[ad_1]
Last updated: July 09, 2023, 15:27 IST
The DRDO scientist was allegedly in contact with PIO through WhatsApp and video calls. (image file)
The charge sheet, obtained exclusively by CNN News18, reveals details of Operation Honey Trap that led to the breach of sensitive information related to missile systems and other defense programs.
The charge sheet filed by the Maharashtra Police Anti-Terrorism Squad (ATS) in the high-profile case relating to Defense Research and World Development Organization (DRDO) It reveals amazing details of the honey trap operation that led to the leaking of sensitive information.
The charge sheet, obtained exclusively by CNN News18, reveals the details of Operation Honey Trap that led to the breach of sensitive information related to missile systems and other defense programs.
DRDO scientist Pradeep Korolkar was arrested on May 3 under the Official Secrets Act and is now in judicial custody. According to the indictment, Korolkar and ISI agent Zara Dasgupta were in contact via WhatsApp as well as audio and video calls.
‘Dasgupta’ claimed to be a UK based software engineer whom I befriended by sending lewd messages and videos. ATS said in the charge sheet that during the investigation, its IP address was traced to Pakistan.
According to the indictment, the woman who worked under the pseudonyms of Zara Das and Johi. The agent, believed to be based in the UK with country code +44, used the DRDO scientist’s desire for intimate relationships to extract important information from him.
The investigation found that the scientist openly discussed sensitive topics including Rafael and Akash missile systems with the woman. It also allegedly provided detailed structural information about missile systems, as well as information about other defense programs.
News18 has learned that the woman, who referred to Kurulkar as “Babe,” also managed to obtain information about the DRDO bot during their conversations.
The charge sheet revealed that their contacts primarily occurred between September 2022 and February 2023.
The woman also gave their email ids and password to upload details and asked him to download the apps designed with malware, the sources said, adding that these apps use all the downloaded phones data and connected emails.
As investigations progress, it is discovered that the scientist’s activities have been traced from Islamabad, Pakistan, indicating possible involvement of the Pakistani intelligence agency, ISI.
[ad_2]