Delhi Terror Attack Accused Doctors Used Swiss App Threema to Plan & Coordinate: Police
In a shocking revelation, it has come to light that the accused doctors in the Delhi terror attack case used a Swiss encrypted messaging app called Threema to plan and coordinate their activities. Dr. Umar Nabi, Dr. Muzammil Ganaie, and Dr. Shaheen Shahid, who are being investigated for the blast near Delhi’s Red Fort, allegedly used this app to constantly keep in touch and discuss their terror plans.
According to the police, Threema is a highly secure messaging app that offers end-to-end encryption, making it extremely difficult for law enforcement agencies to intercept and decode messages. The app is popular among those who value their privacy and want to keep their communications confidential. However, in this case, the accused doctors allegedly used Threema to coordinate their terror activities, taking advantage of the app’s secure features.
One of the key features of Threema that made it attractive to the accused doctors is that it does not require a phone number or email ID for registration. This makes it extremely difficult for law enforcement agencies to trace the users of the app. “Threema doesn’t require a phone number or email ID for registration, making it extremely difficult to trace the users,” a source told PTI. This anonymity feature of Threema allowed the accused doctors to communicate with each other without fear of being detected by the authorities.
The use of Threema by the accused doctors is a worrying trend, as it highlights the increasing use of technology by terror groups to plan and coordinate their activities. With the rise of social media and messaging apps, terror groups have found new ways to communicate and spread their ideology. The use of encrypted messaging apps like Threema makes it even more challenging for law enforcement agencies to track and prevent terror activities.
The investigation into the Delhi terror attack has revealed that the accused doctors used Threema to discuss their plans and coordinate their activities. The police have seized the mobile phones of the accused doctors and are analyzing the data to gather more evidence. The use of Threema by the accused doctors has also raised questions about the role of technology in facilitating terror activities.
The case highlights the need for law enforcement agencies to be more vigilant and proactive in tracking and preventing terror activities. The use of technology by terror groups is a growing concern, and it requires a coordinated effort from law enforcement agencies, intelligence agencies, and technology companies to prevent such activities.
In recent years, there have been several cases of terror groups using encrypted messaging apps to plan and coordinate their activities. The use of such apps has made it challenging for law enforcement agencies to track and prevent terror activities. The case of the Delhi terror attack accused doctors using Threema is just one example of how terror groups are using technology to further their goals.
The police are still investigating the case, and more details are expected to emerge in the coming days. The use of Threema by the accused doctors has raised concerns about the security of the app and the potential risks it poses to national security. The case highlights the need for a balanced approach to encryption and security, one that takes into account the need for privacy and security while also preventing the misuse of technology by terror groups.
In conclusion, the use of Threema by the accused doctors in the Delhi terror attack case is a worrying trend that highlights the increasing use of technology by terror groups. The case raises questions about the role of technology in facilitating terror activities and the need for law enforcement agencies to be more vigilant and proactive in tracking and preventing such activities. As the investigation continues, it is likely that more details will emerge about the use of Threema by the accused doctors and the potential risks it poses to national security.
News Source: https://repository.inshorts.com/articles/en/PTI/f2a8ca2c-2fb5-4ada-b46a-28e29563f0c3