logo
Concerns for Auckland teen Tamiya, missing four days

Concerns for Auckland teen Tamiya, missing four days

RNZ News2 days ago
Tamiya, 15, has been missing since Monday.
Photo:
NZ Police / SUPPLIED
An Auckland teenager has been missing for four days, causing concerns for her safety with both her family and police.
Waitematā Police were appealing for information about the whereabouts of 15-year-old Tamiya who had been missing since Monday.
Police said she was last seen in the Torbay area on Auckland's North Shore about 1pm on 7 July.
Tamiya was described as being of thin build and generally wore baggy jeans and hoodies, with a cap and sneakers.
Police were asking anyone with information that could help find her to get in touch online at 105.police.govt.nz or call 105, they could use the reference number 250709/7653.
Information could also be provided anonymously through Crime Stoppers at 0800 555 111.
Sign up for Ngā Pitopito Kōrero
,
a daily newsletter curated by our editors and delivered straight to your inbox every weekday.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Repeat offender Mark Williams jailed for indecent assault on autistic man
Repeat offender Mark Williams jailed for indecent assault on autistic man

RNZ News

time3 hours ago

  • RNZ News

Repeat offender Mark Williams jailed for indecent assault on autistic man

By Shannon Pitman, Open Justice reporter of Photo: 123RF Warning: This article discusses sexual assault and may be upsetting to some readers. A 65-year-old with back-to-back convictions for sexual offending was released into the community after 33 years, only to indecently assault a young autistic man. Mark Williams, who was sentenced to preventive detention in the 1980s for a violent rape, has now been sent back to prison, with a judge commenting that his chances of rehabilitation are slim. Williams appeared for sentencing in the Whangārei District Court on Thursday on one charge of indecent assault of a male and one charge of burglary. The court heard Williams had a significant history of sexual violence dating back 40 years. In 1980, he was convicted of indecent assault and the following year was sent to prison for offensive behaviour. Then, in 1982, he was jailed for three years and six months for assault with intent to rape. In 1985, he committed another violent rape in Auckland that landed him a lifelong term of preventive detention. After 33 years in custody, Williams was released in 2018 to a supported living facility in Whangārei. Things had reportedly been going well, but in December 2023, Williams covered his face with a white balaclava and entered the home of a young autistic man. He then locked the door behind him. The young man was on his phone with noise-cancelling headphones and did not hear Williams enter, and on seeing him, became frightened. He yelled at him to get out of his room, but instead, Williams demanded oral sex. The victim said no and told him to leave, but Williams responded by touching the young man inappropriately. Before he left, he threatened the victim to "keep quiet, otherwise there will be trouble". When Williams was charged in 2024 for the latest offending, he pleaded not guilty and elected a trial by jury, but one month before the trial was due to start this year, he accepted the charge. Defence lawyer Jenna Johnson Aufa'i told the court her client should get a discount for an early guilty plea, but Crown lawyer Pablo Hamber challenged this. "By the time we're at a month before, we've been prepping the victim to come into court," Hamber submitted. "He's had to go through his court education, and sit there and picture what that would be like to give evidence, so while he may not have had to play the game on Saturday, he's done all of the trainings leading up to it." Judge Gus Andree Wiltens said Williams' significant history needed to be taken into account and the impact on the victim who had been adversely affected. "I have to have regard for the possibility of rehabilitation, which in this situation, appears rather slim," the judge said. Judge Andree Wiltens sentenced Williams to 35 months' imprisonment and he would be required to go back before the Parole Board for release. If it is an emergency and you feel like you or someone else is at risk, call 111. * This story originally appeared in the New Zealand Herald.

Supermarket loyalty card cyberattack prompts password warning
Supermarket loyalty card cyberattack prompts password warning

RNZ News

time14 hours ago

  • RNZ News

Supermarket loyalty card cyberattack prompts password warning

New World says some customer accounts may have been accessed in the cyberattack. Photo: Google Maps A cybersecurity attack has prompted a warning for supermarket customers to change their passwords and some accounts may have been accessed by outsiders. Members of supermarket loyalty and online shopping programme New World Clubcard received an email on Friday night, telling them scammers had attempted to gain access to accounts by trying commonly used passwords. A "recent" cybersecurity incident had affected "a number of New World Clubcard accounts", the email said. "Our technology team has identified suspicious external activity where scammers have attempted to gain access to accounts by trying commonly used passwords across many usernames," the supermarket said. "Based on our investigation, it appears that some New World Clubcard accounts with weaker or reused passwords may have been accessed, without the cardholder's authorisation." Photo: Supplied Most customers were told their account had not been affected, but the supermarket advised them to change their passwords to be safe. In the email, New World said its own systems had not been breached and its technology team was monitoring for "any further malicious activity". The supermarket retailer, which is owned by parent company Foodstuffs, said it was working with cybersecurity experts to ensure customers' data remained secure. "We sincerely apologise for any inconvenience. Your privacy and security are extremely important to us, we have taken these actions to protect you, and strongly recommend you [establish] a refreshed and strong password." Foodstuffs did not respond to RNZ's requests for comment. Sign up for Ngā Pitopito Kōrero, a daily newsletter curated by our editors and delivered straight to your inbox every weekday.

