An informer's confession

[email protected] (Syed Nazakat/Malegaon &New Delhi for The Week)
December 4, 2012

abrar

Abrar Ahmad Ghulam Ahmad, 40, lives in a house with no number or calling bell in the Bage Mahmood locality in Malegaon, Maharashtra. Finding the man or the house is a difficult task. He anyway does not want visitors, and the people of Malegaon are not keen to drop in either.


Abrar, however, was a 'wanted' man six years ago, when a number of bombs ripped the textile town apart on September 8, 2006, killing 31 people. He was the sole approver in the case, which the Maharashtra Anti-Terrorism Squad (ATS) claimed to have solved, busting a major terrorist group on his tip-off. It arrested and charge-sheeted nine Malegaon men. Things, however, took a reverse turn when Hemant Karkare took charge of the ATS and arrested 11 members of the Hindu right-wing group Abhinav Bharat in connection with the case in 2008. The group, allegedly, carried out four more strikes after the 2006 blasts.


Though it looked like a goof-up by the ATS officers who initially investigated the case, in a shocking revelation, Abrar says they knew the real culprits all along, and he implicated innocent men under pressure from them. Had the ATS investigated the case the right way, investigators now believe, it could have avoided the subsequent strikes allegedly carried out by Abhinav Bharat and saved many lives. “I'm guilty of destroying so many innocent lives,” said Abrar. “But I was caught in a deadly web. I had no clue what I was doing.”


A school dropout, Abrar lived an aimless life till 2001. As the Americans invaded Afghanistan after the 9/11 terrorist attacks, the Muslim-dominant Malegaon witnessed protests and demonstrations. One of them went out of control and 13 people died in a police firing. This prompted the security agencies to weave an informer network in the area. A number of undercover informers were recruited, and Abrar was one of them.


The ATS has consistently denied that Abrar worked for it. New evidence, however, suggests that he was close to some ATS officers. And the National Investigation Agency, which took up the case in 2011, is looking into whether some ATS officers deliberately botched up the investigation.


Abrar says the day after the first Malegaon blasts he told his brother-in-law Farooq Wardha, allegedly a police informer in Bhiwandi in Thane, that he had heard some people talking about blasts and he gave the information to the police. He was whisked away by the ATS to safe houses in Maharashtra, Madhya Pradesh and Gujarat. Abrar gives a detailed account of his detention, the places where he was kept and the men who accompanied him.


More shocking are his claims that he met Lt-Col Prasad Shrikant Purohit, a former Military Intelligence officer, and Pragya Singh Thakur, a sanyasin, who were allegedly associated with Abhinav Bharat and later arrested for the Malegaon blasts. “I met Purohit on October 22, 2006 in Deolali [in Nashik]. He told me that whatever promise the ATS had made to me would be fulfilled,” he said. Abrar claims three ATS cops—Arun, Baru and Sadanand Patil—were with him when he met Purohit.


Court documents reveal that the ATS had kept Abrar's cell phone (number 9823436809) under surveillance. According to a Maharashtra home department document (No.HD/CPM/ATS/576/2006), which THE WEEK accessed, the ATS had obtained permission to put the phone under surveillance. In its chargesheet, the ATS has said that Abrar's cell phone voice recordings established that he was in touch with terrorists and played a part in the bomb blasts conspiracy.


Abrar, however, claims that he was given the cell phone by the ATS to be in touch with senior officers. When the NIA took over the investigation, it found out that the cell phone interception, which could have not only established Abrar's location during the three months but also revealed the identity of the people whom he spoke to, was missing.

abrar_with_police

Abrar Ahmad (in red shirt) with Arun, who he says is an ATS cop


The NIA has collected fresh ?evidence, including a number of photographs, which suggests that Abrar was close to some ATS officers. In one of the pictures, which are in the possession of THE WEEK, ATS officers are seen with Abrar in the Saputara hill station. Another picture shows Abrar with an ATS officer and his son. In another one Abrar's wife, Jannatunissa, is seen with a cop. A Tata Sumo vehicle, which was allegedly hired by the ATS from Nashik for Abrar and his wife, is seen in another photograph.


Also, the reply to an RTI query has revealed that Sadashiv Abhimanyu Patil, a constable at the Nashik unit of the ATS, had been sending money orders to Abrar when he was in Byculla jail in Mumbai. He sent money in August, September and November 2008 from his residential address at the police headquarters in Nashik.


