Mangaluru auto blast suspect Shariq’s house raided; he was previously booked under UAPA

News Network
November 20, 2022

shareeq.jpg

Mangaluru/ Mysuru, Nov 20: The Karnataka police today conducted searches at the house of a youth who suffered severe injuries in a blast in a moving auto rickshaw in Mangaluru last night. The injured, who is also the prime suspect in the blast case, was reportedly staying in Mysuru. 

According to the police, the accused took the one-room accommodation on rent last month. He had told the house owner that he was in the city for "mobile repair training".

Preliminary investigation indicates Mohammed Shariq, 24, hailing from Teerthahalli he has terror links. He had previously been booked under the Unlawful Activities (Prevention) Act (UAPA) for graffiti on walls in Mangaluru. He was out on bail in the case. He was also absconding in a terror case and was wanted by the police.

Police have verified his photos in their records and his family has also identified the injured person in the hospital as Mohammed Shariq, via a phone, and are on their way to the hospital, a senior police official said.

Shivamogga stabbing case

Probing a stabbing incident in Shivamogga around Independence Day over putting up a photo of V. D. Savarkar, Shivamogga Rural Police had busted an alleged terror module with alleged links to Islamic State. Police had arrested Maaz Muneer Ahmed, 22 and Syed Yasin, 21 and recovered explosive materials from the duo.

Investigations had uncovered that they were radicalised by Mohammed Shariq and they had learnt making bombs through PDF files, videos and several materials sent to them by Shariq. The duo had prepared an IED and tested it successfully on the banks of Tungabhadra, police had alleged. However, Shariq had fled from his residence and had been absconding till date. 

Mohammed Shariq and Maaz Ahmed were earlier arrested by Mangaluru City Police in 2020 over graffiti they wrote on the walls of two buildings in the coastal city, in support of Lashakr-e-Taiba and Taliban, and were later released on bail. Maaz Ahmed was again busted in the terror module case in Sepetmber 2022, even as Shariq the prime accused in the case was at large. 

Links to Al Hind IS module

Mohammed Shariq is said to be associated with Matheen Ahmed Taha, also hailing from Shivamogga and a member of Al Hind IS module, active in Karnataka and Tamil Nadu. The Bengaluru-based Al Hind IS module was allegedly put together by Mehboob Pasha, a resident of Gurappana Palya, Bengaluru and Khaja Moideen, a resident of Cuddalore, Tamil Nadu, accused in several murder cases of Hindutva leaders in the neighbouring state.

The module was busted by the National Investigation Agency (NIA) in 2020 and chargesheets filed in 2021, alleging the group wanted to establish an IS province inside the jungles of South India. However, Matheen Ahmed Taha, a prominent member of this group, is still at large and Mohammed Shariq is suspected to be his associate.

The blast occurred on Saturday evening inside an autorickshaw, near a police station, leaving the passenger and the driver injured. Both have been admitted to the hospital. The police said inside the vehicle, they found a burnt pressure cooker fitted with batteries, which Shareeq was apparently carrying. The pressure cooker, the police said, was a low-intensity Improvised Explosive device or IED.

‘Not well enough to give a statement’

This morning, the police confirmed that it was "an act of terror with intention to cause serious damage". The Karnataka police are investigating it along with central agencies.

The police said Shareeq is not well enough to give a statement. The auto driver, who was also injured, is in the hospital.

Shareeq was also carrying an Aadhaar card which did not belong to him, the police said. The owner of the card has been located. Premraj Hutagi, a resident of Karnataka's Hubballi district, has said he had lost the card and had acquired a duplicate.

Citing the "stolen" Aadhaar card, the police said it gives them a "fair idea that he was planning to target something, but we don't know what". "We are not ruling out his having a connection with the recent Coimbatore blast," said state police chief Praveen Sood. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 16,2024

Mangaluru: The Kavoor police in Mangaluru, Karnataka, have arrested three individuals from Kerala in connection with two separate cybercrime cases, including one involving extortion under the guise of a "digital arrest."

