Early Times Report
Jammu, Jan 23 Post abrogation of Article 370 on August 5, 2019, when the Centre decided to snap mobile internet in Jammu and Kashmir, the terrorists got a shock of their life, as the move cracked the backbone of terrorism and terrorist links, however to get 'vital information' from the police officers of Jammu and Kashmir Police and other government officers, Pakistan's ISI started targeting the social networking sites and applications through 'honey trap'. ''A bug has been introduced by the Pakistan intelligence agency, along with 'honey trap,' to gather 'vital information' from the officers in the Jammu and Kashmir Police,'' intelligence sources said here. They said the moment the link was shared on the social media via different applications like Facebook, Whatsapp or Twitter, after being clicked by the user, complete data in phones, computers, laptops or any other electronic gadgets from where the link was clicked, would pass on to the ISI recruits. ''The modus operandi in this exercise is that a 'friend request' from any sources, especially women, (ISI over ground workers) operating from neighbouring states of Punjab, Delhi, Haryana or Hiamchal Pradesh, is sent to the IDs of J&K Police Officers on social apps,'' sources said. ''ISI has hatched a new conspiracy to gather information from the police officers of Jammu and Kashmir by making a dent in their social media accounts,'' they added. The Pakistani ISI has been in a fix since the internet has been shut down in Jammu and Kashmir from August 5, because they have been unable to establish contacts to their over-ground workers and important information was not being shared to them by their recruits, which foiled all their nefarious designs of disturbing peace in Jammu and Kashmir. ''Sending friend requests to the accounts of police officers from unknown sources/numbers on social networking sites, including Whatsapp and Facebook, was a 'honey trap' of ISI and these requests were accepted by these officers, without knowing the modus operandi behind,'' sources said and added that once the link is clicked by the user, the data (personal/private/official) in his electronic gadget, automatically gets 'hacked' and transferred to the conspirator. ''Mostly, such friend requests are being sent to the officers from women OGWs of ISI operating in Punjab,'' sources said and added that these women, under 'cyber expertise' generate a common number being used by some farmers or labourers or even some officials, to forward the friend request on WhatsApp or Facebook, and once it's sent, the number is deleted and further response remains awaited. ''The Intelligence agencies have located many such numbers and on investigation, found that either they belonged to some shopkeepers or the labourers/farmers, who were not even aware of the criminal act being committed,'' sources added. ''This 'smart move' of ISI is not only worrying, but also could be threatening, because one cannot identify easily the sender and without confirming credentials, the request is accepted, which ultimately is damaging,'' sources said and appealed to the police officers, public and other government officials to be careful while sharing any details to an unknown person or accepting an anonymous request on social media, as it could be a 'honey trap'. |