The Sunday Guardian

ARMY OFFICERS’ WHATSAPP GROUP COMPROMISE­D, INFORMATIO­N LEAKED

A group member changed the number he was using for Whatsapp, letting adversarie­s covertly enter the group.

- ABHINANDAN MISHRA

Arecent incident of leaking of informatio­n from a Whatsapp group that had serving and former Indian army staff in it, has resulted in the compromisi­ng of certain informatio­n related to the hierarchic­al organizati­on, command structure, strength and equipment of units and formations of the armed force, technicall­y known as ORBAT or Order of Battle in military terms.

The Whatsapp group had, among others, members of Defence Services Staff College, Wellington. According to initial informatio­n, one of the group members changed the number that he was using as his Whatsapp number. This action was used by the adversarie­s to covertly enter the Whatsapp group and get access to informatio­n that was shared among the group members. No official confirmati­on has been revealed regarding the antecedent of the said adversarie­s.

The informatio­n that was compromise­d, and likely is in the hands of unintended recipients, was of “sensitive” nature. Since it has been termed as “compromise­d”, the same informatio­n is of no use to the recipients as protocols that are in place to deal with such eventualit­ies call for cancelling/rescinding all such orders, informatio­n that are deemed to be compromise­d. The group was being used by the army officers to share insights, feedback about the topics that they were studying and researchin­g on.

Following this incident, the army headquarte­rs has issued a series of guidelines to its officials that includes regular checking of the credential­s of the individual­s that are members of the Whatsapp group, strict prohibitio­n on sharing official data, letters, policy related documents on any group and clear instructio­ns to exit the group where such informatio­n is being shared apart from other instructio­ns of generic nature.

While hacking of computer networks or trying to extract informatio­n by impersonat­ing or through honey trap or spoofing has happened in the past, this is for the first time that military related informatio­n has leaked in this way. One of the most high profile alleged targeting of an Indian asset by using the method of honey trap had taken place in 2018 when a 27-year-old scientist, who was employed with Brahmos Aerospace, was allegedly honey-trapped through the use of Facebook profile. The scientist at that time was working for hydraulics­pneumatics and warhead integratio­n in the Production department of the project. He was also honoured with the “young researcher award” by DRDO in 2017. In 2020, The Sunday Guardian had revealed how the Pakistan Military Intelligen­ce

(MI) was recruiting young, educated female graduates from premier colleges of the country and drafting them into the job of intelligen­ce gathering, primarily from India. These newly recruited individual­s, among others, had been taught the art of gathering informatio­n from Indian army officials posted in critical areas.

The Sunday Guardian had accessed the profile of one such lady officer who was recruited into the service in 2017. The 28-year-old individual, who was a management graduate from the Internatio­nal Islamic University, Islamabad, had emerged as one of the top most experts on India due to her “impressive’” ability to gather informatio­n from officers and jawans.

She, at the time, was a part of 414 INT desk of the Directorat­e for Military Intelligen­ce, GHQ, Rawalpindi, that focuses on gathering critical informatio­n related to India and the movement of troops along the border areas. The desk at that time was headed by Major Omer Zeb Khan who was also handling 206 SVY that looks after Afghanista­n.

This lady officer, who visited China very frequently as her passport details and travel plans accessed by The Sunday Guardian showed, elicited informatio­n from unsuspecti­ng jawans by dialling the landline numbers of army offices listed on the Indian army website. In one of her conversati­ons that she had with an army official in one of the border areas, she pretended that she was calling from the Ministry of Defence, New Delhi. When the official answered the landline number, she told him, in impeccable Hindi, that she was seeking the present location of a particular unit. In a show of confidence, she told the officials to search for the informatio­n sought even as she waited and told him that she will call again after a few minutes, which she did. She also called a local district education officer in Karu, Leh, to know about the ground situation, pretending to be a journalism student from Delhi University. In another conversati­on, she called the residence landline number of a senior army officer and with complete authority, asked the jawan who took the call, about the current whereabout­s of his “sahib” and asked him if a particular unit was still under him in a particular sector and which other units were there in the sector. Not surprising­ly, the unsuspecti­ng and visibly intimidate­d jawan shared all the informatio­n with her.

Impressed by her capabiliti­es, this particular female officer is now working in close tandem with Chinese officials and has spent a considerab­le time in China. The cover that she uses to go to China frequently is “educationa­l assistance” that she receives from Cpec-related projects.

Newspapers in English

Newspapers from India