The Gujarat Anti-Terrorist Squad (ATS) has successfully uncovered a sophisticated espionage network with roots in Pakistan, following a meticulous digital investigation that began with the detection of anomalous communication patterns.
Digital Patterns Trigger Investigation
The first clues emerged when sharp-eyed ATS analysts spotted irregular digital communication patterns. This discovery prompted the immediate formation of a specialised monitoring cell, which was placed under the command of Superintendent of Police K Siddharth.
Officers then began the painstaking task of cross-referencing suspicious social media activity with unexplained financial transactions that had been flagged by intelligence units. Their analysis revealed a critical pattern: persistent interactions between Indian mobile numbers and international virtual numbers, cleverly masked using VPNs.
Breakthroughs in Tracking and Finance
A major lead materialised when investigators identified a WhatsApp account operating under the name "Ankita Sharma". This account was found making repeated calls to a mobile number registered in Goa. Technical mapping of these calls showed the associated IP addresses bouncing between Multan and Sargodha in Pakistan. The high frequency and nature of these communications strongly suggested they were operational exchanges, not casual chats.
In a parallel line of inquiry, scrutiny of mobile banking records exposed small but recurring transactions. These were linked to an Airtel Payments Bank account held by an individual named Rashmani Ravindra Pal. Officials stated that this financial pattern matched the hallmark of reconnaissance-stage funding, a method commonly employed by foreign handlers. Her direct connections to Pakistani phone numbers further solidified the suspicion of espionage activities.
State-Wide Crackdown and Conclusion
Armed with these concrete findings, the Gujarat ATS promptly alerted central agencies and activated its Special Operations Group (SOG) units across multiple districts, including Mehsana, Kheda, Surat, and Dahod. This coordinated effort allowed the teams to meticulously map the network's entire communication flow.
The investigation conclusively established that the espionage activity was orchestrated by Pakistan-based intelligence modules. The coordinated crackdown effectively identified and disrupted the spy ring's operations, safeguarding state security.