activate WhatsApp for those numbers.
Sources said that to operate silently without much attention, the duo started operating under the garb of an NGO and that too from a rented accommodation in a place like Memari in East Burdwan district, which otherwise does not have many records of crime-related activities.
The state police insiders said the duo gave contradictory introductions about themselves to the owner of the apartment they rented and to their neighbours.
While to the owner, they introduced themselves as teachers of the English language; to the neighbours, they introduced themselves as heads of an NGO involved in different social welfare activities.
As told by the neighbours to the investigating officials, although in the locality Rajak and Gupta were known as true gentlemen, their interactions in the locality were limited.
The neighbours also told the cops that at times, some people used to come to meet them and stay at the rented accommodation for some time.
While Rajak was a resident of Panagarh in the West Burdwan district, Gupta was a resident of Bhawanipur in South Kolkata.
The cops doubt that Gupta and Rajak were part of a major espionage racket.
The investigating officials have already seized the mobile phones of the duo. The investigating officials are tracking the period when the arrested men had been operating as ISI linkmen, and also what kind of information they shared with their associates in Pakistan.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Flicker Of Hope: Indian Grand Mufti Steps In As Kerala Nurse Faces Gallows – Crucial Talks Underway IN Yemen's Sanaa
Flicker Of Hope: Indian Grand Mufti Steps In As Kerala Nurse Faces Gallows – Crucial Talks Underway IN Yemen's Sanaa

India.com

timean hour ago

  • India.com

Flicker Of Hope: Indian Grand Mufti Steps In As Kerala Nurse Faces Gallows – Crucial Talks Underway IN Yemen's Sanaa

New Delhi/Sanaa: Urgent diplomatic and legal efforts are underway to stop the execution of Kerala nurse Nimisha Priya, who is facing death sentenced in Yemen. Her execution is scheduled for July 16. The Supreme Court of India on July 14 heard a petition seeking intervention in the case, while parallel talks continue in Yemen between local authorities, tribal leaders and representatives from India. The petition was filed by the Save Nimisha Priya International Action Council, a group campaigning to prevent her execution. During the Supreme Court hearing, Attorney General R. Venkataramani informed the bench that 'the Government of India is doing whatever is utmost possible' but highlighted that 'having regard to the sensitivity and status of Yemen as a place, there is nothing much the the government can do'. Meanwhile, negotiations are underway in Yemen's capital of Sanaa involving tribal leaders, judicial representatives and religious scholars. The talks are being attended by Habeeb Abdurahman Ali Mashhour, who is a representative of Shaikh Habeeb, along with a judge from the Jinayat court, representatives of the Yemeni government, tribal leaders and Talal's brother. The initiative was launched following a direct appeal by Indian Grand Mufti and All India Sunni Jamiyyathul Ulama General Secretary Kanthapuram A.P. Aboobacker Musliyar, who requested the victim's family to pardon Priya without seeking blood money (diya). A statement issued from Kanthapuram's office expressed hope that the outcome of the discussions may be known soon. Originally from Palakkad district in Kerala, Priya was convicted in 2020 by a Yemeni court for the murder of her business partner, whom she allegedly drugged and killed in July 2017, with the assistance of another nurse. According to Yemeni court documents, she then dismembered his body and disposed of the parts in an underground water tank. Her final appeal was rejected in 2023, and she is currently held at the Central Prison in Sanaa. The Indian government continues to monitor the case, but its capacity to intervene directly remains limited, as India does not currently have an operational embassy in Yemen due to the ongoing civil conflict there. The Supreme Court case, diplomatic appeals and tribal negotiations in Yemen are all unfolding simultaneously in a bid to prevent her execution. The situation remains fluid and a final decision from either side is awaited.

Pakistan's political, military brass ordered hit at Pahalgam: Officials
Pakistan's political, military brass ordered hit at Pahalgam: Officials

Time of India

timean hour ago

  • Time of India

Pakistan's political, military brass ordered hit at Pahalgam: Officials

File photo: Army jawans on alert in the aftermath of the Pahalgam terror attack (Picture credit: PTI) NEW DELHI: The April 22 terror attack in Pahalgam that claimed the lives of 26 civilians was a conspiracy hatched by Pakistan's ISI and terror group Lashkar-e-Taiba on the directions of the country's political and military brass and executed exclusively by Pakistani terrorists , according to sources in the security establishment. In what sources described as an LeT-ISI project akin to the 26/11 Mumbai attack, ISI gave specific directions to Pakistan-based Lashkar commander Sajid Jutt to deploy only foreign terrorists operating in J&K. To ensure secrecy, no Kashmiri terrorist was taken on board. He was directed to ensure minimal local involvement on a "need-to-know" basis. The attack was led by Sulaiman, a suspected former Pakistani special forces commando who had participated in training at LeT's Muridke hub in Pakistan's Punjab before crossing the LoC into the Jammu region in 2022. Two other Pakistanis were also in the hit squad. Satellite phone analysis has revealed that Sulaiman's location on April 15 was in Tral forest, indicating he was in the vicinity of the attack site at Baisaran for almost a week before the incident. Sulaiman was also involved in the April 2023 attack on an Army truck in Poonch in which five soldiers were killed. However, he laid low for the next two years. Sources did not reveal the identities of the two other Pakistani terrorists. Although J&K Police had suspected the role of Pakistani terrorists Hashim Musa and Ali Bhai, probe has only confirmed Sulaiman's role till now. There is no corroboration of the role of local terrorist Adil Hussain Thoker as a facilitator, either. Even the two locals arrested by NIA last month - Parvaiz Ahmad Jothar and Bashir Ahmad Jothar, both from Pahalgam - are believed to have had a limited role, having provided the Pakistani terrorists food, shelter and other logistics in return for a few thousand rupees. They have also denied any knowledge of the terrorists' plan to hit tourists in Baisaran. There are currently about 68 foreign terrorists and three local terrorists active in the Valley.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store