Shobha booked for ‘rape, murder, jihad’ tweet; but she has no regrets for lying

coastaldigest.com news network
December 23, 2017

The police have registered a case against BJP leader and Udupi-Chikkamagaluru MP Shobha Karandlaje for allegedly trying to create communal tension in Uttara Kannada district through provocative tweets and lies.

On December 14, she tweeted: “Jihadis tried to rape and murder a girl studying in 9th std near honnavar. Why is the govt silent about this incident? Arrest those who molested and injured this girl.  Where are you CM @siddaramaiah?” (sic). The MP has not deleted her ill-intentioned tweet even after it was proved that her allegations were false. 

The Honnavar police have registered a suo motu case booking the MP under section 153 (wantonly giving provocation with intent to cause riot), 153A (wantonly giving provocation with intent to cause riot) and 505(2) (statements creating or promoting enmity, hatred or ill-will between classes) of the Indian Penal Code on Thursday night.

In fact, a Class 9 girl in Honnavar had inflicted injuries to her hands after she was harassed by a miscreant called Ganesha Eshwara Naik, who is said to be a supporter of saffron groups. However, a local shop keeper, who provided bandage to the girl, had floated a rumour that she was stabbed by Muslims. Ms Karandlaje immediately took to the social media and added a few more lies to the story. The girl later clarified that no one had stabbed her.

Even after an FIR was registered against her, Ms Karandlaje continued her war on twitter. On December 22 she tweeted: “Govt which has failed in providing safety to women in Karnataka now tries to stifle my voice through a FIR. @siddaramaiah Govt protecting Jihadis."

“Will continue my fight against Jihadi elements. There is no way I'll succumb to the pressure of @siddaramaiah Govt.#HinduLivesMatter,” she tweeted again. 

She also has refused to admit that she had tweeted without trying to know the truth. She continued to claim that the girl was indeed attacked by so called “jihadis” and that was what the girl had told the doctors immediately after the incident. “The police have threatened the girl and made her retract her statements and the State government is burying the case,” she claimed.

Also Read: How a hatemonger used a schoolgirl to concoct a stabbing story to create unrest in Honnavar

Comments

shaji
 - 
Saturday, 23 Dec 2017

Shobha is a Master degree holder from Nagpur university in telling lie.   She is not ashamed or telling lie.   Its is her duty and religion to lie.  More she lies more money comes in her account.  She is already having crores of rupees in her accounts.  She is nominated to misguide people and create trouble in karnataka in view of next election.   In the case of College girl who hurted herself, this hate monger Shoba gave press statement that few Jihadis molested her and tried for gang rape, and fortunately this girl was saved by some patriot sangh parivar volunteers.    She has crossed all the levels in the field of telling lie.   this is her main job.  She is not bothered about poors and needy people of her constituency.  She is favorite of UP CM.   Police should take note of her hate speeches + statements and book her under goonda act for spreading wrong rumours in the public resulting in riots + killings.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 30,2020

Dubai, May 30: Taking advantage of Vande Bharat Mission, a notorious NRI conman has fled to India through a repatriation flight after duping several businessmen in United Arab Emirates and stealing goods worth nearly six million dirhams.

Yogesh Ashok Yariava, 36, owner of the fraudulent Royal Luck Foodstuff Trading and prime suspect in the audacious scam took a flight to Hyderabad from Abu Dhabi on May 11 with around 170 repatriates.

His mandatory two-week quarantine period would have ended on May 25, but for his 40 odd victims a protracted battle for justice has just begun.

Last Wednesday many of them trooped down to the Indian Consulate office in Dubai in the hope of getting an audience with Consul General Vipul. The following day they went to Bur Dubai police station clutching dud bank cheques.

In a replay of the familiar trading scam, conmen representing Royal Luck Foodstuff approached unsuspecting traders and made bulk purchases against post-dated cheques.

They bought anything they could get their hands on: Facemasks, hand sanisters and medical gloves worth nearly half a million dirhams from Skydent Medical Equipment, Raheeq Laboratories and GSA Star; rice and nuts (Dh393,000) from Al Baraka Foods; tuna, pistachios and saffron (Dh300,725) from Yes Buy General Trading; French fries and mozzarella cheese (Dh229,000) from Mehdu General Trading; frozen Indian beef (Dh207,000) from Al Ahbab General Trading and halwa and tahina (Dh52812) from Emirates Sesame Factory. It’s a long list and it keeps getting longer as more victims come forward.

When their post-dated cheques started bouncing, the traders rushed to Royal Luck’s Opal Tower office in Business Bay. But it was too late. They had shut down and all their 18 staffers had disappeared. Visits to their warehouses also drew a blank.

“Calls made to the company’s sweet-talking purchase managers who visited us days earlier carrying fancy business cards remained unanswered,” said Chandrasekaran Ganesan of Ajman-based Skydent Medical Equipment which supplied protective face masks worth Dh175,875.

Another business owner, Anand Asar said he visited Royal Luck’s office after his cheque of Dh79,552 returned marked insufficient funds. “The security guard at the building told us their staff was last seen on May 17,” said Asar who has since lodged a police complaint.

“I am devastated. I don’t know how I will recover my losses,” said another trader.

Victims reckon the ill-gotten goods have been sold to third parties at dirt cheap prices.

“They have got millions of dirhams worth of goods against worthless pieces of paper. The scammers would rack up huge profits even if they sell our stuff for one tenth their price,” said another trader who pegged his losses at Dh200,000.

The scam comes close on the heels a Dh4 million fruit loot in which 810 tonnes of fruits shipped by Indian exporters to OPC Foodstuff Trading in Deira, Dubai were similarly stolen last month.

Legal adviser Salam Pappinisseri from Sharjah based United Advocates that represents five firms which have collectively lost over Dh550,000 said they are weighing legal action against the prime suspect Yogesh Ashok Variava in both India and the UAE.

“Yogesh, originally from Mumbai, absconded from the UAE with large amounts of money on an emergency evacuation flight. It’s strange that the fraudster got a seat in the flight which was meant to bring stranded Indian citizens who had registered with the Indian embassy and consulate requesting repatriation on urgent grounds,” said Pappinisseri.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest.com news network
February 16,2020

Mangaluru, Feb 16: A 45 year-old man committed suicide by jumping into Netravati River from the bridge near Thokkottu along with his six-year-old son in the early hours of Sunday here, police said.

The deceased have been identified as Gopalkrishna Rai and his son Aneesh Rai, residents of Baltila in Bantwal.

According to the police, Gopalkrishna along with his wife Ashwini Rai and son had come to Konaje for a family programme. At about 4:30 a.m. he came to the bridge with his son, left a suicide note and jumped into the river.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.