☀️ JOIN SPN MOBILE
Forums
New posts
Guru Granth Sahib
Composition, Arrangement & Layout
ਜਪੁ | Jup
ਸੋ ਦਰੁ | So Dar
ਸੋਹਿਲਾ | Sohilaa
ਰਾਗੁ ਸਿਰੀਰਾਗੁ | Raag Siree-Raag
Gurbani (14-53)
Ashtpadiyan (53-71)
Gurbani (71-74)
Pahre (74-78)
Chhant (78-81)
Vanjara (81-82)
Vaar Siri Raag (83-91)
Bhagat Bani (91-93)
ਰਾਗੁ ਮਾਝ | Raag Maajh
Gurbani (94-109)
Ashtpadi (109)
Ashtpadiyan (110-129)
Ashtpadi (129-130)
Ashtpadiyan (130-133)
Bara Maha (133-136)
Din Raen (136-137)
Vaar Maajh Ki (137-150)
ਰਾਗੁ ਗਉੜੀ | Raag Gauree
Gurbani (151-185)
Quartets/Couplets (185-220)
Ashtpadiyan (220-234)
Karhalei (234-235)
Ashtpadiyan (235-242)
Chhant (242-249)
Baavan Akhari (250-262)
Sukhmani (262-296)
Thittee (296-300)
Gauree kii Vaar (300-323)
Gurbani (323-330)
Ashtpadiyan (330-340)
Baavan Akhari (340-343)
Thintteen (343-344)
Vaar Kabir (344-345)
Bhagat Bani (345-346)
ਰਾਗੁ ਆਸਾ | Raag Aasaa
Gurbani (347-348)
Chaupaday (348-364)
Panchpadde (364-365)
Kaafee (365-409)
Aasaavaree (409-411)
Ashtpadiyan (411-432)
Patee (432-435)
Chhant (435-462)
Vaar Aasaa (462-475)
Bhagat Bani (475-488)
ਰਾਗੁ ਗੂਜਰੀ | Raag Goojaree
Gurbani (489-503)
Ashtpadiyan (503-508)
Vaar Gujari (508-517)
Vaar Gujari (517-526)
ਰਾਗੁ ਦੇਵਗੰਧਾਰੀ | Raag Dayv-Gandhaaree
Gurbani (527-536)
ਰਾਗੁ ਬਿਹਾਗੜਾ | Raag Bihaagraa
Gurbani (537-556)
Chhant (538-548)
Vaar Bihaagraa (548-556)
ਰਾਗੁ ਵਡਹੰਸ | Raag Wadhans
Gurbani (557-564)
Ashtpadiyan (564-565)
Chhant (565-575)
Ghoriaan (575-578)
Alaahaniiaa (578-582)
Vaar Wadhans (582-594)
ਰਾਗੁ ਸੋਰਠਿ | Raag Sorath
Gurbani (595-634)
Asatpadhiya (634-642)
Vaar Sorath (642-659)
ਰਾਗੁ ਧਨਾਸਰੀ | Raag Dhanasaree
Gurbani (660-685)
Astpadhiya (685-687)
Chhant (687-691)
Bhagat Bani (691-695)
ਰਾਗੁ ਜੈਤਸਰੀ | Raag Jaitsree
Gurbani (696-703)
Chhant (703-705)
Vaar Jaitsaree (705-710)
Bhagat Bani (710)
ਰਾਗੁ ਟੋਡੀ | Raag Todee
ਰਾਗੁ ਬੈਰਾੜੀ | Raag Bairaaree
ਰਾਗੁ ਤਿਲੰਗ | Raag Tilang
Gurbani (721-727)
Bhagat Bani (727)
ਰਾਗੁ ਸੂਹੀ | Raag Suhi
Gurbani (728-750)
Ashtpadiyan (750-761)
Kaafee (761-762)
Suchajee (762)
Gunvantee (763)
Chhant (763-785)
Vaar Soohee (785-792)
Bhagat Bani (792-794)
ਰਾਗੁ ਬਿਲਾਵਲੁ | Raag Bilaaval
Gurbani (795-831)
Ashtpadiyan (831-838)
Thitteen (838-840)
Vaar Sat (841-843)
