Mumbai: The Maharashtra Anti-Terrorism Squad (ATS) is expanding its probe into the espionage case involving Ravi Verma, an employee of a private defense company, who was arrested for allegedly spying for Pakistan. ATS sources revealed that several other employees who worked alongside Verma—particularly those in fitter roles—are now under scrutiny, and the agency is expected to question them soon. There is also a possibility that the ATS will examine the mobile phones of both former and current employees hired through outsourcing.
According to sources, these employees, like Verma, were permitted to carry mobile phones into sensitive and restricted naval dockyard areas due to the technical nature of their work, which often involved live video calls with senior engineers or supervisors during equipment repairs. The ATS suspects that these employees may have also taken unauthorized photos and videos of warships, vessels, and submarines—similar to Verma’s actions.
The ATS plans to scan the mobile phones of these employees to recover any deleted data that could serve as evidence of espionage. Investigators believe that, like Verma, some of them may have unknowingly or deliberately shared sensitive visuals with foreign agents.
How Verma Exploited Access for Espionage:
Verma, employed by a private firm contracted for naval repair work, used the video-call provision—granted for work-related communication—to smuggle sensitive images and videos out of classified naval zones. His job required him to demonstrate damaged or faulty parts over video calls to receive real-time instructions, a provision he exploited for espionage.
Investigations revealed that Verma came into contact with a Pakistani woman intelligence operative, identified as Preeti Jaiswal, during his posting in Visakhapatnam (Vizag) via Facebook in October 2024. Their online interaction soon turned into an emotional relationship, with Jaiswal allegedly extracting sensitive information from Verma in exchange for emotional support and monetary rewards. The ATS has detected suspicious transactions in some of Verma’s bank accounts and is currently probing their sources.
On Saturday, the Mumbai head office of the ATS interrogated Verma for two hours after taking custody from its Thane unit. During the session, Verma reportedly admitted to sending classified photos and videos of naval vessels to Preeti Jaiswal. He had saved her contact under the alias “Aakriti College Friend” to avoid detection. He also archived their chats, which were later recovered during a forensic analysis of his phone.
ATS officials learned that Verma was contacted by Pakistani intelligence operatives using four different mobile numbers—some posing as friends or acquaintances of Preeti or her associate Ishpreet. Using these aliases, Verma was persuaded to provide strategic visuals and updates on ship locations, movements, and technical malfunctions.
He reportedly documented and shared information on 14 warships and submarines, five of which have been classified as highly confidential by investigators. These included vessels from Mazagon Dock, Naval Dockyard, Indian Coast Guard, and Mumbai Port Trust.

Company Background & Ongoing Probe:
Verma was employed in the energy division of a private defense firm named Krishna. He was regularly deployed to various naval bases across Maharashtra for maintenance assignments. The ATS is in regular contact with the company to gather more information on Verma’s activities and access.
In a particularly revealing incident, Verma reportedly wrote down sensitive ship deployment data in his diary on March 12, 2025, and sent a photo of the page to Preeti Jaiswal. Sources say that it was in December 2024 that Preeti first requested operational details of naval vessels from him.
The ATS is continuing its investigation and is expected to summon and interrogate other employees who may have had similar access to sensitive naval areas. The agency is also analyzing multiple digital trails and financial records to uncover the full extent of the espionage operation. The case highlights a serious breach of defense security protocols and raises alarms over insider threats facilitated by emotional manipulation and digital communication.