Abrar has named some top Maharastra police officers in the conspiracy—K.P. Raghuvanshi, then ATS chief (now Thane police commissioner), Subodh Jaiswal, then additional commissioner of police (now joint secretary at cabinet secretariat), Rajwardhan, then additional superintendent of police in Malegaon (now additional police commissioner of the economic offences wing in Mumbai).


Raghuvanshi, however, denied the charges. “We arrested him because we had evidence that he was a part of terrorist cell,” he said.


The ATS investigation was done under the supervision of then director-general of police P.S. Pasricha. When contacted by THE WEEK, Pasricha said he did not personally investigate the case. “My two officers, Raghuvanshi and Jaiswal, were investigating the case. Both of them are very competent officers. I don't believe that they sabotaged or misled the investigation. There was no pressure on any officer to rush the investigation. They conducted a proper probe and I have no reason to believe that they misled the investigation. Yet, if there is any proof, we all are subjected to stand before the court,” he said.


Rajwardhan said he was not the investigating officer of the case. “I was the [additional] superintendent of police of Malegaon. A few months after the bomb blasts, Abrar confessed his involvement in the conspiracy. His allegations are not new. He has made similar allegations during the trial. As the case is sub judice it would not be proper for me to further comment on it,” he said.


The Malegaon blast was one of the first major cases that the ATS investigated after it was formally formed on July 8, 2004 to counter terrorism and organised crime syndicates. From the very beginning, however, the investigation ran into the sand. Soon after the explosions, the police released sketches of two suspects. The sketches did not match any of the nine men arrested by the ATS. The court records accessed by THE WEEK show that the two main accused—Noorul Huda and Shabbir Masiulla—had been under police surveillance for at least a couple of months when the blasts happened.


Masiulla, in fact, was in jail when the bombs went off. The ATS alleged that he was associated with the terror outfit Lashkar-e-Toiba and had received training in Pakistan, and a sample collected from his workshop showed traces of RDX, an explosive used in the blast. Zahid Majid, another person arrested and was accused in the chargesheet of planting the bombs, was in Fulsawangi, about 500km away from Malegaon, at the time of the blasts.


The ATS never recorded the statements of any of the crucial witnesses, such as friends and neighbours of the accused. Also, it did not bother to investigate the mysterious death of Mohammad Azhar, 32, a powerloom worker who had claimed to have seen one of the bombers. Azhar met some community leaders a day after the bomb blasts and told them that he had seen a bomber. Maulana Abdul Malik Bakra, a village head, told him to come the next day so that his statement could be taped before informing the police. Azhar's body was found in his compound the next day. The police registered it as a case of suicide. “We know the family was reluctant to do the postmortem but the police should have investigated the murder,” said Bakra. “He was an important witness in the case.”


The ATS built its case primarily on the interrogations. But all the accused retracted the statements given in custody. So the ATS invoked the Maharashtra Control of Organised Crime Act (MCOCA), under which custody confessions are admissible in court. This effectively shut off further investigation into the case. But only till another round of bombs exploded in Malegaon on September 29, 2008.


A motorcycle found at one of the explosion sites led the investigators to Pragya Thakur, a key member of Abhinav Bharat. Further investigation by the ATS, then led by Karkare, found that Abhinav Bharat was formed to avenge terrorist attacks by Islamist groups on Hindu temples. Evidence of the outfit's involvement in other attacks started surfacing after its ideologue Swami Aseemanand's confession that his men carried out the bomb blasts.


According to an NIA officer, Abhinav Bharat had bigger plans and targets. Vice-President Mohammad Hamid Ansari was one. His security was tightened after the agencies learned about the threat. Another target, allegedly, was Rashtriya Swayamsevak Sangh chief Mohan Bhagwat, who, the outfit thought, was not doing enough for the Hindutva cause. The Maharashtra government has suggested to the Union government to include the name of Abhinav Bharat in the schedule of terrorist organisations under Section 35 of the Unlawful Activities (Prevention) Act, (UAPA) 1967.


