How virtual SIMs helped JeM carry out the Pulwama attack
Srinagar, Mar 25: India would seek the help of the United States after it was found that virtual SIMs were used in the Pulwama attack.

Piecing together probe from the site of the terror strike, searches carried out by the Jammu and Kashmir police and central security agencies at an encounter site in Tral as well as other locations, it was found that the bomber, Adil Dar, was in constant touch with the JeM across the border, they said.
The main mastermind of the audacious attack, Mudassir Khan, was killed + in the encounter in Tral.
Forty CRPF personnel were killed + on February 14 when Dar rammed his explosive-laden vehicle into a paramilitary force bus at Pulwama in South Kashmir. India retaliated after the strike by bombing the Jaish terror group's hideout in Balakot in Pakistan.
It was a fairly new modus operandi where terrorists across the border were using a "virtual SIM", generated by a service provider in the United States. In this technology, the computer generates a telephone number and the user downloads an application of the service provider on their smartphone.
The number is linked to social networking sites like WhatsApp, Facebook, Telegram or Twitter. The verification code generated by these networking sites is received on the smartphone and the user is ready.
In case of Pulwama, Dar was in constant touch with the Jaish handler as well as Mudassir Khan using the same technology, the officials said.
They said the numbers used were pre-fixed with "+1", the Mobile Station International Subscriber Directory Number (MSISDN) number used for the United States.
The request to the US will include details of phone numbers that got in touch with the 'Virtual SIM' and who had activated it, they said, adding that Internet Protocol addresses would also be sought.
While the security agencies would attempt to find who had paid for the virtual SIM, they were also aware that the terror groups used forged identities, as was done during the Mumbai 26/11 terror strikes.
During investigation of the 26/11 attacks it was found that an amount of $229 was wired to Callphonex, via Western Union Money Transfer receipt number 8364307716-0, for activating the Voice Over Internet Protocol (VoIP) used during the strikes.
The money was received from 'Madina Trading' located in Brescia in Italy and sender was claimed to be Javed Iqbal, a resident of Pakistan-occupied-Kashmir (PoK).
However, after Italian police arrested two Pakistani nationals in 2009, it was alleged that the firm had made nearly 300 transfers in the name of Iqbal, who probably had never set his foot in Italy.
The Italian police, while concluding the probe, had said the Brescia-based company made several transfers using the identity of innocent, unsuspecting persons, whose identity cards or passports might have been stolen.
(With agency inputs)
-
Bangalore Gold Silver Rate Today, March 9, 2026: Gold and Silver Prices Fall as US Dollar Strengthens -
Vijay-NDA Alliance On Cards? Pawan Kalyan Reportedly Reaches Out to TVK Chief -
Who Was Mojtaba Khamenei’s Wife Zahra Haddad-Adel and What Do We Know About Her? -
Who Is Aditi Hundia? Viral ‘Girl in Red’ & Ishan Kishan's Girlfriend Spotted During IND vs NZ Final -
Hyderabad Gold Silver Rate Today, 9 March 2026: Latest 24K, 22K Gold And Silver Rates In City -
Kerala Election 2026 Date: When Can You Expect EC To Announce Key Dates of Voting & Counting? -
Chennai MRTS Velachery–St Thomas Mount Line Opening on March 10 Faces Delay; Direct Beach Route to Start Later -
Mumbai Water Supply Cut For 24 Hours: Check Dates, Timings & Areas Affected by BMC Maintenance Disruption -
Hardik Pandya and Girlfriend Mahieka Sharma’s Celebration Video Goes Viral After India’s Win -
Bengaluru Hotels to Shut From Tomorrow March 10 as Commercial LPG Supply Stops -
Trisha's Net Worth: How Rich Is Thalapathy Vijay's Rumoured Girlfriend? -
Pune Electrician Arrested After Viral Video Shows Him Raising ‘Pakistan Zindabad’ Slogans, Watch












Click it and Unblock the Notifications