Partygoers cower in horror 1am shooting
In footage captured by a Ring doorbell camera, partygoers are seen squirming around on the floor of a tiled porch, ducking and weaving to avoid the gunfire a mere arms length above them.
Others are seen running for their lives down the street, ducking behind cars for safety.
A man, dressed in all black and wearing a backpack, is seen moving up the stairs of the neighbouring porch and ducks, before peeking back out to the road to shoot.
Two men leap from the huddle of people hiding to join in, firing in the same direction.
Three men – aged 19, 23 and 24 – died at the 1500 block of South Etting Street in Grays Ferry just after 1am on Monday morning.
It is not known what triggered the shooting, with a neighbour telling the Philadelphia Inquirer the gathering quickly grew in numbers and got out of hand.
'This is coward stuff,' Philadelphia Police Commissioner Kevin Bethel told reporters.
'Just individuals just shooting randomly into houses, into cars, children out here.
'This is coward, wannabe thug stuff.'
Police had already responded to the same block late Saturday into early Sunday and some arrests were made, the commissioner said.
Commissioner Bethel said evidence indicated nearly 140 shots were fired.
'Reports of around 40 individuals may be out here, but those numbers can surge particularly when you're on a block of this size,' he said.
'People go in, they go out, they see the police officers, they back in, clearly there was something on the block.'
Another 13 people were reportedly injured, including a 19-year-old who was hit twice in the head and remains in a critical condition at the University of Pennsylvania hospital.
A 15-year-old girl and two 17-year-old boys were also injured.
One person with a weapon has been taken into custody, police confirmed.
It is unknown at this stage if they were involved.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


SBS Australia
16 hours ago
- SBS Australia
US scraps shoe removal requirement at airport screenings, 20 years on
Passengers at United States airports will no longer have to remove their shoes to pass through security, 20 years after the requirement was introduced. Homeland security secretary Kristi Noem announced the change to Transportation Security Administration (TSA) rules at a news conference at Washington's Ronald Reagan National Airport. Passengers at US airports have been required to take off shoes during screenings since 2006, five years after the arrest of "Shoe Bomber" Richard Reid, who had explosives hidden in his footwear onboard. Reid, a member of Al-Qaeda, was overpowered by other passengers as he tried to light a fuse on his shoes on an American Airlines flight from Paris to Miami in December 2001. Reid pleaded guilty to terrorism and other charges and is serving a life sentence at a maximum security prison in Colorado. 'Security technology has changed dramatically' "In those 20 years since that policy was put in place, our security technology has changed dramatically. It's evolved. TSA has changed. We have a multi-layered, whole-of-government approach now to security," Noem said. "We are very confident that we can continue to provide hospitality to folks and for American travellers and for those visiting our country, while maintaining the same standard of security for passengers and for our homeland," she added. Homeland security secretary Kristi Noem said security technology had "evolved" over the past two decades. Source: AAP / AP / Mark Schiefelbein The TSA said in a statement on the shoe policy change that other security measures will remain in place. "Other aspects of TSA's layered security approach will still apply during the TSA checkpoint process. For example, passengers subject must still clear identity verification, Secure Flight vetting, and other processes," it said. Past attacks — both successful and thwarted — have led to a raft of new airport security measures in recent decades, especially following the September 11 attacks in 2011, in which hijackers flew passenger jets into the Twin Towers in New York as well as the Pentagon. In 2006, British authorities announced they had foiled a terror plot that aimed to blow up several planes in mid-air simultaneously with liquid explosives. Since then, tough restrictions have applied to liquids and gels, such as toothpaste. And electronics have also come in for additional screening in a bid to head off attacks, with passengers required to remove laptops from bags, for instance.

