Rs 1,400-cr Guru Raghavendra Bank fraud: 43 depositors die amid covid without getting money

News Network
June 5, 2021

Bengaluru, June 5: At least 43 of around 35,000 depositors that are struggling to get their hard-earned money back from the Sri Guru Raghavendra Sahakara Bank Niyamitha (SGRSBN) have passed away in last one and half years. 

In January 2020, the Reserve Bank of India, had invoked Section 35 A of the Banking Regulation Act, 1949 along with Section 56 of the Banking Regulation Act, after a scam worth Rs 1,400 crore had come to light. 

According to official sources, at least 43 depositors died since then without getting their money back. While some of them died due to covid-19, some others due to other reasons. 

The RBI had also imposed a withdrawal limit of Rs 35,000 citing the bank’s bad loans. The ceiling was raised to Rs 1 lakh later.

Satish Karanth, a mechanical engineer and resident of Kathriguppe, lost his 56-yearold wife Savithri Karanth in March due to breathing issues. “The bank assured good interest rates. We trusted the bank as it was run by our community people. We invested Rs 1 crore, including my mother’s Rs 20 lakh. Now, she despairs every day over the lost money and I don’t know how to console her,” he said.

Vijay Gururaj, a Nagarbhavi resident, said his mother Gayathri Gururaja had deposited Rs 6 lakh. “She was dependent on the interest money for her medical expenses. She was not happy to take money from us. After her deposit was stuck, she became depressed. On March 18, while heading to a hospital, she met with a road accident and died. She did not find peace in her death but was worried about losing money,” said Vijay, an accountant.

Online protest

Hit by Covid-19, the depositors have called for an online protest. It will be organised on Facebook Live — https:// www.facebook.com/SGRSBNDepositors/ — at 8pm on June 6.

Harish Venkataramaiah, a depositor leading the protest, said there has been no development in the last one-andhalf-year with regard to the money. 

“Initially, the heads promised to revive the bank but later an administrator was appointed by the Registrar of Cooperative Societies in Karnataka but that was also of no use. People who defaulted on their loans have been roaming free and the poor depositors are paying a heavy price for it,” he rued.

The bank’s case of irregularities was handed over to the Criminal Investigation Department (CID), which is yet to file a chargesheet. A police official said the CID had collected data of the victims but later Covid-19 situation slowed down the probe.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 8,2025

SofiaQuraishi.jpg

Belagavi: Colonel Sofia Qureshi who along with Wing Commander Vyomika Singh presented the details of ‘Operation Sindoor’ is being hailed as the daughter-in-law of Karnataka’s Belagavi.

Qureshi's husband Colonel Tajuddin Bagewadi is from Konnur town in Gokak taluk. He has been serving as a colonel in the Indian Army. They were married in 2015.

Qureshi is a native of Baroda in Gujarat, being married to Tajuddin has made her the daughter-in-law of Belagavi.

During a media meet at New Delhi on Wednesday, Qureshi had shared the details of the success of Operation Sindoor which was conducted in retaliation to the terror attack at Pahalgam in Kashmir.

Qureshi has also served in the UN peacekeeping force at Kangola. She has received great appreciation from General Officer Commanding for her work along the borders of Punjab and during the floods in North-East.

Presently Sofia has been posted at Jammu while her husband Colonel Tajuddin Bagewadi at Jhanshi.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 15,2025

julani.jpg

Riyadh: Dismantling years of US government policy of treating Syria like a pariah, President Donald Trump on Wednesday met Syria's interim president, Ahmad al-Sharaa-- former leader of a rebel group Hay'at Tahrir al-Sham (HTS), which was an offshoot of al-Qaeda and designated as a terrorist organisation by the American government. The meeting was held in Riyadh at the request of Saudi Arabia's Crown Prince Mohammed bin Salman, a day after President Trump lifted sweeping sanctions against Syria, which the US began imposing in 1979.

After the meeting, Trump, who often judges people based on how they look, suggested that al-Sharaa has a "real shot at doing a good job" with war-torn Syria. He also called the former terrorist a "young, attractive, tough guy" with a "very strong" past. 

