logo
Austria stabbing that killed teenager was Islamist attack, minister says

Austria stabbing that killed teenager was Islamist attack, minister says

The Guardian16-02-2025

A stabbing that left a teenager dead and five others injured in southern Austria was an 'Islamist attack', Austria's interior minister has said.
'It is an Islamist attack with IS connections,' Gerhard Karner told reporters on Sunday in the southern city of Villach, where Saturday's attack took place, referring to the Islamic State group.
He said the suspect, a 23-year-old Syrian asylum seeker, was radicalised online 'in a short space of time'.
In the city centre attack a man targeted passersby with a folding knife, police said. The man was arrested just after the attack, which was stopped when a fellow Syrian, a food delivery driver, rammed a car into the suspected assailant.
A 14-year-old boy died and five other males were hurt, including two seriously. Among the wounded are two 15-year-old teenagers, police said.
The suspect is an asylum seeker with a valid residence permit and no criminal record, according to police.
At the site of the crime on Sunday, people placed candles in front of shops in the street where the attack took place in the centre of Villach, a city in Carinthia province.
'I am afraid for my children. I am afraid for those around me. I fear for the future. I fear where this will lead. I am endlessly sad,' said Tanja Planinschek, a local person. 'Not only I, but all of us have been afraid for a long time that something bigger will happen,' she said, adding the country 'should open our eyes and see whom we let in, whom we help, whom we leave with all kinds of freedoms. If nothing is done, it will get even worse.'
The food delivery driver who rammed his car into the attacker was slightly hurt, police said. 'I saw a person lying on the ground, a man was attacking other passersby – I didn't think twice and drove at him,' the Krone tabloid quoted the driver, Alaaeddin Alhalabi, 42, as saying.
'He wanted to go towards the city centre, there were children on the street – I couldn't let that happen,' he said, adding he regretted he could not save the 14-year-old.
The Carinthia governor, Peter Kaiser of the Social Democrats, called for the 'harshest consequences' for this 'unbelievable atrocity'.
The far-right leader Herbert Kickl, whose party topped September's national elections for the first time, said he was 'appalled' by the attack and called for 'a rigorous clamp-down on asylum'.
Kickl's Freedom party this week failed in talks to form a government with the runner-up and incumbent conservatives because of disagreements including over who would hold sensitive cabinet posts dealing with security.
Austria has a large Syrian refugee population of almost 100,000 people. After Bashar al-Assad's was ousted from Syria in December, Austria and several European countries froze pending asylum requests from Syrians to reassess the situation.
Austria has also stopped family reunifications and sent at least 2,400 letters to revoke refugee status. The interior ministry has said it is preparing 'an orderly repatriation and deportation programme to Syria'.
Austria has so far only experienced one jihadist attack, in 2020, when a convicted IS sympathiser went on a shooting rampage in downtown Vienna, killing four.
On Thursday, a man rammed a car into people in the city of Munich in neighbouring Germany, killing a two-year-old girl and her mother and wounding 37 other people.
A 24-year-old Afghan asylum seeker was arrested on suspicion of deliberately driving the car into a trade union march. German police said he may have had Islamist extremist motives.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Britain's gift to Putin
Britain's gift to Putin

New Statesman​

time13 hours ago

  • New Statesman​

Britain's gift to Putin

Photo byOn Wednesday, Volodymyr Zelensky announced that Russia has now used more than 27,000 aerial bombs, more than 11,000 armed drones and thousands more guided munitions to attack Ukraine. Among the victims of this week's attacks were an emergency worker, his wife and their one-year-old grandson, the 632nd child killed in Ukraine since Russia's invasion. And yet British businesses continue to enable the Russian state to secure its main source of income: revenue from oil and gas. New research shared exclusively with the New Statesman has found that since Russia's invasion of Ukraine, more than £200bn in Russian fossil fuel exports have been shipped using UK-based maritime services. A single UK-based firm has carried almost a quarter of Russia's exports of liquefied natural gas (LNG) since the war began. While our government seeks to increase its defence budget, Britain's active role in the Russian fossil fuel trade helps to maintain the military spending of a nuclear power currently at war with a close European ally. The study, which has been conducted by the Centre for Research on Energy and Clean Air (CREA), finds that the value of Russian crude oil, oil products and LNG shipped under British ownership or insurance since the war began has now reached £205.8bn. Three quarters of Russian LNG carriers were covered by UK insurance. Britain officially stopped importing Russian oil and oil products nine months after the invasion (it became illegal to do so on 5 December 2022). But a sanctions loophole means Britain keeps buying Putin's products: Russian crude is shipped to refineries in Turkey and India and then returns as oil products. CREA estimates that the UK has indirectly bought £1.4bn in Russian oil through this loophole, providing more than half a billion pounds' worth of revenue to the Kremlin. Much of the jet fuel taking British holidaymakers to sunnier climes this summer will have entered the supply chain in the oilfields of Siberia. Europe continues to buy Russian LNG directly, and in 2024 imported more LNG from Russia than ever before. Much of this is shipped, entirely legally, by a single British company: Seapeak, which is headquartered in Glasgow and which owns seven specialist LNG carriers, which can power through ice two metres thick. This is not subject to a ban and there is no suggestion that Seapeak has broken any laws. Seapeak was mentioned in an Early Day Motion on Russian LNG, which was signed by 34 cross-party MPs in January. CREA says that Seapeak alone has carried Russian LNG worth £13bn since the war began. Elsewhere, Russian fossil fuels are also shipped by a 'dark fleet' of uninsured vessels, whose ownership is obscured. As previously reported, these ships pass in sight of our shores on an almost daily basis as they sail through the English Channel. Since Labour came to power, the UK government has taken a more determined stance towards sanctioning these ships and those who enable their sale, including an accountant who allegedly arranged for the sale of vessels. A government spokesperson told the New Statesman: 'We are working with G7 and EU partners to eliminate remaining dependencies on Russian energy as soon as possible. We will not hesitate to take further action to increase economic pressure on Putin.' Why can't we stop paying Putin immediately? In a word: inflation. If Western countries entirely quit the Russian oil and gas habit, the wholesale price of energy would spike in a similar manner to 2022, bringing the price of almost everything else with it. The last inflationary surge cost the UK government £67bn in a single year in additional spending in support for consumers and businesses, and the population still endured a historic rise in the cost of living accompanied by strikes across the public sector. No government is going to impose that upon its voters, and even if it did, it wouldn't last long. Subscribe to The New Statesman today from only £8.99 per month Subscribe This doesn't mean there is nothing the UK can do. Energy analysts say it is a question of supply: when the oil and gas market has enough capacity to make a sudden drop in Russian fossil fuels less important, sanctions can be imposed and enforced. The pragmatic answer is probably then to secure LNG and crude from other countries. The most realistic answer to this problem therefore comes from productive diplomacy with the US for LNG, and Saudi Arabia and others for oil. In the long term, of course, it means not relying on fossil fuels, because we don't have enough to power our country. Amid all the talk of how much we're going to spend on our military, it's important we also try to avoid paying for our enemy's. [See also: Revealed: how the City of London keeps Putin's oil flowing] Related

