Particle.news
Download on the App Store

Probe of Red Fort Blast Details ‘Ghost’ SIM Network and Dual-Phone Tradecraft

The findings prompted a DoT order requiring messaging apps to function only with an active physical SIM.

Overview

  • Officials say a ‘white-collar’ module that included doctors used fraudulently issued ‘ghost’ SIMs and encrypted apps to contact Pakistani handlers identified by the codenames Ukasa, Faizan and Hashmi.
  • Investigators describe a dual-phone protocol with a personal ‘clean’ handset and a separate ‘terror phone’ using SIMs obtained through misused Aadhaar details, alongside a parallel fake-Aadhaar SIM racket.
  • Compromised numbers stayed active on apps even when accessed from PoK or Pakistan, enabling remote guidance that included directing operatives to learn IED assembly from online videos.
  • The DoT on November 28 directed TIUEs to ensure apps work only when an active SIM is present, told operators to auto-log out users if no SIM is detected, and sought compliance reports from major platforms within 90 days.
  • Authorities are fast-tracking enforcement in the Jammu and Kashmir telecom circle, warning of penalties for non-compliance, as the NIA probes the Red Fort car blast that killed 15 after arrests and a 2,900 kg explosives-precursor seizure tied to Al Falah University.