New Delhi: An investigation carried out by the Indian security agencies has revealed that the use of the latest modes of communication by Khalistani terrorists to carry out terror activities and spread anti-India propaganda on many occasions evades the eyes of law-enforcing agencies.
A senior official in the security establishment told ETV Bharat on Wednesday that Khalistani terrorists have of late been using two categories of communication: private for operational purposes and public for spreading propaganda. The modes used for operational communication leverage the easy availability of encrypted chat apps, virtual private network (VPN) among other freely available technology.
“The Khalistani terrorist organization gives topmost priority to the Voice over Internet Protocol (VoIP) technology which allows voice and multimedia communication over Internet networks instead of a regular or analog phone line,” the official said, quoting an intelligence report. Several applications, and services are easily available for making VoIP communications such as WhatsApp, Skype, Facebook Messenger, Google Talk etc, the official said.
“These applications provide data encryption features due to which the contents of communications cannot be lawfully intercepted by the law enforcement agencies. This provides a safe and secure channel of communication for these extremists. Apps such as Signal also feature relay servers to hide the IP addresses in peer-to-peer communications,” he said.
The terrorists are also using several applications that allow users to generate virtual phone numbers that can be used as real phone numbers but without a physical SIM card.
“These numbers provide anonymity to the user and can be associated with almost all the Internet calling applications. As these numbers have not been issued by regulated Telecom Service Providers, it makes it difficult for law enforcement agencies to identify and trace the user. Khalistani Extremists are using such numbers for operational communication and to extend threats to their targets,” the official added.
The terrorists also use VPN, a protected network connection over a public network. “VPNs encrypt the internet traffic and disguise the source IP of the user. The extremists tend to use this technology while communicating over the Internet thereby masking their identity, location, etc. Some of the VPN service providers allow multiple layering that renders detection of the user almost impossible for the law enforcement agencies,” he said.
As far as spreading anti-India propaganda is concerned, the terrorists use social media applications to communicate within themselves to avoid detection and interception by law enforcement agencies.