According to the report, encryption of messages, whether e-mail or chats, dead dropping of emails and use of GPRS phones are some of the methods used by the IM to bluff the security agencies from detecting them.
Sources in the security establishment said each of the message used by the IM operatives are encrypted and they never use ordinary phones. According to these sources, the state police are two decades behind these terror outfits when it comes to the use of technology, the report added.
State police are two decades behind the terrorists in terms of technology
The security agencies are trying to decipher at least 30,000 encrypted messages between the arrested IM operatives and their link groups.
The investigators, after learning about the technological expertise of the IM, are linking it more to the tech-savvy Lashkar-e-Toiba of Pakistan than the al-Qaeda, with which the IM has been more linked in the past.