Ex-SBI staffer’s account used to honeytrap Dockyard worker
The Maharashtra Anti-Terrorism Squad (ATS) has found crucial evidence regarding the financial trail in the case involving Mazagon Dockyard worker Kalpesh Baikar, who is accused of compromising national security by sharing sketches of 25 warships and submarines with a Pakistani intelligence operative (PIO) disguised as an Indian woman, Sonali Sharma.
The agency has identified the person whose account was exploited by the PIO to transfer funds to Baikar as part of the honey-trap strategy. Sharing the details of the investigation with the magistrate court, the ATS revealed that Kiran Pal Singh, a retired SBI employee actively involved in digital currency, had purchased digital coins worth $24 through a wellknown online exchange. During this transaction, Singh was provided a UPI ID to transfer the money. Unbeknownst to Singh, the UPI ID was linked to Baikar’s bank account in Alibag to which Rs2,000 was transferred through G-Pay as a birthday gift by the PIO.
During the probe into the case, it was discovered that
ISI was using digital currency to fund terrorism and for their operations, employing a honey trap strategy to avoid leaving a footprint of their involvement. Currently, the ATS is scrutinising Singh’s digital currency account. Singh will also be presented before the court on Wednesday to record his statement.
The ATS stated that they are still trying to identify the PIO agent, who allegedly honey-trapped Baikar to obtain the sketches of warships and submarines. Meanwhile, the court sent Baikar to judicial custody for 14 days.