Punjab Man Arrested for Using CCTV to Monitor Army Movement for Pakistan

You just need someone willing to point a camera at the right place
On how modern espionage exploits ordinary technology rather than sophisticated spy craft.

In Pathankot, a city that sits at the edge of India's most sensitive military corridors, a man named Baljit Singh allegedly turned a commercial surveillance camera into an instrument of espionage — pointing it at a highway bridge to livestream army convoy movements to handlers in Pakistan. Punjab Police arrested him in May 2026, recovering the equipment and tracing payments reportedly routed through Dubai. The case is less a story of shadowy tradecraft than a quiet warning: that the tools of modern civilian life have become the tools of modern intelligence gathering, and the line between the ordinary and the dangerous has grown very thin.

  • A simple internet-enabled CCTV camera, installed at a roadside shop near NH-44, gave overseas handlers a real-time window into one of India's most critical military transit routes.
  • The operation required no infiltration, no recruited soldier, no classified breach — only a willing civilian, a consumer device, and an internet connection, exposing a profound gap in perimeter security assumptions.
  • Punjab Police moved after preliminary intelligence flagged suspicious surveillance activity in the area, eventually recovering the equipment and extracting a confession from Singh during questioning.
  • Investigators are now racing to determine whether this was a lone act or a single node in a wider cross-border surveillance network, with the possibility that other cameras may already be watching other convoys on other roads.
  • The arrest lands against a backdrop of repeated warnings from security agencies about Pakistan-linked operatives using local recruits, drones, and digital tools to map India's defence corridors — a pattern this case fits precisely.

A man in Pathankot installed a commercial CCTV camera at a roadside shop and aimed it at a bridge on National Highway-44 — one of India's most heavily used military transit routes toward Jammu and Kashmir. The camera streamed live footage over the internet. According to Punjab Police, the person watching on the other end was in Pakistan.

Baljit Singh, a resident of Chakk Dhariwal village, allegedly set up the camera in January 2026. He confessed during questioning, and police recovered the equipment from his possession. Investigators believe he received around Rs 40,000 from an unidentified contact operating out of Dubai in exchange for access to the live feed.

What has unsettled security officials is not the sophistication of the operation but its absence of sophistication. No military facility was breached. No soldier was recruited. No agent was planted. A consumer-grade camera, available to anyone, was pointed at the right stretch of road — and that was enough. The Pathankot-Jammu corridor sees constant military movement, and a camera near a bridge on that highway would capture it all.

Pathankot carries particular strategic weight. It borders Pakistan, serves as a major troop transit point, and houses critical defence infrastructure. Security was already heightened there after the 2016 militant attack on the Air Force Station. That a surveillance camera could operate undetected for months along this corridor has prompted hard questions about detection gaps.

Investigators are now working to map the full network — the overseas contacts, the communication channels, and whether others were involved. The broader concern is whether Singh's camera was one of many, part of a coordinated effort to monitor defence movement corridors across Punjab and other border states. That question remains open. What the case has already made clear is that espionage in the region no longer demands the elaborate tradecraft of an earlier era. It demands only a camera, a connection, and someone willing to install it.

A man in Pathankot installed a camera at a roadside shop and pointed it at a bridge on National Highway-44. The camera was internet-enabled, which meant someone sitting anywhere in the world could watch what it saw in real time. What it saw, according to Punjab Police, was the movement of Indian Army and paramilitary convoys traveling toward Jammu and Kashmir. The man's name was Baljit Singh. He lived in Chakk Dhariwal village. And police say he was sending that footage to handlers in Pakistan.

This is not a story about a sophisticated spy ring or a decades-long operation. It is a story about what happens when ordinary technology becomes a tool for intelligence gathering. Singh allegedly installed the camera in January of this year. He confessed during questioning that he had done it. Police recovered the equipment from his possession. Investigators believe he received approximately 40,000 rupees from someone operating out of Dubai for his work. The payment came from an unidentified person. The handlers on the other end of the live feed remained largely unknown.

