In a major counter-espionage operation, the Gujarat Anti-Terrorism Squad (ATS) has arrested a retired Indian Army Subedar and a woman for allegedly leaking sensitive military information to Pakistan-based handlers. The case uncovers a growing trend of digital honeytraps, cyber-surveillance malware and financial manipulation in modern-day spying.
This is not a conventional espionage case. It is a digitally driven operation using emotional manipulation and cyber tools,” a senior ATS officer told.
The accused arrested have been identified as:
Ajaykumar Surendrasingh Singh (47) who is a retired Army Subedar who earlier served in Nagaland and later shifted to Goa.
Rashmani Ravindra Pal (35) , a resident of Daman, originally from Uttar Pradesh.

Both were arrested on December 3 following a multi-state surveillance operation involving Gujarat ATS, Goa Police and other intelligence units.
How the Espionage Network Operated
According to investigators, Singh was contacted in 2022 by a woman using the fake identity “Ankita Sharma” through social media. Over time, he was allegedly persuaded into sharing classified information related to —Troop movements, Officer postings, transfers and Unit deployment patterns.
He was later sent a Trojan malware link, which once installed, allowed handlers to remotely access data from his mobile phone.
Once the malware was active, information could be extracted without repeated communication— ATS cyber expert said.
Simultaneously, Pal allegedly operated under fake identities such as “Priya Thakur”, targeting defence personnel and ex-servicemen using emotional tactics—a classic digital honeytrap strategy.
She was given specific phone numbers and instructed to emotionally engage with targets and extract operational details, an investigating officer confirmed.
Money Trail & Pakistan Link
Investigators revealed that Pal opened a new digital payments bank account solely to receive funds from foreign handlers. Forensic analysis has uncovered—WhatsApp calls with international numbers,IP addresses linked to Lahore, Multan and Sargodha,Use of VPNs and virtual numbers, Financial transfers routed through digital wallets.
This was a well-coordinated, cross-border espionage module. The accused were not acting independently, ATS officials stated.
What is Digital HoneyTrap?
A honey trap is a strategy that uses romantic or sexual attraction to manipulate and compromise a person, usually for purposes such as espionage, blackmail, or financial exploitation. It works by creating a fake emotional or personal relationship to gain trust and then extract sensitive information, money, or influence.
Although they are often shown in spy movies and thrillers . However, they are also common in real life through online dating scams and social engineering. In this tactic, an attractive operative, known as the “honey pot,” lures the target into emotional or physical involvement, which is then used to control, deceive, or pressure them into actions like sharing confidential details or even smuggling illegal substances.
Why This Case Is a Serious Security Concern?
Security experts point out three critical risks exposed by this case:
Vulnerability of retired defence personnel,Growing reliance on digital espionage tools like malware and encrypted platforms,Financial inducement replacing traditional spying methods,Officials have also not ruled out the involvement of more Indian collaborators.
“We are certain this network is wider. These two arrests are only the first breakthrough,” the ATS said.
What Lies Ahead?
Both accused are currently in ATS custody. Their mobile phones, laptops, bank accounts and communication records are undergoing deep cyber-forensic examination. Agencies are also probing whether active-duty personnel were compromised.
UnWires Insight
This case highlights how India’s security challenges are shifting from borders to browsers. Espionage today no longer needs secret meetings — it now travels through screens, apps and digital payments.


