
Japanese influencer stabbed to death while livestreaming to 6,000 followers
Airi Sato, who filmed her day-to-day life on an app called WhoWatch, was attacked on Tuesday on a Tokyo street by a man to whom she had failed to repay £13,000, police said.
When her feed went dark and emergency sirens could be heard, concerned followers urgently called for help in the live chat.
But it was too late. Ms Sato had been stabbed in the head, neck and stomach, and was dead on arrival at hospital.
Police said that they had arrested Kenji Takano, 42, on suspicion of murder. They added that he had been apprehended at the scene, and although he admitted to the stabbing, he said he had not intended to kill Ms Sato.
According to the news outlet Asahi, onlookers who heard Ms Sato's screams from nearby office blocks initially thought Mr Takano was a 'good samaritan' helping the victim.
Police said the pair had known each other for some years, and Mr Takano had lent Ms Sato roughly £13,100. She was yet to repay the debt, despite court cases ruling in Mr Takano's favour, according to TokyoHive.
Asahi said the police quoted Mr Takano as saying: 'I got to know the woman through her video streaming, and I started meeting her three years ago by visiting the restaurant where she worked. I had money troubles with her.'
He added that he had seen Ms Sato's livestreaming schedule that morning – she had been filming herself making a loop of the city's major train stations. Once he travelled to Tokyo, he tracked her down by identifying the buildings in her videos.
Cases of violent crime are extremely rare in Tokyo, a megacity well known for its clean and orderly streets. But this is not the first time a female social media personality has been killed there.
Two years ago, a court in the suburbs sentenced a 26-year-old man to 17 years in prison after he killed a 33-year-old influencer in a knife attack. She had recently ended a relationship with him, according to the New York Times.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Daily Mail
7 days ago
- Daily Mail
Russia allegedly behind cyberattack on US Justice Department
Russia is believed to be behind an 'unprecedented' cyber hack that exposed some of the Department of Justice's most high-profile sources. Last week, it was revealed the hackers breached the electronic case filing system used by the federal judiciary - and may have accessed confidential information from federal district courts around the country. It has since been dug up by investigators that those responsible, at least in part, have Russian origins, just days before Donald Trump is set to meet with Vladimir Putin in Washington. Several people briefed told the New York Times that despite the certainty, it was unclear if the hackers were with Russian intelligence or if other nations were involved in what they call a yearslong effort. The searches involved in the breach often involved mid-level criminal files that featured people with Russian surnames. Last week, it was revealed that among the information that may have been compromised are the identities of confidential informants in criminal cases, though the identities of those who were thought to face exceptional risk for cooperating with the DOJ are held on separate systems than the ones hacked. Department of Justice officials under Attorney General Pam Bondi (pictured) have reportedly been informed that the court files have faced 'persistent and sophisticated cyber threat actors have recently compromised sealed records.' The staffers have been warned to remove any of their most important documents from the system. Officials are still dealing with figuring out the patterns of the breach and determine the complete damage done. The Daily Mail has reached out to the Department of Justice for comment. Other information the hackers may have acquired are sealed indictments detailing confidential information about alleged crimes and arrests and search warrants that criminals may use to evade capture. The Administrative Office of the US Courts, which manages the federal court filing system, has now been left scrambling with the Department of Justice and district courts around the US to determine how much of a threat the hack poses. But an unidentified source who spent more than two decades on the federal judiciary told Politico: 'It's the first time I've ever seen a hack at this level.' It affected the judiciary's federal core case management system - which includes the Case Management/Electronic Case Files that lawyers use to upload and manage case documents as well as PACER, a system that gives the public limited access to the data. Roughly a dozen court dockets were also tampered with in one court district during the hack, an unidentified source said. The incident demonstrates the susceptibility of the outdated court filing system to hackers. PACER had even been hacked at least once before - back in July 2022 - in a breach that then-House Judiciary Committee Chairman Jerrold Nadler described as 'startling in breadth and scope.' Michael Scudder (pictured), who chairs the Committee on Information Technology for the federal courts and national policymaking body, warned the House Judiciary in June of this year that more such attacks may be coming. He said that because the Judiciary holds such sensitive information, it faces 'unrelenting security threats of extraordinary gravity.' 'Experience has shown that the Judiciary is a high-value target for malicious actors and cyber criminals seeking to misappropriate confidential information and disrupt the judicial process in the United States,' he testified. 'These attacks pose risks to our entire justice system.'


