In a major security breach, a civilian employee posted at the Indian Navy Headquarters in Delhi has been arrested for allegedly spying for Pakistan’s intelligence agency, the Inter-Services Intelligence (ISI), and leaking classified defence information, reportedly even during the high-stakes Operation Sindoor.
The accused has been identified as Vishal Yadav, a clerk at the Navy HQ and a resident of Haryana. He was arrested by the intelligence wing of the Rajasthan Police’s CID unit after months of covert surveillance. According to senior police officials, Yadav had been under watch for some time for suspicious activity, and concrete evidence of espionage emerged from the analysis of his cellphone and financial transactions.
According to a report by NDTV, Yadav was allegedly in regular contact with a Pakistani handler, posing as a woman named Priya Sharma, on social media platforms. The handler reportedly lured him into divulging sensitive information related to naval operations, infrastructure, and deployment plans in exchange for money.
Shockingly, officials believe that some of the leaked material pertains to Operation Sindoor, the covert cross-border strike conducted by India in May targeting terror camps in Pakistan and PoK following the Pahalgam terror attack. The leak, if verified, could have compromised operational planning or real-time movement details, say sources.
Speaking to the media, senior CID Intelligence officer Vishnukant Gupta revealed that Yadav had become vulnerable due to his compulsive online gaming addiction and financial losses.
“He was in desperate need of money to cover his online gaming debts. He was lured by his handler, who gained his trust posing as a woman. In return for classified information, he received money both via cryptocurrency trading platforms and direct bank transfers,” Gupta said.
The handler, believed to be an ISI asset operating under a false identity, maintained regular contact with Yadav through encrypted messaging apps and fake social media accounts. “This is a classic honeytrap model—manipulating emotion and financial need to infiltrate sensitive defence institutions,” added another officer familiar with the case.
Yadav is currently in custody and is being interrogated for the full extent of the breach. The police are examining his phone records, computer usage, and financial trails to determine what exact information was leaked and who else might be involved.
Security agencies have raised alarms over the increasing number of such digital espionage operations and issued an advisory urging defence personnel and the public to report suspicious social media activity and unknown contacts immediately.
This is not the first time Pakistani intelligence operatives have attempted to infiltrate Indian defence circles using digital platforms and financial inducements. The recent case highlights the evolving nature of espionage in the digital age, where personal vulnerabilities are exploited using social engineering and cryptocurrency anonymity.
While the full extent of damage caused by Yadav’s leak is yet to be officially quantified, the timing, amid India’s heightened military operations against terror groups, has made it a matter of serious concern for national security agencies.
Comments