Since the aftermath of the Pahalgam terror attack and India’s retaliatory strikes under Operation Sindoor, Indian counterintelligence agencies have been on high alert. Over the past month, at least 15 individuals across Rajasthan, Maharashtra, Delhi, Haryana, Uttar Pradesh, Gujarat, and Punjab have been detained or arrested.
An engineer in Mumbai sketching warship blueprints after being honey-trapped on Facebook, a travel vlogger in Haryana escorted by armed men through Lahore’s markets, a Rajasthan government employee with seven unexplained trips to Pakistan, and a SIM card supplier in Deeg funnelling information to Pakistan’s Inter-Services Intelligence (ISI) handlers – each arrest, unconnected yet similar, reveals a wide network of people engaged in passing sensitive information to Pakistan. Moti Ram Jat was not a high-ranking officer, but his access to operational details within the Central Reserve Police Force made him a candidate that Pakistani operatives could exploit. According to the National Investigation Agency (NIA), Jat had been in contact with Pakistan Intelligence Officers (PIOs) since 2023, passing along classified information in exchange for money.
The NIA arrested Jat from Delhi earlier this month after his social media activity triggered internal alarms. The CRPF, in a rare public disclosure, acknowledged that Jat was dismissed after being found to have “acted in violation of established norms and protocols.” Jat is currently in NIA custody until June 6. Investigation is still underway to determine what information he passed on to India’s nuclear-powered neighbour.
Honeytrap At The Dockyard: Engineer Ravindra Verma
In Maharashtra, the Anti-Terrorism Squad (ATS) arrested 27-year-old Ravindra Verma, a mechanical engineer employed by a Mumbai-based defence technology firm. Verma had access to the Naval Dockyard in south Mumbai and was involved in work related to submarines and warships.
His arrest was triggered by a forensic trail linking him to Facebook accounts under the names “Payal Sharma” and “Ispreet.” Investigators say these profiles were fronts for Pakistani agents who gradually lured Verma into a honeytrap. Verma began sharing detailed sketches, diagrams, and audio notes about naval assets in exchange for money sent via Indian and international bank accounts.
According to the police, Verma was not merely duped but knowingly and repeatedly shared confidential data. While phones were prohibited inside the Naval Dockyard, he would reportedly sketch from memory and send images later. The ATS suspects he also supplied ship names and docking schedules. He had been communicating with the Pakistani operative since November 2024 and is currently in custody.
The Influencer Asset: Jyoti Malhotra
Perhaps the most publicly visible case is that of travel vlogger Jyoti Malhotra, who ran a popular YouTube channel. Her arrest by Haryana Police came in mid-May, following her alleged links to ISI operatives.
According to authorities investigating the case, Malhotra had direct, repeated contact with operatives at the Pakistan High Commission in Delhi, as well as during visits to Pakistan, at least two of which were confirmed by travel records. She reportedly interacted with Pakistani intelligence officials named Danish, Ahsan, and Shahid. Forensic examination of her seized mobile phones and laptops revealed a trove of over 12 terabytes of data, including communications that investigators claim confirm her awareness of the agents’ ISI affiliations.
Despite being under scrutiny for disproportionate spending and multiple foreign trips, including to Pakistan and China, Malhotra continued her interactions with suspected handlers. One notable incident captured in a video by Scottish YouTuber Callum Mill showed her walking through Lahore’s Anarkali Bazaar accompanied by six men armed with AK-47s.
Malhotra has been charged under the Official Secrets Act and sections of the Bharatiya Nyaya Sanhita. Her trial is scheduled to begin in June.
The Health Worker: Sahdev Singh Gohil
A 28-year-old health worker from Gujarat was arrested for transmitting sensitive information related to Indian military infrastructure to a Pakistani operative.
Officials from the Gujarat Anti-Terrorism Squad (ATS) confirmed last Saturday that Sahdev Singh Gohil, a resident of the border district of Kachchh, had been detained earlier this month on charges of sharing classified images and videos of newly constructed Indian Air Force (IAF) and Border Security Force (BSF) installations with a foreign agent.
Senior ATS officer K Siddharth said that Gohil came into contact with a person identifying herself as Aditi Bharadwaj via WhatsApp in 2023. Investigators now believe Bharadwaj was a cover identity used by a Pakistani intelligence operative. The communication, according to ATS sources, evolved into an exchange of visuals and data concerning Indian military sites near the border.
According to investigators, Gohil procured a new SIM card registered under his Aadhaar details in early 2025 and activated a WhatsApp account on behalf of the alleged handler using a one-time-password (OTP) authentication process. This channel, officials say, was subsequently used to transmit sensitive content documenting military construction and movements in the area.
Leave a Reply