The National Investigation Agency (NIA) has brought to light the alarming tactics employed by ISIS radicals responsible for the blast at Bengaluru’s Rameshwaram cafe. In a significant development, the NIA filed a chargesheet against four individuals accused in this case, unveiling a chilling narrative of deception, digital manipulation, and a sophisticated network of funding.
The NIA identified the accused as Mussavir Hussain Shazib, Abdul Mateen Ahmed Taaha, Maaz Muneer Ahmed, and Muzammil Shareef. They face charges under various sections of the Indian Penal Code (IPC), Unlawful Activities (Prevention) Act (UA(P) A), Explosive Substances Act, and Prevention of Damage to Public Property Act (PDPP).
Among the accused, Taaha and Shazib emerged as key figures, revealed to be ISIS radicals hailing from the Shivamogga district in Karnataka. Their modus operandi involved a calculated approach to conceal their identities and finance their operations. The investigation revealed that they had acquired fraudulently obtained Indian SIM cards and bank accounts, further camouflaging their activities. To further solidify their cover, they utilized a mix of Indian and Bangladeshi identity documents, obtained illicitly from the Dark Web.
The NIA investigation exposed the alarming use of cryptocurrency by Taaha and Shazib to fund their violent activities in Bengaluru. Taaha reportedly converted cryptocurrencies to fiat currency through Telegram-based P2P platforms, highlighting the evolving landscape of terrorist financing.
The meticulously planned attack at the Rameshwaram cafe was not an isolated incident. Prior to the explosion, the accused had attempted to execute an IED attack at the State BJP Office, Malleshwaram, Bengaluru, on January 22, 2024, coinciding with the Pran Pratishtha ceremony in Ayodhya. However, their attempt was thwarted. This failed attempt subsequently led them to target the Rameshwaram cafe, resulting in the explosion on March 1, which left nine people injured and caused significant damage to the hotel property.
The NIA initiated an investigation on March 3, conducting comprehensive technical and field investigations in collaboration with state police forces and other agencies. The investigation concluded that Shazib was responsible for planting the bomb.
Shazib and Taaha had previously gone into hiding after the Al-Hind module was busted in 2020. They were eventually apprehended from their hideout in West Bengal after 42 days following the explosion.
The NIA chargesheet provides a stark reminder of the evolving tactics employed by terrorist organizations, highlighting the growing threat of transnational terrorism and the need for robust counter-terrorism strategies. The case serves as a testament to the critical role played by law enforcement agencies in investigating and disrupting terrorist networks, particularly in an era characterized by the increasing use of digital technologies and cryptocurrencies.