logo
#

Latest news with #VishalYadav

Op Sindoor Leaked: How Indian Navy staffer was lured by Pak handler ‘Priya Sharma' into spying
Op Sindoor Leaked: How Indian Navy staffer was lured by Pak handler ‘Priya Sharma' into spying

Time of India

time17 hours ago

  • Time of India

Op Sindoor Leaked: How Indian Navy staffer was lured by Pak handler ‘Priya Sharma' into spying

A routine social media romance turned into a national security breach. Vishal Yadav, an Upper Division Clerk at Naval Headquarters in Delhi, has been arrested for leaking sensitive defence information, including classified updates from Operation Sindoor, to a Pakistani handler posing as 'Priya Sharma' on Facebook. Like a previous espionage case involving Ravi Meena in 2022, Yadav fell into a similar trap: chats moved from Facebook to WhatsApp to Telegram, with encrypted messages and payments exchanged for secrets. Authorities say he sold intel related to India's cross-border military strikes in Pakistan and PoK, earning nearly ₹2 lakh. Forensic checks confirmed files, chats, and financial links. The case highlights growing threats from digital espionage networks exploiting romantic traps and social media. Are our insiders secure enough? This report exposes the modern face of spying in the digital age.#operationsindoor #vishalyadav #priyasharma #indiannavy #espionagecase #navysecrets #pakistanhandler #priyasharma #spynetwork #toi #toibharat #bharat #breakingnews #indianews Read More

Cattle smuggler arrested after encounter in Ballia
Cattle smuggler arrested after encounter in Ballia

Time of India

timea day ago

  • Time of India

Cattle smuggler arrested after encounter in Ballia

Varanasi: A cattle smuggler was injured and arrested after an encounter with police in Revati police station area of Ballia on Thursday night. Police said Vishal Yadav alias Neta Yadav of Karammar Pur in Ballia was wanted in a case registered under sections 3/5A/8B of the Cow Slaughter Prevention Act. He was admitted to Sadar Hospital Ballia for treatment. According to reports, during a check at Devpur Regulator by Revati police around 10pm, police signalled a suspicious motorcycle rider to stop. However, the rider sped away. The police pursued him and seeing himself surrounded, Yadav fired at the police. In retaliation, Yadav was shot at in the right leg by the police. Yadav confessed that the motorcycle was stolen, and he was planning to escape to Bihar. One illegal country-made pistol of .315 bore with one used cartridge, two live cartridges, and one stolen black motorcycle were recovered from his possession. Additional superintendent of police (southern) Kripashankar said further legal action was being taken against the accused.

Navy staffer held for leaking Op Sindoor details to Pak handler
Navy staffer held for leaking Op Sindoor details to Pak handler

Hans India

time2 days ago

  • Hans India

Navy staffer held for leaking Op Sindoor details to Pak handler

Jaipur: An Indian Navy staffer posted in naval headquarters in Delhi was arrested in Jaipur for allegedly leaking defence-related sensitive information to a Pakistani handler in exchange for money, a police official said Thursday. Vishal Yadav, an Upper Division Clerk (UDC) in the Directorate of Dockyard at the Navy building, allegedly also shared details on Operation Sindoor -- strikes carried out by the Indian Armed Forces in Pakistan and Pakistan-occupied Kashmir in response to the Pahalgam terror attack. Inspector General of Police (CID-Security) Vishnu Kant Gupta said Yadav, originally from Rewari in Haryana, leaked the classified information to a female Pakistani handler posing as an Indian woman. He was arrested on Wednesday in Jaipur and will be subjected to a joint probe by multiple agencies. "Yadav confessed to receiving approximately Rs 2 lakh in total for the information he passed on," Gupta said. "This included Rs 50,000 for leaking information related to Operation Sindoor," the IGP said, adding some of the payments were also made in cryptocurrency. Intelligence sources revealed that Yadav was first approached on Facebook. The Pakistani handler sent a friend request under the fake identity "Priya Sharma". The two started communicating regularly and eventually shifted to WhatsApp and later to Telegram, a platform known for its encryption-enabled messages.

How Indian Navy staffer was lured by Pakistani handler ‘Priya Sharma' into spying
How Indian Navy staffer was lured by Pakistani handler ‘Priya Sharma' into spying

First Post

time2 days ago

  • Politics
  • First Post

How Indian Navy staffer was lured by Pakistani handler ‘Priya Sharma' into spying

