logo
SpaceX rocket explodes into giant fireball, but no injuries reported

SpaceX rocket explodes into giant fireball, but no injuries reported

Euronews12 hours ago

A SpaceX rocket being tested in Texas exploded Wednesday night, sending a dramatic fireball high into the sky.
The company said the Starship 'experienced a major anomaly' at about 11 pm local time while on the test stand preparing for the tenth flight test at Starbase, SpaceX's launch site at the southern tip of Texas.
'A safety clear area around the site was maintained throughout the operation and all personnel are safe and accounted for,' SpaceX said in a statement on the social platform X.
Elon Musk's company SpaceX said there were no hazards to nearby communities. It asked people not to try to approach the site.
The company said it is working with local officials to respond to the explosion.
Israel stunned and hobbled Iran last week when it pulled off an intelligence and military operation years in the making that struck high-level targets with precision.
Guided by spies and artificial intelligence (AI), the Israeli military unleashed a nighttime fusillade of warplanes and armed drones that it smuggled into Iran to quickly incapacitate many of its air defences and missile systems.
With greater freedom to fly over Iran, Israel bombarded key nuclear sites and killed top generals and scientists. By the time Iran mustered a response hours later, its ability to retaliate — already weakened by past Israeli strikes — was greatly diminished.
This account is based on conversations with 10 current and former Israeli intelligence and military officials, some of whom spoke on condition of anonymity to discuss clandestine operations.
It was not possible to independently verify some of their claims. But the former head of research at Israel's spy agency, the Mossad, confirmed the basic contours of the attack, saying she had inside knowledge of how it was planned and executed.
'This attack is the culmination of years of work by the Mossad to target Iran's nuclear programme,' said Sima Shine, the former Mossad research director who is now an analyst at the Institute for National Security Studies.
Israel's element of surprise was enhanced by Iranian officials' apparent assumption that Israel wouldn't attack while talks over its rapidly advancing nuclear programme were ongoing with the United States.
A sixth round of talks had been planned for last Sunday in Oman, but Israeli Prime Minister Benjamin Netanyahu activated 'Operation Rising Lion' on Friday – after his country first notified US President Donald Trump.
Netanyahu has for years said neutralising Iran's nuclear programme was vital for Israel's security, and Israel had previously taken steps to set back Iran's ability to enrich uranium to weapons grade.
But Netanyahu said a more aggressive attack proved necessary, as Iran kept advancing its enrichment programme despite US diplomatic efforts and warnings from UN watchdogs.
Iranian Supreme Leader Ayatollah Ali Khamenei has repeatedly called for Israel's destruction. Iran's political leaders say their nuclear programme is for peaceful purposes, though it was the only country without the bomb to enrich uranium close to weapons-grade levels.
The Mossad and the military worked together for at least three years to lay the operational groundwork, according to a former intelligence officer who said he had knowledge of the attack. This person spoke on condition of anonymity, given the sensitivity of the subject.
The attack built on knowledge Israel gained during a wave of airstrikes last October, which 'highlighted the weakness of Iranian air defences,' said Naysan Rafati, an Iran analyst at the International Crisis Group.
To further diminish Iranian air defences and missile systems at the start of last week's attack, Mossad agents had smuggled precision weapons into Iran that were prepositioned to strike from close range, according to two current security officials who spoke on condition of anonymity to discuss the missions.
Those weapons included small, armed drones, which agents snuck into the country in vehicles, according to the former intelligence officer.
Mossad agents stationed weapons close to Iranian surface-to-air missile sites, Shine said. The agency works with a mix of people, both locals and Israelis, she said.
To analyse information it gathered, Israel used the latest AI, said an intelligence officer involved with selecting individuals and sites to target. He said AI was used to help Israelis quickly sift through troves of data they had obtained.
That effort began last October, according to the officer, who spoke on condition of anonymity because he was not authorised to talk to the media. It was one month before Netanyahu said he had ordered the attack plans.
An investigation by The Associated Press earlier this year uncovered that the Israeli military uses US-made AI models in war to sift through intelligence and intercept communications to learn the movements of its enemies. It's been used in the Israel-Hamas war in Gaza and conflict with Hezbollah in Lebanon.
The intelligence officer involved in identifying potential targets said that options were first grouped into various categories, including leadership, military, civilian and infrastructure. Targets were chosen if they were determined to be a threat to Israel, such as being deeply associated with Iran's Revolutionary Guard — a paramilitary force that controls Iran's ballistic missiles.
The officer was tasked with putting together a list of Iranian generals, including details on where they worked and spent their free time.
Among the high-level military officials killed since Friday's attack were General Hossein Salami, the head of Iran's Revolutionary Guard, and General Mohammed Bagheri, the chief of staff of Iran's armed forces.
In addition to AI, the Mossad relied on spies to identify top nuclear scientists and members of Iran's Revolutionary Guard, according to one security official. At least eight members of the Guard, including the head of its missile programme, were killed in a single Israeli strike on an underground bunker.
Another facet of the attack was to strike Iranian vehicles used to transport and launch missiles.
Shine said the strategy was similar to a Ukrainian operation earlier this month in Russia. In that operation, nearly a third of Moscow's strategic bomber fleet was destroyed or damaged with cheaply made drones sneaked into Russian territory, according to Ukrainian officials.
In an interview with Iranian state-run television, the country's police chief, General Ahmadreza Radan, said 'several vehicles carrying mini-drones and some tactical drones have been discovered.'
He added: 'a number of traitors are trying to engage the country's air defence by flying some mini-drones.'
The Mossad is believed to have carried out numerous covert attacks on the Iranian nuclear programme over the years, including cyberattacks and the killing of Iranian nuclear scientists. But it rarely acknowledges such operations.
In the 2000s, Iranian centrifuges used for enriching uranium were destroyed by the so-called Stuxnet computer virus, believed to be an Israeli and American creation.
In 2018, Israel stole an archive of Iranian nuclear research that included tens of thousands of pages of records, said Yossi Kuperwasser, a retired general and former military intelligence researcher who now directs the Jerusalem Institute for Strategy and Security.
In July 2024, Israel killed a senior leader of Hamas, Ismail Haniyeh, with a bomb in a bedroom of a government guesthouse in Tehran.
Israel's blistering attack last week on the heart of Iran's nuclear and military structure didn't come out of nowhere, said retired Israeli Brigadier General Amir Avivi, who heads the Israel Defence and Security Forum think tank.
It was the result of 'Israeli intelligence working extensively for years in Iran and establishing a very strong robust presence,' he said.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

