
Bangladesh Air Force jet crash: death toll rises to 27, over 170 injured — here's what we know so far
The jet experienced a technical problem shortly after take-off, resulting in the accident at Milestone School and College in the northern Uttara area, a military spokesperson said. The military said in a statement that the F-7 BGI training aircraft had taken off at 1:06 p.m. local time (0706 GMT) before crashing.
Detailing the crash on Monday, Lieutenant Colonel Sami Ud Dowla Chowdhury said: 'The pilot…made a valiant attempt to divert the aircraft away from densely populated areas. Despite his best efforts, the aircraft…crashed into a two-storey building belonging to Milestone School and College,' Reuters reported.
📌A Chinese variant of the fighter jet F-7 BGI crashed into the campus of Milestone School and College in the Uttara locality of Dhaka. The jet took off around 1:07pm (local time) on Monday from the Bangladesh Air Force base in Kurmitola, Dhaka for a routine training mission but faced a mechanical failure.
📌The jet, which has been described as a training aircraft by the officials, caught fire soon after crashing in the school campus in Dhaka. As per a fire official, the pilot was among the dead. And according to the special assistant to the chief advisor for health, the death toll in the crash has gone up to 27, while 171 people, mostly students, have been injured.
📌Bangladesh military has said that the pilot tried to avoid densely populated areas after the F-7 jet faced technical difficulties but the training aircraft hit a two-storey school building. The military added that the aircraft experienced a 'technical malfunction' and the crash will be investigated by a high-level Air Force committee.
📌The crash took place on the campus of Milestone school which has reportedly 2,000 students enrolled. The school describes itself as having over two decades of experience in leading private educational institutes. The Uttara neighborhood, where the crash happened, is a metropolitan region with over 20 million people.
📌The interim Bangladesh government has announced a national day of mourning on Tuesday, with flags to fly at half-staff throughout the country. Bangladesh's interim leader Muhammad Yunus promised a full investigation into the crash. 'Necessary measures will be taken to investigate the cause of the accident and ensure all kinds of assistance,' he said, as quoted by Reuters.
📌Prime Minister Narendra Modi also responded to the tragic plane crash in Dhaka by expressing his condolences on social media. 'Deeply shocked and saddened at the loss of lives, many of them young students, in a tragic air crash in Dhaka,' PM Modi said in a post on X. 'Our hearts go out to the bereaved families. We pray for the swift recovery of those injured.'
(with inputs from AP)
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NDTV
2 hours ago
- NDTV
Rise Of Deepfakes: Realistic AI Impersonations Threaten Governments, Businesses, And Trust
WASHINGTON: The phone rings. It's the secretary of state calling. Or is it? For Washington insiders, seeing and hearing is no longer believing, thanks to a spate of recent incidents involving deepfakes impersonating top officials in President Donald Trump's administration. Digital fakes are coming for corporate America, too, as criminal gangs and hackers associated with adversaries, including North Korea, use synthetic video and audio to impersonate CEOs and low-level job candidates to gain access to critical systems or business secrets. Thanks to advances in artificial intelligence, creating realistic deepfakes is easier than ever, causing security problems for governments, businesses and private individuals and making trust the most valuable currency of the digital age. Responding to the challenge will require laws, better digital literacy and technical solutions that fight AI with more AI. "As humans, we are remarkably susceptible to deception," said Vijay Balasubramaniyan, CEO and founder of the tech firm Pindrop Security. But he believes solutions to the challenge of deepfakes may be within reach: "We are going to fight back." This summer, someone used AI to create a deepfake of Secretary of State Marco Rubio in an attempt to reach out to foreign ministers, a US senator and a governor over text, voice mail and the Signal messaging app. In May, someone impersonated Trump's chief of staff, Susie Wiles. Another phoney Rubio had popped up in a deepfake earlier this year, saying he wanted to cut off Ukraine's access to Elon Musk's Starlink internet service. Ukraine's government later rebutted the false claim. The national security implications are huge: People who think they're chatting with Rubio or Wiles, for instance, might discuss sensitive information about diplomatic negotiations or military strategy. "You're either trying to extract sensitive secrets