Delhi Terror Attack Accused Doctors Used Swiss App Threema to Plan & Coordinate: Police
In a shocking revelation, the Delhi Police have uncovered that the accused doctors in the recent terror attack near the Red Fort in Delhi used a Swiss encrypted messaging app called Threema to plan and coordinate their activities. The three accused doctors, Dr. Umar Nabi, Dr. Muzammil Ganaie, and Dr. Shaheen Shahid, who are currently being investigated for their alleged role in the blast, allegedly used the app to constantly keep in touch and discuss their terror plans.
According to the police, the use of Threema by the accused doctors made it extremely difficult to trace their online activities, as the app does not require a phone number or email ID for registration. This unique feature of the app made it an attractive option for the accused to use for their nefarious activities. A source close to the investigation told PTI, “Threema doesn’t require a phone number or email ID for registration, making it extremely difficult to trace the users.”
The investigation into the Delhi terror attack has revealed that the accused doctors used Threema to discuss and plan their activities, including the blast near the Red Fort. The police have been able to recover chat logs and other evidence from the app, which has helped them to piece together the events leading up to the attack. The use of Threema by the accused doctors has also raised concerns about the role of encrypted messaging apps in facilitating terror activities.
The Threema app, which is based in Switzerland, offers end-to-end encryption, which means that only the sender and the recipient can read the messages. The app also offers a range of other features, including file sharing and group chats, which can be used to coordinate activities. The app’s website claims that it offers “secure and private” messaging, which is “protected by European data protection laws.”
The use of Threema by the accused doctors in the Delhi terror attack is not an isolated incident. There have been several instances in the past where terror groups have used encrypted messaging apps to plan and coordinate their activities. The use of such apps has made it increasingly difficult for law enforcement agencies to track and prevent terror activities.
The investigation into the Delhi terror attack has also highlighted the need for greater cooperation between law enforcement agencies and tech companies to prevent the use of encrypted messaging apps for terror activities. The police have been working closely with the developers of Threema to retrieve chat logs and other evidence, which has helped them to build a case against the accused doctors.
In recent years, there has been a growing concern about the use of encrypted messaging apps by terror groups. The use of such apps has made it difficult for law enforcement agencies to track and prevent terror activities. The Indian government has been pushing for greater regulation of encrypted messaging apps, including the requirement for companies to provide access to chat logs and other data in cases where it is required for national security.
The Delhi terror attack has once again highlighted the need for greater vigilance and cooperation to prevent terror activities. The use of Threema by the accused doctors has shown that terror groups are becoming increasingly sophisticated in their use of technology to plan and coordinate their activities. The investigation into the attack has also shown that law enforcement agencies are working hard to keep pace with the evolving threat landscape.
In conclusion, the use of Threema by the accused doctors in the Delhi terror attack has raised concerns about the role of encrypted messaging apps in facilitating terror activities. The investigation into the attack has highlighted the need for greater cooperation between law enforcement agencies and tech companies to prevent the use of such apps for terror activities. As the threat landscape continues to evolve, it is essential that law enforcement agencies and tech companies work together to prevent the use of technology for nefarious activities.
Source: https://repository.inshorts.com/articles/en/PTI/f2a8ca2c-2fb5-4ada-b46a-28e29563f0c3