
Paul Doyle, 53, charged with multiple counts over Liverpool parade crash
To view this video please enable JavaScript, and consider upgrading to a web browser that supports HTML5 video
A man has been charged after a car drove into a crowd of jubilant football fans in Liverpool.
Paul Doyle, 53, has been charged with dangerous driving, grievous bodily harm with intent and wounding with intent.
He is accused of ploughing through dozens of people in Water Street who were celebrating Liverpool's Premier League win on Monday evening.
Doyle is due to appear in Liverpool Magistrates Court tomorrow.
At least 79 people were injured in the crash, with police stating the youngest person injured was nine-years-old.
Seven people remain in hospital this afternoon and they are in a stable condition. Everyone who was injured in the crash is understood to be British.
In a press conference earlier this week, the police said the car, which struck the Liverpool fans, followed an ambulance crew which had been let into Water Street to help treat someone who had a heart attack.
They added road closures were in places on Dale Street – which leads into Water Street – between North John Street and Exchange Street.
Several fundraisers have been set up for those who were injured in the attack.
Bar Coopers Townhouse, which is in the heart of Liverpool, raised £200 in just 10 minutes for Alder Hey children's hospital.
After learning the youngest victim was just nine-years-old, staff and customers began an impromptu auction to raise funds.
Steve Keegan, who helps run the family owned pub, told Metro: 'We were all just sat round talking about how sad it was for the young kids for such a special day to end like it did.
'When customers started offering to buy random stuff from us so we can donate the money. More Trending
'Someone gave us £50 for an old hat! We know it's not much but it's what we can do.'
A fundraising campaign set up for those affected has raised more than £30,000, including a £10,000 donation from the Jamie Carragher 23 Foundation, the former Liverpool player's charity.
The Liverpool Spirit Appeal was set up by the Community Foundation for Merseyside, in partnership with Liverpool City Council, and Liverpool Charity and Voluntary Services (LCVS), and money raised will be distributed to those experiencing physical or psychological injuries as a result of the incident, as well as to community organisations.
Got a story? Get in touch with our news team by emailing us at webnews@metro.co.uk. Or you can submit your videos and pictures here.
For more stories like this, check our news page.
Follow Metro.co.uk on Twitter and Facebook for the latest news updates. You can now also get Metro.co.uk articles sent straight to your device. Sign up for our daily push alerts here.
MORE: Woman who spiked another woman's drink with poppers as a 'joke' avoids jail
MORE: Hillsborough survivor said Liverpool parade crash 'reminded him' of disaster
MORE: Girl sold to 'healer' by her mum for £800 for her 'light eyes and skin'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


BBC News
19 minutes ago
- BBC News
Rochdale: Illegal products found under loo in closed-down shop
A shop has been ordered to close temporarily after illegal vapes and counterfeit tobacco were found on the premises, with some products hidden under a volumes of illegal and potentially dangerous goods were discovered at the Drake Street Food Store, also known as Polski Sklep, in Rochdale, during undercover visits, the local authority shop was also found to have sold foods not labelled in English and toys that did not meet safety standards, it added.A Rochdale Council spokesperson said that since June 2024, they had seized more than 33,000 fake cigarettes and 26kg of hand-rolled tobacco during a series of undercover visits there. The authority's deputy leader and portfolio holder for climate change and environment, Tricia Ayrton, said: "Our efforts to take these illegal products off our streets really uncover the extent these criminals will go to, to supply fake cigarettes and other items to their customers – not least concealing them in a hole under a toilet of all places."She said the people running the business "clearly" believed "they were above the law which is why we have been left with no alternative but to shut them down".Insp Meena Yasin, from Greater Manchester Police, said: "This closure order represents our work with trading standards to use enforcement legislation on business premises." A closure order was granted at Manchester and Salford Magistrates' Court on Wednesday after the council argued the illegal activity was likely to continue unless the business was will remain shut for a total of three months, which is the maximum period of time enforceable under the terms of the closure in fake packaging were found to have been sold well below standard prices at £4 and £5, with illegal tobacco products also found concealed inside the store, in a commercial bin at the rear of the property and in nearby parked warnings were given to the director of the business, the property's landlords and shop staff, but they had continued to sell illegal goods from the premises at 138a Drake Street, the council who is aware of illicit tobacco or any other illegal items on sale at a local business is asked to contact Rochdale Council's trading standards team. Listen to the best of BBC Radio Manchester on Sounds and follow BBC Manchester on Facebook, X, and Instagram. You can also send story ideas via Whatsapp to 0808 100 2230.


