SPY CAUGHT at Missile Test Site!

An employee at India’s premier missile testing complex has been detained for allegedly leaking sensitive defense information to Pakistan’s intelligence agency, raising alarms about internal security protocols.

At a Glance

  • Indian authorities detained a civilian worker at the DRDO’s Pokhran site
  • The suspect allegedly shared missile and troop details with Pakistan’s ISI
  • Spyware and coded messages found on his personal mobile device
  • DRDO and Indian Army have launched parallel internal audits
  • Investigation is ongoing into broader espionage implications

Breach at Strategic Site

Indian security officials detained the manager of a guest house operated by the Defence Research and Development Organisation (DRDO) near Pokhran Field Firing Range in Rajasthan. The facility is India’s primary missile and ordnance testing ground, known for high-profile ballistic missile trials and live-fire exercises involving nuclear-capable platforms.

Watch now: Manager of DRDO Guest House Detained for Spying · Times of India

https://timesofindia.indiatimes.com/city/jaipur/manager-of-drdo-guest-house-detained-for-spying/articleshow/123104083.cms

Preliminary reports allege the individual was in contact with handlers linked to Pakistan’s Inter-Services Intelligence (ISI), and had used messaging apps and encrypted calls to transmit sensitive details related to troop deployments, test timetables, and infrastructure layouts. The breach came to light after a routine cybersecurity audit flagged irregular data traffic patterns from the guest house network.

The suspect, whose identity is being withheld during investigation, had access to personnel rosters and logistical plans despite not being a scientist or technician. Officials believe he may have been exploited via a “honey trap” operation—common in espionage cases targeting mid-level civilian workers.

Damage Assessment Underway

DRDO has confirmed that multiple security layers at Pokhran have been reinforced and audit protocols are being re-evaluated across its facilities. The Indian Army’s Southern Command is concurrently conducting a review of personnel background checks and third-party employment contracts.

Investigators are examining whether any data related to India’s latest long-range missile tests—such as the Agni-5 or Pralay platforms—was compromised. National cyber defense teams have been deployed to trace potential communication nodes used for outbound data relays, especially to foreign intelligence-linked numbers and servers.

The Home Ministry has briefed the Prime Minister’s Office on the incident, indicating the possibility of further arrests depending on digital evidence extraction from seized devices.

Broader Security Implications

This case is the latest in a string of espionage attempts targeting India’s missile and aerospace sectors. In the past five years, several lower-level employees at research labs and coastal command centers have been accused of leaking data through covert online exchanges or under coercion.

Defense experts have long warned that civilian-adjacent contractors at critical sites are often overlooked in counterintelligence frameworks. This incident may prompt a comprehensive reevaluation of access permissions, digital hygiene protocols, and social engineering vulnerabilities within India’s high-security zones.

India’s National Security Council Secretariat is reportedly preparing a draft advisory on strengthening internal threat monitoring, with special focus on guest facility employees and transport contractors embedded in defense infrastructure.

Sources

Times of India

The Hindu

Hindustan Times