SIM card racket exposed IM module | mumbai | Hindustan Times
Today in New Delhi, India
Aug 20, 2017-Sunday
-°C
New Delhi
  • Humidity
    -
  • Wind
    -

SIM card racket exposed IM module

During its investigations in the July 13, 2011, blasts, the state anti-terrorism squad (ATS) found that the Indian Mujahideen (IM) operatives were in touch with each other thorough SIM cards procured using forged documents.

mumbai Updated: Jan 25, 2012 01:51 IST
Rahul Mahajani

During its investigations in the July 13, 2011, blasts, the state anti-terrorism squad (ATS) found that the Indian Mujahideen (IM) operatives were in touch with each other thorough SIM cards procured using forged documents.


“IM operatives from Pune, Bihar, and Mumbai communicated with each other before the blasts using such cards,” an ATS officer said. “The SIM card racket exposed the Darbhanga module of the IM.”

On December, 28, 2011 the ATS registered a first information report (FIR) in the matter. So far, eight accused have been arrested in the case.

“Yasin Bhatkal had also used one of these SIM cards to remain in touch with the other accused. Hence he is also wanted in the SIM card case,” the officer said, adding that even Naquee Ahmed’s brother had been questioned by the ATS in the case.

Naquee and his brother, Taquee, ran a shop selling SIM cards and they provided the IM operatives with the cards, the officer said.

The ATS arrested a SIM card agent identified as Ganesh Tikole, who had allegedly provided 700-800 forged documents for getting the cards.

“Tikole is just one of the dozen agents who have helped IM operatives get the documents. This has been going on for two-three years,” the officer said, adding, “A SIM card could be registered on my name, but I may not be aware of its existence. An agent could just sell my documents for procuring the card.”