What began as a historic corridor of peace for Indian Sikh pilgrims is now being flagged by Indian intelligence agencies as a covert recruitment ground for Pakistan’s Inter-Services Intelligence (ISI). Intelligence sources allege that Pakistan has weaponized the Kartarpur Sahib Corridor to infiltrate Indian society through emotional manipulation and ideological grooming, using religious pilgrimage as a cover.
Religious Pilgrimage Turned Surveillance Ground
The Kartarpur complex, managed by Pakistan’s Evacuee Trust Property Board (ETPB), is said to be under the firm control of the ISI. The ETPB replaced the Pakistan Sikh Gurdwara Prabandhak Committee, giving intelligence agents unprecedented access to the activities of Indian pilgrims. Hidden surveillance tools—ranging from covert cameras to listening devices and compromised public Wi-Fi—have reportedly been used to monitor pilgrims during langars, prayer sessions, and resting hours. The goal: to assess emotional vulnerabilities, political sentiments, and socio-economic weaknesses.
According to reports, individuals with traumatic Partition-linked family histories or ideological discontent are targeted. The ISI offers them financial aid or emotional support, eventually turning them into ideological assets. One such alleged recruit is Jyoti Malhotra, an Indian influencer who reportedly came under scrutiny for promoting narratives that favor Pakistani interests.
Psychological Targeting and Digital Espionage
Jyoti Malhotra was reportedly contacted by Pakistani handlers posing as cultural liaisons. With her rising digital presence and perceived anti-establishment tone, she allegedly matched the profile ISI seeks—individuals with influence and emotional openness. These handlers are accused of offering media exposure and funding in exchange for pushing subtle propaganda, particularly around India-Pakistan relations and Kashmir.
Other reported cases include students like Devendra Singh Dhillon, who were emotionally manipulated during Kartarpur visits and later coerced into leaking information. Encrypted apps like Telegram and WhatsApp are allegedly used by handlers who operate under aliases to exchange sensitive data, including photographs of military sites.
In one significant case, Indian national Vipin Singh was arrested for leaking construction and defense movement details in exchange for money. Intelligence agencies are also keeping a close watch on pilgrimage coordinators like Harkirat Singh, who may be facilitating these interactions—willingly or under pressure.
The post appeared first on .
You may also like
New Orleans prison break: Two women arrested for aiding fugitives, bringing food and driving them around
Tottenham pundit names five players crucial in their Europa League final triumph
Nightmare for Prince Harry and Meghan Markle as Montecito 'rocked by crime' - including dogging
Govt working for permanent solution of Bengaluru's rain woes: DCM DK Shivakumar
Inside lavish Fury birthday bash as Paris shares glamorous behind the scenes snaps