Speaking to reporters on Air Force One, he said al-Sharaa is a “young, attractive guy. Tough guy. Strong past. Very strong past. Fighter.”

“He's got a real shot at holding it together."

Trump said he spoke with Turkish President Recep Tayyip Erdoğan, "who is very friendly with him. He feels he's got a shot of doing a good job. It's a torn-up country.”

Trump is the first US president to meet a Syrian leader in a quarter of a century, and urged the onetime jihadist to normalise ties with Israel. He, however, gave no indication that the United States would remove Syria from its blacklist of state sponsors of terrorism -- a designation dating back to 1979 over support to Palestinian militants that severely impedes investment.

But the US president's offer to lift sanctions on Syria, mostly imposed during the repressive rule of ousted president Bashar al-Assad, comes as a major boost to the war-ravaged country, still getting to grips with Sharaa's December toppling of Assad.

Why Meeting Raised Eyebrows?

The meeting between the two leaders raised eyebrows globally due to al-Sharaa's murky past. Previously known as Abu Mohammad al-Julani, al-Sharaa was linked to the terror group al-Qaeda and fought against US forces in Iraq, and had even spent years in American custody. However, the former jihadist has abandoned his nom de guerre Abu Mohammed al-Jolani, trimmed his beard and donned a suit and tie to receive foreign dignitaries since ousting Assad from power on December 8, 2024.

He was later appointed to lead Syria for an unspecified transitional period, and has been tasked with forming an interim legislature after the dissolution of the Assad era parliament and the suspension of the 2012 constitution.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 10,2025

indaarmy.jpg

New Delhi, May 10: In a detailed joint briefing today, India’s defence and foreign ministries dismantled Pakistan’s claims of major strikes on Indian infrastructure and exposed Islamabad’s alleged attempts to escalate conflict along the border. Here's a clear breakdown of 12 crucial points made by Indian military officials:

1. Pakistan’s Claims Are False
The Indian government called Pakistan’s statements about destroying airbases, power grids, and cyber systems “completely false” and “state-sponsored propaganda.”

2. No Damage to Indian Airbases
Indian officials categorically denied Pakistani claims of hitting Sirsa, Suratgarh, and the S-400 radar base in Udhampur.

3. Pakistan Used Multiple Attack Platforms
Pakistan employed UCAVs (unmanned combat aerial vehicles), loitering munitions, long-range missiles, and fighter aircraft to target military and civilian sites.

4. Civilian Infrastructure Targeted
Pakistan struck schools and a Medicare centre near Indian Air Force bases in Srinagar, Awantipora, and Udhampur.

5. Over 26 Locations Attacked
India reported air intrusions and harassment attacks across 26+ locations from Srinagar to Naliya, along the Line of Control (LoC) and international border.

6. Limited Damage at IAF Bases
Minor damage occurred at four IAF stations: Udhampur, Patan, Adampur, and Bhuj — but all operations remain unaffected.

7. Heavy Cross-Border Shelling
Sectors like Kupwara, Baramulla, Poonch, Rajouri, and Akhnoor saw intense artillery, mortar, and small arms fire — all met with strong Indian retaliation.

8. Pakistan Moving Troops to Forward Areas – Signals Possible Escalation
The Indian Army observed significant Pakistani troop mobilisation toward forward posts along the LoC. This movement, described as “indicative of offensive intent,” suggests that Pakistan may be preparing for a wider military escalation. The Indian armed forces are on high operational alert, closely monitoring the situation and ready to respond to any provocation.

9. India’s Response: Swift, Measured, Targeted
In retaliation, India struck only military assets — radar stations, command centres, and storage sites — using precision air-launched weapons.

10. No Damage to Critical Indian Defences
Pakistan’s claims of destroying India’s S-400 systems, BrahMos base, and Chandigarh ammo depot were debunked with timestamped visual evidence.

11. Pakistan Trying to Spread Communal Discord
Indian officials accused Pakistan of fabricating stories to stoke communal unrest in India — calling such efforts "doomed to fail."

12. India Committed to Responsible Conduct
India reiterated its commitment to non-escalation — “provided Pakistan reciprocates.” Officials stressed that India’s military operations have been calibrated and proportionate.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.