Home / Mumbai / Mumbai News / Article / How terror suspects from Mumbra 'ducked' the authorities' radar

How terror suspects from Mumbra 'ducked' the authorities' radar

Ten suspects, who had planned to poison maha prasad at the Mumbreshwar temple, used search engine DuckDuckGo and the Textnow app to secretly communicate on social media platforms

Listen to this article :
Representational picture

Representational picture

Days after the Maharashtra Anti Terrorism Squad (ATS) filed a charge sheet against 10 Mumbra-based terror suspects, arrested in January this year, the cops found that they were using a search engine DuckDuckGo to hide their search details and dodge law enforcers. Investigation has revealed that they were using a mobile-run application Textnow to procure virtual contact numbers and get themselves registered on various social media platforms. Thereafter, they used to secretly communicate with each other through those platforms to execute their plan.

ATS sources further said the group — Ummat-E-Mohammaddiya — inspired by controversial Islamic preacher Zakir Naik, had allegedly planned to poison the maha prasad given out to devotees at Mumbreshwar temple. They further revealed that they had conducted trial explosions at the foothill of the Mumbra bypass. The nine suspects (tenth one a minor) have been identified as Mohsin Khan alias Abu Mary, Atai Waris Shaikh alias Mazhar, Mohammad Takky Khan alias Abu Khalid, Mushahed Ul-Islam Majid, Mohammad Sarfaraj Usmani, Jamman Nawab Khutepad, Salman Sirajuddin Khan, Fahad Ansari and Talha Potrick.

How do you like the new new mid-day.com experience? Share your feedback and help us improve.

Read Next Story
Ganesh Naik's son, 3 others hand in resignations

Trending Stories

Latest Photoscta-pos

Latest VideosView All

Latest Web StoriesView All

Mid-Day FastView All

Advertisement