City Commissioner of Police Anupam Agrawal reported that one of the arrested individuals, Nisar, a resident of Ernakulam district, posed as a CBI officer. He allegedly threatened the complainant with arrest and extorted Rs 68 lakh. A case has been filed under sections 66 (C) and 66 (D) of the IT Act, and sections 308 (2) and 381 (4) of BNS.

In another case, the Kavoor police arrested two men, Sahil K P of Thiruvannur, Kozhikode, and Muhammad Nashath of Mappila Koyilandy, Kerala, in connection with a share trade fraud. The accused are alleged to have deceived the complainant by promising substantial profits from an investment in the stock market. Trusting the fraudsters, the complainant invested Rs 90 lakh, which was subsequently lost. A case has been registered under sections 66 (C) and 66 (D) of the IT Act, and sections 318 (4) and 3 (5) of BNS.

The accused were arrested in Koyilandi and presented before the court. The operation was carried out under the guidance of City Police Commissioner Anupam Agrawal, led by Mangaluru North Sub-Division ACP Srikanth K, Kavoor Inspector Raghavendra Byndoor, Kavoor PSI Mallikarjuna Biradara, and staff members Ramanna Shetty, Bhuvaneshwari, Rajappa Kashibai, Praveen N, and Malatesh. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 15,2024

iranarmy.jpg

Iran’s Islamic Revolution Guards Corps (IRGC) has killed or captured 69 terrorists linked to the Israeli spy agency Mossad during a major counterterrorism drill in the country's southeast, its spokesman says.  

General Ahmad Shafaei, the spokesman for the “Martyrs of Security” drill, said Friday that a total of 23 terrorists have been killed and another 46 arrested in various clean-up operations ever since the IRGC Ground Force launched it in the Sistan and Baluchestan province on November 1.

Seven terrorists have also turned themselves in during the period.

“The undeniable fact about terrorists is that they rely on arrogant powers, particularly the intelligence service of the wicked and vicious Zionist regime," Shafaei said.

“Unfortunately, weapons and munitions at terrorists’ disposal are among the most sophisticated ones in the world. This accounts for their heavy dependence.” 

The official stated that several members of the disbanded terror teams were non-Iranian nationals, who had been hired by foreign intelligence agencies to carry out acts of sabotage and terror inside Iran.

In a most recent operation, six terrorists were arrested and four others were eliminated, three of whom were non-Iranians, he added. 

On October 26, ten members of Iran's law enforcement forces were killed in a terrorist attack in the Gohar Kuh district of Taftan in the Sistan and Baluchestan province.

The so-called Jaish al-Adl terrorist group claimed responsibility for the assault, which was one of the deadliest in the province in recent months.

The group has carried out numerous terrorist attacks in Iran, primarily in Sistan and Baluchestan.

Its tactics include the abduction of border guards as well as targeting civilians and police stations within the province to incite chaos and disorder.

In January, Iran launched a military operation during which the headquarters of the Pakistan-based terrorist group was targeted in missile strikes, destroying its infrastructure.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 11,2024

udupistatue.jpg

Udupi, Nov 11: The Karkala town police in Udupi have arrested Krishna Naik, the sculptor responsible for installing a 33-foot Parashurama statue at Umikkal Hill in Bailur, Karkala taluk. 

Naik, the owner of Krish Art World and a resident of Bengaluru's Visvesvaraya Layout, was apprehended in Mahe, part of the Union Territory of Puducherry, for allegedly substituting a look-alike statue in place of a genuine bronze figure at the Parashurama Theme Park in Karkala.

Udupi Superintendent of Police Dr. Arun K confirmed the arrest, stating that Naik faces charges under Sections 420 (cheating) and 409 (criminal breach of trust) of the Indian Penal Code. 

This legal action followed a complaint lodged in June by Krishna Shetty, a resident of Nallur village, Karkala. Shetty claimed that Naik had received a payment of ₹1,25,50,000 from Udupi Nirmithi Kendra for the installation of a bronze Parashurama statue. However, Naik allegedly deceived the government by installing a replica instead.

The statue was unveiled on January 27, 2023, by then Chief Minister Basavaraj Bommai. Current Chief Minister Siddaramaiah has since ordered a CID investigation to probe deeper into the alleged fraud surrounding the statue's installation at the theme park.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.