Vishal Yadav, lured into a honeytrap via social media, shared classified military info with Pakistani intelligence; paid through crypto and bank transfers.
A clerk posted at the Indian Navy headquarters in New Delhi has been arrested for allegedly leaking sensitive military details to Pakistan’s Inter-Services Intelligence (ISI), including information linked to Operation Sindoor, according to reports.
The accused, Vishal Yadav, hails from Haryana. He was picked up by Rajasthan Police’s Intelligence Wing after weeks of surveillance. His arrest follows a larger crackdown on espionage networks after the recent terror attack in Pahalgam that killed 26 tourists.
According to officials, Yadav thought he was talking to someone named “Priya Sharma” on social media — but behind the screen was an ISI operative pulling the strings. They chatted frequently. She built trust. Flirted. Lured him into a honeytrap. And then began extracting classified information about the Navy and other defense units.
The senior cop leading the probe, Vishnukant Gupta, said Yadav was hooked on online gaming and had racked up debt. That’s when it started — selling secrets to stay afloat, to cover debts, to grab easy cash.
He didn’t just send messages. He shared confidential documents and details over his phone. Payments? Some came through crypto channels. Others? Straight into his bank account.
Right now, he’s being grilled by a joint interrogation team at the Central Interrogation Centre in Jaipur. Agencies are trying to piece together how deep the leak runs — and if more people are involved.
This isn’t an isolated case. A YouTuber from Haryana, Jyoti Malhotra, and a few others have also been detained recently for alleged links to Pakistani spies. Most of these connections? Traced back to social media.
It’s a troubling reminder. Espionage doesn’t always wear a uniform. Sometimes, it hides behind a screen name.
Add Comment