Ads Area

Red Fort Blast Probe Reveals Sophisticated ‘Dead-Drop’ Email Network Used by Suspects

The investigation into the November 10 Red Fort blast, which claimed 13 lives, has uncovered indications of a highly sophisticated communication network allegedly used by the suspects. According to investigative sources, the Delhi Police are now concentrating on the use of dead-drop email systems—a technique historically associated with espionage networks and advanced militant organisations.

This covert method, often described as a “communication channel without transmission,” allows two parties to exchange information without ever sending an email. Instead, both users log into a shared email account, type messages in the drafts folder, read or delete them, and respond—all without pressing “Send.”
Because no email is transmitted externally, conventional digital footprints like “sent” or “received” metadata are never generated, making it extremely difficult for standard surveillance systems to detect.

Investigators believe this method was used by the accused to communicate with handlers based outside India, possibly in Pakistan or Afghanistan, as suggested in earlier interrogations. Such communications may have included:

  • Operational instructions and attack directives

  • Target reconnaissance information

  • Financial codes and logistical updates

The discovery of this tradecraft strengthens the suspicion that the perpetrators—including the professionals and doctors recently arrested—were likely acting under the guidance of trained foreign operatives or established terror networks. The use of dead-drop emails marks a significant departure from the more rudimentary tactics seen in lower-level terror modules, pointing instead to a structured attempt to shield senior handlers and planners from exposure.

Investigators are now attempting to reconstruct the digital trail by seeking access to the suspect email accounts and examining technical metadata such as log-in timestamps, IP histories, and device fingerprints. Even without transmitted messages, such data can help establish communication patterns and identify the accounts involved in the clandestine exchanges.

This forensic analysis is now considered crucial to mapping the entire conspiracy and identifying the foreign handlers behind the sophisticated plot targeting high-value locations in the National Capital Region (NCR).

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Below Post Ad

www.indiansdaily.com GLOBAL INDIAN COMMUNITY

Ads Area

avatar
EDITOR Welcome to www.indiansdaily.com
Hi there! Can I help you?,if you have anything please ask throgh our WhatsApp
:
Chat WhatsApp