Karnataka witnesses a politically turbulent 2012

December 23, 2012
yeddy


BS Yeddyurappa breaking ranks with BJP and floating his own party, another change of guard, the Cauvery issue, busting of a terror module and an ugly incident of three ministers watching porn clippings in the assembly marked the year 2012 for Karnataka.

The year also saw attacks on girls and boys at a home stay in Mangalore, clash between lawyers and police in the wake of men of legal fraternity attacking journalists and exodus of people from northeastern states following rumours of attack.

The Cauvery water sharing row returned to haunt Karnataka, with Tamil Nadu managing to get court orders for release of water on two occasions and Cauvery basin districts plunged into agitation opposing water release.

The first-ever saffron party government in south India continued to be hit by political turmoil following a banner of revolt launched by its strong man Yeddyurappa, who later launched Karnataka Janata Party with the sole aim of decimating BJP in next year's election.

The other notable events that marked the year was a problem of mounting garbage in the city, which also tarnished the brand name of Bangalore at the international level, resignation drama by ministers and legislators to seek the sacking of D V Sadananda Gowda as chief minister.

There were private complaints pouring against Chief Minister Jagadish Shettar, which the Lokayukta court quashed, Law Minister S Suresh Kumar, former chief minister Sadananda Gowda , BBMP Mayor Venkatesh Murthy and former chief ministers H D Devegowda, S M Krishna and Yeddyurappa accusing them of abusing their power.

The year also witnessed an unprecedented scene of ministers and ruling party legislators boycotting the budget session to press for their demand to sack Gowda and make Shettar as chief minister.


In a continued collision-course between Governor HR Bhardwaj with the government, the former rejected in February the recommendation to appoint retired judge S R Bannurmath as Lokayukta in the wake of him facing a land allotment row.

The image of the BJP government took a beating when two of its ministers, Laxman Savadi and C C Patil, were caught on camera watching porn clippings in the state assembly when the house was debating the hardships faced by drought-hit people.

The footage aired by a regional channel and later by others led to the resignation of three ministers-- J Krishna Palemar, who was accused of providing the clippings, besides Savadi and Patil.

Yeddyurappa got a major relief from the high court in March when it quashed the FIR registered against him in illegal mining case on Lokayukta report and also a chapter in the report that indicted him. This prompted the 70-year-old Lingayat leader to stake claim for re-instating himself as chief minister, a post he was forced to quit in July 2011, but the BJP high command rejected the demand, which ultimately led him to bid adieu to the saffron party and launch KJP.

However, Yeddyurappa suffered a major setback when the Supreme Court ordered a CBI probe in May into illegal mining and mysterious disappearance of iron ore from Belekeri Port in Uttara Kannada district.

The year saw the tragic death of two officials -- Karnataka Administrative Service (KAS) officer Mahantesh, who was murdered by some individuals in Bangalore City and an Assistant Conservator of Forest Madan Naik in Dandeli, who was assaulted by a group of tourists to death for warning them to be beware of crocodiles in the lake, triggering off protests from government servants.


The internal feud that has been simmering in the ruling BJP ever since it came to power in 2008 continued unabated in 2012 and led to sacking of Sadananda Gowda as chief minister by the rebels led by Yeddyurappa.

Yeddyurappa ensured that nine ministers loyal to him quit seeking Gowda's replacement with Shettar on June 29 and they withdrew the resignation on July 2 after BJP high command accepted the demand for change of guard.

Gowda quit as chief minister on July 8 and Shettar, another Lingayat leader, assumed office on July 12. But the rumblings in the government and also the party continued.

People of the state were for a rude shock when the city police announced that they have uncovered a terror module with the arrest of 11 terror suspects who had planned to eliminate prominent politicians and journalists on August 30.


The reputation of the state suffered a major dent when the activists of Hindu Jagaran Vedike stormed a home stay in Mangalore, beat up girls and boys partying there in July. The attack evoked nationwide outrage.



Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 27,2020

Mumbai, Jun 27: The Bombay High Court observed that COVID-19 patients from poor and indigent sections cannot be expected to produce documentary proof to avail subsidised or free treatment while getting admitted to hospitals.

The court on Friday was hearing a plea filed by seven residents of a slum rehabilitation building in Bandra, who had been charged ₹ 12.5 lakh by K J Somaiya Hospital for COVID-19 treatment between April 11 and April 28.

The bench of Justices Ramesh Dhanuka and Madhav Jamdar directed the hospital to deposit ₹10 lakh in the court.

The petitioners had borrowed money and managed to pay ₹10 lakh out of ₹12.5 lakh that the hospital had demanded, after threatening to halt their discharge if they failed to clear the bill, counsel Vivek Shukla informed the court.

According to the plea, the petitioners were also overcharged for PPE kits and unused services.

On June 13, the court had directed the state charity commissioner to probe if the hospital had reserved 20% beds for poor and indigent patients and provided free or subsidised treatment to them.

Last week, the joint charity commissioner had informed the court that although the hospital had reserved such beds, it had treated only three poor or indigent persons since the lockdown.

It was unfathomable that the hospital that claimed to have reserved 90 beds for poor and indigent patients had treated only three such persons during the pandemic, advocate Shukla said.

He further argued that COVID-19 patients, who are in distress, cannot be expected to produce income certificate and such documents as proof.

However, senior advocate Janak Dwarkadas, who represented the hospital, said the petitioners did not belong to economically weak or indigent categories and had not produced documents to prove the same.

A person who is suffering from a disease like COVID-19 cannot be expected to produce certificates from a tehsildar or social welfare officer before seeking admission in the hospital, the bench noted and asked the hospital to deposit ₹10 lakh in court within two weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.