
A man from Agra, Uttar Pradesh, was arrested for allegedly leaking sensitive information about ISRO's Gaganyaan mission and other defense projects to Pakistan's ISI. The individual was reportedly manipulated through a honeytrap operation.
The honeytrap incident involving ISRO's Gaganyaan mission has raised significant concerns about national security.
Ravindra Kumar, a chargeman at the Firozabad Ordnance Factory, was arrested by the Uttar Pradesh Anti-Terrorism Squad (ATS) on March 14, 2025. He was accused of leaking sensitive information about India's Gaganyaan mission and other defense projects to Pakistan's ISI.
The accused, Ravindra Kumar, was reportedly honey-trapped by an ISI handler named ‘Neha’ and had been leaking sensitive defence information for an extended period.
Kumar was reportedly manipulated by a Pakistani agent posing as an ISRO officer named "Neha Sharma" on Facebook. Their interactions moved to WhatsApp, where the agent extracted classified information through chats and video calls.
The data shared included details about drone manufacturing, ordnance production, and the Gaganyaan mission. Kumar allegedly received payments from unknown sources multiple times in exchange for this information.
The investigation revealed a larger espionage network operated by ISI, utilizing AI-driven tools and call centers in cities like Lahore and Karachi. This network, known as "Project Lioness," trains female spies for such operations.
The Firozabad Ordnance Factory, which plays a crucial role in manufacturing parachutes for astronaut landings in the Gaganyaan mission, was compromised. Authorities are investigating the extent of the breach and its potential impact on national security.
If convicted under the Official Secrets Act, Kumar could face up to 14 years in prison.
This incident underscores the persistent threat of honeytrapping and the need for stringent cybersecurity measures. Let me know if you'd like to explore more about ISRO's Gaganyaan mission or related topics!