French state leads capital increase for satellite operator Eutelsat
French state leads capital increase for satellite operator Eutelsat

France 24

time2 hours ago

  • France 24

French state leads capital increase for satellite operator Eutelsat

Paris's holdings will increase to just under 30 percent from 13 percent, Eutelsat said, in an overall deal set to be completed by the end of this year that will see 1.35 billion euros ($1.5 billion) injected into the company. The announcement comes as competition heats up in the satellite communications sector, where Elon Musk's Starlink is a dominant player but some governments are keen on sovereign solutions. "The race is on. That's why we have to take a position now and invest now. Otherwise, the whole market will be occupied and France and Europe will depend on other powers in future,' President Emmanuel Macron's office told AFP. Boasting more than 600 satellites since merging with British firm OneWeb in 2023, Eutelsat is the world's second-largest operator of low Earth orbit (LEO) satellites, behind Starlink, making it the obvious candidate as a European champion. The company has been pushing for new government contracts, signing a 10-year, billion-euro deal at this week's Paris Air Show to provide military communications for the French armed forces. Presenting its most recent quarterly results last month, Eutelsat said it was in active sales talks with governments both inside and outside Europe. The capital increase should allow Eutelsat to push ahead with renewing its satellite fleet, the company said. Major shareholders stumping up alongside Paris were shipping giant CMA CGM, Indian telecoms operator Bharti Airtel and the FSP investment fund, owned by seven French insurance companies. The two-stage plan includes a "reserved" capital increase open only to the four named investors, with a second round open to others. "Discussions are ongoing" with other investors including the British government, "which could join the capital raise in due course," Eutelsat said. "The capital increase would represent a pivotal step in Eutelsat's strategic and financing roadmap, enabling the execution of its strategic vision," it added, with other financial operations planned including debt refinancing.

Apple and Meta to escape sanctions for failing to meet digital rules
Apple and Meta to escape sanctions for failing to meet digital rules