The NIA investigation has revealed that Purohit was never authorised by the Military Intelligence to probe the 2006 Malegaon blast. Then posted in Nashik, he allegedly misled the investigation by filing a report saying that Noorul Huda, who was a member of the banned Students Islamic Movement of India, was involved in the blasts. “Abrar implicated us in the case for some petty money and the ATS never bothered to believe us,” said Huda.
The NIA is facing its own share of difficulties in investigating the case. The evidences and reports have changed many a hand before reaching the agency. In another setback to the NIA, the Supreme Court restrained it from interrogating Pragya Thakur in the murder of Sunil Joshi, a founder member of Abhinav Bharat. Joshi, an important link to Malegaon and other attacks, was shot dead in Dewas, Madhya Pradesh, on December 29, 2007.


Pragya challenged the NIA's authority to probe the case on the ground that its FIR had been lodged before the inception of the agency in 2008. Earlier this year, the Supreme Court had restrained the NIA from questioning Purohit and Sudhakar Dhar Dwivedi, another accused. To make things worse, the NIA could not file a chargesheet in the given 90 days against another accused, Lokesh Sharma, who was subsequently granted bail. Currently, the agency is on a hunt for two key members of Abhinav Bharat—Sandeep Dange and Ram Chandra Kalsangra.


Abrar's claims raise certain important questions: How much did the investigation agencies know about Abhinav Bharat at the time of the first Malegaon blast? Did some ATS officers deliberately sabotage the investigation, or is Abrar a bluff who misled everyone? All eyes are on the NIA, as the agency is expected to file the probe report in the MCOCA court in December.

Deadly connection

If the ATS investigation in the 2006 Malegaon blasts had gone the right way, many other terrorist attacks could have been prevented, as the bombers of Malegaon struck in several other places.


* Samjhauta Express 2007: Bombs went off in two coaches of the cross-border train, killing 68 people. Investigations revealed that Abhinav Bharat activists were responsible for the attack.


* Mecca Masjid 2007: Bomb blasts at the Hyderabad mosque killed 14 people. Swami Aseemanand of Abhinav Bharat, who was arrested later, confessed his and the outfit's role in the strike. In March 2011, however, he retracted the statement.


* Ajmer Sharif 2007: Bomb explosion at the Sufi shrine killed three persons and injured dozens. Aseemanand said Abhinav Bharat's Sunil Joshi conducted the blasts to avenge Islamist terrorists' attacks on Hindu temples.


* Malegaon 2008: A series of bombs struck Malegaon again. Investigation led to the arrest of several members of Abhinav Bharat, including of Pragya Singh Thakur and a serving Military Intelligence officer, Lt-Col Prasad Shrikant Purohit.

Changing times


* September 8, 2006: A series of bomb blasts rips Malegaon apart, killing 31 people and injuring 300. The Maharashtra ATS starts investigation.


* December 21, 2006: Maharashtra government asks the CBI to take over the probe. The ATS files the chargesheet against nine Malegaon residents the same day.


* September 29, 2008: Another series of bomb blasts rocks Malegaon. Similar blasts happen in Gujarat. The ATS, now headed by Hemant Karkare, blows the lid off a conspiracy. Eleven members of Abhinav Bharat, a Hindu right-wing organisation, including Lt-Col Purohit, a Military Intelligence officer, and Pragya Thakur are arrested.


* November 19, 2010: Swami Aseemanand is arrested and confesses that a team of RSS pracharaks exploded bombs in Malegaon in 2006 and 2008, on the Samjhauta Express in 2007, in Ajmer Sharif in Rajasthan 2007 and in Mecca Masjid in Hyderabad in 2007.


* April 2011: Government transfers the case to the NIA. Seven people whom the ATS initially arrested get bail.


* November 2012: Abrar Ahmed, the sole approver in the case, tells THE WEEK that some senior officers of the ATS knew the real culprits and they deliberately misled the investigation.


Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 27,2020

Due to impacts of COVID-19, shipments of total mobile phones are forecast to decline 14.6% in 2020, while smartphone shipments will achieve a slightly slower decline of 13.7 % year over year to total 1.3 billion units this year, according to a Gartner forecast on Tuesday.

"While users have increased the use of their mobile phones to communicate with colleagues, work partners, friends and families during lockdowns, reduced disposable income will result in fewer consumers upgrading their phones," Ranjit Atwal, Senior Research Director at Gartner, said in a statement.

"As a result, phone lifetimes will extend from 2.5 years in 2018 to 2.7 years in 2020," said Atwal.

In 2020, affordable 5G phones were expected to be the catalyst to increase phone replacements, but now it is unlikely to be the case.

