logo
Norfolk Police appeal as otter dies after being shot in the head near Aylsham

Norfolk Police appeal as otter dies after being shot in the head near Aylsham

ITV News5 days ago

An otter has been euthanised after it was shot in the head with an "air weapon".
The animal was found in Buxton near Aylsham, Norfolk on Wednesday, but is thought to have travelled some distance before being discovered, Norfolk Police said.
The otter was put down due to the severity of its injuries and the force is appealing for anyone in the area with information to come forward.
PC Chris Shelley said: 'This is a deeply upsetting incident involving a protected species.
"We are urging anyone who may have seen suspicious activity involving air weapons, slingshots, or similar devices in the area to come forward.'
Otters are protected under UK and European law and the use of air weapons and similar devices against wildlife has been "a growing concern nationally", Norfolk Police said.
A dedicated police operation - Operation Lakeshot - has been launched to better understand and tackle the crime.
Anyone with information is urged to contact PC Chris Shelley via email at Christopher.shelley@norfolk.police.uk, quoting incident number 36/36976/25.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz
High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

NBC News

time6 hours ago

  • NBC News

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potentially groundbreaking hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, refuted the findings. But Cole stood by the report's significance for research purposes. Apple's reputation is sterling among security professionals, and if a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. IVerify CEO Rocky Cole responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. The Biden administration's Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns ' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Waltz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said.

25 consumer organisations file complaint against Shein over misleading practices
25 consumer organisations file complaint against Shein over misleading practices

Fashion United

time10 hours ago

  • Fashion United

25 consumer organisations file complaint against Shein over misleading practices

Twenty-five European consumer organisations have lodged a joint complaint against Chinese fast-fashion giant Shein, accusing the company of misleading consumers and promoting overconsumption through manipulative design elements on its website and mobile app. The complaint, addressed to European regulators, alleges that Shein employs so-called 'dark patterns'—techniques designed to subconsciously influence consumer behaviour. These include fake discounts, countdown timers, misleading low-stock alerts and endless scrolling features. Emotional triggers and peer pressure are also said to be used, such as fake reviews or notifications suggesting that a product is nearly sold out. 'Shein deliberately designed its site and app to be addictive, aimed at impulse purchases and overconsumption. This isn't harmless marketing, but a deliberate aggressive strategy that misleads consumers,' said Sandra Molenaar, director of Dutch consumer group Consumentenbond, in a press release. 'These practices are not only unfair, but also harmful to consumers and the environment. That is why we are taking action and increasing the pressure on Shein.' The complaint follows earlier investigations by European regulators, which in early 2025 uncovered several violations of consumer protection law at Shein. The latest action was coordinated by BEUC (the European Consumer Organisation), which submitted the complaint to the European Commission and the Consumer Protection Cooperation (CPC) Network. Consumer organisations behind the complaint stress that Shein is not an isolated case. Other fast-fashion platforms reportedly use similar manipulative tactics, prompting calls for broader investigation across the sector. The joint action underscores growing scrutiny of online sales practices in the fast-fashion industry and intensifies pressure on authorities to take regulatory measures against digital manipulation. This article was translated to English using an AI tool. FashionUnited uses AI language tools to speed up translating (news) articles and proofread the translations to improve the end result. This saves our human journalists time they can spend doing research and writing original articles. Articles translated with the help of AI are checked and edited by a human desk editor prior to going online. If you have questions or comments about this process email us at info@

Everything we know as as search for Madeleine McCann enters its third day
Everything we know as as search for Madeleine McCann enters its third day

