Man Arrested in Jalandhar for Spying for Pakistan’s ISI Using Mobile App
In a major breakthrough against cross-border espionage, Gujarat Police arrested a man in Punjab’s Jalandhar for leaking sensitive information to Pakistan’s Inter-Services Intelligence (ISI). Acting on detailed intelligence, the Gujarat Anti-Terrorist Squad (ATS) tracked and detained the suspect from a rented house in the Gandhi Nagar area.

Investigators revealed that the man used encrypted mobile apps to transmit classified data to his handlers across the border. He had been living under the radar, posing as a regular resident while secretly engaging in espionage activities.
Police Seize Multiple Devices and SIM Cards
During the operation, officers confiscated four mobile phones and three SIM cards from the suspect. Investigators believe he used these devices to communicate with ISI contacts and share crucial information. Forensic teams are now analyzing the data to uncover deleted messages, call records, and other digital traces.
Initial findings suggest the man provided details related to defense infrastructure and sensitive sites. Though officials haven’t released specifics, they confirmed the leaked information posed a threat to national security.
Neighborhood Shocked by Hidden Agenda
The suspect lived quietly in Gandhi Nagar for several months. Neighbors described him as reserved and said he didn’t attract much attention. “We never imagined he could be involved in something like this,” said one local resident.
Police are questioning nearby residents and examining visitor logs to determine if anyone else had contact with him or played a role in the operation.
Spy Used Encrypted Apps to Evade Detection
The accused relied on encrypted messaging platforms to hide his identity and avoid surveillance. These apps allowed him to delete conversations automatically and mask his location, making real-time monitoring difficult.
Despite the digital cover, ATS cyber experts traced his communication patterns and tracked his location. Gujarat Police then coordinated with Punjab law enforcement to conduct a swift raid and prevent any data wipe or escape attempt.
Espionage Threats Evolve with Technology
This case reflects how espionage tactics have evolved. Spies no longer need to cross borders physically; now, they can leak information instantly using smartphones and apps. A senior ATS officer stated, “Our adversaries are exploiting technology. Even everyday apps have become tools for gathering intelligence.”
Authorities are expanding the investigation to identify any accomplices or network links. Teams are examining whether the suspect worked alone or formed part of a wider ISI-backed spy ring.
Legal Action in Motion
Gujarat Police have booked the accused under the Official Secrets Act and relevant sections of the Indian Penal Code. Legal experts say the case could result in severe penalties if the court proves his role in espionage.
“Courts treat national security violations very seriously. If convicted, he could face life imprisonment,” said a Delhi-based criminal lawyer who handles security-related cases.
Police Urge Public Vigilance
Following the arrest, security agencies urged citizens to remain watchful. They encouraged people to report unusual behavior, such as the frequent use of different SIM cards or phones, or access to unfamiliar messaging apps. Authorities stressed that public awareness can help prevent future threats.
This incident also sparked renewed calls for stronger cybersecurity laws and better monitoring of encrypted platforms. Experts emphasized the need for a balance between digital freedom and national safety.
Conclusion
The arrest of a suspected ISI agent from a quiet neighborhood in Jalandhar highlights how espionage has adapted to the digital era. Thanks to swift action by Gujarat Police and the support of Punjab officials, investigators prevented further damage to national interests. The case serves as a wake-up call: national security now depends not only on borders but also on how we manage technology and watch for invisible threats.