Two Army jawans 'honey-trapped' by Pakist spy agencies arrested

By ANI | Published: November 7, 2019 06:30 PM2019-11-07T18:30:59+5:302019-11-07T18:45:17+5:30

Two Indian Army personnel, Lance Naik Ravi Verma and Sepoy Vichitra Behera, have been arrested by the Rajasthan Police after they were honey-trapped by Pakist spy agencies through social media.

Two Army jawans 'honey-trapped' by Pakist spy agencies arrested | Two Army jawans 'honey-trapped' by Pakist spy agencies arrested

Two Army jawans 'honey-trapped' by Pakist spy agencies arrested

Two Indian Army personnel, Lance Naik Ravi Verma and Sepoy Vichitra Behera, have been arrested by the Rajasthan Police after they were honey-trapped by Pakist spy agencies through social media.

During the investigation, it emerged that the two personnel were involved with one Facebook ID with the name of 'Seerat' that was posing as a woman to honey-trap the two jawans, Army sources said.

The two jawans were arrested by the Rajasthan Police in a joint operation by the intelligence bureau and the state CID after they caught the two fellows chatting with the same ID for some time, the sources added.

Against this backdrop of the number of virtual honey trapping cases, the sources said the Indian Army had issued an advisory in mid-October on the modus operandi of Pakistan intelligence operatives' attempts to gain intelligence through social media and other means.

The force in its advisory had also warned the troops against Sharing information or having any relations with unknown people on social media.

The force has also warned the personnel against trusting any fake babas or insurance agents who might try to trap them.

Both the jawans belong to the same unit deployed in Pokhran of Rajasthan and were arrested.

Over suspicious activities of Behera, CID Intelligence on the direction of Additional DCP, Intelligence, kept a watch on Behera. During the process, it came to the knowledge that Behera was in touch with the Pakist agent through Facebook and WhatsApp and was sharing information and asked for money in return.

( With inputs from ANI )

Open in app