In a major setback to cross-border spy rings, a Pakistani court has convicted three people who were caught spying on behalf of the top Indian intelligence agency, the Research and Analysis Wing (RAW). The conviction, which was held on Monday, April 13, 2026, underscores a worrying trend in the manner in which intelligence activities are being carried out nowadays- through social media, electronic currency, and time-tested psychological methods.
The terrorists were arrested after a precision strike by the Pakistani security agencies and are of Narowal, Bahawalpur and Neelum district of Azad Jammu and Kashmir (AJK).
The Digital Honey Trap Modus Operandi
As the investigation unfolded and they proceeded with the interrogation, a shocking trend was revealed. The inmates have confessed that they were not enlisted in the dark corners, but on the sunny screens of their smartphones.
The accused were enticed into espionage using the honey trap strategies as alleged by security sources. People posing as women approached them on particular social media. With time, the interactions turned out to be not mere chatting but a form of exploitation where the suspects were lured by both emotional and financial gains to give out sensitive information about the nation.
A Modern Money Trail: Crypto and Easypaisa
One of the most concerning aspects of this case is the method used for financial compensation. To avoid detection by traditional banking monitors, the handlers utilized a mix of local and global digital payment systems.
Investigators revealed that payments were funneled through:
- Cryptocurrency Wallets: Allowing for near-anonymous cross-border transfers.
- Easypaisa: Utilizing local mobile wallet networks for quick, everyday transactions.
- Standard Bank Accounts: For larger, seemingly legitimate transfers.
This hybrid approach allowed the suspects to remain “on the payroll” for extended periods while maintaining a facade of normal financial activity.
Conviction Under the Official Secrets Act
Cases against the three were registered by the state on the basis of the Official Secrets Act, which was the main law involving the prosecution of the acts of spying, as well as the disclosure of classified data of the state. The sentences were sentenced after a rigorous legal process during which the confessions and computer-related evidence were provided, and it marked the start of a zero-tolerance policy to betrayal at the state level.
Security analysts point out that this case is part of a broader trend where hostile agencies exploit “innocent” or vulnerable citizens via financial inducements. Past evidence has frequently surfaced showing serving foreign officials involved in similar covert attempts to access Pakistan’s sensitive data.
Key Takeaways for Public Safety
Don’t Trust Strangers: Do not disclose personal or professional information to strangers, particularly those who promise financial favors.
Keep Track of Financial Requests: When a person requests you to do something in exchange of the crypto or mobile wallet transfer, it is a gigantic red flag.
Report Suspicious Activity: Vigilance is the first line of defense against hostile intelligence methods.
READ: More Informative Content






