03-01-2009, 03:52 AM
<b>VoIP data is a pointer to Lashkarâs wide network
</b>
Rahi Gaikwad
IP addresses traced to Chicago, Kuwait and Russia
Terrorists were in âconstant communication with co-conspiratorsâ
One IP address belongs to Col. R. Saadat Ullah
Mumbai: Technical data collected by tracing the phone calls between the Mumbai attackers and their handlers and co-conspirators serve as an indicator of the worldwide reach of the terror outfit Lashkar-e-Taiba.
IP (Internet Protocol) addresses listed in the November 26, 2008, charge sheet have been traced to Pakistan, Chicago in the U.S., Kuwait and Moscow in Russia. They form part of the technical evidence collected by the Mumbai Crime Branchâs Cyber Cell. There are 10 IP addresses in the charge sheet, out of which five are from Pakistan, two from Chicago, two from Russia and one from Kuwait.
According to the charge sheet, the terrorists were in âconstant communication with the co-conspiratorsâ and made 384 calls. These calls were made from three mobile numbers 9819464530, 9820704561 and 9910719424. âInstructional and motivational inputs were being provided with alarming regularityâ and the briefing among the conspirators happened in real time.
A total of 41 calls (8,834 seconds) were made from the Taj Mahal Palace and Tower hotel, 62 calls (15,705 seconds) were made from Oberoi-Trident hotels and 181 calls (35,172 seconds) were made from Nariman House, the charge sheet states.
The attackers and conspirators spoke using the VoIP (Voice over Internet Protocol) service, which uses the Internet as a medium of communication. For this, an account with the New Jersey-based VoIP provider CallPhonex was created by a person who called himself Kharak Singh.
The charge sheet states: ââ¦on October 20 and 21, 2008, an individual identifying himself as Kharak Singh indicated that he was a VoIP reseller located in India and was interested in establishing an account with CALLPHONEX.â All the calls were made via CallPhonex.
Kharak Singh, a pseudonym used by a Pakistani national, created an id kharak_telco@yahoo.com, with CallPhonex. It is this id, which was accessed by the 10 IP addresses, to make payments to CallPhonex.
âSinghâ is a wanted accused in the charge sheet.
While speculation about the involvement of Pakistani army officers is rife, data culled by tracking this VoIP communication has thrown up the name of one Col. R. Saadat Ullah.
The charge sheet says that Saadat Ullah belongs to Special Communication Organisation located in Rawalpindi, Pakistan. Another member of this organisation, Khurram Shazad, is also linked to the IP address. Ullah and Shazad are listed as wanted accused in the case.
They also shared an email id pmit@sco.gov.pk. They âfacilitated the communication between the deceased accused and the wanted accused.â The charge sheet mentions a Russian name Vladimir N. Zernov. There is an indication from the police that he is a real person. During the attacks, a threatening email from the id deccanmujahideen@gmail.com, sent to a television channel on November 27, 2008, was traced to Zernovâs IP address in Russia, the charge sheet states.
In addition, Ahemed Mekky from Kuwait is also on the IP list.
While the terrorists used five Nokia mobile handsets from Pakistan for communication, they used five GPS (Global Positioning System) handsets for navigation.
</b>
Rahi Gaikwad
IP addresses traced to Chicago, Kuwait and Russia
Terrorists were in âconstant communication with co-conspiratorsâ
One IP address belongs to Col. R. Saadat Ullah
Mumbai: Technical data collected by tracing the phone calls between the Mumbai attackers and their handlers and co-conspirators serve as an indicator of the worldwide reach of the terror outfit Lashkar-e-Taiba.
IP (Internet Protocol) addresses listed in the November 26, 2008, charge sheet have been traced to Pakistan, Chicago in the U.S., Kuwait and Moscow in Russia. They form part of the technical evidence collected by the Mumbai Crime Branchâs Cyber Cell. There are 10 IP addresses in the charge sheet, out of which five are from Pakistan, two from Chicago, two from Russia and one from Kuwait.
According to the charge sheet, the terrorists were in âconstant communication with the co-conspiratorsâ and made 384 calls. These calls were made from three mobile numbers 9819464530, 9820704561 and 9910719424. âInstructional and motivational inputs were being provided with alarming regularityâ and the briefing among the conspirators happened in real time.
A total of 41 calls (8,834 seconds) were made from the Taj Mahal Palace and Tower hotel, 62 calls (15,705 seconds) were made from Oberoi-Trident hotels and 181 calls (35,172 seconds) were made from Nariman House, the charge sheet states.
The attackers and conspirators spoke using the VoIP (Voice over Internet Protocol) service, which uses the Internet as a medium of communication. For this, an account with the New Jersey-based VoIP provider CallPhonex was created by a person who called himself Kharak Singh.
The charge sheet states: ââ¦on October 20 and 21, 2008, an individual identifying himself as Kharak Singh indicated that he was a VoIP reseller located in India and was interested in establishing an account with CALLPHONEX.â All the calls were made via CallPhonex.
Kharak Singh, a pseudonym used by a Pakistani national, created an id kharak_telco@yahoo.com, with CallPhonex. It is this id, which was accessed by the 10 IP addresses, to make payments to CallPhonex.
âSinghâ is a wanted accused in the charge sheet.
While speculation about the involvement of Pakistani army officers is rife, data culled by tracking this VoIP communication has thrown up the name of one Col. R. Saadat Ullah.
The charge sheet says that Saadat Ullah belongs to Special Communication Organisation located in Rawalpindi, Pakistan. Another member of this organisation, Khurram Shazad, is also linked to the IP address. Ullah and Shazad are listed as wanted accused in the case.
They also shared an email id pmit@sco.gov.pk. They âfacilitated the communication between the deceased accused and the wanted accused.â The charge sheet mentions a Russian name Vladimir N. Zernov. There is an indication from the police that he is a real person. During the attacks, a threatening email from the id deccanmujahideen@gmail.com, sent to a television channel on November 27, 2008, was traced to Zernovâs IP address in Russia, the charge sheet states.
In addition, Ahemed Mekky from Kuwait is also on the IP list.
While the terrorists used five Nokia mobile handsets from Pakistan for communication, they used five GPS (Global Positioning System) handsets for navigation.