Bengaluru, Oct 13: As the tension along the Indo-Pak border escalates, there are spy games galore being played by the ISI and its agents. The past few weeks have seen escalation of ISI related activity on several fronts.
Right from activating spies in India to defacing Indian websites- there has been a considerable amount of activity which India has been witness to.
Along the border there have been several violations that are being reported. Following the surgical strikes, Pakistan seems to be on the offensive and has resorted to unprovoked firing.
In the aftermath of the surgical strikes, Pakistan hackers managed to deface nearly 7,000 Indian websites, all of which have been restored now.
The social media wing of the ISI and its foot soldiers who were planted in India have also been on an overdrive mode. Intelligence Bureau officials say that these are busy days and they see a surge in ISI activity off late.
The ISI's social media team is trying to set honey traps on one hand and on the other, their agents in India are trying to gather sensitive military information.
On overdrive mode
For Pakistan this has become a psychological war. They are desperate to prove that they can hit back and save their face in the aftermath of the surgical strikes.
While military escalation is not in their best interest, they have resorted to various other means to prove to India that they are still capable at playing the psychological game.
The ISI has a set of agents in India which it has activated now. On Wednesday, two spies from ISI were arrested from the border town of Khavda in Kutch district.
The allegation against them was that they were in possession of incriminating documents pertaining to the movement of the Indian army. The duo arrested have been identified as Mohammad Alana and Saifur Sumara.
In addition to this, there have also been cases of ISI spies trying to recruit retired soldiers. This was in fact revealed during the interrogation of Kafitullah Khan who was arrested earlier this year that he had tried to recruit retired jawans.
One of the conversations involving him was submitted to the court and he was heard saying, "Check karey ki Army wale LOC ke villages mein kitne logo ko training dey rahein hain. Villages ka naam pata hai toh batayein (Check how many people the army is training at the villages near the LOC. Get us the names of those villages)
Another instance of spying that has been found is targeting the mobile phones of armed forces personnel.
A Karachi based cyber unit is under the radar for attempting to lay honey traps on army personnel.
It was also noticed that this Karachi team comprising nearly 3,000 members were also developing an app through which they could steal data from the phones of the army personnel. Through this app the attempt is to access troop movement details.