Terrorists too update themselves on the technology front. First a private server to find the need (Pakistan set up private servers for terrorists) and now a common application to communicate between each other.
The urge to improvise their technology has been giving security agencies nightmares since the tapping and tracking of communication between terrorists has become extremely difficult.
The National Investigation Agency is learning gradually the advancement in technology adopted by terrorist groups and say that with each passing day they are discovering something new.
The difference today is that terror groups not only want to ensure that their communication is not traced, but also make sure that after an attack there is no proof left like was the case in the 26/11 attack in Mumbai.
The Lashkar-e-Taiba which continues to be the biggest headache for Indian security agencies is technologically sound. They have a dedicated technology wing with young minds who are paid several lakhs of rupees every month.
Their job is to innovate and make sure that before and after every attack the communication is secure.
When the Udhampur (Jammu and Kashmir) strike took place, the NIA during the subsequent investigation found that the terrorists had hosted private servers to communicate.
These servers never came on the radar of any intelligence agency due to which the none got wind of the infiltration that took place.
Today the NIA during the questioning of Mohammad Naved an accused in the Udhampur strike found that the Lashkar had also developed an application. The idea of the application was to communicate between each other.
The app is created and downloaded on the mobile phones of those involved in the strike. Through this app, they would send messages and make calls between each other. Only those with the application were able to communicate with each other.
The idea is to ensure that none of the communication is found on the open space. Moreover not all members of the Lashkar would have access to such technology.
Only those part of the plan and attack are given access to such applications. It is like a closed user group comprising around 5 to 10 persons who would be involved in the attack, an NIA officer informed.