Wednesday, 24 August 2016

Telangana counter intelligence sleuths crack ultras command chain

By Udumula Sudhakar Reddy

The counter intelligence sleuths of TS who busted the ISIS' Janood-ul-Khalifa-e-Hind (Army of the Caliph in India) network along with the National Investigation Agency has deciphered the chain of command and communication methods of the terror group.

The group had built its terror structure with a bomb-maker, an electric specialist and an information security analyst who can hack into systems and foot soldiers. This structure is similar to that of the Indian Mujahideen, police officials said.

Abu Anas, who hails from Rajasthan and was staying in Hyderabad, was the information security analyst, akin to IM’s Mansoor Peerboy. Mohammed Nafees Khan was the bomb-maker and local commander and Shareef Moinuddin the electrician.

A senior IPS official said, “They followed ranks not only in hierarchy but had built their group to execute the attacks and bomb blasts by making IEDs.

"There were several instances earlier where the bombs failed to go off due to circuit problems. That’s why they had an expert in electric circuits as well as an information security analyst who is also a trainer. The ISIS was planning to use his services as a trainer.”

Sources said the suspects were in “constant touch” with top commanders perceived to be close to ISIS chief Abu Bakr al-Baghdadi.

Mudabbir Mushtaq Shaikh was the 'ameer' of the Janood-ul-Khalifa-e-Hind. Mudabbir was getting instructions from Shafi Armar alias Yousuf.

Mudabbir was working as the manager of a sports company and had received huge amounts routed from Turkey and Syria through hawala and other modes.
Rizwan Ali, a resident of Kushinagar in Uttar Pradesh, was its naib ameer (deputy chief).

Mangalore resident Najmul Huda was appointed ameer-e-askari (battalion commander) and Mohammed Nafees Khan of Tolichowki, Hyderabad, was the group’s ameer-e-wyulat (head of finance) and head of operations in Hyderabad.

They purchased 42 mobile phones with SIM cards. It is also believed that the groups visited several places and photographed important installations.

Investigators found that the ISIS suspects used to contact each other in FB and Twitter with the code “Doctor Medicine Leak Karega.”

No comments:

Post a Comment