BrahMos Engineer Nishant Agarwal: Nishant Agarwal was a young systems engineer at BrahMos Aerospace, the Indo-Russian joint venture that develops the BrahMos supersonic cruise missile. He was regarded in media reports as a bright, award-winning young scientist (DRDO’s Young Scientist award has been mentioned in profiles) and worked in technical research and production-related areas at the Nagpur facility.
The arrest (2018): How the case began?
Indian agencies arrested Agarwal in October 2018 in a joint operation involving military intelligence and state Anti-Terrorism Squads. Investigators said they found classified BrahMos documents on his personal devices and alleged he had been in contact with apparent Pakistani operatives through social-media accounts. The initial allegation was that sensitive technical information about the missile programme had been passed to Pakistan’s intelligence agencies.
The “honeytrap” and social-media contacts
Police accounts and later reporting described a pattern often seen in cross-border intelligence operations: operatives create fake social-media profiles, frequently impersonating attractive young women to befriend people with access to valuable information.

In this case, investigators publicly named Facebook aliases (reported in multiple outlets as “Neha”, “Pooja”, and later “Sejal”) that were allegedly run from Pakistan and that had targeted not only Agarwal but other BrahMos personnel. Media coverage also described investigators claiming the accused used a “coded game” and other covert channels to transmit information. These elements formed a central plank of the prosecution’s narrative.
Lucknow-built BrahMos missiles set for rollout: 1st batch to be handed over Saturday
BrahMos Engineer Nishant Agarwal: Trial and earlier convictions (2024)
After years of investigation and legal process, a Nagpur court convicted Agarwal and sentenced him to life imprisonment in 2024 under sections of the Official Secrets Act and related provisions; the national press carried detailed reports of that conviction. At the time, reporting emphasised the sensitivity of the alleged disclosures and the strong reaction within defence circles.
The higher-court turnaround (December 2025)
In a major legal development, the Nagpur bench of the Bombay High Court recently set aside the life sentence and quashed the more serious espionage charges against Agarwal. The high court found insufficient basis to sustain the primary allegations that he had “passed” classified defence secrets to Pakistan. The court did, however, uphold a lesser finding under Section 3(1)(c) of the Official Secrets Act for possession of official documents on a personal device, a technical offence that carries a shorter sentence. Because Agarwal had already spent more than that term in custody, the court’s decision paved the way for his release.
What does the reporting say about how Pakistan’s agents target personnel?
Multiple investigative accounts from Indian outlets and police statements described a pattern: Pakistani handlers create convincing social accounts (often posing as Indian women), build rapport with personnel who work in sensitive establishments, and then attempt to persuade them emotionally, ideologically, or financially to share information. Sometimes these approaches are described as simple chat-based grooming; other reports cited encrypted or coded transfers hidden inside gaming/chat data.
Authorities have also told the press that other BrahMos staff were approached, suggesting the operation was cast widely to identify potential sources inside the organisation. While many details of intelligence tradecraft are necessarily unavailable publicly, the broad pattern, fake social profiles, prolonged grooming, and targeted outreach to scientists and military personnel has been repeatedly reported.
Reactions of family, legal teams, and defence analysts
Media coverage captured the family’s relief and defence lawyers’ statements that the accused had suffered years in custody. Legal commentators emphasised how the judgment will be studied by lawyers and intelligence-community observers alike: for procedural lessons on evidence handling, for standards of proof in espionage prosecutions, and for organisational policies on digital hygiene and monitoring. At the same time, many defence analysts and officials have warned that honeytrap and online recruitment tactics remain an enduring national-security challenge, so the case is treated as both a legal story and an operational cautionary tale.