Vishal Yadav, an Upper Division Clerk at the Nausena Bhavan in Delhi, has been arrested for allegedly spying for Pakistan. A native of Haryana's Rewari, he was approached by a Pakistani handler, who used the alias 'Priya Sharma', for leaking sensitive naval information, including during Operation Sindoor read more Vishal Yadav has been arrested for allegedly spying for Pakistan. News18 Hindi A civilian employee posted at the Indian Navy headquarters in Delhi has been arrested for allegedly spying for Pakistan. Vishal Yadav, who was nabbed by the Rajasthan Police's Intelligence Wing in Jaipur, is suspected of leaking classified information to a Pakistani intelligence handler. He is also accused of sharing details on Operation Sindoor, the strikes by the Indian military on multiple terror sites in Pakistan and Pakistan-occupied Kashmir (PoK) last month in retaliation for the April 22 Pahalgam terror attack. STORY CONTINUES BELOW THIS AD Let's take a closer look. How 'Priya Sharma' trapped Vishal Yadav Vishal Yadav worked as an Upper Division Clerk (UDC) in the Directorate of Dockyard at Nausena Bhavan, the naval wing of the Defence Ministry, in Delhi. A native of Haryana's Rewari, he was reportedly addicted to online gaming. Yadav was approached by his Pakistani handler three years ago on Facebook. He got a friend request from 'Priya Sharma', a fake identity, and he began communicating regularly with the person, intelligence sources told PTI. Their interactions later shifted to WhatsApp and then Telegram, both of which provide encryption-enabled messages. As per the NDTV report, Yadav became a target because of his online gaming addiction. The Pakistani handler allegedly convinced him to spy in exchange for money. According to the police, Yadav first received small sums of Rs 5,000-Rs 6,000 for providing less sensitive information. 'However, the handler allegedly encouraged him to provide more valuable intelligence for higher compensation. That's when Yadav began sharing critical defence-related data,' Inspector General of Police (CID-Security) Vishnu Kant Gupta was quoted as saying by PTI. 'He was lured by money and ended up leaking sensitive information from the Navy headquarters,' the IGP added. Gupta claimed Yadav has confessed to earning a total of Rs 2 lakh by sharing defence details with the Pakistani handler. 'This included Rs 50,000 for leaking information related to Operation Sindoor,' the IGP said. Some payments were made to him through cryptocurrency. Yadav is said to have used this money for his online gaming addiction. The police said that forensic analysis of Yadav's phone revealed chat records and documents showing that he had leaked sensitive naval intelligence during Operation Sindoor. STORY CONTINUES BELOW THIS AD ALSO READ: Who is Pakistan's 'Madam N', who trapped Indian YouTubers arrested for spying? How police caught Vishal Yadav Yadav may have come under the police radar during the investigation into Ravi Prakash Meena, a Rajasthan resident arrested in 2022 for allegedly spying for Pakistan. He was a Class 4 employee in the Defence Ministry's Sena Bhawan. The probe revealed that Meena received money through a cryptocurrency channel in exchange for leaking sensitive information to his Pakistani handler. As intelligence agencies put Meena's cryptocurrency channel under surveillance, they found that Yadav was also being paid through the same route, reported NDTV. The agencies started monitoring Yadav for over two years before his arrest this week. 'After monitoring his social media activity and confirming his links with a Pakistani handler, he was detained in Jaipur for joint interrogation involving multiple national agencies,' IGP Gupta said, as per PTI. Yadav is being grilled at a secure facility in Jaipur. Interrogators are trying to determine whether other individuals were involved and the scale of the leak. Recent arrests for spying Authorities have recently busted a Pakistani espionage network, arresting some social media influencers on suspicion of spying. YouTubers Jyoti Malhotra and Jasbir Singh are among those sent behind bars in connection with a Pakistan-backed spy network operating in North India. After Operation Sindoor, India had declared some diplomats at the Pakistan High Commission in Delhi as persona non grata. One of the Pakistani officials, identified as Danish alias Ehsan-ur-Rehman, was in contact with Jyoti Malhotra. STORY CONTINUES BELOW THIS AD With inputs from agencies

Navy staffer held for leaking Op Sindoor info communicated on Telegram, got payments on Crypto: Police
Navy staffer held for leaking Op Sindoor info communicated on Telegram, got payments on Crypto: Police

Hindustan Times

time3 days ago

  • Politics
  • Hindustan Times

Navy staffer held for leaking Op Sindoor info communicated on Telegram, got payments on Crypto: Police

The Indian Navy staffer, who has been arrested for allegedly leaking defence-related information to a Pakistani handler, used Telegram for communication and received some of the payments through cryptocurrency. Vishal Yadav, a clerk posted in navy headquarters, was arrested in Jaipur on Wednesday.(Pixabay/Representative) Vishal Yadav, an Upper Division Clerk (UDC) posted in the Indian Navy headquarters in Delhi, was arrested in Jaipur on Wednesday for allegedly leaking defence-related sensitive information to the Pakistani intelligence handler he met on Facebook. The police have revealed that Yadav was first approached on Facebook, where the Pakistani handler sent a friend request under the fake identity "Priya Sharma", news agency PTI reported. Yadav, who hails from Haryana's Rewari district, was allegedly sharing sensitive information in exchange for money. He also shared details on India's Operation Sindoor, which was carried out by the Indian Armed Forces in Pakistan and Pakistan-occupied Kashmir in response to the Pahalgam terror attack, according to the report. Also Read: How Pakistani handler lured arrested Indian naval staffer for spying What police probe revealed? The initial probe has revealed that Yadav, who worked with the Directorate of Dockyard at the Navy building, allegedly shared details on Operation Sindoor to a female Pakistani handler posing as an Indian woman. Vishnu Kant Gupta, Inspector General of Police (CID-Security), said Yadav confessed to receiving approximately ₹ 2 lakh in total in exchange for the information he passed on to the Pakistani handler. "Yadav confessed to receiving approximately ₹ 2 lakh in total for the information he passed on," Gupta said, adding that the amount included ₹ 50,000 for leaking information on Operation Sindoor. Intelligence sources said that Yadav was first approached on Facebook, where the Pakistani handler sent a friend request under the fake identity "Priya Sharma", according to PTI. The two started communicating on the social media website, following which the communication shifted to WhatsApp and later to Telegram, a messaging platform known for its encryption-enabled messages. The sleuths also said that the Navy staffer initially received smaller payments of ₹ 5,000- ₹ 6,000 for lower-grade information. However, the handler encouraged him to provide more valuable intelligence in exchange for higher compensation, which is when Yadav began sharing critical defence-related information. The police further said that some of the payments were made in cryptocurrency. Yadav is also said to be addicted to online gaming, which authorities believe may be the reason behind the breach of information. The investigating agencies have said that the forensic examination of Yadav's mobile phone uncovered extensive evidence, including financial transactions, sensitive messages, and confidential defence data.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store