Mumbai Internet Chase
The terrorists had made 284 calls from Mumbai to their handlers in Pakistan during the 60 hours they had laid siege to the city, the Crime Branch said.
The Crime Branch was helped by the Federal Bureau of Investigation (FBI) of the US in piecing the puzzle together.
According to the police, the report submitted by the FBI to the Crime Branch revealed that the nine terrorists killed by National Security Guards (NSG) commandos had used mobile phone numbers
to communicate with their handlers.
Records showed that calls were made to phone numbers
and calls were received from another number,
The calls were made to or received from co-conspirators in Pakistan for instructions, the Crime Branch said.
Investigations also revealed that these numbers were connected to a Callphonex account. Callphonex is a VoIP (voice over internet protocol) service provider based in New Jersey, USA.
On October 20-21, 2008, an individual calling himself Kharak Singh called the company up for an account, saying he was a VoIP reseller in India. Two payments were made to Callphonex for the account. On October 27, an initial payment of $250 was wired to Callphonex via Money Gram (receipt number 80700471903880005473).
The money was sent by one Muhammad Ishfaq through Money Gram's agent, Paracha International Exchange, located at Road Anarkali Fayazuddin in Lahore, the Crime Branch said.
According to Money Gram records, Ishfaq gave an address in Peshawar, Pakistan, as his.
On November 25, the second payment of $299 was wired to Callphonex via Western Union Money Transfer (WUMT) (receipt number
The sender was one Javed Iqbal, and the money was wired through WUMT agent, Madina Trading, in Brescia, Italy.
The payments for this were made by opening an account in the name of Kharak Singh from India. However, the payments to this account were made on two occasions by wire transfer through MoneyGram and Western Union Money Transfer by two Pakistani nationals,
Javed Iqbal and
Iqbal, who has since been arrested by the Pakistan police, had provided a copy of his Pakistani passport (number
to Madina Trading as his identity proof. Investigations found that he had communicated with Callphonex through the e-mail id, email@example.com.
Crime Branch officials said the account was accessed from 10 different IP addresses in Pakistan, Chicago, Kuwait and Russia.
These two, while communicating with Callphonex, used the e-mail id firstname.lastname@example.org. This e-mail id was accessed from at least 10 IP addresses, says the chargesheet. One of them,
belongs to Col R Sadatullah whose official address is SCO, Qasim Rd, Rawalpindi, Pakistan. Sadatullah's official e-mail id is email@example.com, which police say is the official e-mail service for all SCO officers.
One of the wanted accused is `Major General sahab' whose name crops up repeatedly in the taped conversation between the terrorists and their handlers. Incidentally, the general manager of SCO happens to be Major General Muhammad Khalid Rao, who joined the Signals Corps in 1979.
Major General Saab" appears to be unknown, that handle has been used by a Kashmiri militant online. Col R Saadat Ullah, CU16-AP, e-mail:firstname.lastname@example.org, address: SCO, Qasim Road, Rawalpindi, Pakistan phone:
The SCO, army sources say, stands for Special Communications Organization, a telecommunications agency of the Pakistani government which is run by officers from the army's signals corps and operates only in Pakistan-occupied Kashmir and the conflict-wracked Northern Areas.
OSINT by Our
Expect Interpol Official Orange Notice, soon.
Frontline video; Personalities
Labels: Mumbai Internet Chase