The Chhattisgarh

Beyond The Region

Second BOMB THREAT at Ranchi's Birsa Munda Airport, probe underway | India News

Second BOMB THREAT at Ranchi’s Birsa Munda Airport, probe underway | Information

Ranchi: Birsa Munda Airport in Ranchi acquired a second bomb risk on Friday by way of textual content message. For the unversed, the airport had acquired a bomb risk on Thursday by way of a name for an unidentified individual. Whereas the Thursday risk was declared a hoax by Birsa Munda Airport Director KL Agarwal as quoted by Occasions Now, the Friday risk is below investigation.

“The criticism has been given to the police. Police have taken up the investigation. Yesterday additionally an unknown caller gave the same risk. About yesterday’s name, the cyber cell of Ranchi police is investigating the matter and tracing the caller,” mentioned airport oficial as quoted by ANI.

Jharkhand | Birsa Munda Airport, Ranchi acquired a bomb risk once more on July twenty ninth, by way of textual content message, with a requirement of Rs 20 lakhs. The police are taking the required motion after a criticism was given; an investigation is underway: Airport officers


— ANI (@ANI) July 30, 2022

 

It’s price mentioning that Ranchi’s Birsa Munda Airport (BMA) was just lately adjudged as the very best within the Buyer Satisfaction Index (CSI) survey together with Udaipur airport by the Airports Authority of India (AAI).

Equally, in Could this 12 months, Bengaluru’s Kempegowda Worldwide Airport (KIAL) had acquired a bomb risk name, which later turned out to be a hoax. Airport authorities, Central Industrial Safety Drive (CISF) personnel and the Canine squad in addition to Bomb disposal squads swung into motion creating panic among the many passengers. In line with police, the airport police management room acquired a name at about 3.45 AM leading to a vigorous drill for the safety personnel deployed there. After about three and half hours of search, the officers concluded that it was a hoax name.

(With company inputs)

%d bloggers like this: