
247 DNA matches completed, 232 bodies handed over
A
Tired of too many ads? go ad free now
hmedabad: Civil Hospital authorities announced on Saturday the completion of matches for 247 persons deceased in the AI171 aircraft crash that took place on June 12 in the city.
The figure is higher than the 241 persons who died onboard the aircraft, including 229 passengers and 12 crew members. The crash had only a lone survivor in Vishwash Kumar Ramesh who miraculoulsy escaped even as several lives were lost on the ground.
The 247 deceased identified so far through the DNA matching process include 175 Indian nationals, 52 British nationals, 7 Portuguese nationals, and one Canadian national.
It also includes 12 non-passengers.
Dr Rakesh Joshi, medical superintendent of Civil Hospital, said that 232 mortal remains have been handed over to the relatives for last rites so far. "Of the 15 bodies whose DNA has been completed, three bodies have not been received by families as they await DNA match of other family members lost in the plane crash. Six bodies have been prepared for being handed over to their families for the onward journey while families of six victims are expected to arrive on Sunday to claim the mortal remains," he said.
"Out of the total, 23 mortal remains have been flown out of the city, whereas the rest are transported to crematoriums or their native places by road."
Sources said that based on the figures released earlier, out of 61 foreign nationals on the flight, 60 have been identified, whereas the identification of a British national is still awaited. With all 12 'non-passengers' identified — believed to be the 12 crew members.
Tired of too many ads? go ad free now
Sources added that more than 95% of the persons aboard the ill-fated AI 171 are identified. "Only a few DNA matches are yet to be completed. The process is taking longer due to the nature of the samples, which are highly charred, and extraction of DNA is difficult. However, the teams have managed to use the technology to the optimum and improve the detection rate significantly even in challenging cases," said a state official.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Hindu
26 minutes ago
- The Hindu
FATF report links dual-use cargo seized by India in 2020 to Pakistan missile agency
A dual-use equipment seized by India from a Pakistan-bound merchant vessel in 2020 is linked to Islamabad's National Development Complex, which is involved in the country's missile development programme, a new report by the Financial Action Task Force (FATF), the global anti-terror financing watchdog, has said. The report listed the case under a section on the misuse of the maritime and shipping sectors, including to transport a range of commodities, including dual-use equipment. 'In 2020, Indian Customs authorities seized an Asian-flagged ship bound for Pakistan. During an investigation, Indian authorities confirmed that documents mis-declared the shipment's dual-use items,' the FATF report said. 'Indian investigators certified the items for shipment to be 'autoclaves', which are used for sensitive high-energy materials, and for insulation and chemical coating of missile motors,' the report said. It said these sensitive items are included in dual-use export control lists of the Missile Technology Control Regime (MTCR). The bill of lading of the seized cargo provided evidence of the 'link between the importer and the National Development Complex, which is involved in the development of long-range ballistic missiles', it said. The export of equipment such as autoclaves without formal approval from various authorities is a violation of the existing law, the FATF said. Pakistan's National Development Complex (NDC) has played a crucial role in the development of Pakistan's missile programme. India seized the dual-use equipment from merchant vessel Da Cui Yun at Kandla port in Gujarat on February 3, 2020. Loopholes The report noted significant vulnerabilities in the global financial system in countering the financing of weapons of mass destruction (WMD). "Despite the grave threat posed by proliferation financing, only 16 per cent of countries assessed by the FATF and its global network have demonstrated high or substantial effectiveness" in a process that evaluates the implementation of targeted financial sanctions under the United Nations Security Council resolutions on proliferation. The report said that unless the public and private sectors urgently bolster technical compliance and effectiveness, those seeking to finance WMD proliferation will continue to exploit weaknesses in the existing controls. The report provided a detailed analysis of the evolving methods and techniques used to evade proliferation financing-related sanctions. 'Illicit actors are employing increasingly sophisticated methods to evade sanctions and circumvent export controls,' it said.


