logo
Counter-terrorism mock drill held at Pune airport

Counter-terrorism mock drill held at Pune airport

News1816 hours ago
Agency:
Pune, Aug 10 (PTI) A full-scale mock drill was conducted at the Pune airport on Sunday, simulating a terror attack scenario at the terminal building, officials said.
The Counter-Terrorism Contingency Plan (CTCP) mock exercise involved 258 personnel from agencies, including the Central Industrial Security Force (CISF), Airports Authority of India (AAI), state police, bomb detection and disposal squad (BDDS), Indian Air Force (IAF), immigration authorities, and airline representatives.
A tabletop exercise was conducted at the New Conference Hall with participation from all stakeholders. The respective team leaders briefed their teams on roles and responsibilities, and this was followed by an operational briefing from the senior commandant/CASO, CISF, in the presence of the Pune airport director.
The simulated incident, which commenced near the departure date, involved four terrorists arriving in a vehicle with firearms and explosives, and attempting an attack on the terminal building.
All agencies acted swiftly in coordination as per established Standard Operating Procedures (SOPs).
The BDDS team confirmed the presence of explosives, which were subsequently neutralised, while security forces successfully eliminated the four simulated terrorists.
The drill served as an important measure to test and refine inter-agency coordination during high-threat situations and validate existing contingency plans and SOPs, along with building operational confidence among participating forces.
The AAI and CISF reaffirm their commitment to maintaining the highest level of airport security to ensure the safety and confidence of passengers and stakeholders. PTI COR ARU
view comments
First Published:
Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Bengaluru software engineer loses ₹5.4 lakh to crooks after posting ad online
Bengaluru software engineer loses ₹5.4 lakh to crooks after posting ad online

Time of India

time6 hours ago

  • Time of India

Bengaluru software engineer loses ₹5.4 lakh to crooks after posting ad online

Bengaluru: In yet another case of cyberfraud, a 52-year-old software engineer, who had posted an advertisement online to rent out her flat, was allegedly duped of Rs 5.4 lakh by a scammer posing as a CISF jawan and his associates. Police have registered a case under the Information Technology Act and BNS Section 318 (cheating), and are on the lookout for the scammers. After the engineer (name withheld) posted the ad on OLX to rent out her 3-BHK flat in Hennur, she was contacted by a man who introduced his nephew as a prospective tenant. It was after this that the man pretending to be a CISF jawan got in touch with her on WhatsApp. You Can Also Check: Bengaluru AQI | Weather in Bengaluru | Bank Holidays in Bengaluru | Public Holidays in Bengaluru The fraudster, Sandeep Rawat, said he had recently been transferred to Bengaluru and would be posted at Kempegowda International Airport (KIA) from Aug 5. He said he was keen to rent the house, where he would live with his wife and two children. Urging her to arrange the rental agreement at the earliest, the crook, who claimed to be from Uttarakhand, shared copies of his PAN and ID cards, as well as family photographs. In her complaint to the East CEN crime police station, the engineer said the man urged her to remove the OLX ad and told her that his friend and senior, Captain Hemant Kumar, would contact her and transfer the advance of Rs 2 lakh. Hemant contacted her around 9pm via a WhatsApp call on July 27 and wanted to initiate the payment by a digital application. He transferred Rs 1 to her account, and after confirmation, asked her to transfer Rs 40,000 and Rs 50,000 to him separately using the payment app to ensure that the Unique Transaction Reference (UTR) numbers matched. After she followed his instructions, the amount didn't show as debited from her account. Hemant then claimed he was unable to transfer Rs 2 lakh to her account because of UTR mismatch, and again asked her to transfer money. However, these transactions failed as the daily limit on her payment app was hit. He then suggested that she use a banking app to transfer an additional Rs 1.5 lakh each to three new payees — named Anuj Kairon, Rejesh, and Karan — and promised to remit any amount deducted from her account along with the Rs 2 lakh advance. Suspecting something amiss, the complainant refused to transfer the amount. However, the man threatened her by saying she could not stop a payment made via a CISF official account and had to make these payments for UTR match. After she transferred said amount, both Sandeep and Hemant called her and promised to return the sum. Worried she had been scammed, the woman raised a dispute with her bank over all eight transactions she had made. The two scammers again contacted her the same evening and tried in vain to get more money out of her. What is UTR? Unique Transaction Reference (UTR) number is a unique code, typically alphanumeric, generated by the initiating bank for every electronic fund transfer, for transactions made via electronic payment systems such as UPI, IMPS, RTGS, and NEFT. These numbers help verify the completion of all payments and can have a different number of characters for each type of system. Stay updated with the latest local news from your city on Times of India (TOI). Check upcoming bank holidays , public holidays , and current gold rates and silver prices in your area.