Wales Online

time12 hours ago

  • Wales Online

Everything we know as as search for Madeleine McCann enters its third day

Everything we know as as search for Madeleine McCann enters its third day The search of land in Praia da Luz continues on Thursday, 18 years after the three-year-old's disappearance. The searches are taking place between Brueckner's old rented cottage and a rural area near Lagos, Atalaia (Image: PA ) Madeleine McCann was three years old when she vanished on May 3, 2007 after her parents left her asleep in their holiday apartment in Praia da Luz, in the Algarve, Portugal. Since then, hers has become one of the highest-profile unsolved missing person cases in the world, with British, Portuguese and European police forces involved in the investigation. ‌ Police forces from across Europe have launched multiple searches for Madeleine McCann since her disappearance in 2007. ‌ Early efforts focused on the Praia da Luz resort, where she was last seen in her family's holiday apartment. In 2013, British police began Operation Grange, a formal investigation into the case. Searches have included digging in scrubland, draining reservoirs, and using sniffer dogs and ground-penetrating radar. German authorities have also led inquiries in recent years, targeting prime suspect, 48-year-old Christian Brückner. Madeleine McCann disappeared from a holiday flat in Portugal in 2007 (Image: PA ) Article continues below The latest one commenced on Tuesday this week, searching the suspects old place of residence in Praia da Luz, covering a large patch of land near the home of their prime suspect and the McCanns' holiday apartment. Here's everything we know. The latest investigation Where are police searching? Operational tents have been set up in the nearby village of Atalaia as investigation teams search over 20 plots of land in Praia da Luz. ‌ German authorities, who are leading this investigation, are searching the old residence of Christian Brückner, a man who is currently in jail for the offence of rape, to find anything that could prove Madeleine was ever taken there. What have they found? Teams investigating the disappearance of Madeleine McCann have taken samples of potential evidence from properties near Praia Da Luz in Portugal. ‌ The search teams were seen using pickaxes, shovels and chainsaws to clear dense vegetation and dig near a derelict building. On Tuesday, fresh searches for Madeleine began in countryside a few miles from Praia da Luz, with firefighters spotted pumping water to drain a well. (Image: © 2025 PA Media, All Rights Reserved ) ‌ About a dozen officers focused on one abandoned building where digging was taking place, while another member of the search team cleared large rocks. The Daily Express reported that investigation teams have taken samples of potential evidence from properties near Praia Da Luz in Portugal. A man who knew Madeleine McCann prime suspect Christian Brueckner has made a dramatic appeal to police, claiming they are searching in the wrong place. Ken Ralphs told GB News that Brueckner's alleged accomplice once broke down in tears and confessed plans to help abduct a child in Praia de Luz. ‌ He said: "He cried that he needed the money to get out the country with his family and children and that's why he got involved." Mr Ralphs identified what he described as the last property Brueckner stayed in before Madeleine vanished – and urged investigators to focus there. Frustrated by years of inaction, he said: "For over 18 years, I've pressed the police and all they can do is blame each other for not passing this information on." ‌ The prime suspect Last year, Christian Brueckner was cleared of unrelated sexual offences between 2000 and 2017 (Image: Phil Harris ) Christian Brückner is serving a jail sentence in Germany after raping a 72-year-old American tourist in Portugal in 2005. He is due to be released later this year. He moved to Portugal in 1995 after serving a two-year prison sentence in Germany for sexually assaulting a six-year-old girl in 1994, he is known to have been renting a cottage in Praia da Luz at the time of Madeleine's disappearance. Soon after the media descended on the resort in 2007, he moved back to Germany. ‌ In October 2024, he was acquitted of two charges rape and two of sexual abuse in a German rape trial where it was argued there was a lack of evidence and witnesses who were not credible. Police have previously claimed he made a 30-minute phone call from the same area just an hour before Madeleine disappeared. He is alleged to have confessed on two occasions to kidnapping and sexually abusing the toddler - once to a friend in a German bar in 2017 and again to his prison cellmate in 2020. ‌ The German national was formally identified as a suspect in 2022, but has denied any involvement. He also denied committing the 2005 rape for which he was convicted of in 2019. Brückner has not been charged in the McCann case, but German authorities began investigating him in June 2020 for her kidnap and murder. German authorities maintain that he is the main suspect in Madeleine's disappearance and are pushing for charges before his scheduled release in September. Article continues below The last search The most recent search prior to this one was also executed by German police in spent a week searching the Barragem do Arade reservoir, around 30 miles from Praia da Luz, after receiving of a "tip-off". It was previously searched by divers in 2008 after Portuguese lawyer Marcos Aragao Correia ordered them to look to see if Madeleine McCann's body was there. Nothing was found.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store