According to intelligence sources, terrorists are believed to have used a Chinese-origin communication device and a modified offline navigation app to plan and execute the assault
According to intelligence sources, terrorists are believed to have used a Chinese-origin communication device and a modified offline navigation app to plan and execute the assault