Explosive drama at Mangalore Airport: It's just a tab, not bomb, officials declare!

[email protected] (CD Network)
September 14, 2014

Mangalore, Sep 14: More than 12 hours after detaining a Dubai-bound Muslim passenger at Mangalore International Airport on charge of possessing “suspected explosive materials”, security officials and police have finally admitted that their suspicion was wrong.

However, a few regional Kannada news channels, newspapers and a Mangalore based news portal that accused the detained passenger of having links with a "terrorist group" in Syria, have not yet apologized for their blunder and baseless allegations against an innocent passenger.

After a prolonged interrogation amidst tight security, the sleuths of Central Industrial Security Force and cops “realized” that what they had assumed to be “explosive materials” was nothing but a tab.

The victim of suspicion, Mohammed Abdul Khader from Periya Uppala in Kasargod district, who was supposed to board a Dubai-bound flight Saturday night, is under shock after unexpected developments.

After inquiring several family members and neighbors of detained passenger, the investigators confirmed that one of his neighbours had handed over the tab to get it repaired in Dubai.

It is learnt that Mohammed Abdul Khader, an NRI, had married just a month ago and he was returning to Dubai for work after spending vacation with his newly married wife and family members. One of his neighbours had handed over a small package to him to give it to their relatives in Dubai.

Even though the package contained a tab and a bottle of hydrogen peroxide that is used as cleaning substance along with some food, the neighbours had told him that the package contained only eatables.

The Airport officials, who found electronic device inside the package during scanning enquired the passenger about it, he reportedly told them that it may contain some food items. When the officials opened the package, they found a tab and a bottle of liquid. This instigated the local media to spread fabricated stories triggering panic in the region.

However, when the investigation began, the family members and neighbours of the passenger rushed to Mangalore International Airport and explained the truth. Meanwhile the experts have also confirmed that the package did not contain any kind of explosive devices.

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport drama 14 1

airport1

Earlier Report: Suspected 'explosive materials' seized from passenger at Mangalore Airport

Comments

Victoria
 - 
Monday, 11 Jul 2016

You have made some good points there. I checked on the internet for more info
about the issue and found most individuals will go along with your views on this web site.

Here is my web blog :: job slogan t shirts: http://jobslogantshirts.xyz

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 30,2025

girlnomore.jpg

Mangaluru, Nov 30: A 22-year-old college student succumbed to her injuries at a private hospital in Mangaluru today, days after she was hit by a goods tempo while crossing a road in Padubidri.

The deceased has been identified as Preksha, a resident of Nadsalu Billitota in Padubidri. The fatal incident occurred as Preksha, who was returning home after completing her examination, attempted to cross the service road towards Mangaluru. She was struck by a goods tempo approaching from the Udupi side, causing her to fall and sustain a severe head injury.

Prompt action from local residents ensured she received immediate first aid before being rushed to a hospital in Mangaluru for specialised treatment. Despite medical efforts, she passed away while undergoing care.

Preksha was a student at Karavali College, Vamanjoor on the outskirts of Mangaluru city. The tragedy is compounded by the fact that she belonged to a financially vulnerable family, having previously lost her father. She is survived by her mother and brother.

A case related to the accident has been registered at the Padubidri police station, and an investigation is underway to determine the exact circumstances that led to the collision. The incident highlights the growing concerns over road safety, particularly on busy service roads, and serves as a tragic reminder of the human cost of traffic accidents.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 4,2025

Udupi: A 40-year-old NRI from Udupi has reportedly lost more than Rs 12.25 lakh in an online investment scam operated through Telegram.

According to a complaint filed at the CEN police station, Leo Jerome Mendonsa, who has been working in Dubai for the past 15 years in computer accessories sales, maintains NRI accounts in Karkala and Nitte.

On November 12, 2025, Mendonsa was added to a Telegram group called Instaflow Earnings by unknown individuals. Users identified as Priya and Dipannita persuaded him to invest in “Revenue Tasks.” Initially, Mendonsa transferred Rs 1,100 multiple times and received the promised returns, encouraging him to continue.

On November 14, another user, Nishmitha Shetty, directed him to register on a website, digitvisionuoce.cc, and invest Rs 4 lakh in various shares. Over the next few days, he made multiple transfers totaling Rs 12,25,000, including Rs 50,000 via Google Pay, believing the scheme was legitimate.

After receiving the money, the alleged handlers stopped responding, and neither the invested amount nor the promised profits were returned.

The CEN police have registered a case under Sections 66(C) and 66(D) of the IT Act and Section 318(4) of the Bharatiya Nyaya Sanhita (BNS), and investigations are ongoing.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 7,2025

Mangaluru, Dec 7: A 34-year-old fruit and vegetable trader in Mangaluru has reportedly lost ₹33.1 lakh after falling victim to an online investment scam run through a fake mobile app.

Police said the scam began in September, when the victim received a link on Facebook. Clicking it connected him to a WhatsApp number, where an unidentified person introduced a high-return investment scheme and instructed him to download an app.

To build trust, the fraudster asked him to invest ₹30,000 on September 24. The trader soon received ₹34,000 as “profit,” convincing him the scheme was genuine. Over the next two months, he transferred money in multiple instalments via Google Pay and IMPS to different scanner codes and bank accounts shared by the scammers. Between September 24 and December 3, he ended up sending a total of ₹33.1 lakh.

When he later requested a refund of his investment and promised returns, the scammers demanded additional payments, claiming he needed to pay a “service tax” first. Even after he paid a small amount, no money was returned, and the scammers continued pressuring him for more.

A case has been registered at the CEN Crime Police Station.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.