Chhant (843-848)
Vaar Bilaaval (849-855)
Bhagat Bani (855-858)
ਰਾਗੁ ਗੋਂਡ | Raag Gond
Gurbani (859-869)
Ashtpadiyan (869)
Bhagat Bani (870-875)
ਰਾਗੁ ਰਾਮਕਲੀ | Raag Ramkalee
Ashtpadiyan (902-916)
Gurbani (876-902)
Anand (917-922)
Sadd (923-924)
Chhant (924-929)
Dakhnee (929-938)
Sidh Gosat (938-946)
Vaar Ramkalee (947-968)
ਰਾਗੁ ਨਟ ਨਾਰਾਇਨ | Raag Nat Narayan
Gurbani (975-980)
Ashtpadiyan (980-983)
ਰਾਗੁ ਮਾਲੀ ਗਉੜਾ | Raag Maalee Gauraa
Gurbani (984-988)
Bhagat Bani (988)
ਰਾਗੁ ਮਾਰੂ | Raag Maaroo
Gurbani (889-1008)
Ashtpadiyan (1008-1014)
Kaafee (1014-1016)
Ashtpadiyan (1016-1019)
Anjulian (1019-1020)
Solhe (1020-1033)
Dakhni (1033-1043)
ਰਾਗੁ ਤੁਖਾਰੀ | Raag Tukhaari
Bara Maha (1107-1110)
Chhant (1110-1117)
ਰਾਗੁ ਕੇਦਾਰਾ | Raag Kedara
Gurbani (1118-1123)
Bhagat Bani (1123-1124)
ਰਾਗੁ ਭੈਰਉ | Raag Bhairo
Gurbani (1125-1152)
Partaal (1153)
Ashtpadiyan (1153-1167)
ਰਾਗੁ ਬਸੰਤੁ | Raag Basant
Gurbani (1168-1187)
Ashtpadiyan (1187-1193)
Vaar Basant (1193-1196)
ਰਾਗੁ ਸਾਰਗ | Raag Saarag
Gurbani (1197-1200)
Partaal (1200-1231)
Ashtpadiyan (1232-1236)
Chhant (1236-1237)
Vaar Saarang (1237-1253)
ਰਾਗੁ ਮਲਾਰ | Raag Malaar
Gurbani (1254-1293)
Partaal (1265-1273)
Ashtpadiyan (1273-1278)
Chhant (1278)
Vaar Malaar (1278-91)
Bhagat Bani (1292-93)
ਰਾਗੁ ਕਾਨੜਾ | Raag Kaanraa
Gurbani (1294-96)
Partaal (1296-1318)
Ashtpadiyan (1308-1312)
Chhant (1312)
Vaar Kaanraa
Bhagat Bani (1318)
ਰਾਗੁ ਕਲਿਆਨ | Raag Kalyaan
Gurbani (1319-23)
Ashtpadiyan (1323-26)
ਰਾਗੁ ਪ੍ਰਭਾਤੀ | Raag Prabhaatee
Gurbani (1327-1341)
Ashtpadiyan (1342-51)
ਰਾਗੁ ਜੈਜਾਵੰਤੀ | Raag Jaijaiwanti
Gurbani (1352-53)
Salok | Gatha | Phunahe | Chaubole | Swayiye
Sehskritee Mahala 1
Sehskritee Mahala 5
Gaathaa Mahala 5
Phunhay Mahala 5
Chaubolae Mahala 5
Shaloks Bhagat Kabir
Shaloks Sheikh Farid
Swaiyyae Mahala 5
Swaiyyae in Praise of Gurus
Shaloks in Addition To Vaars
Shalok Ninth Mehl
Mundavanee Mehl 5
ਰਾਗ ਮਾਲਾ, Raag Maalaa
What's new
New posts
New media
New media comments
New resources
Latest activity
Videos
New media
New comments
Library
Latest reviews
Donate
Log in
Register
What's new
New posts
Menu
Log in
Register
Install the app
Install
Welcome to all New Sikh Philosophy Network Forums!
Explore Sikh Sikhi Sikhism...
