Tracking The Money Trail, Fake IDs & Details, Spending Patterns of The Bengaluru Blast Accused | Exclusive
Tracking The Money Trail, Fake IDs & Details, Spending Patterns of The Bengaluru Blast Accused | Exclusive
Top intelligence sources have told CNN-News18 that the now-arrested Mussavir Hussain Shazib and Abdul Matheen Taaha were using crypto money traders available on digital platforms for their finances. Investigators also found that after December 2023, the duo had been staying at cheap guesthouses in different places so they would be seen as tourists and not asked too many questions

The National Investigation Agency (NIA) arrested the two accused in the Bengaluru cafe blast case — Mussavir Hussain Shazib and Abdul Matheen Taaha — from West Bengal on Friday. And top intelligence sources have told CNN-News18 that the men were using crypto money traders available on digital platforms for their finances.

These traders are available on Telegram channels and work for a commission, they added.

These crypto traders are not criminals or involved in any terror activity, said the sources.

“Right now we have not been able to pinpoint the person giving money to these people,” said an intelligence official.

The blast at Bengaluru’s Rameshwaram Cafe on March 1 injured at least nine people. Investigators believe Shazib planted the explosive device, placed inside a backpack, at the popular eatery, while Taahaa was responsible for planning the attack and for their disappearance.

Agencies got their first breakthrough after CCTV footage from the site and evidence like a cap and glasses were found.

Initial attempts to identify the attackers proved difficult. But after Shazib’s cap was found at a Bengaluru mosque, investigators scanned its details, located the seller in Chennai, and examined the CCTV footage to zero in on the duo.

“In this Chennai shop, we learnt that Taahaa was also involved in the attack,” said an official.

Security camera footage from Bengaluru had already shown Shazib in several places and on buses.

By the time agencies reached their first hideout, the duo had left and switched off their cellphones and other electronic equipment, said sources.

“At the hideout, we came to know about the Aadhaar cards and mobile numbers they were using,” an official said. “They were using different identities and bank accounts linked to them were also found. It was a complete network, which arranged everything for them including mobile numbers and fake SIM cards. We received bus data from Andhra Pradesh, Karnataka, etc, and watched their movements.”

Investigators also examined their online purchase patterns.

Meanwhile, one of their associates, Muzamil, was caught by authorities. He allegedly supplied them the fake SIM cards and he shared more details with officials.

After Muzamil’s arrest, Shazib and Taahaa fled to Kolkata, sources said.

Investigators found that after December 2023, the duo had been staying at cheap guesthouses in different places so they would be seen as tourists and not asked too many questions.

After agencies tracked down some phone numbers, they learnt that the two men were in Bengal’s Purba Medinipur district.

“Their first phone we found was in Chennai, which was important for investigations,” said an official. “They received Rs 15 lakh from their handler through Lashkar-e-Taiba or an associated group. The Lashkar link is important because some disgruntled elements who ran away have used ISIS and LeT support to carry out blasts in India. These groups abroad also use these absconding people or those who come out of jail for their tasks.”

What's your reaction?

Comments

https://shivann.com/assets/images/user-avatar-s.jpg

0 comment

Write the first comment for this!