admarketadmarketadmarketadmarket Close  

India grounds pilot for sending hijack alert by mistake

/ 05:12 PM July 20, 2019

NEW DELHI — India has suspended a pilot for accidentally sending a hijack alert to air traffic control during a domestic flight last month, the aviation authority said.

The AirAsia India plane, flying from the capital New Delhi to Srinagar, suffered a stalled engine and the captain told first officer Ravi Raj to send an emergency code to alert authorities about the situation.


Instead of the appropriate code 7700, Raj transmitted 7500 — the code for a hijacking — India’s Director General of Civil Aviation said in a statement on Friday.

Such a transmission is considered a major security alert across the world. Precise details of the response from Indian authorities during the incident were not available, but local media reported last month that procedures for handling a hijacking were set in motion.


The Airbus A320 airliner safely landed later in the city of Chandigarh.

Raj was found guilty of “negligent conduct” and suspended for three months, the DGCA said, and the captain of the flight was also warned to be more vigilant.

AirAsia India, a joint venture between Malaysian low-cost giant AirAsia and India’s Tata Sons, told the Press Trust of India news agency that it had received the “final remarks on an event where a flight from Delhi to Srinagar diverted due to a technical issue”, but did not provide further details.  /muf

Read Next
Don't miss out on the latest news and information.
View comments

Subscribe to INQUIRER PLUS to get access to The Philippine Daily Inquirer & other 70+ titles, share up to 5 gadgets, listen to the news, download as early as 4am & share articles on social media. Call 896 6000.

TAGS: Aviation, hijack alert, India, Pilot, suspension
For feedback, complaints, or inquiries, contact us.

© Copyright 1997-2019 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.