In a major revelation from the investigation into the Red Fort terror incident, security agencies have uncovered that the accused individuals utilized untraceable 'ghost' SIM cards to maintain communication with their handlers based in Pakistan. This sophisticated method was employed to evade detection by Indian intelligence and law enforcement networks.
The Modus Operandi of the Attackers
Each person implicated in the plot, including the deceased Dr Umar-un-Nabi, was found to be in possession of multiple mobile handsets. According to officials, every accused carried two to three mobile phones. Dr Umar-un-Nabi, who was killed while driving the vehicle loaded with explosives near the historic Red Fort monument, was a central figure in this setup. The use of these 'ghost' SIMs—pre-activated cards often obtained without proper customer verification—allowed the network to operate under the radar, facilitating covert instructions and coordination.
Chronology and Key Facts
The incident, which sent shockwaves through the national capital, occurred recently. The news detailing these investigative findings was published on 04 January 2026, at 10:56 IST. The report highlights a critical vulnerability in telecom security that was exploited by the terror module. The primary communication trail leads back to operatives in Pakistan, indicating cross-border planning and direction for the attempted attack at one of India's most iconic and heavily secured landmarks.
Security Implications and Next Steps
This discovery has raised serious concerns among security agencies about the widespread availability and misuse of such anonymous SIM cards. The case underscores the evolving tactics of terror groups who are increasingly relying on technology to plan and execute attacks while hiding their digital footprints. Authorities are now likely to push for stricter enforcement of the KYC (Know Your Customer) norms by all telecom service providers and conduct a wider crackdown on the grey market for such SIM cards. The investigation remains active as agencies work to unravel the full network behind the Red Fort blast attempt.