logo
Cats alerted Dundee householder to late-night break-in

Cats alerted Dundee householder to late-night break-in

The Courier26-05-2025

A rampant criminal was caught red-handed during a Dundee break-in after the householders' cats began acting strangely.
John Harris fled after being confronted by a woman who screamed when she found the crook in her living room.
The 56-year-old was caught after being hunted by her partner and police officers.
Harris – who was been breaking into properties for 40 years – is now facing a further stint in prison after admitting the offence at Dundee Sheriff Court.
It was revealed the couple had locked all doors and windows before going to bed, with the woman still awake at around 1.30am.
'She noticed her cats acting strange and spooked by something,' prosecutor Stephanie Paterson told the court.
'A short time later, she heard a loud bang as if a door had just been slammed.
'She went downstairs to check the noise and noticed the living room light was on.
'Upon walking in, she saw the accused standing directly in front of her.'
The fiscal depute said the woman 'began to scream loudly' in a panic, which prompted a bloodied Harris to flee out of the kitchen and into a neighbour's garden.
Her partner raced downstairs to assist and tried to trace his stolen iPhone with an app.
Harris was arrested at around 2am a short distance away, where he was found with the phone, a bank card, driving licence and alcohol.
Police noted the kitchen window had been forced open, with blood visible.
HMP Perth prisoner Harris pled guilty to breaking into a property in the Douglas area on May 4 this year.
Sheriff Tim Niven-Smith deferred sentence until next month for a social work report to be prepared.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Reviews opened into Tina Satchwell and Michael Gaine investigations
Reviews opened into Tina Satchwell and Michael Gaine investigations

Belfast Telegraph

time3 hours ago

  • Belfast Telegraph

Reviews opened into Tina Satchwell and Michael Gaine investigations

Garda Commissioner Drew Harris said that 'in hindsight' it may have been 'very obvious' where Mrs Satchwell's remains were secretly buried. Mr Harris said a report would be compiled and given to the Minister for Justice Jim O'Callaghan on Mrs Satchwell's disappearance, while the case of Mr Gaine is undergoing a peer review. Earlier this week, Richard Satchwell was given a life sentence for the murder of his wife Tina at their home in Co Cork. The British truck driver, 58, had denied murdering his wife between March 19 and March 20 2017. The jury at the Central Criminal Court in Dublin reached the unanimous verdict last Friday after nine hours and 28 minutes of deliberations. Mrs Satchwell's skeletal remain were found in a clandestine grave under the stairs of the couple's home in Co Cork in October 2023, more than six years after her husband reported her missing. The house was subject to a search in 2017, however nothing was discovered. In a separate case, the remains of Mr Gaine, a farmer from Co Kerry, were discovered in a slurry tank on his farmland in May, two months after he was reported missing by his wife. The farmyard had been previously searched as part of the probe. Speaking about the investigation into the disappearance of Mrs Satchwell, Mr Harris said the 2017 search did 'harvest' a 'huge information', which was useful in the re-examination of the case. Speaking at the Garda College in Templemore, Co Tipperary, Mr Harris said: 'All of those were crucial. So I would say the initial investigation was hamstrung because of the lack of information in comparison to the later re-examination of this matter. 'There's far more information to hand which gave us real grounds then for actual suspicion and then inquiries that we could lead. 'When you look at hindsight, some of these things can seem very obvious, but in the moment, what was known, what was being said in terms of sighting, what was being said in terms of the victim by her husband, and one has to recognise the victimology that was being applied here. 'His suppression of her, the coercive control that obviously she was subject to for many years, her isolation in that particular community, that meant that there was very few other people that we could speak to her… what Tina Satchwell's life was like. 'It was a complex investigation. Yes, the house was searched in 2017, forensic scientists also accompanied that search, it was subject to thorough examination and looked for blood splatter, none was found.' He said the initial investigation will be subject to a review. 'We have the expertise within the organisation, and obviously, then we report to the minister and to the Policing and Community Safety Authority, as is our responsibility. 'But I do think there are definitely lessons that we wish to learn from all of these homicides, where it's missing persons and then converts some time later to a homicide investigation.' He added: 'What I can say is, we've already reviewed all our missing person reports nationally. That was done last year. We found no other suspected homicide cases. 'Then following the Michael Gaine investigation, we're subjecting that to peer review, as I do think there's learning for us around those who would commit crime and then attempt to dispose of the body, and often are successful in disposing of the body.'

Northwich man jailed again after running drugs ring from his prison cell
Northwich man jailed again after running drugs ring from his prison cell

ITV News

time8 hours ago

  • ITV News

Northwich man jailed again after running drugs ring from his prison cell

The moment Samuel Watts was arrested as he left HMP Kirkham after serving a previous sentence A man who saw his prison term as an "inconvenience rather than a punishment" has been jailed once more after he admitted dealing drugs from his cell. Samuel Watts, 34, was serving a three-year prison term at HMP Kirkham, in Preston, after he admitted being concerned in the supply of cocaine and cannabis and possession of a weapon. But by July 2024 police uncovered intelligence suggesting that Watts, of Thornley Green in Northwich, Cheshire, had a mobile phone and was coordinating the sale of illegal drugs in the town from his prison cell. Watts was later searched in his cell where prison officers discovered an iPhone strapped to his waist, which later analysis showed carried a string of messages proving he was involved in the sale of illegal drugs. He was then arrested as he left HMP Kirkham following his release for his previous offences, in November 2024, and has now been sentenced to four years and four months in prison at Burnley Crown Court. Following the sentencing Police Constable Dan Lee, of Cheshire Police's Northwich Proactive CID, said: 'Watts saw his initial prison sentence as an inconvenience rather than a punishment. "After smuggling a mobile phone into the prison, he thought that he could simply continue to run his criminal enterprise from behind bars, directing people lower down the chain to deliver drugs on his behalf. 'However, he clearly underestimated the dedication and determination of the team here at Northwich Proactive CID. "As soon as we became aware of his latest activities we brought them to a swift conclusion and were ready to arrest him as he was released from prison. 'I welcome the latest sentence handed to Watts and hopefully this time he'll use his time behind bars to reflect upon his actions rather than trying to set up another business venture, otherwise we'll be waiting for him again next time he's released.'

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz
High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

NBC News

timea day ago

  • NBC News

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potentially groundbreaking hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, refuted the findings. But Cole stood by the report's significance for research purposes. Apple's reputation is sterling among security professionals, and if a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. IVerify CEO Rocky Cole responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. The Biden administration's Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns ' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Waltz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store