The Independent
13-08-2025
- The Independent
National Guard troops on the streets of DC to fight what Trump calls ‘out of control' crime in the nation's capital
Members of the District of Columbia National Guard began their first night of operations in Washington, D.C., on Tuesday as part of President Donald Trump's anti-crime crackdown in the nation's capital. Troops were seen leaving the D.C. Armory earlier Tuesday and by the evening a group of about a dozen Guard personnel stood with five parked military Humvee trucks near the Washington Monument before later departing for an unknown location. 'We just did a presence patrol to be amongst the people, to be seen,' Master Sgt. Cory Boroff, one of the Guard troops near the Monument, told The New York Times. 'Of the people, for the people in D.C.,' he added. Officials have not disclosed the exact number of troops deployed to the streets on Tuesday as part of the president's decision, announced on Monday, to call 800 Guard personnel to the capital to fight what he has described as rampant violent crime in Washington. Homicide and property crime figures are down compared with the same period in 2024, according to municipal data, with violent crime at a 30-year low following a spike in 2023. The Independent has contacted the D.C. Guard and the White House for comment on the nature and extent of their operations so far. More troops are expected to continue arriving throughout the week. Among the 800 called to Washington, between 100 and 200 will serve 'supporting law enforcement' the Defense Department said in a statement on Monday. general prohibition on the military being involved in domestic law enforcement. Defense Secretary Pete Hegseth said the troops would not be involved in arrests. "Under Title 32, which is the authorization they'll be using, they have broad latitude.' he told Fox News on Monday. 'But they're not going to be involved in law enforcement functions." The deployment is expected to last through September 25, according to a memo obtained by independent journalist Ken Klippenstein. The troops join an even larger contingent of federal and federalized law enforcement sweeping the capital as part of what the administration is calling the D.C. Safe and Beautiful Task Force. The task force involves some 500 federal agents from agencies including the FBI, DEA, and Park Police, as well as hundreds more Washington, D.C. police officers the administration has put under federal control for the next 30 days under the District of Columbia Home Rule Act. White House Press Secretary Karoline Leavitt said the combined force numbered 850 people on the streets on Monday night. The agents and officers arrested 23 people overnight Monday, for charges including homicide, drunk driving, gun, drug crimes and subway fare evasion. FBI Director Kash Patel said on X on Tuesday that the FBI was involved in nearly half of the Monday arrests, including arrests for unlawful gun possession, outstanding DUI warrants, and a violation of a restraining order. The president has threatened to bring similar National Guard deployments to other Democrat-led cities. 'This will go further,' he said announcing his Washington operation on Monday, naming other large Democrat-led cities such as New York, Oakland, and Baltimore. But Trump has few clear legal routes to doing so. To send the Guard to Los Angeles over the summer, the administration used a provision for times of rebellion, invasion, or a breakdown in federal law enforcement, which the White House said had occurred amid protests against immigration raids. The Trump administration's Washington operation has benefited from the president's special authorities over the non-state District of Columbia. Democratic leaders on Trump's punch list have said they will challenge any attempt to send in the Guard, just as California is doing in federal court. Trump 'has absolutely no right and no legal ability to send troops into the city of Chicago, and so I reject that notion,' Illinois Governor J.B. Pritzker said on Tuesday. 'You've seen that he doesn't follow the law. I have talked about the fact that the Nazis in Germany in the 30s tore down a constitutional republic in just 53 days,' he added. 'It does not take much, frankly, and we have a president who seems hell-bent on doing just that.'


Daily Mail
13-08-2025
- Daily Mail
Major US adversary believed to be behind 'unprecedented' cyber hack on US court data
Russia is believed to be behind an 'unprecedented' cyber hack that exposed some of the Department of Justice's most high-profile sources. Last week, it was revealed the hackers breached the electronic case filing system used by the federal judiciary - and may have accessed confidential information from federal district courts around the country. It has since been dug up by investigators that those responsible, at least in part, have Russian origins, just days before Donald Trump is set to meet with Vladimir Putin in Washington. Several people briefed told the New York Times that despite the certainty, it was unclear if the hackers were with Russian intelligence or if other nations were involved in what they call a yearslong effort. The searches involved in the breach often involved mid-level criminal files that featured people with Russian surnames. Last week, it was revealed that among the information that may have been compromised are the identities of confidential informants in criminal cases, though the identities of those who were thought to face exceptional risk for cooperating with the DOJ are held on separate systems than the ones hacked. Department of Justice officials under Attorney General Pam Bondi have reportedly been informed that the court files have faced 'persistent and sophisticated cyber threat actors have recently compromised sealed records.' The staffers have been warned to remove any of their most important documents from the system. Officials are still dealing with figuring out the patterns of the breach and determine the complete damage done. The Daily Mail has reached out to the Department of Justice for comment. Other information the hackers may have acquired are sealed indictments detailing confidential information about alleged crimes and arrests and search warrants that criminals may use to evade capture. The Administrative Office of the US Courts, which manages the federal court filing system, has now been left scrambling with the Department of Justice and district courts around the US to determine how much of a threat the hack poses. But an unidentified source who spent more than two decades on the federal judiciary told Politico: 'It's the first time I've ever seen a hack at this level.' It is now suspected that the attack was conducted by nation-state affiliated actors, though criminal organizations may have also been involved. Officials were first made aware of the breach around the July 4 holiday, and chief judges of the federal courts in the 8th Circuit - which includes Arkansas, Iowa, Minnesota, Missouri, Nebraska, North Dakota and South Dakota - were alerted about the hack last week, according to Politico. It affected the judiciary's federal core case management system - which includes the Case Management/Electronic Case Files that lawyers use to upload and manage case documents as well as PACER, a system that gives the public limited access to the data. Roughly a dozen court dockets were also tampered with in one court district during the hack, an unidentified source said. The incident demonstrates the susceptibility of the outdated court filing system to hackers. PACER had even been hacked at least once before - back in July 2022 - in a breach that then-House Judiciary Committee Chairman Jerrold Nadler described as 'startling in breadth and scope.' Michael Scudder, who chairs the Committee on Information Technology for the federal courts and national policymaking body, warned the House Judiciary in June of this year that more such attacks may be coming. He said that because the Judiciary holds such sensitive information, it faces 'unrelenting security threats of extraordinary gravity.' 'Experience has shown that the Judiciary is a high-value target for malicious actors and cyber criminals seeking to misappropriate confidential information and disrupt the judicial process in the United States,' he testified. 'These attacks pose risks to our entire justice system.' In fiscal year 2024, he noted, 200 million harmful cyber 'events' were prevented from penetrating court local area networks in fiscal year 2024, according to The Record. But, Scudder said, the Case Management/Electronic Case Files and PACER systems pose an even greater risk as they are 'outdated [and] unsustainable due to cyber risks and require replacement,' which he said is a 'top priority' for the Department of Justice. Still, Scudder said, a new, more modernized system would have to be 'developed and rolled out on an incremental basis.'