NIA arrests father-daughter duo for sheltering Pulwama bomber

Agencies
March 3, 2020

Kashmir, Mar 3: Four days after the National Investigation Agency made a major breakthrough in the Pulwama terror attack case over a year after the bombing, arresting one person who had sheltered the suicide bomber Adil Ahmad Dar, the NIA on Tuesday arrested two more people in the case - a father-daughter duo - who had also provided shelter to the bomber, officials said.

The NIA also claimed that the video of the suicide bomber was also recorded at their residence and released by the Jaish-e-Mohammad (JeM) terror group from Pakistan after the attack. An NIA spokesperson in Delhi said: "Two more persons have been arrested by the agency in the Pulwama terror attack case and they have been identified as Insha Jan, 23, and her father Tariq Ahmed Shah, 50, who works as a tipper driver."

The official said that the father-daughter duo have been arrested from Hakripora area in Pulwama for their involvement in the attack. The two were arrested on early Tuesday morning after senior officials of the NIA raided their house on Monday night.

A senior NIA official related to the probe told IANS: "The video of Dar, who attacked the CRPF convoy, was recorded at the home of the duo. And the same video was released soon after the Pulwama terror attack by the JeM terrorists from a Pakistani IP address."

He said, "The video was shared by them to their handlers in Pakistan."

The spokesperson further claimed that during the probe Tariq Ahmed Shah disclosed that his house in Hakripora area was used by Dar, Mohammad Umar Farooq, a Pakistani terrorist and IED maker, Kamran - another Pakistani terrorist (both were later killed in encounters with security forces), Sameer Ahmed Dar, a Jaish-e-Mohammad terrorist from Pulwama and Mohammad Ismail aka Ibrahim, a Pakistani terrorist.

The spokesperson said that Shah facilitated all the terrorists at his house for sheltering and for planning of the heinous attack on the CRPF convoy. He said Jan, daughter of Shah, facilitated the terrorists at their home and provided food and other logistics during their stay on more than 15 occasions for two to four days each time, in their house during the year 2018-2019.

"Initial interrogation has revealed that Jan was in constant touch with Farooq and was in communication with him over telephone and other social media applications," the spokesperson said. The fresh arrests of the two accused brings the total number of arrests in the case to three.

The arrests were made on the revelations of Shakir Bashir Magrey, who was arrested by the anti-terror probe agency on February 28. According to senior NIA officials, more arrests will be made in the coming days. Magrey, a resident of Hajibal, Kakapora in Pulwama district of Jammu & Kashmir, is an overground worker (OGW) of the Pakistan-based Jaish-e-Mohammad (JeM).

According to agency sources, Magrey allegedly provided shelter and other logistical assistance to the Pulwama suicide bomber. He was sent to 15 days' NIA custody by a special NIA court in Jammu & Kashmir on Friday. During interrogation, Magrey revealed that he had harboured Dar and Pakistan-based terrorist Mohammad Umar Farooq in his house from late 2018 till the attack in February 2019 and assisted them in the preparation of the Improvised Explosive Device (IED). His shop is located near Lethpora bridge, and as advised by Mohammad Umar, he started conducting reconnaissance of the movement of CRPF convoys on Jammu-Srinagar Highway in January 2019, and informed Mohammad Umar and Adil Ahmad Dar about it.

Magrey was also involved in modifying the Maruti Eeco car and fitting the IED into it in early February, 2019 and was introduced to Adil Ahmad Dar in mid-2018 by Mohammad Umar and he became a full-time OGW of JeM.

"During his initial interrogation, he disclosed that on several occasions, he collected and delivered arms, ammunition, cash and explosive material to JeM terrorists, including those involved in the Pulwama attack," the agency had said on February 28.

"During investigation, the make, model and number of the car used in the attack was quickly ascertained by NIA to be a Maruti Eeco through forensic examination of the tiny remnants of the car which were found at the spot during extended searches," the agency stated.

"This has been corroborated by accused Shakir Bashir Magrey. The explosives used in the attack were determined to be ammonium nitrate, nitro-glycerin and RDX, through forensic investigation," it said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Nerwork
June 7,2020

New Delhi, Jun 7: Rain lashed some parts of the Delhi-NCR on Sunday morning.

The India Meteorological Department (IMD) has predicted partly cloudy sky with possibility of development of thunder lightning for three days from June 10 onwards with minimum and maximum temperature will hover around 29° Celcius and 42° Celcius respectively.

Strong surface winds during day time have been predicted for today by IMD.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 3,2020

New Delhi, Feb 3: In the third such incident inside of a week, two unidentified persons opened fire outside Gate No. 5 of Jamia Millia Islamia on Sunday night, the Jamia Coordination Committee (JCC) said.

A statement issued by the committee, a group comprising students and alumni of the university formed to protest against the Citizenship Amendment Act, said the attackers were on a red Rcooty.

No one was injured in the attack. One of the miscreants was wearing a red jacket, the statement said.

"Firing has taken place at Gate No.5 of Jamia Millia Islamia right now by two unidentified persons. As per report, one of them was wearing a red jacket and driving a red Scooty having vehicle no. 1532 or 1534," the statement said.

Police said they were verifying the JCC's claims.

Asim Mohammed Khan, former Congress MLA from Okhla, said the incident occurred around 11.30 pm. "We heard the gunshot. That is when we stepped out to see and the two men left on a Scooty," a student said.

"We have taken down the vehicle number and called police," he added.

This is the third firing incident in the Jamia Nagar area in a week.

On Thursday, a minor fired at anti-CAA protesters marching towards Rajghat, injuring a student.

Two days later, a 25-year-old fired two rounds in air in Shaheen Bagh in Jamia Nagar. No one was hurt in the incident.

The incident on Sunday night triggered panic in the area. A police vehicle had reached the spot after the incident but was chased away by angry students.

Hundreds of students and locals gathered outside the university.

Many raised slogans against the Delhi Police. They also staged a dharna outside the Jamia Nagar police station.

Shezad Ahmed, a JMI student and resident of Zakir Nagar, said they were not even allowed to protest peacefully.

"We are not going to be deterred by such incidents. We will continue with our protest," he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.