Skip to main content

ISI used Facebook to honeytrap IAF airman into spilling secrets

An Indian Air Force employee, got a Facebook friend request from a pretty woman based in the United Kingdom three years ago. He thought himself the luckiest of young men when the friendship took a spicy turn that included dirty talk late into the night. Already addicted to social media, the 30-something man began to remain online almost through the day for the woman, McNaught Damini, to come online and fulfil his fantasies.

McNaught's profile on Facebook showed her to be a resident of Beeston, Leeds, an executive for an investigative magazine there. Ranjith, whose job as a lead aircraft man (LAC) was to help the technical crew look after the aircraft, was titillated by the intimate chatter made all the more naughty by the woman's strong British accent. They soon moved from text chats to audio and photo exchanges on Whatsapp.

During one such tete-a-tete, McNaught seductively asked the Kerala man for some information on the IAF, ostensibly for the news magazine she worked for. She had earlier even interviewed him for the magazine, so an enamoured Ranjith thought nothing of divulging the info. In fact, he thought it a bonus when she said she would pay him for any material he passed to her.

One day, the woman asked him if he could give her some details about TAC-DE (Tactical and Combat Deployment Establishment) in Gwalior. He refused, knowing how strategically important this unit is to the IAF. He could as well have been hit by a missile, for the woman suddenly turned from coy to vicious, confronting him with recordings of the chats and documentation of the information he had shared earlier.


Too late, Ranjith realised he had become the latest victim of an ISI honeytrap. Threatened with exposure, he had no option but to pass on crucial IAF-related dope to an ISI handler he was introduced to. Every time he moved stations for training - Belgaum to Chennai, and lately to Delhi -- the ISI dogged him, sometimes over Facebook and Whatsapp, but also via Skype.
Thrice in Belgaum, six times in Chennai and also in Delhi, Ranjith leaked sensitive data on air force exercises, movement of aircraft and deployment of various flying units, his major lapse being supplying the position and other details of Mirage and fighter jets at TAC-DE.


Military Intelligence (MI) and Delhi Police caught up with him, and Ranjith was arrested on Monday, hours after the IAF dismissed him from service. Ravindra Yadav, joint commissioner of police, Crime Branch, revealed that the man had been under electronic surveillance for some months after MI sleuths had tracked communications between him and his handler. A few days ago, a police team led by ACP KPS Malhotra interrogated him at length in Bathinda. They brought him to Delhi, where he was formally arrested, completely wrecking Ranjith's planned tryst on New Year's Eve with his lady love at a luxury hotel in New Delhi.

Comments

Popular posts from this blog

Here Are 7 Brilliant Cheat Sheets For Linux/Unix

There's nothing better than a cheatsheet when you are stuck and need a reference. So here bringing to you 7 brilliant free cheat sheets. 




1. Unix Tool Box: An incredibly exhaustive reference for all things Linux. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.

2. One page Linux Manual: Great one page reference to the most popular Linux commands, it is a summary of useful Linux commands.

3. Linux Reference Card: One great reference published by FOSSwire.

4. Linux Command Line Cheat Sheet: This is an interestingly sorted and helpful cheat sheet by cheatography.

5. Linux Command Line Tips: This is a linux command line reference for common operations. Cleanly sorted and well described.

6. Treebeard’s Unix Cheat Sheet: A great reference that shows command comparisons with that of DOS. So if you are someone who was a DOS user and has switched to Linux, this is the best one too have!

7. Linux Shortcuts and Commands:…

WhatsApp is illegal, will soon banned in India : Government

WhatsApp could have accidentally entered into troubled waters here in India by enabling its end-to-end encryption for all. The new security feature by WhatsApp is not what is required by the Indian telecom rules and WhatsApp could face a ban, if the rules are not adhered to. But not yet.
In India, companies need to follow the country’s rules and adhere to specific types of encryption, which WhatsApp does not currently use. WhatsApp’s end-to-end encryption on its chat service means that WhatsApp or anyone else won’t be able to crack open its contents.  Only the sender and the recipient are able to read the encrypted data. WhatsApp uses a 256-bit key for encryption of all chat messages, which is only known to the sender and the recipient.
Why is it not possible for WhatsApp to help decrypt users’ messages? "No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us," WhatsApp founders Jan Koum and Brian Acton wrote on their blog. How…

Ten Important Rules Of Ethical Hacking

The world of ethical hacking too is bound by a set of rules and principles, here are 10 crucial ones!

Time and again we have been bringing you valuable resources on ethical hacking since we know and understand the nature of things as far as security goes. Ethical hacking is picking up steam each day with more and more organisations spending heftily to maintain the sanctity of their systems and data. As such, ethical hacking is a glorious career option in the current scheme of things.



1.Set your goals straight

To begin with, an ethical hacker must start thinking like the intruder. He must be able to identify the loopholes on the target access points or networks that are prone to attack, he must be aware of the repercussions of these loopholes and how the intruder can use it against the same. An ethical hacker then has to find out if anyone at the target notice the intruder's attempts to carry out his/her acts. Finding out and eliminating unauthorised wireless access points is always t…