
Chinese National Arrested For Mid-Air Theft On Hong Kong-To-Delhi Flight
Last Updated:
According to the police, the accused was part of a suspected international gang that targeted sleeping passengers during international transit flights.
A 30-year-old Chinese national has been arrested for mid-air theft on a Hong Kong to Delhi Air India flight. The man identified as Benlai Pan was caught after the security and vigilance team of the airline raised concerns about suspicious activities.
The incident came to light after the Security and Vigilance team of Air India, Terminal-3, IGI Airport, alerted Delhi Police regarding suspicious activity on Air India Flight AI-315 from Hong Kong to New Delhi.
The alert was issued after four Chinese nationals were detained based on the complaints by the passengers, according to an official statement by IGI Airport Police.
A passenger, Prabhat Verma, reported that the cabin crew had warned him of suspicious movements around his overhead baggage. After checking his bag, he found that his Bank of America Credit Card was missing.
He further observed a suspicious individual seated at Seat No. 14C, later identified as Benlai Pan, who was not assigned that seat but was originally ticketed for Seat No. 23C. The missing card was found under Seat No. 14C, according to the police.
Prashi, who was seated at 14A, also reported that her mother's HDFC Debit Card had gone missing from her handbag.
Another passenger, Nafeez Fatima, stepped forward with a video recording that allegedly showed Benlai Pan opening cabin baggage and inspecting other passengers' personal items.
The airline staff initiated further checks, and the authorities were alerted upon landing.
The accused was identified as Benlai Pan. He was accompanied by three other Chinese nationals, including Meng Guangyang, 51, Chang Mang, 42, and Liu Jie, 45.
The police immediately detained all four suspects.
While Benlai has been arrested, his other three associates are under detailed inquiry to ascertain their exact role and involvement.
The accused was part of a suspected international gang that targeted sleeping passengers during international transit flights, stealing high-value items, cash, and debit/credit cards, according to the official statement by police.
The police are examining their travel data over the past 12 months.
An FIR has also been filed against Benlai under sections 378/2025, 303(2) of the BNS at PS IGI Airport. A further investigation into the matter is underway.
First Published:
May 17, 2025, 14:23 IST

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
an hour ago
- Time of India
Russian intelligence says it collects WeChat data: What does that mean?
Russian counterintelligence agents are analyzing data from the popular Chinese messaging and social media app WeChat to monitor people who might be in contact with Chinese spies, according to a Russian intelligence document obtained by The New York Times. The disclosure highlights the rising level of concern about Chinese influence in Russia as the two countries deepen their relationship. As Russia has become isolated from the West over its war in Ukraine, it has become increasingly reliant on Chinese money, companies and technology. But it has also faced what the document describes as increased Chinese espionage efforts. The document indicates that the Russian domestic security agency, known as the FSB, pulls purloined data into an analytical tool known as "Skopishche" (a Russian word for a mob of people). Information from WeChat is among the data being analyzed, according to the document. The document offers insights into the espionage tactics of two authoritarian governments that are preoccupied with surveillance. According to the document, the system processes detailed data on WeChat users, including account logins, contact lists and message archives, some of which are extracted from phones seized from people of interest to Russia's spy hunters. Live Events The tool is used to scrutinize the data trail of "people using the Chinese messenger WeChat to talk to representatives of the PRC intelligence services," the document says, using the abbreviation for the People's Republic of China. Discover the stories of your interest Blockchain 5 Stories Cyber-safety 7 Stories Fintech 9 Stories E-comm 9 Stories ML 8 Stories Edtech 6 Stories The exact functionality of the system is unclear. It is described in Russian as an automated data processing system that can be used in "search activities." Intelligence agencies typically use such tools to map messenger and social network connections to spot potential spies. The document makes clear that the FSB is particularly interested in WeChat. The Russian security agency asks field officers to send WeChat accounts and logins of interest to the China counterintelligence team, including "lists of contacts (logins) and archives of chats from WeChat obtained during direct access to the smartphones of targets of interest." The document says data can be run through another automated system, known as Laretz, a Russian word for a small decorated box, that can check "more than a thousand electronic indicators simultaneously." The Times was unable to confirm whether Skopishche had been effective as a counterintelligence tool or how extensively the FSB could intercept data from WeChat. One Western intelligence agency told the Times that the information in the document was consistent with what it knew about "Russian penetration of Chinese communications." The FSB and the Chinese Foreign Ministry did not reply to requests for comment. WeChat, owned by the Chinese tech giant Tencent, is one of the most widely used digital platforms in the world, mostly concentrated in China and among Chinese communities. It functions as an all-in-one tool that combines messaging, mobile payments, social networking and government services. The app has over 1.4 billion users globally, according to Tencent financial disclosures. Tencent did not reply to a request for comment. Russian intelligence agencies have worked to penetrate encrypted communication apps like Signal and WhatsApp. The FSB has have long viewed those apps, which are widely used by dissidents, as tools of subversion and foreign influence. In April, President Vladimir Putin of Russia barred government and bank employees from using foreign messaging apps. WeChat is different. By design, it does not use end-to-end encryption to protect user data. That is because the Chinese government exercises strict control over the app and relies on its weak security to monitor and censor speech. Foreign intelligence agencies can exploit that weakness, too. WeChat added some limited encryption features in 2016, according to Mona Wang, a research fellow at the University of Toronto's Citizen Lab. But the security improvements still fall short of the encryption offered by other messaging apps like Signal or WhatsApp. It is unclear why Chinese intelligence officers would use WeChat to communicate with sources, given its lack of end-to-end encryption. But sources or potential recruits may not know they are communicating with spies, who often pose as diplomats and strike up casual conversations at first. WeChat was briefly banned in Russia in 2017, but access was restored after Tencent took steps to comply with laws requiring foreign digital platforms above a certain size to register as "organizers of information dissemination." The Times confirmed that WeChat is currently licensed by the government to operate in Russia. That license would require Tencent to store user data on Russian servers and to provide access to security agencies upon request. Russia is separately pursuing a government messaging app of its own, one that has drawn comparisons to WeChat.


