Thane – In a case that has once again exposed the vulnerabilities in India’s defense sector, a 35-year-old naval engineer from Thane has been arrested for leaking classified information to a Pakistani intelligence operative. The accused, Ravikumar Verma, had been working as a junior technical engineer on contract at the Mumbai Naval Dockyard for the past five years. He was allegedly caught in a honey trap laid by a Pakistani woman spy who befriended him over Facebook and lured him into sharing sensitive information in exchange for money.
According to Maharashtra’s Anti-Terrorism Squad (ATS), Verma came in contact with the Pakistani operative in November 2024. Their online chats quickly turned into an emotional relationship, and over the following months, he began sharing restricted information related to the Indian Navy via WhatsApp. The information reportedly included technical details about dockyard operations, restricted zone layouts, and internal communication.
The ATS began tracking Verma after intelligence agencies noticed suspicious financial transactions in his bank account. A detailed probe revealed that he had received significant sums of money from foreign sources, suspected to be routed through proxy accounts linked to Pakistan. Following this, he was arrested on May 28 from his residence in Kalwa, Thane. Investigators also detained two more individuals connected to the case. All three have been booked under the Official Secrets Act and the Unlawful Activities (Prevention) Act (UAPA).
Verma, who lived alone and was unmarried, is believed to have been emotionally manipulated by the woman posing as a professional from a ship design firm. Investigations indicate that she was, in fact, a Pakistani intelligence operative who slowly extracted classified information under the guise of a romantic relationship. Sources say Verma sent sensitive documents, photos of dockyard layouts, and internal notes through WhatsApp, unaware of the full implications.
The ATS is now examining the nature of the information leaked, the exact amount of money received, and whether Verma had any accomplices within the naval or civilian defense systems. They are also probing the financial trail to identify whether this was part of a broader espionage network operating in India.
This incident is not isolated. In recent years, several similar honey trap cases have come to light:
In March 2024, Kalpesh Baikar, a contractual worker at Mazagon Dock Shipbuilders, was arrested for passing on restricted information. In December 2023, Gaurav Patil, a 23-year-old naval trainee, was caught sharing sensitive ship design details with a Pakistani agent who had posed as an HR executive. In May 2023, DRDO director Dr. Pradeep Kurulkar was arrested in a similar honey trap operation. And in October 2020, Deepak Shirsath, an HAL employee, was found guilty of leaking fighter aircraft data to a foreign agent.
These repeated cases have raised serious concerns about cyber and personnel security across India’s defense and research organizations. Experts say that while advanced weaponry and secure systems are in place, the human element—often overlooked—remains the weakest link. The use of social media by defense personnel, particularly for unsupervised interactions, continues to be a growing threat.
Authorities are now expected to issue new guidelines for defense staff regarding online conduct, use of personal devices, and communication protocols. Regular cybersecurity training, background re-verification, and stricter monitoring of contract employees are likely to be among the key reforms considered.
As the investigation progresses, officials believe more arrests may follow. The incident has once again underlined the urgent need for India’s defense establishments to strengthen internal security, not just through technology—but also through vigilance, education, and better human resource safeguards.