Euronews

time4 hours ago

  • Euronews

Apple and Meta to escape sanctions for failing to meet digital rules

US tech giants Apple and Meta will not face sanctions immediately for failure to meet obligations under the EU's digital rulebook, an EU spokesperson told Euronews. In April, the Commission fined Apple €500 million and Meta €200 million for non-compliance with the Digital Markets Act (DMA) and gave both companies 60 days to bring their practices in line with EU rules. That grace period ends on 26 June, after which they risk periodic penalty payments. According to the spokesperson, financial penalties will not be applied automatically but only after the Commission conducts a preliminary analysis and shares its findings with the two tech giants as part of an ongoing exchange process. Apple was fined €500 million for preventing developers from directing users to alternative offers or content outside its platform—an action deemed contrary to DMA rules. Meta received a €200 million fine for its "pay or consent" model, which the Commission found problematic. The model forces users to either consent to the use of their personal data for targeted advertising or pay for an ad-free subscription—limiting user choice. In response, Meta introduced a revised version of its personalised advertising model in November 2024, which uses less personal data. The Commission is still evaluating this system while continuing its discussions with the company. Compared to past antitrust enforcement, the fines issued in April were relatively modest. Under former EU Competition Commissioner Margrethe Vestager, tech giants were subject to more substantial penalties. In April, EU officials explained that the lower fines reflected the short duration of the violations since the DMA implementation started in 2023 and the Commission's current focus on achieving compliance rather than punishing breaches. US digital services have been drawn into the trade war that has been escalating between the US and the EU since mid-March. In response to US tariffs, Commission President Ursula von der Leyen has threatened to impose a tax on digital advertising revenues. Meanwhile, a report by the US Trade Representative, published in early April, labelled EU digital regulations as a barrier to US exports. The DMA is designed to prevent dominant digital platforms from abusing their market power. It aims to open up digital ecosystems controlled by Big Tech and ensure users enjoy real freedom of choice online. The foreign ministers of France, Germany, and the United Kingdom - collectively known as the E3 - will meet with Iranian Foreign Minister Abbas Araghchi in Geneva to discuss Iran's nuclear program in Geneva on Friday. While the EU has historically played a key role in negotiations with Iran, it seems unlikely to participate in the formal talks. When asked by Euronews whether EU foreign policy chief Kaja Kallas would participate in the talks, a European Commission spokesperson gave no clear confirmation. 'We have always expressed our openness to dialogue and negotiation. When such dialogue occurs, we will inform you,' the spokesperson said, leaving open the possibility of a last-minute invitation. Before the E3-Iran meeting, the European ministers are expected to meet with Kallas at Germany's permanent mission in Geneva however – a move that highlights the EU's continued efforts to coordinate and facilitate diplomacy, even if indirectly. Brussels has long played a central role in the Iran nuclear negotiations, particularly through the High Representative for Foreign Affairs in the broader EU+3 format – which once included other countries such as the United States, Russia and China. Under the 2015 Joint Comprehensive Plan of Action (JCPOA), the UN-brokered nuclear agreement aimed at lifting sanctions in exchange for Iran's compliance with nuclear obligations, the EU served as a key facilitator and guardian of the agreement's implementation. Under the previous administration of US President Donald Trump, Washington pulled out of the JCPOA. The upcoming talks are expected to revive dialogue in light of the escalating conflict and persuade Iran to provide credible guarantees that its nuclear program remains exclusively civilian in nature. However, the influence of the European parties has waned in recent months. The last E3-Iran meeting was held in January, shortly before Trump assumed office. Subsequent indirect US-Iran talks, brokered by Oman, failed to yield results, with the sixth planned round cancelled after the Israeli military strikes on Iran. Although not directly involved this time, the EU has played a behind-the-scenes role as a diplomatic facilitator, attempting to bridge divides among European countries and even between Europe and the US. The EU's presence in the talks has visibly diminished since the tenure of former High Representative Federica Mogherini, who was a prominent architect and staunch defender of the 2015 deal. Despite its limited visibility, the EU hopes that its coordinating efforts can still shape the outcome of the talks or at least keep the door open for renewed multilateral diplomacy on Iran's nuclear file.

How the Israel-Iran conflict is developing in cyberspace
How the Israel-Iran conflict is developing in cyberspace

