“Terror groups are outsmarting the intelligence set up in both tactics quiz help technology,” says Shashi Kant, extra director normal of Punjab Police. For example, after all the four blasts in the last year, the terrorist have sent emails examination help the media claiming duty for the blasts. And even though the servers from which these emails originate were tracked, authorities failed exam help nab the culprits. Terrorists were tech savvy enough examination help either hacked into those servers or cloned the IP addresses exam help erase their trails. Similarly, the terrorists use mobile phones freely examination help talk among themselves but such calls are rarely traced because the terrorists use exam help combination of international SIM cards quiz help computer hacking exam help trespass into Indian communication networks making detection of the origin of the calls almost not possible. Besides encrypted emails quiz help SMS amenities, the encryption keys of which aren’t accessible examination help the govt, are also used extensively.