Pakistan ISI used Facebook likes and comments to honey-trap a BSF jawan

The IG said the ISI targets such people who are armed forces aspirants or stay somewhere close to important security and armed forces installations

0
103
ISI

Lucknow: Simple likes and comments on social media posts from unknown users can be an ISI trap for the armed force personnel as well as common people. The investigators of UP Anti-Terrorism Squad (ATS) discovered this alarming trend while interrogating the BSF jawan Achyutanand Mishra, who was arrested from Noida on charges of spying on Wednesday.

He has been taken into five-day police remand since Wednesday evening. Mishra was honey-trapped by Pakistan’s Inter-Services Intelligence (ISI) over social media and he was being used to extract crucial information about BSF logistics and troop movement.

Inspector general (IG) of police of ATS, Asim Arun said the BSF jawan was honey-trapped by an unknown Facebook user posing as a woman who simply liked his photograph. The jawan walked into the trap laid by the ISI and sent a friend request to the unknown user, he said. Sources said the Facebook ID that was used to trap Mishra had as many as 90 Indians on its friend list.

Asim Arun admitted that multiple cases of ‘social media trap’ by ISI have been reported in the recent past in which people got trapped through simple likes and comments on their posts by unknown people, mainly girls. He said the ISI trap trend is not limited to the armed forces alone but some common men were also trapped in this manner for a recce of important installations and collect crucial information.

The IG said the ISI targets such people who are armed forces aspirants or stay somewhere close to important security and armed forces installations.

Another senior police official said some cases of the honey trap were reported where the same trick was used to trap the armed forces, aspirants. He said the unknown social media user continued a friendship with the aspirants till they got inducted into different forces and then used them to extract crucial information.