Man Arrested in Bihar for Allegedly Threatening PM Modi Via WhatsApp

30 May, 2025

A man has been arrested in Bihar for allegedly making a WhatsApp call threatening to kill Prime Minister Narendra Modi during his visit to the state. Police investigations suggest the accused may have used a Virtual Private Network (VPN) and another individual's mobile number, Mantu Chaudhary, to make the call. A property dispute between the accused and Chaudhary is suspected as a motive to falsely implicate him.

Unpacked:

How common are threats against Prime Minister Modi during his visits, particularly to Bihar?

Threats against high-profile leaders like Prime Minister Modi are not uncommon, especially during public events or visits to politically sensitive states like Bihar. Security agencies routinely receive and investigate such threats, and security is tightened accordingly, as seen during Modi's recent visits to Bihar following events like the Pahalgam terror attack.

What security measures were in place during PM Modi’s visit to Bihar in light of this threat?

In response to threats and recent attacks, Bihar police and central agencies intensified security, especially at airports, tourist spots, and border districts. Surveillance was increased, intelligence officials were mobilized, and border outposts along the Indo-Nepal border were put on high alert to monitor cross-border movement.

What is known about the accused and his alleged motive involving the property dispute?

Police suspect the accused made the threatening call using another person's mobile number, likely to implicate Mantu Chaudhary in connection with an ongoing property dispute. This suggests the threat may have been fabricated as a means to settle personal scores rather than a genuine security threat to the Prime Minister.

How do authorities verify threats made using VPNs and spoofed numbers?

Authorities use cyber forensics, tracking digital footprints, and analyzing call records to trace the source of threats made via VPNs and spoofed numbers. While VPNs can mask locations, investigators often collaborate with telecom providers and use advanced digital tools to identify the real user behind the suspicious activity.