
ThePrint ThePrintPod: A ‘clumsy’ Indian spy left a trail of digital breadcrumbs, US DEA claims it led them to Pannun plot
Nov 22, 2025
Investigators reveal how a clumsy alleged RAW officer left behind a digital trail linking him to a murder-for-hire plot against a Sikh separatist. Personal records from Gmail exposed his identity, while WhatsApp exchanges provided crucial connections. Mistakes in using commercial email services risked his operational security. The DEA claims detailed planning occurred through encrypted communications, leading to essential forensic recovery of messages. The episode dives into the intersection of digital privacy and security failures.
AI Snips
Chapters
Transcript
Episode notes
Personal Gmail Revealed Identity
- Digital 'breadcrumbs' in personal Gmail accounts linked alleged RAW officer Vikash Yadav to a murder-for-hire plot against Gurpatwant Pannun.
- Prosecutors found employment records, passport, tax returns and photos that tied the pseudonym to Yadav and Indian government service.
Linked Accounts Through Same IPs
- Yadav set up a Pannu-operation Gmail tied to a phone number ending 9645 and linked it to a long‑running vikas0 Gmail.
- Both accounts accessed the same ISP IP addresses in Delhi, which helped investigators connect them.
Operational Slips Undermined Secrecy
- Yadav accidentally used the Pannu Gmail for tax and debit-card images, undermining operational separation.
- Those slips allowed investigators to pull personal documents from his vikas0 account and map his RAW/ARC ties.
