How do ‘ghost’ SIM cards pose a threat to national security and what can be done to regulate them?
The Red Fort blast case mentioned the use of ‘ghost’ SIM cards for communication with foreign handlers. I want to analyze how such technology is misused and what measures can be taken to prevent such security lapses.