New Indian Express
2 hours ago
- New Indian Express
Odisha's Jagatsinghpur police officer condemned for allowing accused to cut birthday cake
BHUBANESWAR: An inspector ranked officer of Jagatsinghpur who was part of birthday cake-cutting of an accused in his office chamber has been pulled up for his bizarre action and served a 'displeasure letter' by the IG. The incident which took place in Paradip Model police station in Paradip town last month was caught on video and went viral. In a 'displeasure letter' to inspector-in-charge of Paradip Model police station Kabuli Barik, Central Range IG Praveen Kumar stated his explanation submitted to Jagatsinghpur SP on May 24 regarding the incident was unsatisfactory. Barik had defended himself claiming he was in contact with two persons, Bapu Mishra and Manoj Behera who were earlier booked by Model police station, to receive intelligence from them. According to the letter, Mishra was booked under section 142 of BNS (keeping in confinement a person who has been kidnapped or abducted) on April 29 this year and two cases were registered against Behera in 2008 and 2009.


Indian Express
3 hours ago
- Indian Express
Lured with hospital jobs, 3 Bangladeshi women trafficked to Mumbai and forced into sex trade
The Malvani police arrested a 53-year-old man Saturday and are currently searching for his three accomplices for allegedly trafficking three women from Bangladesh to Mumbai, misleading them with false promises of employment at a hospital, only to force them into the sex trade. The police rescued the three Bangladeshi women and sent them to a shelter home. According to the police, acting on specific information, the Malwani police raided a house Saturday night and rescued the three women. During the initial investigation, when the women's statements were recorded, it was revealed that they are Bangladeshi nationals from poor families. The women were desperately seeking work to support their families, the police said. The victims told the police that the accused falsely promised them jobs in hospitals in Mumbai. Last month, they were allegedly brought to Mumbai by illegally crossing the international border between India and Bangladesh. The accused allegedly bribed some government officials at the border to facilitate their illegal entry into India. The police registered a suo motu FIR and arrested Mansar Ahmed Sheikh, a Malvani resident, and are looking for Mehandi Hassan, Sanjeev alias Bachchan, and Akash alias Shaheen. The group members also allegedly helped one of the three women in making an Aadhaar card in her name to conceal her Bangladeshi nationality, an officer said. The four accused have been booked under sections 143(3) [trafficking of person], 144(2) [Exploitation of a trafficked person], 336(3) [crime of forgery], and 3(5) [common intention] of the Bharatiya Nyaya Sanhita (BNS) and sections 4 and 5 of the Illegal Trafficking (Prevention) Act. The police are investigating whether the group trafficked women and forced them into the flesh trade in the past.