UP ATS Arrests Navy Seaman for Alleged ISI Espionage via Social Media Honey Trap
The Uttar Pradesh Anti-Terrorist Squad (ATS) has apprehended a 24-year-old Indian Navy seaman from Agra on charges of espionage for Pakistan's Inter-Services Intelligence (ISI). The accused allegedly shared sensitive military information after being honey-trapped through social media nearly three years ago.
Intelligence Inputs Lead to Investigation
According to ATS officials, intelligence inputs were received indicating that an individual working in a sensitive defence establishment had fallen under the influence of a Pakistan-based intelligence operative. This operative was reportedly passing confidential information related to India's defence infrastructure.
Following these inputs, ATS teams initiated a comprehensive investigation using electronic surveillance, technical monitoring, and physical verification. During this process, the name of Adarsh Kumar, also known as Lucky (24), surfaced as a suspect.
Accused's Background and Posting
The accused is a resident of Cheetpur village under the Kagarol police station in Agra district. He was serving in the Indian Navy as a leading seaman at the Southern Naval Command in Kochi, Kerala. This naval formation is strategically important for India's maritime security.
Investigators stated that technical evidence and communication records indicated Adarsh had established contact with a Pakistan-based ISI handler. Following this contact, he allegedly began sharing sensitive information.
Honey Trap Operation via Social Media
ATS officials revealed that the probe uncovered a honey trap operation initiated around three years ago. The accused was allegedly targeted through social media by a woman profile operated by an ISI-linked handler.
Initially, the communication started as a friendly interaction on social media platforms. Over time, the handler allegedly gained Adarsh's trust and gradually persuaded him to share information related to his work and posting.
Once the relationship developed, the handler began pressuring him to send sensitive information and photographs related to naval installations and assets.
Sensitive Information Allegedly Shared
During the investigation, ATS officials found that the accused had allegedly shared photographs and information related to strategically important naval assets. This included images of warships with the Pakistan-based handler.
Officials emphasized that such information is considered highly sensitive from a national security perspective. It could potentially reveal operational or logistical details of military assets, compromising India's defence capabilities.
The probe also revealed that the accused had transferred money from his personal bank account to the ISI-linked contact. This indicates financial transactions linked to the espionage activity, suggesting possible monetary incentives.
Arrest and Judicial Proceedings
After verifying the evidence and establishing his alleged involvement in anti-national activities, the ATS arrested Adarsh Kumar on March 10, 2026. He was subsequently produced before a competent court, which remanded him to judicial custody.
Ongoing Investigation and Wider Implications
Officials stated that the investigation is continuing to determine the exact nature and extent of classified information shared. Authorities are also examining the duration of his contact with the ISI network and whether other individuals may have been involved or targeted through similar honey-trap tactics.
The ATS is thoroughly examining communication devices, digital records, and financial transactions of the accused. This is to trace the full network and understand the operational methods used by the suspected Pakistani intelligence handler.
This case highlights the ongoing threats to national security from foreign intelligence agencies using sophisticated methods like social media honey traps to compromise defence personnel.



