FEATUREDLatestNationalNewsTODAY'S STORIESTOP STORIES

Terrorist Organizations Using Turkish-Made App: Jammu Kashmir

Terrorist organizations using Turkish-made app revealed in the interrogation of terrorists: Jammu Kashmir.

Terrorist organizations in Pakistan, which are considering it as unsafe, have started airing terror with new messaging apps amid reports of WhatsApp’s secret leaking.

The specialty of these apps is that they can also work at 2G speed. Terrorist handlers in Pakistan are now using an app developed by a Turkish company.

Some militants who surrendered during a recent encounter in Kashmir have given this information to the army during interrogation.

The surrendered terrorists said that now three new messaging apps are being used from across the border.

Terrorist organizations are considering it safe to send their messages to the terrorists in Kashmir. These three new apps are made by an American company, a European and a Turkish company.

Handlers are also using these three apps to mislead the youth of Kashmir. These three apps can also work on the low speed of 2G internet.

Explain that the government of Jammu and Kashmir has banned 4G mobile networks from August 2019. Last year 2G internet services were started. Only two districts Udhampur and Ganderbal are running 4G.

The app with the most secure encryption algorithm:

In the changed situation, the terrorists and their handlers have stopped using WhatsApp and Facebook Messenger. The RSA-2048 encryption algorithm is used in apps considered safe by them.

American Security Network Authentication Company is created by American citizen Rann Rivest, Israel’s accustomed Shamir, Leonard Adleman of America.

The RSA-2048 encryption algorithm is considered the safest in the world. In such a situation, the terrorists are trying to mislead the youth of Kashmir through new messaging apps.

Virtual sim used in Pulwama attack:

The case of the use of technology in Jammu and Kashmir by terrorists took place in the Pulwama attack in 2019. Jaish’s attacker used a virtual SIM to attack the CRPF convoy.

An investigation by the NIA revealed that 40 virtual SIMs were used in the Pulwama attack itself. Virtual SIM is generated by a person sitting in a distant country.

It is used in another country. A telephone number is generated by the computer with this technique. An application using it is downloaded and used to call it on its smartphone.

Leave a Reply

Your email address will not be published. Required fields are marked *