Was the NSG spooked by ISI?

March 05, 2013 06:44 pm | Updated June 13, 2016 09:59 am IST - New Delhi

NSG forensic team ferrets out clues at the bomb blast site at Dilsukhnagar in Hyderabad. File photo.

NSG forensic team ferrets out clues at the bomb blast site at Dilsukhnagar in Hyderabad. File photo.

A day after the questioning of a Home Ministry employee for having links with an alleged ISI spy, yet another suspected case of Pakistan’s intelligence service trying to break into India’s critical security network has come to light. The elite National Security Guard (NSG) has initiated an inquiry into a suspected ISI agent calling up its officer to get details of investigations into the recent twin blasts in Hyderabad.

The NSG has claimed that its officer, a Major on deputation from the Army, did not share any crucial information with the ISI agent, who had called the EPBX system at NSG’s headquarters here. Significantly, the caller, reportedly from Pakistan, who identified himself as an officer of India’s Military Intelligence unit, had asked for the Major by name and got details about the movement of the ‘Black Cats’ to Dilsukhnagar where the blasts took place. NSG sources denied sharing information about the nature of explosives or the probe with the suspected agent.

As per standard operation procedure, such information cannot be shared on unsecured lines (EPBX or general exchange) and only secured lines can be used for such critical purposes and information shared only after thorough crosschecks.

But this incident has brought back to the limelight the demand by intelligence and investigative agencies to block or allow restricted use of Internet telephony, a project which is being pursued by the Department of Telecom to improve Internet penetration in the country. Indian intelligence agencies have already sounded alerts over the misuse of Voice over Internet Protocol (VoIP) or Internet telephony by terrorists and ISI agents from Pakistan and Pakistan-occupied Kashmir.

MHA sources said security agencies have found that terrorists operating from Kashmir and Pakistan are using this technology; and with the State police and the telecom department not having the wherewithal to crack such calls, the problem is only getting aggravated. Security agencies are worried as it is difficult to ascertain the time and origin place of a VoIP call immediately. It is all the more difficult if the call is made from abroad, particularly when a call is made from an unregistered user.

Meanwhile, the Home Ministry said it has eliminated over 30 ISI-backed spy modules and 48 spies in the last three years. Since 2010 till February 2013, 31 espionage modules have been neutralised throughout the country resulting in the arrest of 38 Indians and 10 Pakistani spies.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.