5G phones are now forecast to represent only 11% of total mobile phone shipments in 2020.

"The delayed delivery of some 5G flagship phones is an ongoing issue," said Annette Zimmermann, Research Vice President at Gartner.

"Moreover, the lack of 5G geographical coverage along with the increasing cost of the 5G phone contract will impact the choice of a 5G phone."

Overall, spending on 5G phones will be impacted in most regions apart from China, where continued investment in 5G infrastructure is expected, allowing providers in China to effectively market 5G phones.

The combined global shipments PCs, tablets and mobile phones are on pace to decline 13.6% in 2020, according to the forecast.

PC shipments are expected to decline 10.5% this year. Shipments of notebooks, tablets and Chromebooks are forecast to decline slower than the PC market overall in 2020.

"The forecasted decline in the PC market in particular could have been much worse," said Atwal.

"However, government lockdowns due to COVID-19 forced businesses and schools to enable millions of people to work from home and increase spending on new notebooks, Chromebooks and tablets for those workers. Education and government establishments also increased spending on those devices to facilitate e-learning."

Gartner said that 48 per cent of employees will likely work remotely at least part of the time after the COVID-19 pandemic, compared to 30 % pre-pandemic.

Overall, the work from home trend will make IT departments shift to more notebooks, tablets and Chrome devices for work.

"This trend combined with businesses required to create flexible business continuity plans will make business notebooks displace desk based PCs through 2021 and 2022," said Atwal.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 13,2020

Amid the rapid spread of the novel coronavirus (COVID-19), which has infected 73 people in India and killed more than 4,500 individuals globally, doctors have advised that in addition to regularly washing hands, one should also disinfect their smartphone every 90 minutes with alcohol-based hand sanitizer.

Ravi Shekhar Jha, Head of Department at Fortis Escorts Hospital in Faridabad said the best method to disinfect your smartphone is to use regular doctor spirit or the alcohol-based hand sanitizer at least every 90 minutes.

"Avoid touching your eyes, mouth, or nose. The best option is to use a phone cover or a Bluetooth device and try to touch your phone as less as possible. We would also recommend cleaning your phone at least twice a day," Jha told IANS.

According to research, published in 2018 by Insurance2Go, a gadget insurance provider, revealed that smartphone screens have three times more germs than a toilet seat.

One in 20 smartphone users was found to clean their phones less than every six months, said the study.

"In the time of fear of coronavirus, smartphones should also be disinfected with alcohol-based sanitizer rub. Pour few drops of sanitizer on a tiny clean cotton pad and rub it safely on your entire phone," said Jyoti Mutta, Senior Consultant, Microbiology, Sri Balaji Action Medical Institute in New Delhi.

"You can repeat this process every evening coming back home after an entire day out at work and once in the morning before going out," Mutta added.

"Maintain basic cleanliness, and try to avoid using other's phones especially if suffering from respiratory illness or flu-like symptoms as there is no other way to disinfect these regular gadgets," she stressed.

Another study from the University of Surrey in the UK, also found that the home button on your smartphone may be harbouring millions of bacteria - some even harmful.

The World Health Organisation (WHO) declared the novel coronavirus as a global pandemic on Wednesday. The death toll of COVID-19 has crossed the 4,500 marks and confirmed cases globally have touched one lakh as per the reports.

According to Suranjeet Chatterjee, Senior Consultant in Internal Medicine Department of Indraprastha Apollo Hospitals in New Delhi, "We should frequently wash our hands, cover our coughs and it is important to adapt to other good hygiene habits that are most important in such a situation."

"Coronavirus and other germs can live on surfaces like glass, metal or plastics and phones are bacteria-ridden. It is necessary that we sanitize our hands frequently and make sure that our hands are clean all the time," Chatterjee told IANS.

"The emphasis should be laid on sanitising our hands rather than sanitizing the phone - once in a while the phone can be sanitized under the guidance of the makers of the phone," Chatterjee stressed.

According to the global health agency, the most effective way to protect yourself against coronavirus is by frequently cleaning of your hands with alcohol-based hand rub or washing them with soap and water.

The WHO's report showed the virus infects people of all ages, among which older people and those with underlying medical conditions are at a higher risk of getting infected.

People should eat only well-cooked food, avoid spitting in public, and avoid close contact, the WHO said, adding that it is important for people to seek medical care at the earliest if they become sick.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.