Sign up
Log in
Discussions
Hard Talk
Interviews
26/11 Italian Police Explain How VOIP Was Used To Crack Terrorist Cell
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="spnadmin" data-source="post: 115943" data-attributes="member: 35"><p><span style="font-size: 15px"><span style="color: blue"><strong>Italian police explain how VOIP was used on 26/11 </strong></span></span> Vaiju Naravane <em> PowerPoint presentation spells out modus operandi of terrorists </em> </p><p> </p><p><strong> A slide from a PowerPoint presentation made by the Italian police shows the residence of the father-and-son duo, Mohammad Yaqub Janjua and Aamer Yaqub Janjua. A veritable phone centre with routers and modems was discovered there. These bypassed all norms of international telephone traffic and pricing and allowed the duo to defraud telephone companies of thousands of Euros.</strong></p><p><strong></strong></p><p><strong></strong> PARIS: In an internal PowerPoint presentation, of which <em>The Hindu</em> has obtained a copy, the Italian police and its top anti-terrorist unit, the DIGOS (Divisione Investigazioni Generali e Operazioni Speciali Antiterrorismo, spell out exactly how Pakistani operatives, using a series of false identities, activated a U.S.-based Voice-over-Internet Protocol (VOIP) which was used by handlers in Pakistan to give orders to Pakistani terrorists during the Mumbai attacks that began on November 26 last year. </p><p></p><p></p><p></p><p> The Italian investigations, which began in December 2008, culminated in the arrest of a father-and-son duo in the northern Italian city of Brescia on Saturday on charges of aiding and abetting terrorists, illegal money transfers and the smuggling of people. The presentation also states that on November 25, the eve of the attack, a request went out from a certain Kharak Singh to the telephone company to activate 5 Austrian DID lines for the VOIP account in the name of Mohammed Ashfaq from Pakistan. The request bore the number 88647675.</p><p></p><p></p><p> Slide No 6 of the presentation states that: “On November 25, 2008 [underlined] from Brescia, a person of Pakistani origin used Western Union to make a second payment for the VOIP account again using the phantom name of Kharak Singh. This payment was communicated to the Callphonex user by the so-called Kharak Singh via email and gave details about the person making the payment. This email, obtained by the FBI from Callphonex, confirms the payment and identifies the sender as Javaid Iqbal, born on 31 December 1962, and whose address is given as No. 125 Via Milano in Brescia.”</p><p></p><p></p><p> The presentation made by the Italain police and anti-terrorism unit and obtained by <em>The Hindu</em> further states: </p><p> “Investigations carried by DIGOS of Brescia in coordination with the Public Prosecutor’s office revealed that:</p><p></p><p></p><p> •Iqbal Javaid (sic) had never transited through Italian territory and that he was residing legally in the Barcelona region of Spain;</p><p></p><p></p><p> •The persons running the Western Union agency via Madina Trading in Brescia had used Iqbal Javaid’s identity and details and those of other subjects, without their knowledge, to carry out money transfer operations with the specific intention of hiding the identity of the real senders of the money because they could not or did not wish to be identified.</p><p></p><p></p><p> •From 2006 to 2008 Madina Trading used the identity of Iqbal Javaid over 300 times to send money to various countries totalling over 400,000 Euros.”</p><p></p><p></p><p> When questioned, the Janujas unhesitatingly described Iqbal Javaid from Brescia as a regular customer who often sent cash out of the country, the report says. The order for the payment made on 25 November in fact came illegally using the havala/hundi method and was given by two individuals in Pakistan. Their details have been communicated to investigation agencies. </p><p></p><p></p><p></p><p> Madina Trading also defrauded telephone companies by using an alternative and illegal dialling system using a CD called Premium.</p><p> Slide three of the internal presentation made by the Italian police and their top anti-terrorism unit, the DIGOS, gives the following details:</p><p></p><p></p><p> “During the attacks of November 26 the terrorists used the U.S. based number 201-253-1824 to communicate amongst themselves. The number is the property of the Belgian company Voxbone and was leased to the American telecommunications company Callphonex which has its headquarters in New Jersey, USA. Even during the attack phase of their operation, the terrorists’ commander continued to receive instructions and information by telephone from his handlers using the number 201-253-1824 for all calls routed to India,” the power-point presentation states. </p><p></p><p></p><p></p><p> Slide no 4 of the presentation states: “This type of numbering in fact consists of the use of a ‘telephone exchange’ or ‘server’ which furnishes a VOIP service which acts as a telephone service provider via the internet. In this case the VOIP service was activated by a certain Kharak Singh through an initial transfer of money through ‘Moneygram’ in the name of Mohammed Ashfaq in Pakistan.”</p></blockquote><p></p>
