Karnataka Assembly directs cops to arrest Ravi Belagere, Anil Raj

News Network
November 22, 2017

Belagavi, Nov 22: The Karnataka Legislative Assembly has directed the Home department to arrest Bengaluru-based tabloid journalists Ravi Belagere and Anil Raj following a House resolution sentencing them to one-year imprisonment and a fine of Rs 10,000 for breach of privilege.

The Assembly Secretariat sent a letter to the Home department on Tuesday night, after the Legislative Assembly unanimously rejected a petition filed by the two editors seeking reconsideration of the imprisonment and fine.

In 2014, Ranebennur MLA K B Koliwad (now the Speaker) had petitioned the Privileges Committee taking offence to "defamatory articles" against him in 'Hi Bengaluru'. Ravi Belagere is the editor of Hi Bengaluru.

In another instance, in 2017, Yelahanka MLA S R Vishwanath approached the Privileges Committee taking offence to the articles appeared in a local tabloid 'Yelahanka Voice' edited by Raj. The committee found the articles defamatory and that they amounted to breach of privilege.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 7,2025

Mangaluru, Dec 7: A 34-year-old fruit and vegetable trader in Mangaluru has reportedly lost ₹33.1 lakh after falling victim to an online investment scam run through a fake mobile app.

Police said the scam began in September, when the victim received a link on Facebook. Clicking it connected him to a WhatsApp number, where an unidentified person introduced a high-return investment scheme and instructed him to download an app.

To build trust, the fraudster asked him to invest ₹30,000 on September 24. The trader soon received ₹34,000 as “profit,” convincing him the scheme was genuine. Over the next two months, he transferred money in multiple instalments via Google Pay and IMPS to different scanner codes and bank accounts shared by the scammers. Between September 24 and December 3, he ended up sending a total of ₹33.1 lakh.

When he later requested a refund of his investment and promised returns, the scammers demanded additional payments, claiming he needed to pay a “service tax” first. Even after he paid a small amount, no money was returned, and the scammers continued pressuring him for more.

A case has been registered at the CEN Crime Police Station.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 4,2025

Udupi: A 40-year-old NRI from Udupi has reportedly lost more than Rs 12.25 lakh in an online investment scam operated through Telegram.

According to a complaint filed at the CEN police station, Leo Jerome Mendonsa, who has been working in Dubai for the past 15 years in computer accessories sales, maintains NRI accounts in Karkala and Nitte.

On November 12, 2025, Mendonsa was added to a Telegram group called Instaflow Earnings by unknown individuals. Users identified as Priya and Dipannita persuaded him to invest in “Revenue Tasks.” Initially, Mendonsa transferred Rs 1,100 multiple times and received the promised returns, encouraging him to continue.

On November 14, another user, Nishmitha Shetty, directed him to register on a website, digitvisionuoce.cc, and invest Rs 4 lakh in various shares. Over the next few days, he made multiple transfers totaling Rs 12,25,000, including Rs 50,000 via Google Pay, believing the scheme was legitimate.

After receiving the money, the alleged handlers stopped responding, and neither the invested amount nor the promised profits were returned.

The CEN police have registered a case under Sections 66(C) and 66(D) of the IT Act and Section 318(4) of the Bharatiya Nyaya Sanhita (BNS), and investigations are ongoing.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 1,2025

hindutvaboy.jpg

Udupi, Dec 1: A horrific case of alleged rape has unfolded in Udupi, where a worker from a Hindutva organisation, previously arrested and released on bail for harassing a young woman, is now accused of waylaying and sexually assaulting her.

The arrested individual has been identified as Pradeep Poojary (26), a member of the Hindu Jagarana Vedike's Nairkode unit in Perdur.

Poojary had allegedly been relentlessly harassing the young woman, pressuring her to marry him. When she bravely stood up to him and refused his demands, she filed a formal complaint at the Hiriyadka police station. He was subsequently arrested in that initial harassment case but was later granted bail.

According to police reports, driven by the same malicious grudge, Poojary allegedly intercepted the woman again on November 29. While she was walking through a deserted area, the accused is claimed to have threatened her by grabbing her neck. When she again refused to marry him, he allegedly proceeded to rape her.

The survivor immediately informed her family about the traumatic assault. Following this, her parents lodged a complaint at the Udupi women’s police station.

Police arrested Poojary again and produced him before the court. He has since been remanded to judicial custody.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.