1. Home
  2. English
  3. Mobile App Linked to JeM Active on Play Store: Report
Mobile App Linked to JeM Active on Play Store: Report

Mobile App Linked to JeM Active on Play Store: Report

0
Social Share

NEW DELHI, Oct 12: A mobile application linked with Pakistan-based terrorist organisation, Jaish-e-Mohammed (JeM), is active on Google Play Store for Android phone users worldwide. Named ‘Achi Bateen’, the mobile application is a digital platform that provides Islamic teachings. It doesn’t proclaim its association with the outfit openly. However, the app’s developer page hosts content identified with JeM chief Maulana Masood Azhar.

It also contains links to external web pages that host books, literature, and audio messages of Masood Azhar and his associates. JeM has been sanctioned by the United Nations Security Council (UNSC) since 2001. The group has also been identified as a Foreign Terrorist Organisation (FTO) by the United States Department of State.

The Android application was first launched on December 4, 2020 at the Play Store. It has recorded more than 5,000 downloads so far. The free ‘educational’ app contains quotes, messages, and links to books of several Islamic preachers from Pakistan. The content ranges from mainstream names such as Maulana Tariq Jamil to the teachings of late hardliner Rashid Ahmed.

The app’s developers have created a blog page that is hyperlinked to the app’s description page. The web page has old write-ups by Masood Azhar under the pen name ‘Saadi’, a pseudo-identity well-identified with the JeM chief.

The page hosts links to two external pages. One of them hosts audio messages of Masood Azhar recorded between 2001 and 2019. Other recordings feature Masood Azhar’s younger brother and operational head of JeM, Abdul Rauf Asghar, and his close associate, Talha Saif. Another page linked with the developer’s blog hosts links to several books allegedly written by Masood Azhar.

Technical analysis of the application shows that the app has been communicating to a server in Germany. “The application is connecting to servers in Contabo data centre based out of Germany. This company had been in news for ignoring copyright claims made by different individuals,” sources said.

The app asks for multiple permissions which are different from application functionality. Usually, this is done when you want to add further functionality and not ask for more permission.

This behaviour is similar to the Chinese UC browser application, earlier banned by India, which could execute different classes in the application container once the application was installed the first time.

Once installed, the app accesses both network and GPS (Global Positioning System) location — when GPS is active — of the mobile device. The app can start automatically once the user starts his device, and it continues to run in the background as well. It has access to the phone’s approximate and precise location, network, storage, media, and other files.

(Manas Dasgupta)

LEAVE YOUR COMMENT

Your email address will not be published.

Join our WhatsApp Channel

And stay informed with the latest news and updates.

Join Now
revoi whats app qr code