Scottish Sun
40 minutes ago
- Scottish Sun
Reality star Kristina Belaya, 24, dies after ‘banging her head after slipping while getting out of the bath'
Her injuries were consistent with a fall and there was no sign of a struggle BATHROOM HORROR Reality star Kristina Belaya, 24, dies after 'banging her head after slipping while getting out of the bath' Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) A REALITY star has sadly died after she slipped and fell in her bathtub, leading to a fatal head injury. Kristina Belaya, 24, was at home when she died in the town of Kartaly, Russia on May 30. 1 Kristina Belaya, 24, died in an accident in Kartaly, Russia Credit: Newsflash She was found with signs of a head injury and bruising on her body. According to investigators, she seemed to have slipped and fallen in her apartment's bathroom. Her injuries were consistent with a fall and there was no sign of a struggle, officials have said. More to follow... For the latest news on this story, keep checking back at The U.S. Sun, your go-to destination for the best celebrity news, sports news, real-life stories, jaw-dropping pictures, and must-see videos. Like us on Facebook at TheSunUS and follow us on X at @TheUSSun


Daily Mail
an hour ago
- Daily Mail
Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer
Hackers who crippled Marks & Spencer during a devastating cyber-attack sent the retailer's boss an abusive email gloating about what they had done. Shameless digital fraudsters from the DragonForce hacking group reportedly sent the message to M&S chief executive, Stuart Machin using an employee email account. The email, sent in broken English on April 23, appears to confirm for the first time that M&S was hacked by the notorious ransomware group - something the retailer has so far refused to acknowledge. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, the BBC reported. 'The dragon wants to speak to you so please head over to [our darknet website].' A darknet link shared in the email connected to a portal for DragonForce victims to negotiate a ransom fee. The crime syndicate added: 'Let's get the party started. Message us, we will make this fast and easy for us.' The cyber hack over the Easter break has been hugely damaging for British high street staple, M&S, costing an estimated £300million. Six months on from the digital blitz, and the retailer is still unable to take online orders. The hack has cause mayhem for Marks & Spencer meaning it was unable to process online orders. The retailer later warned some customers' personal details had been stolen According to the BBC, the extortion email was sent to Mr Machin and seven other top executives. The blackmail message reportedly included a racist term. It was reportedly ended with an image of a fire-breathing dragon. As well as boasting about installing ransomware to cripple M&S's IT systems, the hackers said they had also stolen the private data of millions of customers. M&S informed customers three weeks later that contact details and dates of births from some shoppers had been snatched by a suspected cyber cartel. And the retailer also admitted other personal details had also been pilfered by digital crooks, including customers' order histories. However, bosses at the chain have insisted no data relating to shoppers' payment or card details, or account passwords, had been taken. It's unclear exactly how many shoppers have been affected by the major data breach. However, the group had 9.4 million active online customers in the year to March 30, according to its last full-year results. DragonForce's bragging email was apparently sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to M&S for over a decade. What is DragonForce? DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's thought the group operates globally, with hackers operating out of China. Researchers also believe the group also has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. The Indian IT worker had an M&S email address, but is a paid TCS employee and based in London. It is believed that he was among the victims hacked during the devastating digital blitzkrieg that has ravaged M&S online systems. The IT company has previously said it is investigating whether it was a gateway for the cyberattack. It has since told the BBC the email was not sent from its system and has nothing to do with the breach. M&S has declined to comment on the latest revelations in the hacking crisis. As well as claiming responsibility for the M&S hack, DragonForce also says it is behind the ongoing cyber-attack against the Co-op. The two hacks took place in April and have wrought chaos for both retailers. Empty shelves in some stores were reported by customers of both businesses, while M&S fears disruption to its services will continue into next month. However, experts believe it could take 'months' for M&S to fully recover from the hack, which wiped a staggering £1billion off the retailer's market value in the weeks after the mayhem. Matt Hull, head of threat intelligence at global cyber security company NCC Group, said the M&S meltdown could potentially have massive ramifications for shoppers. Warning of the impact, Mr Hull told MailOnline: 'The data breach at M&S is a stark reminder that no organisation is completely immune from cyber threats, and that all forms of customer data requires stringent protection.' He added cyber crooks could seek to use the data they have allegedly obtained to launch a fresh wave of attack on countless unsuspecting victims. 'Despite the absence of financial data or passwords, threat actors could potentially use the stolen information to launch targeted social engineering attacks,' he warned. It is unclear who the actual hackers involved in the DragonForce's alleged cyber assault actually are. The incident is being probed digital experts from Britain's own 'FBI', the National Crime Agency. DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's believed the group operates worldwide, with connections to countries across Asia, with some operating in China. Researchers believe the group has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. Members are known to include teenagers and young adults from the UK and US. A spokeswoman for M&S told MailOnline: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'