mangalore today
name
name
name
Monday, April 29
Genesis Engineersnamename

 

2009 pub attack mastermind goes too far this time

2009 pub attack mastermind goes too far this time


Mangalore Today News Network

Mangalore, August 1, 2012: If the mastermind of the pub attack of 2009 was properly punished, the Padil resort attack would never have taken place. But Subhash Padil, one of those who engineered the 2009 pub assault, was released on bail in just 3 months. This might have encouraged him to engineer the Padil resort attack, but this time, Subhash Padil will find himself behind bars for a longer time as he is booked on multiple charges of attempt to rape, molestation, issuing life threats, abuse, assault, rioting, and property damage.

 

Subash Padil

According to sources close to Subhash Padil, he has a long history of crime and lawlessness. In 2005, the Mangalore rural police booked Subash Padil for rioting, in 2006 for damaging property, in 2009 and 2011 for rioting, and this time he has been charged with so many illegal activities that he will be behind bars for a long time.

Now 36 years old, Padil started as a Bajrang Dal member, but joined the Shri Rama Sene in 2008. Since he was chucked out of the Sene for his involvement in extortion cases, he joined the Hindu Janajagarana Vedike (HJV) and masterminded the attack on Morning Mist Home Stay.

Stating that the organization has nothing to do with the assault, the HJV said that Subhash attacked the home stay as a resident of Padil as he knew that it was home to certain illegal activities. According to a resident of Padil, the men thought that certain Muslim boys were making merry with Hindu girls in the home stay. When they realized that they had barged into a birthday party, it was too late, said the resident, adding that the men went too far this time.


Write Comment | E-Mail | Facebook | Twitter | Print
Error:NULL
Write your Comments on this Article
Your Name
Native Place / Place of Residence
Your E-mail
Your Comment
You have characters left.
Security Validation
Enter the characters in the image above