Gujarat ATS arrests one for spying for Pakistan

The Anti-Terrorist Squad (ATS) of the Gujarat Police on October 20 arrested a man, a native of Pakistan who was granted Indian citizenship in 2005, for allegedly helping Pakistani authorities spy on Indian defence personnel by sending the latter a tracking malware through WhatsApp.

The ATS arrested Labhshankar Maheshwari, 53, based on inputs shared by the Military Intelligence.

The suspect has been booked under Sections 123 (concealing with intent to facilitate a design to wage war against the government) and 121-A (conspiracy to wage war against the government) of the Indian Penal Code (IPC) and relevant Sections of the Information Technology Act.

As per the details shared by the ATS officials, the investigation has revealed that Mr. Maheshwari had agreed to be part of the conspiracy to expedite the visa process for him, his wife and two other family members wanting to visit the neighbouring country to meet relatives.

“The Indian Military Intelligence recently learnt that either the Pakistan Army or Pakistan’s intelligence agency had somehow acquired an Indian SIM card, which was being used for spying on Indian defence personnel by sending them a malware through WhatsApp. Based on the information, we apprehended Maheshwari from Tarapur in Anand, where he runs a grocery shop,” said Om Prakash Jat, an ATS officer.

Last year, when Mr. Maheshwari and his wife had applied for visitor visas for Pakistan, his relative Kishor Ramwani, who is based in the neighbouring country, had asked him to contact a person with links to the Pakistan High Commission in India.

After the unidentified person’s intervention, Mr. Maheshwari and his wife received the visa. After returning to India, he again contacted the person to expedite the visa process for his sister and niece.

“In return, the person with contacts in the Pakistan High Commission asked Maheshwari to install WhatsApp on his mobile phone using a SIM card, which he received from one Saqlain Thaim, a resident of Jamnagar. Maheshwari then shared the OTP to activate WhatsApp with that man,” Mr. Jat said.

As instructed, Mr. Maheshwari, posing as an employee of an Army school, started sending messages to defence personnel and urged them to download an ‘apk’ file to upload information about their children on the official website of the school, he said.

In some instances, the suspect had lured Army personnel to install the application, claiming it was part of the government’s ‘Har Ghar Tiranga’ campaign.

“In reality, that ‘apk’ file was a Remote Access Trojan, a type of malware that extracts all the information from a mobile phone, such as contacts, location and videos, and sends the data to a command and control centre outside India. As of now, we found that the mobile phone of a soldier stationed at Kargil was compromised with that malware. We are yet to ascertain how many more persons were targeted,” Mr. Jat said.

The preliminary probe by the ATS  has revealed that when Mr. Maheshwari’s sister visited Pakistan this year, she took that SIM card with her and handed it over to a relative, who then gave it to an official there.

The SIM card was reportedly purchased by Mr. Thaim at the direction of a Pakistani operative and activated by another Jamnagar resident Asgar Modi, the official said, adding that both are now on the run and believed to have left the country.