Euronews

time6 hours ago

  • Euronews

How the Israel-Iran conflict is developing in cyberspace

As the conflict between Israel and Iran approaches the first-week mark, both countries are leaning into cyberspace to launch attacks. A possible Israeli-linked hacking group has claimed responsibility for disrupting operations at an Iranian bank and flooding the crypto market with approximately $90 million (€77 million) in stolen funds. Meanwhile, Israeli officials reported fake messages sent to the public alerting them of terrorist attacks against bomb shelters to sow panic. Both countries are also known for having a long history of cyberattacks against each other, according to US-based cybersecurity firm Radware. 'In the days since the fighting began, government-backed hackers, patriotic hacktivists, online propagandists, and opportunistic cybercriminals have all been active,' the company said in its threat alert dated June 18. The anti-Iranian hacking group with possible ties to Israel,Gonjeshke Darande, or 'Predatory Sparrow,' claimed an attack on one of Iran's most prominent banks, Bank Sepah, this week, according to a statement they published on X. Iranian media reported at the time that people had difficulties accessing their accounts, withdrawing cash or using their bank cards. The US Department of the Treasury's Office of Foreign Assets Control (OFAC) sanctioned Bank Sepah in 2018 for supporting Iran's military. The hacking group then went after Nobitex, one of Iran's main cryptocurrency exchanges. The group claimed they burned $90 million from accounts that belong to the Israeli regime and, by Thursday morning, had posted the source code for the platform. In a statement on X posted on Wednesday, Nobitex claimed that the assets were transferred to a wallet 'composed of arbitrary characters,' an approach they say 'deviates significantly from conventional crypto exchange hacks'. 'It is clear the intention behind this attack was to harm the peace of mind and assets of our fellow citizens under false pretences,' Nobitex wrote. Nobitex estimates the amount stolen is closer to $100 million (€87 million) The Iranian government has asked people to delete the social messaging app WhatsApp and has begun internet blackouts that have taken the country offline for 'over 12 hours' due to 'Israel's alleged 'misuse' of the network for military purposes,' according to internet monitoring companies Netblocks and Censys. Iran's Tasnim News Agency, a news service associated with the Iranian military, claimed the Internet blackouts are 'temporary' due to the 'special conditions of the country,' and that it will come back when the 'situation returns to normal'. Gonjeshke Darande has been linked to other cyber attacks in Iran, like the 2010 Stuxnet attack. Stuxnet was a computer virus that damaged or destroyed the centrifuges, a key component used to enrich uranium, at Iran's uranium enrichment facilities in Natanz, one of the facilities targeted in the recent missile fire from Israel. US media reports believe Stuxnet was carried out by Israel with support from the United States, who built the program. It's also believed that Israel's Defence Forces Unit 8200 was involved in the attack, according to Reuters. Gonjeshke Darande has also taken credit for other cyber attacks against Iran, such as the 2022 attack on Iran's steel plants and the 2023 attack on gas stations. At the time of the steel plant cyber attacks, Gonjeshke Darande released on social media what they called 'top secret documents and tens of thousands of emails' from Iran's three leading companies to show how the firms were working with the Islamic Revolutionary Guard Corps, a primary branch of Iran's military. Israeli media reported people receiving fraudulent text messages claiming to come from the Israeli Defence Forces (IDF) Home Front Command that warned of attacks onbomb shelters. The messages from OREFAlert were identified as fake by the Israeli authorities, who claim pro-Iranian groups are behind it as a way to sow panic during the operation against the Iranian military, called Operation Rising Lion. Another fake message circulated that said fuel supplies would be suspended for 24 hours, according to the Jerusalem Post. Ron Meyran, the VP of Cyber Threat Intelligence at US-based cybersecurity firm Radware, told the newspaper that there was a 700 per cent increase in cyberattacks against Israel in the first two days of the conflict with Iran, which comes from cyber retaliation from Iranian state actors. Those actions include infiltration attempts targeting critical infrastructure, data theft and malware distribution, Meyran added. Euronews Next reached out to Radware to independently confirm these numbers but did not hear back at the time of publication. A report from Radware says it expects Iran to make use of 'its well-developed network of fake social media personas to shape perceptions of the conflict.' 'During this crisis, observers have seen pro-Iran bot accounts amplifying hashtags about alleged Israeli atrocities and portraying Iran's actions as defensive,' the report said. The bots 'frequently pose as ordinary citizens to make the messaging more persuasive,' it added. Radware also noted in its report that at least 60 of the 100 hacktivist groups that have sprung up since the start of the conflict last week are pro-Iran and are either from the Middle East or Asia. These groups have launched 30 denial of service (DDos) attacks per day against Israel that disrupt normal traffic to a website, Radware found. Some of these groups have also threatened cyber attacks against the United Kingdom and the United States if leadership there decides to 'join the war against Iran'. Iran has a 'considerable number' of state-sponsored threat groups that have targeted Israel in the past, like Muddy Water, APT35 (OilRig), APT35 (Charming Kitten) and APT39 (Remix Kitten), the Radware report continued. These groups, with the help of Iran's Islamic Revolutionary Guard Corps, have targeted Israeli infrastructure, conducted malware campaigns and cyberespionage according to local media. These cyber attacks increased following the start of the conflict between Israel and Hamas in Gaza in 2023, according to a 2024 report by Microsoft. A SpaceX rocket being tested in Texas exploded Wednesday night, sending a dramatic fireball high into the sky. The company said the Starship 'experienced a major anomaly' at about 11 pm local time while on the test stand preparing for the tenth flight test at Starbase, SpaceX's launch site at the southern tip of Texas. 'A safety clear area around the site was maintained throughout the operation and all personnel are safe and accounted for,' SpaceX said in a statement on the social platform X. Elon Musk's company SpaceX said there were no hazards to nearby communities. It asked people not to try to approach the site. The company said it is working with local officials to respond to the explosion.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store