If in Uttar Pradesh, beware of the sweet voice of seduction because it could very well be a honeytrap. In a short span of time, honeytrapping has roiled the UP Police. The state has seen an increase in cases as incidents of cheating are spreading rapidly through honeytraps. Not only are huge sums collected from the people who are trapped, but necessary documents are also demanded from those sitting in important positions.
Adding to the sleepless nights of the Police has been the most worrying case of Honeytrapping with a scientist posted in the Defense Research and Development Organization (DRDO) of Noida. Reportedly the accused took the scientist hostage in a hotel. The accused called the scientist's wife and informed her about the abduction of her husband demanding 10 lakh rupees in return for leaving him. The wife in turn gave this information to the police. Once the police turned active considering a case of kidnapping and rescued the scientist after several hours of hard work.
Cops later arrested a woman and her three accomplices from a hideout and exposed the case. The truth was that the scientist's house is in Sector-77. A few days ago he searched for a massage on the Internet. He got a girl's number from a website, which led him to her. The girl called the scientist for massage. A young man took the scientist from the car to the girl. Three people, including the girl, were already present at the hotel. As soon as the scientist arrived, the accused surrounded him and took him hostage. Taking the number from the scientist, they called his wife and asked for money. The woman gave this information to the police. After more than 12 hours, the police reached the hideout through surveillance. The police then arrested the girl and her accomplices.
Last year, a girl from Farrukhabad in UP was arrested in a Honeytrap case. The Gurugram police said that a 24-year-old woman was seeking Rs 40 lakh from the owner of an automobile workshop. The accused girl used to run a PG in Gurugram Sector-39. The woman befriended the owner of the workshop, and then recorded intimate moments and started blackmailing him.
The victim lodged a complaint against the woman at the Sadar police station. The police acted fast and setting up a meeting between the girl and the owner, they swiftly arrested the accused.
The honeytrap network runs deep in India. Earlier in January this year there were reports that atleast four big modules in India are active that allegedly pass on critical information to the ISI. The rot in the framework was exposed after a hawala operative and seven India Navy soldiers were arrested for leaks regarding the Navy to Pakistan.
Cracking the massive racket open was the operation Codenamed Dolphin’s Nose. This led to the Navy bring forth drastic changes in its functioning. With immediate effect the Navy banned use of social media and smartphones at navalbases, dockyards and onboard warships. WhatsApp and other messaging platforms too are a strict No – No.
Linked to Pakistan, in recent history honey trapping has been a popular tactic to elicit sensitive information from Indian Armed Forces. Honeytrapping is a widespread racket involving several local persons. Operators have been caught from Mumbai. Months back, a lady who called herself as Anika Chopra posed as an Army Captain at the Military Nursing Corps managing to trap several jawans.
A jawan posted with an armoured unit was taken into custody at Jaisalmer. Media reportage traces the ISI honey trapping unit to Faridkot, functioning at a budget of Rs 3,500 crore. The modus operandi is to lay a trap and then elicit information through cash or blackmail. For sensitive information, ISI is willing to shellout anything between Rs 5 and 10 lakh.
ISI reportedly tracks 200, at one go. In India there is a record of operating modules in Uttar Pradesh, Rajasthan, Gujarat and Madhya Pradesh. Set up by the ISI , locals are the chessmen doing the real footwork. Locals get in touch with officials and share information to trap and extract information.
Kommentare