or competitive information, or you're going after access to an email server or other sensitive network," Kinny Chan, CEO of the cybersecurity firm QiD, said of the possible motivations. Synthetic media can also aim to alter behavior. Last year, Democratic voters in New Hampshire received a robocall urging them not to vote in the state's upcoming primary. The voice on the call sounded suspiciously like then-President Joe Biden but was actually created using AI. Their ability to deceive makes AI deepfakes a potent weapon for foreign actors. Both Russia and China have used disinformation and propaganda directed at Americans as a way of undermining trust in democratic alliances and institutions. Steven Kramer, the political consultant who admitted sending the fake Biden robocalls, said he wanted to send a message about the dangers deepfakes pose to the American political system. Kramer was acquitted last month of charges of voter suppression and impersonating a candidate. "I did what I did for $500," Kramer said. "Can you imagine what would happen if the Chinese government decided to do this?" The greater availability and sophistication of the programs mean deepfakes are increasingly used for corporate espionage and garden variety fraud. "The financial industry is right in the crosshairs," said Jennifer Ewbank, a former deputy director of the CIA who worked on cybersecurity and digital threats. "Even individuals who know each other have been convinced to transfer vast sums of money." In the context of corporate espionage, they can be used to impersonate CEOs asking employees to hand over passwords or routing numbers. Deepfakes can also allow scammers to apply for jobs - and even do them - under an assumed or fake identity. For some, this is a way to access sensitive networks, to steal secrets or to install ransomware. Others just want the work and may be working a few similar jobs at different companies at the same time. Authorities in the US have said that thousands of North Koreans with information technology skills have been dispatched to live abroad, using stolen identities to obtain jobs at tech firms in the US and elsewhere. The workers get access to company networks as well as a paycheck. In some cases, the workers install ransomware that can be later used to extort even more money. The schemes have generated billions of dollars for the North Korean government. Within three years, as many as 1 in 4 job applications are expected to be fake, according to research from Adaptive Security, a cybersecurity company. "We've entered an era where anyone with a laptop and access to an open-source model can convincingly impersonate a real person," said Brian Long, Adaptive's CEO. "It's no longer about hacking systems - it's about hacking trust." Researchers, public policy experts and technology companies are now investigating the best ways of addressing the economic, political and social challenges posed by deepfakes. New regulations could require tech companies to do more to identify, label and potentially remove deepfakes on their platforms. Lawmakers could also impose greater penalties on those who use digital technology to deceive others, if they can be caught. Greater investments in digital literacy could also boost people's immunity to online deception by teaching them ways to spot fake media and avoid falling prey to scammers. The best tool for catching AI may be another AI program, one trained to sniff out the tiny flaws in deepfakes that would go unnoticed by a person. Systems like Pindrop's analyze millions of datapoints in any person's speech to quickly identify irregularities. The system can be used during job interviews or other video conferences to detect if the person is using voice cloning software, for instance. Similar programs may one day be commonplace, running in the background as people chat with colleagues and loved ones online. Someday, deepfakes may go the way of email spam, a technological challenge that once threatened to upend the usefulness of email, said Balasubramaniyan, Pindrop's CEO. "You can take the defeatist view and say we're going to be subservient to disinformation," he said. "But that's not going to happen." (Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)


Mint
2 hours ago
- Mint
Cadence nears deal to pay over $100 million to US for China sales, sources say
