In a significant security breach, the Uttar Pradesh Anti-Terrorist Squad (UP ATS) arrested an employee of an ordnance factory for allegedly engaging in espionage activities on behalf of Pakistan’s Inter-Services Intelligence (ISI). The accused, identified as Ravindra Kumar, is believed to have been honey-trapped by an ISI handler who went by the name ‘Neha. ’ According to authorities, he had been passing on classified defence-related information to Pakistan for an extended period.
Arrest and Investigation Details
During a press briefing, Additional Director General (ADG) of the UP ATS, Nilabja Choudhary, elaborated on the investigation that led to Kumar’s arrest. He stated that intelligence inputs were received, suggesting that an individual named Ravindra Kumar was actively engaged in leaking sensitive and confidential information to a Pakistani handler. Acting on this intelligence, the Agra unit of UP ATS conducted an initial probe into the matter. Subsequently, Kumar was summoned to the ATS headquarters for an extensive interrogation. During the questioning, it was confirmed that he had indeed shared highly sensitive information with his Pakistani contact, Neha.
Authorities revealed that ISIS has been orchestrating similar espionage operations for an extended period, strategically targeting individuals working in key defence and strategic institutions. Their primary method involves exploiting social media platforms to establish connections and lure targets into their web of deceit using honey-trapping tactics.
The Information Leak
The investigation brought to light that Kumar had been consistently sharing crucial defence-related details with his handler, including highly classified reports and documents. Among the information leaked were daily production reports from the ordnance factory where he was employed, details regarding the receipt of military stores, upcoming stock arrivals, and internal requisition records. The accused also reportedly shared sensitive updates on drones and critical projects like India’s ambitious Gaganyaan space mission.
Further analysis revealed that Kumar’s association with his ISI handler began on Facebook. The handler, introducing herself as ‘Neha, ’ initially established contact through the social media platform before shifting communication to more secure channels. After gaining his trust, she disclosed that she was associated with the Pakistani intelligence network. To avoid detection, Kumar saved her contact under the misleading name ‘Chandan Store Keeper 2’ in his phone.
Reports suggest that most of the leaked information was transmitted through the messaging platform WhatsApp, making it easier for the accused to share documents discreetly. The India Today report on the case indicated that Kumar regularly communicated with his handler and exchanged classified details without raising suspicion among his colleagues or superiors.
Larger Espionage Network and Implications
Authorities believe that this case is just one example of a broader espionage network operated by ISI. The Pakistani intelligence agency has been systematically targeting individuals with access to sensitive defence information, particularly those working in ordnance factories, military installations, and space research institutions. By employing honey-trapping tactics, ISI handlers manipulate their targets into revealing crucial information, often without the targets fully understanding the extent of the security breach.
The UP ATS is working with other intelligence and security agencies to uncover additional links and identify any possible accomplices involved in this espionage activity. Investigators are also investigating whether Kumar received any financial compensation for his actions or if he was coerced into sharing the information under pressure.
This case highlights the growing threats posed by espionage activities and the need for heightened vigilance, especially in critical defence-related sectors. The role of social media in facilitating such breaches underscores the importance of cybersecurity awareness and stricter monitoring protocols. Authorities continue to emphasize the necessity of robust counterintelligence measures to prevent further leaks that could jeopardize national security.
As the investigation unfolds, security agencies remain on high alert, determined to dismantle any further attempts by foreign intelligence networks to compromise India’s defence and strategic interests.