Honey trap: A tale of 2 women and 2 conversations
When the ISI decided to honey trap Arun Marwaha, an officer with the Indian Air Force, they decided to unleash two of their best spies. The duo signed up on Facebook as Mahima and Kiran.
Prior to this they were observing the social media behaviour of the officer and learnt that he was very active. He would regularly post pictures and was very active.
Both Kiran and Mahima introduced themselves as models. The chat at first was casual. While Kiran indulged only in lewd chats, Mahima would discuss general issues.
It took them at least four months to gain his trust, investigations being conducted by the Special Cell of the Delhi police show. The probe also showed that the duo were part of the ISI's rung which created fake accounts and sent out requests only to officers in India.
The probe suggests that this could have been the latest Bangladesh module of the ISI which was set up following the Kashmir unrest. It is a huge module, officers say while adding that over 200 requests were sent out in the past year.
After the two got comfortable with the officer, they asked him for his naked pictures. Once he sent them out, they knew that the trap had been set. They then blackmailed him and asked him to send out information failing which they would post these pictures online.
He then moved out of Facebook and began interacting with them on WhatsApp. He is alleged to have sent out vital information relating to the Air Force including the Gagan Shakti operations.