Cadence accused of selling chip design tools to Chinese military university Settlement discussions between Cadence and US began in December Resolution nears as US and China engage in new trade talks July 28 - Cadence Design is expected to pay over $100 million to the U.S. government as part of a deal to resolve an investigation into sales of its chip design products to a Chinese military university believed to be involved in simulating nuclear explosions, according to two people familiar with the matter. Cadence is accused of illegally selling chip design technology to front companies representing China's National University of Defense Technology, the sources said. NUDT's supercomputers are thought to support nuclear explosive simulation and military simulation activities, according to U.S. Commerce Department notices restricting shipments to the university. San Jose, California-based Cadence, which said earlier this year it began settlement discussions with the U.S. over sales to China in December, did not immediately respond to a request for comment, nor did NUDT. The Justice Department declined immediate comment. The Commerce Department did not immediately respond to a request for comment. The potential deal, which comes as the U.S. and China meet for new trade talks, shows the U.S. is still willing to enforce U.S. export controls on China, even as it relaxes some of the restrictions as part of negotiations. The sources said the deal is not finalized. NUDT was put on the Commerce Department's restricted trade list in 2015 to keep it from using U.S. technology to power its supercomputers, according to department postings. Other aliases and locations were added to the university's listing in 2019 and 2022, including Hunan Guofang Keji University, Central South CAD Center, and CSCC. The U.S. investigation into Cadence, which began more than four years ago, involves 'historical sales by Cadence to customers in China,' according to a company filing. Cadence received a subpoena from the U.S. Commerce Department in February 2021, demanding records related to certain customers in China. A related November 2023 subpoena followed from the Justice Department over the company's business activity in China. Cadence sold its EDA technology to NUDT through the CSCC or Central South CAD Center alias about 50 times between 2015 and 2020, according to one source familiar with the probe. Chip developer Tianjin Phytium Information Technology, which traces its roots to NUDT, also has been tied to Cadence sales for the university, another source said. Phytium was added to the restricted trade list in 2021. It did not immediately respond to a request for comment. Several employees at a Chinese subsidiary of Cadence were terminated over the sales, one of the sources said. Entities are placed on the restricted trade list, formally known as the entity list, for activities deemed contrary to U.S. national security or foreign policy interests. U.S. companies are not allowed to ship goods and technology to them without licenses from the Commerce Department, which are generally denied. Cadence will hold a call about its second-quarter financial results at 2 p.m. Pacific Time on Monday. Cadence, whose customers include major semiconductor manufacturers and companies such as Nvidia and Qualcomm, is known for its electronic computer-aided design software. Electronic design automation tools are key to designing chips and verifying that they are bug-free. NUDT has developed chips to power university supercomputers, including Tianhe-2, once touted as the world's best supercomputer, which the U.S. believes has been used in research on or the development of nuclear explosive devices. Twelve percent of Cadence's revenue came from China last year, down from 17% in 2023, amid regulatory developments and geopolitical tensions. This article was generated from an automated news agency feed without modifications to text.


Hindustan Times
3 hours ago
- Hindustan Times
'Nimisha Priya's death sentence in Yemen cancelled,' says Indian Grand Mufti's office
In a big relief for Indian nurse Nimisha Priya, her death sentence by Yemeni authorities on charges of murder has been overturned, according to the office of Indian Grand Mufti Kanthapuram AP Abubakker Muslaiyar, reported news agency ANI. Nimisha Priya was sentenced to death in Yemen for alleged murder of her ex-business partner. (Sourced) This comes after her execution, which was originally scheduled to happen on July 16, was halted temporarily just a day earlier, after Grand Mufti AP Abubakker Muslaiyar intervened and requested Yemeni authorities to reconsider. Now, his office says, that her death sentence has been cancelled completely following a high-level meeting in Yemeni capital Sanaa. 'The death sentence of Nimisha Priya, which was previously suspended, has been overturned. A high-level meeting held in Sanaa decided to completely cancel the death sentence that was temporarily suspended earlier,' ANI quoted his office as saying. Priya's family, including her 13-year-old daughter Mishel and her husband Thomas, reached Yemen to join Indian Christian evangelist KA Paul to appeal Houthi authorities to release Priya. In a video, shared by news agency PTI, Mishel can be heard saying 'I love you, mamma,' as she speaks in Malayalam and English. Her speech is not legible.