Court records show previous aggravated robbery investigation leads to arrest of accused Park Plaza Mall shooter
LITTLE ROCK, Ark. – An affidavit released by the Little Rock District Court shows a previous attempted robbery investigation earlier this month led to the arrest of the suspected Park Plaza Mall deadly shooter.
Authorities arrested 18-year-old Abdelrahmanahmed Sallam Wednesday night in connection to the murder of 47-year-old Cynthia Gregory, who was shot and killed in the parking lot of the Park Plaza Mall.
Little Rock police release name of woman killed in Park Plaza Mall shooting
An affidavit obtained by KARK/FOX16 News shows that Sallam was charged in connection to an aggravated robbery incident earlier this month.
On Jan. 19, a man reported an electronic trade organized through Facebook Market Place led to him being shot at.
According to the victim, he was looking to trade his Apple Watch for a new iPhone. They agreed to meet at the Sharks located at 3323 Fairpark where the suspect allegedly traded a fake phone, took the watch and then began shooting at the victims while running away.
Little Rock police arrest suspect in deadly Park Plaza Mall shooting
The suspect was seen heading to the South Oaks apartments after firing the last of four to five rounds at the victims, an eyewitness said to the authorities.
The affidavit read, police then scanned the area and found three shell casings on the street. Another eyewitness of the Jan. 19 incident said he believed the suspected shooter to be a tenant of the apartment complex and believed the suspect's last name was Sallam.
Additional details on Gregory's murder were also obtained by KARK/FOX16 News in the affidavit.
According to detectives, a witness said a man was seen attempting to take Gregory's purse from her and after he was unsuccessful, shot her and then ran through the Chick-fil-A parking lot across from the mall.
Little Rock police confirm Park Plaza Mall deadly shooting as attempted robbery
Video surveillance obtained by detectives showed the same incident and the suspect fleeing towards the Park Avenue Lofts at 308 S University, where Sallam leases an apartment, according to the affidavit.
On Jan. 28, a day after the deadly shooting of Cynthia Gregory, detectives said shell casings found at the scene of Gregory's murder match the casings found from the Jan. 16 incident at 3323 Fairpark. Robbery Detectives identified Sallam as the suspect for both incidents by surveillance videos. The affidavit stated that the victim and both eyewitnesses of the January 19 incident identified Sallam as the suspect in a photograph lineup as well.
Friends remember Park Plaza shooting victim Cynthia Gregory
Sallam was arrested on Jan. 29. After a search of Sallam's apartment, detectives also found the clothes the suspect in video surveillance was seen wearing.
Sallam appeared in court on Thursday, pleaded not guilty and no bond was set. He is being charged with capital murder and aggravated robbery. His next court appearance is March 31.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
2 hours ago
- Yahoo
Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says
One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potential hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a 'significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, pushed back on the findings. But Cole said the report was worth publishing for use by the cybersecurity research community. Apple's reputation is sterling among security professionals, and if it is confirmed a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. Cole, iVerify's CEO, responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. Under the Biden administration, the Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Walz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said. This article was originally published on


Forbes
2 hours ago
- Forbes
American iPhones Maybe Targeted In Spyware Attacks
Were iPhones really attacked? A new report from the team at iVerify warns that a 'previously unknown' vulnerability in iOS maybe enabled a highly targeted attack on iPhones in the U.S. as well as Europe. This flaw was not in the core messaging architecture itself, but in its nickname feature. 'Any increase in the size of a codebase is going to introduce attack opportunities,' iVerify told me. And that's the case here. When a user updates their profile, 'nickname, photo, or wallpaper,' this triggers "a 'Nickname Update' on a recipient's device." Trivial though it might seem, that nickname update process is a data transmission from one device to another, it's implicitly trusted data and it's within the secure enclave. 'This vulnerability was present in iOS versions up to 18.1.1 and fixed in iOS 18.3.1.' While there's no doubting the flaw and the fix, there is no concrete proof it was exploited in the wild. 'We analyzed crash data from nearly 50,000 devices," iVerify says, "and found that the imagent crashes related to Nickname Updates are exceedingly rare, comprising less than 0.001% of all crash logs collected.' But those rare instances appeared only on 'devices belonging to individuals likely to be targeted by sophisticated threat actors.' Sometimes, Occam's Razor really does apply. Those high-risk individuals were affiliated with 'political campaigns, media organizations, tech companies, and governments in the EU and U.S.' Delete All Texts On Your Phone That Look Like This These are exactly the type of individuals Apple says should use its Lockdown Mode, which restricts a raft of iPhone features and is intended to shutdown attacks that might otherwise get through. It's unclear whether that would have mitigated this risk — and irrelevant now as it's patched. But it certainly makes an iPhone more secure. 'iOS remains a robust and secure operating system,' iVerify told me. 'iMessage is likely targeted not because it's insecure but instead because it's popular." That said, it's toeing a tricky line between feature-rich messenger and secure comms tool. Signal is better, iVerify says, if you want to really secure your comms with a COTS platform. That said, as we've seen before, iMessage is on all iPhones and is almost never disabled, and so if there is a working zero-click attack, it will likely get through. On that note, 'Signal is open source,' iVerify says, "which does have security advantages in the sense that it's transparent and therefore easier for researchers to examine. And it's a simple code base, which does reduce the potential attack surface.' Google Confirms Most Gmail Users Must Upgrade Accounts iVerify reports that forensic examination of one affected device "provided evidence suggesting exploitation: several directories related to SMS attachments and message metadata were modified and then emptied just 20 seconds after the imagent crash occurred. This pattern of deleting potential evidence mirrors techniques observed in confirmed spyware attacks where attackers 'clean up' after themselves." But again, this is speculation ands there's no confirmation or attribution, as Apple will be keen to emphasize. While there's 'no smoking gun,' iVerify says, 'definitively proving exploitation exists, when taken together, this body of evidence gives us moderate confidence these crashes indicate targeted exploitation attempts.' I have reached out to Apple for any comments on this report. iMessage has been exploited before and whether or not that's what has happened here, it will remain a target — as will WhatsApp and all other apps and platforms that run on most devices. Exploiting such a vulnerability is the easiest way to compromise an endpoint, as is especially relevant at the moment when it comes to encrypted data. For most users though, your biggest iMessage risks remains texts with malicious lures and crafty links that trick you into clicking. These highly targeted attacks — real or not — should not be a concern. Unpaid tolls and undelivered packages, though…
Yahoo
5 hours ago
- Yahoo
Truck and tractor-trailer ignite into flames during deadly crash on I-70 in Howard County, police say
HOWARD COUNTY, Md. () — Maryland State Police (MSP) said all lanes on Interstate 70 East were closed on Thursday morning following a deadly fiery crash. State police told DC News Now that the collision happened just after 4:15 a.m. on I-70 near Sand Hill Road. A preliminary investigation determined that a tractor-trailer and a pickup truck, hauling a trailer, crashed and caught on fire. Cleanup underway after 2,000 gallons of diesel fuel leaks in Baltimore marina The driver of the pickup truck was pronounced dead at the scene. Police said the driver of the tractor-trailer was not injured. As of 7 a.m., all lanes on I-70 East remained closed as state troopers continued their investigation. Check for updates. To keep up with the latest news and weather updates, download our Mobile App on iPhone or Android. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.