News.com.au
17 hours ago
- News.com.au
Foreign Minister Penny Wong declines to confirm whether she was targeted by Marco Rubio impersonator
Foreign Minister Penny Wong has declined to confirm or deny whether she was one of the three foreign ministers targeted by an impostor who used artificial intelligence to impersonate US Secretary of State Marco Rubio. First reported by The Washington Post, the scammer sent fake texts and voice messages to at least five targets that included three foreign ministers, a US governor and a member of congress. Some messages were sent via texts, while others used the encrypted messaging app Signal. The scam was identified in a State Department cable dated July 3 that warned the impostor 'likely aimed to manipulate targeted individuals using AI-generated text and voice messages, with the goal of gaining access to information or accounts'. It also warned that the 'actor demonstrated extensive knowledge of the department's naming conventions and internal documentation'. Written messages used branding resembling material used by the Department of State's Bureau of Diplomatic Technology as well as a fake @ email address. A spokeswoman for Senator Wong, who is travelling to Malaysia for the ASEAN Summit, declined to comment on whether the minister was impacted and said the office would not comment during ongoing investigations. The US State Department has confirmed it is investigating the matter. 'The department takes seriously its responsibility to safeguard its information and continuously takes steps to improve the department's cybersecurity posture to prevent future incidents,' a senior department official said. The scandal comes just months after then-national security adviser Mike Waltz added high-profile The Atlantic journalist Jeffrey Goldberg into a group chat also on Signal that discussed plans to launch strikes on Houthi rebels in Yemen. Members of the group also included Mr Rubio as well as US Vice President JD Vance and Defence Secretary Peter Hegseth. As a result of the scandal, Mr Waltz was ousted as the national security adviser and replaced by Mr Rubio.

News.com.au
21 hours ago
- News.com.au
Rubio imposter used AI to message high-level officials, reports say
An imposter posing as US Secretary of State Marco Rubio sent AI-generated voice and text messages to high-level officials and foreign ministers, reports said Tuesday, the latest American official to be targeted by impersonators. A cable from the top US diplomat's office said the unidentified culprit was likely seeking to manipulate powerful officials "with the goal of gaining access to information or accounts," the Washington Post and other US media reported. The imposter contacted at least three foreign ministers, a US state governor, and a member of Congress using both text messaging and the encrypted messaging app Signal, according to the cable dated July 3. Starting in mid-June, the imposter created a Signal account using the display name " to contact the unsuspecting officials, it added. "The actor left voicemails on Signal for at least two targeted individuals and in one instance, sent a text message inviting the individual to communicate on Signal," said the cable. The contents of the messages were unclear. Responding to an AFP request for comment, the State Department said it was aware of the incident and was "currently investigating the matter." "The Department takes seriously its responsibility to safeguard its information and continuously takes steps to improve the department's cybersecurity posture to prevent future incidents," said a senior State Department official. The impersonation of Rubio was one of "two distinct campaigns" being probed in which threat actors impersonate State Department personnel via email and messaging apps, the cable said. The second campaign began in April and involves a "Russia-linked cyber actor" who conducted a phishing campaign targeting personal Gmail accounts associated with think tank scholars, Eastern Europe-based activists and dissidents, journalists, and former officials, it said. The cyber actor posed as a "fictitious" State Department official and sought to tap into the contents of the users' Gmail accounts, added the cable. - 'Malicious actors' - The hoaxes follow an FBI warning that since April cyber actors have impersonated senior US officials to target their contacts, including current and former federal or state government officials. "The malicious actors have sent text messages and AI-generated voice messages -- techniques known as smishing and vishing, respectively -- that claim to come from a senior US official in an effort to establish rapport before gaining access to personal accounts," the FBI said in May. In May, President Donald Trump said an impersonator breached the phone of White House Chief of Staff Susie Wiles. US senators, governors and business executives received text messages and phone calls from someone claiming to be Wiles, the Wall Street Journal reported. The breach prompted a White House and FBI investigation, but Trump played down the threat, saying Wiles "can handle it." Senior Trump administration officials have courted criticism for using Signal and other unofficial channels for government work. In March, then-national security advisor Mike Waltz inadvertently added a journalist to a Signal chat group discussing US strikes in Yemen. The episode led to Waltz's ouster. With proliferating AI voice cloning tools -- which are cheap, easy to use and hard to trace -– disinformation researchers fret the impact of audio deepfakes to impersonate or smear celebrities and politicians. Last year, a robocall impersonating then-president Joe Biden stoked public alarm about such deepfakes. The robocall urged New Hampshire residents not to cast ballots in a Democratic primary, prompting authorities to launch a probe into possible voter suppression and triggering demands from campaigners for stricter guardrails around generative AI tools.