Ocnus.Net

Dark Side
Intelligence: Things We Do For Lust
By Strategy Page,February 8, 2019
Feb 8, 2019 - 11:49:16 AM

The Indian military has found itself frequently and embarrassingly vulnerable to repeated Pakistani use of the Internet and sex to turn Indian troops and officers into spies. These cases usually involve officers with access to important and closely held information. But at the end of 2018 there was a different application of the classic Internet honey trap where Pakistani operatives in Pakistan pretending to be an attractive Indian army nurse looking for love and apparently concentrating on young enlisted soldiers and seducing low grade information out of them. This involved detailed photos of equipment and information about unit locations and operations (from a junior soldiers’ perspective). Indian counterintelligence is still investigating this operation because it appears there may be dozens of Indian soldiers seduced into providing information. Apparently some cash payments ($70) were involved as well.

Earlier in 2018 there was a more serious case where two officers (one air force, one army) were arrested after getting caught stealing, or attempting to steal, classified documents for a girlfriend they met on the Internet. A common venue for these seductive intel operatives is Facebook, which lends itself to the honey trap technique. The Internet has made it easier for this social engineering technique to work because instances of men and women meeting each other virtually are so common. A skilled intel operative can then seduce secrets out of the victims, who are usually men, but women have been entrapped as well. Since Internet access via cell phones became so common in Asia during the last decade the “virtual honey trap” has become more popular in many parts of the world. By “virtual” is meant that military men are seduced by virtual women via social networks where the recruiters use photos and talk of eventual physical contact in exchange for digital photos of documents sent via encrypted apps like WhatsApp.

After some well publicized and embarrassing Internet honey trap incidents the Indian military cracked down by ordering military personnel, especially those with access to classified data, to not use their real names or indicate they are in the military while online, especially on social networks. In addition rules forbidding having cell phones in areas where classified documents or activities are were more strictly enforced. This forced spy recruiters to work harder to identify military people worth going after and develop more effective entrapment scripts and strategies. The most frequent known victims of these virtual honey traps are Indians but that is because, unlike China and Pakistan (two known users of this technique) India has a free press where the men recruited and caught usually become known. Not so in Pakistan and China, or at least not often. But one thing all three nations (and most nations in general) have in common is military personnel looking for love in all the wrong places for all the wrong reasons.

It is unclear if Pakistan honey trap operatives have turned their attention to lower ranking personnel because officers and NCOs with access to higher level secrets are now on the alert for this sort of thing. It is clear that Indian media is able and eager to publicize these incidents unlike Pakistan and China where the government has more control over what appears in the media. That can be seen in how honey trap incidents involving Taiwan, South Korea or Japan get noted in the free press of those countries but not in China, where there are known to have been cases of officers and officials snagged in a honey trap that the Chinese government prefers to remain quiet about.

India and Pakistan are a special case. Since the 1990s Pakistan has quietly and extensively changed how it creates and manages spies inside India. For decades Pakistan mainly relied on agents recruited and trained in Pakistan to pass as Indian. After their training, which often took years, was completed these agents were sent to India where they often spent many more years working their way into jobs where they could obtain useful information. The Pakistani agents also sought Indians willing to gather information, usually for a price. India is a poor country and many low level, and poorly paid, government employees were willing to sell information if the price was right. All this was very expensive and the Pakistanis were always on the lookout for more efficient (and cheaper) techniques.

The use of virtual honey traps first became known when it was used against Indians by Pakistan and other nations (Taiwan, South Korea and Japan) by China. The most details are available about the use of these techniques by Pakistan against India. These details began to emerge after 2012. It all began when India became more effective at catching traditional Pakistani spies. Over the years India learned how to quickly detect, identify and arrest these spies as well as their Pakistani handlers. As a result Pakistan began switching from using agents inside India to recruiting and managing spies via the Internet. The highly trained Pakistani agents could remain safe in Pakistan and develop techniques to find and manage Indian spies via the Internet. India still catches these traditional spies, but has come to discover that there are a lot more of them. Since 2015 over a dozen have been arrested. This included four post office employees who were intercepting mail sent from one Indian base to another and looking for salable information. That was passed on to Pakistan, which paid well for this stuff. Often information was literally phoned in using hard-to-trace SIMS supplied by the Pakistanis.

Pakistan accepted the risk of these spies getting caught because the payoff was often considerable. For example in early 2015 Indian police arrested an employee (a cameraman) for the government defense research organization (DRDO) and accused him of spying for Pakistan. The suspect was accused of passing on information about missile research and tests and doing so for up to ten months. The suspect admitted that he had met with ISI (Pakistani intelligence) agents in India several times in 2014. Apparently this man was caught because Indian intelligence was monitoring ISI agents. It’s unclear why the Indian man agreed to be a spy, although money appears to be the most likely motivator.

In addition to cash Pakistan has found that sex also works and is being used more frequently via the Internet. Thus in mid-2014 an Indian army warrant officer (Subedar) was arrested and charged with spying for Pakistan. The arrested man had been recruited in 2013 via Facebook by a woman who sent him software that he posted to his work server. This software enabled the Pakistanis to hack into the headquarters where the warrant officer worked. The Pakistani woman (or someone posing as a woman) convinced the warrant officer she was interested in him and asked him to help her with some work she was doing for the NGO she was employed by. The warrant officer fell for all this and enabled the Pakistanis to get a lot of information about the readiness and deployment of several Indian missile units. It is as yet unclear if the warrant officer knew he was being played or that he was really smitten by his new online girlfriend.

Such honey traps have been encountered in India for quite some time and were known to exist in antiquity. In 2011 an infantry lieutenant-colonel was prosecuted for spying for Pakistan. The officer was recruited in 2010 while in Bangladesh, where he was attending a course at a Bangladesh military school. The Pakistani ISI had a woman operative seduce the Indian officer, and the sexual activity was recorded on video. The officer was given a choice of the video being made public, or him becoming a Pakistani spy. The officer became a spy and was caught by Indian counterintelligence after a few months.

Honey traps are still less frequently encountered in South Asia and the most common method is still simply offering cash. An Indian army clerk was arrested earlier in 2014 for doing that. In early 2013 India police arrested four Indians and accused them of working for ISI and passing on information and documents for at least three years. That spy cell mainly operated near the Nepal border and cash was the main motivator.

Pakistan is constantly seeking Indian military personnel willing to spy for cash or sex. Even most Indian Moslems have no love for Pakistan and thus ISI concentrates on the greed, need or blackmail approach to recruiting Indian agents. India does the same in Pakistan, but India, with six times the population of Pakistan, is a far larger target and has more secrets Pakistan wants. The virtual honey pot, however, has turned out to be very effective and apparently cheaper than the traditional methods of offering cash and using physical contact (between foreign handler and local recruited agent). More effective forms of encrypted Internet communication also help as does the fact that so many of the people targeted have smart phones and regularly access the Internet via those devices.



Source: Ocnus.net 2019