Shocking! Indian YouTuber Caught Spying for Pakistan

In a dramatic crackdown on a growing espionage ring, Indian authorities have arrested six individuals—including a Haryana-based travel blogger—for allegedly passing sensitive information to Pakistani intelligence operatives. The accused, spread across Punjab and Haryana, were reportedly manipulated through emotional entrapment, monetary inducement, and promises of marriage by Pakistan’s spy network.

Among the arrested is Jyoti Malhotra, a popular travel YouTuber from Hisar who ran the channel Travel with Jo, boasting over 377,000 subscribers. Known for her scenic journeys and travel tips, Malhotra led a shocking double life, investigators say—one that involved clandestine exchanges with Pakistani agents.

From Pakistan Visit to Espionage: The Unfolding of Jyoti Malhotra’s Role

Malhotra’s descent into espionage began during a 2023 visit to Pakistan, facilitated through commission agents. There, she came into contact with Ehsan-ur-Rahim alias Danish, a staff member at the Pakistan High Commission in New Delhi. Danish, later expelled from India on May 13, 2025, allegedly acted as a recruiter, introducing her to Pakistani intelligence operatives (PIOs).

Using encrypted platforms such as WhatsApp, Telegram, and Snapchat, Malhotra remained in touch with multiple handlers—including Shakir alias Rana Shahbaz, whose number was saved as “Jatt Randhawa.” Investigators claim she transmitted sensitive data regarding strategic Indian locations and promoted pro-Pakistan narratives online. Disturbingly, she also entered an intimate relationship with a Pakistani agent and even traveled to Bali, Indonesia with him.

Booked under Sections 3, 4, and 5 of the Official Secrets Act, 1923, and Section 152 of the Bharatiya Nyaya Sanhita (BNS), Malhotra has provided a written confession and is currently in police remand. Her case has been transferred to the Economic Offences Wing, Hisar for further investigation.

The Others in the Network: Promises, Payments, and Propaganda

Malhotra wasn’t alone. Several others were similarly lured into espionage using money and emotional manipulation:

Guzala, a 32-year-old widow from Malerkotla, Punjab, first visited the Pakistan High Commission in February 2025. There she met Danish, who wooed her through romantic chats and video calls. He later shifted their communication to Telegram and began sending her money—₹10,000 via PhonePe and ₹20,000 via Google Pay. He instructed her to forward amounts to various accounts, effectively using her as a money mule.

On April 23, Guzala returned to the High Commission with her friend Banu Nasreena, also a widow. Both were granted visas quickly, suspected to be part of Danish’s recruitment funnel.

Yameen Mohd, also from Malerkotla, was engaged in fund transfers and visa logistics.

Devinder Singh Dhillon, a Sikh student from Kaithal, Haryana, allegedly began working with Pakistani handlers during a pilgrimage. He is accused of filming and sharing sensitive footage of the Patiala cantonment.

Arman, from Nuh, Haryana, procured and supplied Indian SIM cards, transferred funds on instructions, and even attended the Defence Expo 2025 as per directions from Pakistani intelligence.

A Pattern of Exploitation: Psychological Warfare Meets Digital Espionage

This case follows a worrying pattern of Pakistan’s covert strategy—targeting emotionally or economically vulnerable individuals for espionage. Intelligence officials describe this as a hybrid warfare model where agents exploit human emotions, religious ties, and financial hardship to infiltrate Indian intelligence circles.

Similar tactics have been seen in past high-profile espionage cases:

·       In 2020, a naval sailor in Mumbai was honey-trapped via Facebook by a Pakistani agent posing as a woman. He leaked sensitive naval deployment details before being arrested.

·       In 2018, a BSF jawan in Rajasthan was caught leaking troop movement data in exchange for money and online companionship.

·       The infamous ISI honeytrap network in 2016, where a woman posing as a defense journalist managed to extract critical documents from several Indian defense personnel, remains a blueprint for ongoing tactics.

National Security Threats Go Digital—and Personal

The recent arrests underscore the evolving nature of espionage threats facing India. No longer limited to foreign spies or elaborate infiltrations, modern espionage now relies heavily on digital platforms, online manipulation, and personal relationships.

While these arrests have disrupted one such network, the investigation continues, and authorities believe more operatives may be active. The case serves as a grim reminder that in today’s information age, the frontlines of national security often pass through smartphones and social feeds. With personal vulnerabilities exploited for geopolitical gain, the need for digital vigilance and public awareness has never been more critical.

(With agency inputs)

Leave a Reply

Your email address will not be published. Required fields are marked *