Army Personnel From Jodhpur Regiment Honey Trapped: 24-year-old Pradeep Kumar, who worked in an army regiment of strategic importance in Jodhpur, became a victim of Honey Trap. A female ISI agent implicated her to get married by trapping her in his love. She told herself to be from Gwalior Madhya Pradesh and to be in MNS in Bangalore. Both used to talk to each other in WhatsApp chat, voice call and video call.
When the State IB came to know about this, Pradeep was being monitored. During this surveillance, it came to the notice that Pradeep Kumar is in touch with the PIO (Pakistani Intelligence Agency) through social media. CID Intelligence Jaipur started monitoring the movement of this jawan continuously since then.
Sensitive document requested through WhatsApp
This agent, on the pretext of meeting the jawan in Delhi and getting married, started asking for confidential documents and photographs related to the army. On which the jawan, trapped in the honeytrap, started sending the photo of a confidential document related to the army from his office to the female agent through WhatsApp by stealthly clicking from his mobile.
Pradeep Kumar, who has already come under the radar of the intelligence agency, is in constant contact with the female agent through social media. Sharing information of strategic importance, taking action on this army personnel, started interrogation by taking him into custody on 18 May afternoon.
According to the information received, Pradeep is originally from Roorkee in Uttarakhand. He had joined the army 3 years ago. After training, the accused was posted to the post of gunner. After which the posting of the jawan took place in the sensitive regiment Jodhpur. Just 6-7 months ago, a woman’s call came on the mobile of the accused, after which the conversation started between the two.
After the evidence was confirmed in the investigation of the phone of the jawan, a case was registered against him under the Official Secrets Act 1923 and arrested. Pradeep told that at the behest of the agent, he also shared the mobile number of a SIM being used and the OTP for WhatsApp, so that the female agent could use that number to make other soldiers of the army his prey.