IAF Staffer Arrested in Assam for Alleged Espionage for Pakistan
IAF Staffer Arrested in Assam for Alleged Pakistan Espionage

IAF Staffer Arrested in Assam for Alleged Espionage for Pakistan

In a significant security breach, a staffer of the Indian Air Force (IAF) has been arrested from the Chabua Air Force Station in Assam's Dibrugarh district. The individual is accused of spying for Pakistani intelligence and leaking highly sensitive military information from one of the country's most strategically vital air bases in the northeast. This incident has triggered alarm within defence and intelligence circles, highlighting vulnerabilities in high-security installations.

Details of the Arrest and Investigation

The accused, Sumit Kumar (36), was serving as a multi-tasking staff (MTS) at the Chabua Air Force station when he was detained on Sunday. The arrest was part of a coordinated joint operation conducted by Rajasthan intelligence and Air Force intelligence. Following his detention, Kumar was taken to Jaipur, where multiple intelligence agencies are conducting intensive interrogation at a high-security facility.

Investigators reveal that Kumar had been in regular contact with Pakistani intelligence handlers for nearly two years. Exploiting his position inside the base, he allegedly collected classified information and transmitted it to his handlers through social media platforms, all in exchange for monetary compensation. The nature of the intelligence he is suspected of having compromised is deeply troubling and includes sensitive data that could impact national security.

Wide Pickt banner — collaborative shopping lists app for Telegram, phone mockup with grocery list

Nature of the Compromised Information

According to officials, Kumar allegedly leaked critical information such as the locations of fighter aircraft, details of missile deployments, sensitive personnel-related data, and strategic inputs from multiple Air Force bases, including one in Bikaner. Additionally, he is suspected of assisting Pakistani handlers in creating social media accounts using mobile numbers registered in his own name, a method apparently designed to conceal the communication trail and evade detection.

A senior official stated, "The accused exploited his access to a high-security installation to systematically gather and pass on sensitive information. This is a serious breach, and the full extent of the damage is being assessed."

Breakthrough in the Case

The breakthrough in this espionage case came after Rajasthan intelligence arrested one Jhabara Ram from Jaisalmer in January 2026. His interrogation unraveled a deeper network with suspected cross-border links, with the trail eventually leading investigators to Kumar at Chabua. Acting swiftly on these leads, a coordinated operation was launched, resulting in Kumar's apprehension from the air base. Kumar has been booked under the stringent provisions of the Official Secrets Act, 1923, and Bharatiya Nyaya Sanhita, 2023, underscoring the gravity of the charges.

Strategic Significance of Chabua Air Force Station

The Chabua Air Force Station, located in Dibrugarh district close to India's international borders with both China and Myanmar, is a frontline installation of immense strategic significance. It plays a crucial role in national defence, particularly in the northeastern region. The alleged penetration of such a sensitive facility by a Pakistan-linked operative has raised urgent questions about insider threats within high-security defence establishments, prompting calls for enhanced vigilance and security protocols.

Ongoing Investigation and Future Implications

The investigation is ongoing, with officials indicating that further developments are expected as the interrogation deepens and the full contours of the espionage network come to light. This case underscores the persistent threats posed by espionage activities and the need for robust counter-intelligence measures to safeguard national security interests. Authorities are likely to review security procedures at key military installations to prevent similar breaches in the future.

Pickt after-article banner — collaborative shopping lists app with family illustration