What makes this case significant to security officials is not the complexity of the operation but its simplicity. A commercial CCTV camera costs very little. It requires no special training to install. It streams over the internet to anyone with access credentials. There is no need to breach a military facility, no need to recruit a soldier, no need to plant an agent inside a secure compound. You just need someone willing to point a camera at the right place and someone willing to pay for the information it captures. The Pathankot-Jammu corridor is one of the most heavily trafficked military routes in India. Convoys move through it constantly. A camera positioned near a bridge on that highway would see everything.

Punjab Police has not released all the details of how they discovered the operation. Officials say preliminary intelligence inputs triggered scrutiny of suspicious surveillance activity in the area. Once they began looking, the trail became clearer. During questioning, Singh allegedly admitted to installing the camera and sharing access to the live feed with his handlers. Police later recovered the equipment. Now investigators are trying to map the full network—the overseas contacts, the communication channels, whether others helped with the installation or operation.

Pathankot sits at a crossroads of strategic importance. It is close to the Pakistan border. It is a major transit point for troops moving into Jammu and Kashmir. The region houses critical defence infrastructure. Security has been heightened there since 2016, when militants attacked the Air Force Station. The fact that someone was able to install a surveillance camera near a major military highway and operate it for months before being caught raises questions about how such operations are detected and how many others might be operating undetected.

This arrest is not isolated. Over the past year, Punjab Police and central agencies have repeatedly warned about attempts by Pakistan-linked operatives to gather information on military installations, troop movement, and sensitive infrastructure. These operatives use local recruits. They use social media contacts. They use digital surveillance devices. The Pathankot case fits a pattern that security experts have been tracking—the shift toward low-cost, high-impact surveillance using easily available technology. A Wi-Fi camera. A drone. A mobile application. These are not exotic tools. They are consumer products. Anyone can buy them.

Investigators are now trying to determine whether Singh's operation was an isolated incident or part of a broader network targeting defence movement corridors across border states. The question matters because if this was one node in a larger system, there may be other cameras pointing at other highways, other convoys, other sensitive movements. The investigation is ongoing. The full scope of what Singh was monitoring, and for how long, and what information was actually transmitted, remains unclear. What is clear is that the nature of espionage in border regions is changing. It no longer requires the tradecraft of the Cold War. It requires only a camera, an internet connection, and someone willing to install it.

The case points to a new pattern of low-cost but high-impact surveillance operations using easily available internet-enabled devices
— Punjab Police investigators
A Conversa do Hearth Outra perspectiva sobre a história
Inventor

Why would someone take this risk for 40,000 rupees? That's not a fortune.

Model

It's enough. In a border town, that's several months of wages. And the person doing it doesn't see themselves as a spy. They see themselves as someone with a camera and a payment.

Inventor

How long was the camera operating before police found it?

Model

Singh allegedly installed it in January. We don't know exactly when it was discovered, but it was operating for months. That's the troubling part—it wasn't found by routine patrol. It was found because of intelligence inputs.

Inventor

What would handlers in Pakistan actually do with footage of convoy movement?

Model

Timing. Route. Frequency. Composition. If you know when convoys move, how many vehicles, what route they take, you can plan operations around that information. You can brief militants. You can coordinate with other surveillance points.

Inventor

Is this a new problem or have they always done this?

Model

The method is new. Espionage in border regions is old. But using a consumer CCTV camera instead of human agents—that's the shift. It's cheaper, it's deniable, it's scalable. One person can operate multiple cameras.

Inventor

How many other cameras might be out there?

Model

That's what investigators are asking now. If this one was operating for months undetected, how many others are? That's the real fear.

Inventor

What happens to Singh now?

Model

He's in custody. The investigation is ongoing. But the larger question is whether this was his operation alone or whether he was part of something bigger. That's what they're trying to determine.

Quer a matéria completa? Leia o original em News18 ↗
Fale Conosco FAQ