Counter-terrorism mock drill conducted at Pune airport
Counter-terrorism mock drill conducted at Pune airport

Time of India

time11 hours ago

  • Time of India

Counter-terrorism mock drill conducted at Pune airport

Pune: In line with the ongoing emphasis on aviation security preparedness, the city airport conducted a full-scale Counter-Terrorism Contingency Plan (CTCP) mock exercise on Saturday, simulating a terrorist attack scenario at the terminal building (city side). The exercise, held from 11.50am to 12.38pm, involved 258 personnel from multiple agencies, including the Central Industrial Security Force (CISF), Airports Authority of India (AAI), state police, Bomb Detection and Disposal Squad (BDDS), Indian Air Force (IAF), immigration authorities, and airline representatives. Prior to the field drill, a tabletop exercise was conducted with participation from all stakeholders. The simulated incident commenced at 11.50am near the departure gate. As per the scenario, four terrorists, arriving in a vehicle armed with firearms and explosives, attempted an armed assault on the terminal building. You Can Also Check: Pune AQI | Weather in Pune | Bank Holidays in Pune | Public Holidays in Pune Responding swiftly, all agencies acted in coordination as per established standard operating procedures (SOPs). The BDDS team confirmed the presence of explosives, which were subsequently neutralized. Security forces successfully eliminated all four simulated terrorists during the course of the operation. A detailed debriefing was held immediately after the exercise, during which the CASO/CISF highlighted operational observations, identified shortcomings, and recommended remedial measures to further enhance preparedness. Stay updated with the latest local news from your city on Times of India (TOI). Check upcoming bank holidays , public holidays , and current gold rates and silver prices in your area.

Counter-terrorism mock drill held at Pune airport
Counter-terrorism mock drill held at Pune airport

News18

time16 hours ago

  • News18

Counter-terrorism mock drill held at Pune airport

Agency: Pune, Aug 10 (PTI) A full-scale mock drill was conducted at the Pune airport on Sunday, simulating a terror attack scenario at the terminal building, officials said. The Counter-Terrorism Contingency Plan (CTCP) mock exercise involved 258 personnel from agencies, including the Central Industrial Security Force (CISF), Airports Authority of India (AAI), state police, bomb detection and disposal squad (BDDS), Indian Air Force (IAF), immigration authorities, and airline representatives. A tabletop exercise was conducted at the New Conference Hall with participation from all stakeholders. The respective team leaders briefed their teams on roles and responsibilities, and this was followed by an operational briefing from the senior commandant/CASO, CISF, in the presence of the Pune airport director. The simulated incident, which commenced near the departure date, involved four terrorists arriving in a vehicle with firearms and explosives, and attempting an attack on the terminal building. All agencies acted swiftly in coordination as per established Standard Operating Procedures (SOPs). The BDDS team confirmed the presence of explosives, which were subsequently neutralised, while security forces successfully eliminated the four simulated terrorists. The drill served as an important measure to test and refine inter-agency coordination during high-threat situations and validate existing contingency plans and SOPs, along with building operational confidence among participating forces. The AAI and CISF reaffirm their commitment to maintaining the highest level of airport security to ensure the safety and confidence of passengers and stakeholders. PTI COR ARU view comments First Published: Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store