Yet another prisoner escapes from Karachi court

This is the third incident of suspects escaping from the court premises in July.


Web Desk July 16, 2013
This is the third incident of suspects escaping from the court premises in July. DESIGN: SAMRA AAMIR

KARACHI: Yet another prisoner escaped from Karachi's city court on Tuesday, Express News reported.

This is the third incident of suspects escaping from the court premises in July.

According to initial details, the prisoner was brought to the court for a hearing.

Earlier on July 13, two terror suspects who were alleged members of the outlawed Tehreek-e-Taliban Pakistan (TTP) escaped from the same court. They were believed to be involved in bomb attacks on Muttahida Quami Movement’s (MQM) offices during the general elections. After a court hearing was adjourned, the prisoners managed to flee easily while the CID police officials were taking them back to the jail.

In the first such incident on July 11, three criminals accused of serious crimes fled from a court lockup. Ammar, Arsalan and Zubair were brought to the Anti-Terrorism Court for a hearing and were kept in the lockup until the hearing commenced. However, they managed to cut open the bars of the small window in the lockup and escaped.

The Supreme Court took notice of the two earlier incidents and had asked police to submit a detailed report. Six CID officers were also arrested in this regard.

COMMENTS (12)

Hamza | 10 years ago | Reply

i don't know if some will find this offensive but don't you think that what ever Hollywood makes in their "believable" action movies, come to life in Karachi or Pakistan...

NK Ali | 10 years ago | Reply

Pakistan has a penchant for always doing the wrong things to enter The Guinness Book of World Records. Thanx to the coward politicians whom we vote into the assemblies and who are then afraid to pass laws that will punish terrorists. Salams

VIEW MORE COMMENTS
Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