[QUOTE="spnadmin, post: 115943, member: 35"] [SIZE=4][COLOR=blue][B]Italian police explain how VOIP was used on 26/11 [/B][/COLOR][/SIZE] Vaiju Naravane [I] PowerPoint presentation spells out modus operandi of terrorists [/I] [B] A slide from a PowerPoint presentation made by the Italian police shows the residence of the father-and-son duo, Mohammad Yaqub Janjua and Aamer Yaqub Janjua. A veritable phone centre with routers and modems was discovered there. These bypassed all norms of international telephone traffic and pricing and allowed the duo to defraud telephone companies of thousands of Euros. [/B] PARIS: In an internal PowerPoint presentation, of which [I]The Hindu[/I] has obtained a copy, the Italian police and its top anti-terrorist unit, the DIGOS (Divisione Investigazioni Generali e Operazioni Speciali Antiterrorismo, spell out exactly how Pakistani operatives, using a series of false identities, activated a U.S.-based Voice-over-Internet Protocol (VOIP) which was used by handlers in Pakistan to give orders to Pakistani terrorists during the Mumbai attacks that began on November 26 last year. The Italian investigations, which began in December 2008, culminated in the arrest of a father-and-son duo in the northern Italian city of Brescia on Saturday on charges of aiding and abetting terrorists, illegal money transfers and the smuggling of people. The presentation also states that on November 25, the eve of the attack, a request went out from a certain Kharak Singh to the telephone company to activate 5 Austrian DID lines for the VOIP account in the name of Mohammed Ashfaq from Pakistan. The request bore the number 88647675. Slide No 6 of the presentation states that: “On November 25, 2008 [underlined] from Brescia, a person of Pakistani origin used Western Union to make a second payment for the VOIP account again using the phantom name of Kharak Singh. This payment was communicated to the Callphonex user by the so-called Kharak Singh via email and gave details about the person making the payment. This email, obtained by the FBI from Callphonex, confirms the payment and identifies the sender as Javaid Iqbal, born on 31 December 1962, and whose address is given as No. 125 Via Milano in Brescia.” The presentation made by the Italain police and anti-terrorism unit and obtained by [I]The Hindu[/I] further states: “Investigations carried by DIGOS of Brescia in coordination with the Public Prosecutor’s office revealed that: •Iqbal Javaid (sic) had never transited through Italian territory and that he was residing legally in the Barcelona region of Spain; •The persons running the Western Union agency via Madina Trading in Brescia had used Iqbal Javaid’s identity and details and those of other subjects, without their knowledge, to carry out money transfer operations with the specific intention of hiding the identity of the real senders of the money because they could not or did not wish to be identified. •From 2006 to 2008 Madina Trading used the identity of Iqbal Javaid over 300 times to send money to various countries totalling over 400,000 Euros.” When questioned, the Janujas unhesitatingly described Iqbal Javaid from Brescia as a regular customer who often sent cash out of the country, the report says. The order for the payment made on 25 November in fact came illegally using the havala/hundi method and was given by two individuals in Pakistan. Their details have been communicated to investigation agencies. Madina Trading also defrauded telephone companies by using an alternative and illegal dialling system using a CD called Premium. Slide three of the internal presentation made by the Italian police and their top anti-terrorism unit, the DIGOS, gives the following details: “During the attacks of November 26 the terrorists used the U.S. based number 201-253-1824 to communicate amongst themselves. The number is the property of the Belgian company Voxbone and was leased to the American telecommunications company Callphonex which has its headquarters in New Jersey, USA. Even during the attack phase of their operation, the terrorists’ commander continued to receive instructions and information by telephone from his handlers using the number 201-253-1824 for all calls routed to India,” the power-point presentation states. Slide no 4 of the presentation states: “This type of numbering in fact consists of the use of a ‘telephone exchange’ or ‘server’ which furnishes a VOIP service which acts as a telephone service provider via the internet. In this case the VOIP service was activated by a certain Kharak Singh through an initial transfer of money through ‘Moneygram’ in the name of Mohammed Ashfaq in Pakistan.” [/QUOTE]
Insert quotes…
Verification
Post reply
Discussions
Hard Talk
Interviews
26/11 Italian Police Explain How VOIP Was Used To Crack Terrorist Cell
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top