Cristiano Ronaldo bodyguard lifts lid on working for him - 'He was threatened'
Cristiano Ronaldo bodyguard lifts lid on working for him - 'He was threatened'

Daily Mirror

time16 hours ago

  • Daily Mirror

Cristiano Ronaldo bodyguard lifts lid on working for him - 'He was threatened'

Cristiano Ronaldo's footballing exploits have raised him to insurmountable fame, and with such notoriety comes an added security risk, as detailed by a former bodyguard Cristiano Ronaldo's former bodyguard has admitted that people and fans would 'threaten' the Portuguese superstar, though his life was never at risk. Having emerged at Manchester United under Sir Alex Ferguson, Ronaldo rose to become one of European football's finest and won his first of five Ballons d'Or in 2008 as a Red Devil. A four-time Champions League-winning spell with Real Madrid followed, before a stint with Juventus, a short-lived return to Old Trafford and an unceremonious exit to the Saudi Pro League with Al Nassr. Throughout his illustrious career for club and country, in which he has mustered over 900 goals and won countless accolades, the superstar's fame has transcended football. ‌ Ronaldo is one of the most recognisable sports stars, if not celebrities, in the world, but such popularity brings with it its fair share of risk. On Wednesday, for example, a fan evaded security before Portugal's match against Germany and invaded the pitch, getting his hands around the 40-year-old before being escorted away by security. ‌ The Al Nassr forward has, therefore, often sought the help of a bodyguard, and Hichman, who served him for four years, has given insight into the sort of threats he would aim to deal with and how much he'd be paid. "Our work depends on the client's profile. In the case of Cristiano, with whom I worked for four years, his profile wasn't high-risk because people didn't want to kill him, and he didn't receive death threats," Hichman told Telecinco. "He was threatened by fans or people who wanted to rob him." The 36-year-old Hichman went on to detail the strategies he would employ to keep Ronaldo, his partner Georgina Rodriguez and their children safe. "We always have to know where we're going, who will be there, and have clear entry and exit points, as well as contact points," he continued. "We must always be aware that our lives could be at risk. We have to be willing to protect a person, and sometimes we have to give our lives to protect them. "If I have to use weapons, I will use them. The most important thing is having the ability to think quickly, solve problems, and remain calm in difficult situations." ‌ Hichman looks back fondly on his time serving the marksman, claiming that he would earn around £850 per day providing security for Ronaldo, with whom he has a positive relationship despite not working for him anymore. "He is the best boss I've ever had," stated Hichman. "We have a good relationship. Working with him wasn't like working with someone threatened with death or kidnap. We had some silly incidents with paparazzi or crazy fans, but nothing major." Aside from making life difficult for photographers and trying to keep Ronaldo's family out of the public eye as much as possible, Hichman revealed that he never dealt with serious threats to the 40-year-old. ‌ There have been many instances of fans running onto the pitch, as occurred during Portugal's Nations League clash this week, to try and get a close-up glimpse of Ronaldo or attempt to take a selfie with him. Yet, in April, Marca reported that Ronaldo had ramped up security efforts after threats were made against his family on social media, allegedly from a group located in Saudi Arabia, where he currently resides.

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz
High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

NBC News

timea day ago

  • NBC News

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potentially groundbreaking hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, refuted the findings. But Cole stood by the report's significance for research purposes. Apple's reputation is sterling among security professionals, and if a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. IVerify CEO Rocky Cole responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. The Biden administration's Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns ' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Waltz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store