Kiran Randhawa and Mahima Patel were two Facebook accounts that were used to honey trap an Indian Air Force officer who was arrested on charges of sharing secret documents.
The chats began six months back. The Group Captain, Arun Marwaha was honey trapped and then blackmailed into sharing vital information regarding the IAF.
It began with lewd chats. It then went on to exchange of pictures. Here is where the trap was set and then the officer was blackmailed. It was a clear ISI operation said an officer with the Delhi police investigating the case.
Once in there was no way out and the officer repeatedly sent classified documents. He logged off the Facebook account and then began communicating on WhatsApp.
During the questioning, the officer admitted to sharing five documents. While the claims made by the officer are being examined, investigations have found that documents relating to the training exercises of the Marine Commando Force, GARUD Commando Force were also sent. It was also found that a document relating to the Garud Shakti exercise was sent.
The police say that Marwaha was trailed on Facebook. He was very active on the social media and would upload pictures frequently. Pictures of his jumps and non-classified exercises were uploaded by him.
The police say that the accounts of Kiran and Mahima were immediately de-activated following the arrest. Marwaha's cell phone has been seized and is currently being examined by the forensics team.
The next step would be to write to Facebook and WhatsApp in a bid to seek the transcripts of the deleted chats. This would be crucial to the investigation as tracing the IP addresses would be tough, says the Delhi police officer. This is because, the ISI masks the IP addresses which makes it very difficult to trace, the officer explained.