Jeddah, May 1: The Saudi Arabia authorities on Monday confirmed that the DNA samples of the man who blew himself outside the US Consulate in Jeddah on July 4, 2016, was that of Fayaz Kagzi. Kagzi was the most wanted terrorist of India who belongs to Beed in Maharashtra. Kagzi was also an alleged operator of Lashkar-e-Toiba (LeT).

Two security personnel were injured in the Jeddah suicide bombing carried out by Kagzi. This attack was one of the three attacks that rocked Saudi Arabia on July 4, 2016. The other two blasts took place near a Shia mosque in Qatif and outside the Masjid-i-Nabvi in Medina.

“We have received confirmation from Saudi Arabian authorities that the DNA samples of Kagzi sent by us last year have matched those of the Jeddah bomber,” reported The Indian Express citing an official. The National Investigation Agency has informed an NIA special court in Delhi that Kagzi is dead. Kagzi was involved in various terror activities. He was believed by the security agencies to be the mastermind and financier of German Bakery blast of 2010 and J M Road blast in 2011. Both the blasts took place in Pune.

Kagzi was also involved in Aurangabad arms haul in 2006. Abu Jundal, who is the alleged handler of arms during 26/11 Mumbai attacks is facing trial in this case.Kagzi was also in Central Bureau of Investigation’s Interpol list. The LeT terrorist was also believed to have taught Hindi to the terrorists who carried out 26/11 attacks.

Maharashtra’s Anti-Terrorism Squad (ATS) and NIA sent DNA samples of Kagzi to Jeddah in August last year after Saudi Arabia released photographs of the Jeddah bomber. According to the report publish in The Indian Express, Kagzi was believed to flee to Pakistan in 2006 through Bangladesh. Later he moved to Saudi Arabia for recruiting Indians in LeT. It was also believed that Kagzi might have joined Islamic State in 2014

 

(The above story first appeared on LatestLY on May 01, 2018 09:13 AM IST. For more news and updates on politics, world, sports, entertainment and lifestyle, log on to our website latestly.com).