ID :
150047
Mon, 11/15/2010 - 20:09
Auther :
Shortlink :
https://oananews.org//node/150047
The shortlink copeid
LeT had set up high tech command centre for 26/11
Lalit K Jha
Washington, Nov 15 (PTI) Stocked with computers,
televisions and voice-over-internet phones, top commanders of
the Lashkar-e-Taiba (LeT) had set up a control room from where
they controlled and directed the 26/11 Mumbai carnage, a US
report has said.
"Lashkar had set up a remote command post in a safe
house or a hotel that US and Indian officials believe was in
Lahore or Karachi," The Washington Post and ProPublica
reported.
The new disclosures come as US counter-terrorism
officials said that masterminds of the terror attack were
still at large.
While attention has been focused on Pakistani-American
terror convict David Headley, the real mastermind of the 26/11
attacks was Sajid Mir, according to the new investigative
report.
Pakistan is unwilling to arrest the elusive mastermind
Mir, who is wanted in four continents, because the LeT
terrorist is "well connected" and "too powerful", US officials
said.
Giving details of the control or war room set up by
the Lashkar to coordinate the Mumbai terror attacks, the
papers said, "The room was stocked with computers,
televisions, voice-over-Internet phones from a New Jersey
company and satellite phones that were manned by (Sajid) Mir
and five other handlers.
"It was Sajid Mir, who allegedly led Pakistan based
Lashkar-e-Taiba's bloody siege on Mumbai in November 2008,"
the Post said.
Before the attack, Mir had spent two years using
Headley to conduct meticulous reconnaissance on Mumbai,
according to investigators and court documents.
The report said Indian intelligence officers
frantically checked known phone numbers associated with
Lashkar and were able to intercept and record nearly 300
calls.
"Mir's voice dominated the conversations, according to
officials and documents. Thanks to Headley, he knew the
targets inside-out," the report said. (MORE) PTI LKJ
HMI
The information contained in this electronic message and any attachments to this
message are intended for the exclusive use of the addressee(s) and may contain
proprietary, confidential or privileged information. If you are not the intended
recipient, you should not disseminate, distribute or copy this e-mail. Please notify
the sender immediately and destroy all copies of this message and any attachments
contained in it.