Time of India
an hour ago
- Time of India
2 Nepalese among 4 held for cyber fraud
1 2 Jaipur: Four men, including two Nepalese nationals and two Delhi residents, were arrested from a city hotel for their involvement in a cyber fraud operation with links to Chinese cybercriminals. The gang is believed to have facilitated fraudulent transactions worth Rs 24.4 crore, with complaints registered on the national cybercrime reporting portal from several states, including Andhra Pradesh, Uttar Pradesh, Kerala, Karnataka, Tamil Nadu, and Telangana. Police identified the accused as Lal Dorge Tamang and Suaj Tamang from Nepal, and Pawan Jain and Abbu Shahma from Delhi. The arrests were made following an FIR lodged earlier in 2025. Twelve mobile phones, one laptop, and three cheque books were recovered from the suspects during the operation. According to DCP (Crime) Kundan Kanwaria, the racket was led by Lal Dorge Tamang, a resident of Sindhupalchowk in Nepal. He created a well-organised network that supported Chinese cybercriminals by supplying them with mule bank accounts. These accounts were used to route illicit funds, and the accused managed them through social media platforms and encrypted messaging apps like Telegram. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Giao dịch vàng CFDs với mức chênh lệch giá thấp nhất IC Markets Đăng ký Undo The gang's modus operandi involved renting bank accounts from individuals in exchange for a commission. The account holders were instructed to install a suspicious APK file on their phones. Once installed, the app gave Chinese handlers remote access to the devices, allowing them to control the bank accounts and conduct transactions from afar. The commissions were paid in USDT, a cryptocurrency commonly used in illegal online operations. The suspects earned between 2 to 5 percent per transaction, with Lal Dorge receiving 4 to 5 percent from the Chinese operators. He, in turn, passed on 2 to 2.5 percent to the mule account holders. Police received a tip-off about suspicious individuals staying at Hotel Sanjay Palace near Polo Victory in Jaipur. Upon investigation, they found that these individuals were involved in procuring and renting out bank accounts to cybercriminal groups based in China. The investigation also revealed that Pawan Jain, a resident of Rohini North in Delhi, was in regular contact with a woman named Sushma, believed to be the mastermind behind the gang. Sushma, currently based in Dubai, served as the key link between the Chinese groups and their Indian and Nepalese associates.


Time of India
an hour ago
- Time of India
Kol cops arrest 3 Zimbabwean nat'ls from Mohali for cyber fraud
Kolkata: After a dramatic cross-country chase between cyber fraudsters from Africa and Kolkata Police, three Zimbabwean nationals were arrested from Mohali in Punjab for allegedly orchestrating a sophisticated cyber fraud that duped a senior pharmaceutical company official of over Rs 1.1 crore. The accused — Tinashe Gadzikkwa Praise (22), Malvern Matumgamire (25) and Nyamhunga Lenon Kudakwashe (23) — were held from different locations in Mohali's Kharar area early on Saturday following a brief chase involving the cops, helped by Punjab Police. The arrests, by Kolkata Police's cyber cell, came following a complaint by Sandip Guha (53), a resident of New Town, this May. The suspects allegedly created fake email addresses and documents bearing the letterhead of a top UK pharmaceutical company and the World Health Organization to lure Guha into a fraudulent kola nut trading scheme. Kola nut is used in medicines that are used to treat schizophrenia and bipolar disorder. The scammers expanded their communication to WhatsApp, using multiple international numbers, primarily from the UK. They introduced Guha to alleged kola nut sellers from northeast India, and, to gain his trust, also "delivered" small quantities of the same. "Convinced by these initial transactions and the professional appearance of the operation, Guha transferred a total of Rs 1,10,41,250 through multiple RTGS transactions to various Indian bank accounts," recalled an officer. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Adidas Three Combo Short With 60% Discount So Hurry Up! Shop Now Original Adidas Shop Now Undo Guha alleged that the fraudsters orchestrated a two-week-long scheme using forged documents. Joint CP (crime & traffic) Rupesh Kumar said: "The accused rented a flat in the Golf Link area in Mohali. A total of six mobile phones, one laptop, some bank documents and other documents were seized. The arrested individuals will be produced before the jurisdictional court concerned for transit remand." "The arrests are significant as it exposes an international cyber fraud ring operating from Indian soil," said Kumar. "We are investigating possible links to other similar cases across the country," he added. The accused would be brought to Kolkata for further investigation and more arrests were likely, an officer said. The case had been registered under relevant sections of the Information Technology Act and BNS, including sections related to fraud, impersonation and cybercrime.