Home build dream shattered after Waikato business hacked and woman launders couple's $150k
Home build dream shattered after Waikato business hacked and woman launders couple's $150k

RNZ News

time19 hours ago

  • RNZ News

Home build dream shattered after Waikato business hacked and woman launders couple's $150k

By Belinda Feek, Open Justice reporter of Sophie Winchester-Krishan outside the Hamilton District Court after being sentenced on three charges of money laundering. Photo: NZME / Open Justice / Belinda Feek A woman's bank account went from a balance of 5c to almost $150,000 overnight - but it was not her money. Instead, it was the money of a couple who were in the process of building their dream home and had fallen prey to hackers. Sophie Mareta Moerangi Winchester-Krishan was the middleman in the scam, where her bank account was used to deposit the funds and she then transferred them to offshore accounts. The 66-year-old, who was charged with three counts of money-laundering as a result, was paid $5000 for her role in the scam. She was recently sentenced in Hamilton District Court, where the couple spoke of their building dream being shattered and how they had been left with "a lifetime of loss and heartache". It wasn't made clear in court exactly how Winchester-Krishan and the scammers first connected. Her defence lawyer argued Winchester-Krishan had been so keen to get back into work that she ignored what might have been red flags. Those red flags included queries by Kiwibank about the suspicious transactions and her account being briefly frozen. Despite this, she assured the bank that the transactions were legitimate. Now, the case has earned caution from Netsafe, which warned it was difficult to recover money in these events and urged people to be sceptical when being told a company's invoice details had changed. The court heard that in August 2021, the email account of a Waikato-based building firm was hacked. The hackers were able to access the company's client database and then created an email with a similar domain name. They then sent the couple an email stating the company was having difficulty with its regular bank and asked them to direct their next payment into a Kiwibank account. The victims later discovered the account belonged to Winchester-Krishan and, before the transfer, it had a balance of 5c. The money was transferred over two days. One payment was $100,000 - the ASB Bank's daily transfer limit - followed by a second transfer of $54,263.01. By the morning of 16 August 2021, the full amount had made its way into Winchester-Krishan's account. She then sent some of the funds to an account in Australia, after receiving payment instructions from an "almost certainly fictitious overseas doctor", the court heard. Kiwibank then contacted her to alert her to a "suspicious transaction" and froze her bank account. Winchester-Krishan later told Kiwibank the transaction was genuine and the money was released. She then transferred almost $30,000 to an account in the US. Kiwibank contacted her about the suspicious account and, again, Winchester-Krishan confirmed it was genuine. Later that same day, she transferred $66,280.77 to a different US bank account. Over two days, Winchester-Krishan transferred just under $150,000 of the couple's money into offshore bank accounts. She kept $5000 as payment. In a statement to the court, the woman said she and her husband bought a piece of land to build their dream home in September 2020. Filled with excitement, they visited the section with their newborn baby in July 2021, after the concrete had been poured. A month later, she received the fake email from the "building company", asking for the $154,263.01 instalment. She duly paid it into what she was told was the company's Kiwibank account. Shortly afterwards, she was informed that the company's computer system had been hacked and their money was gone. "In a matter of seconds, our whole world changed," she told the court. She said their plan to build their dream home had been shattered. Their excitement turned to stress and worry, which was compounded by the fact that she had worked in IT for 17 years. She was left asking herself, "How could I let this happen to us?" The woman said she was so stressed that she was no longer able to produce milk to breastfeed her daughter. "The opportunity to bond [with her] was taken away from me," she said. The woman then developed a chronic illness that she would never fully recover from. She and her husband ended up having to walk away from the building project. "It's hard to believe all this happened for the offender to gain $5000, and it has left us with a lifetime of loss and heartache." Crown solicitor James Lewis characterised Winchester-Krishan's offending as "a sequence of reckless acts carried out by the defendant for financial gain". "The devastating impacts on the victim and their family include life-altering consequences," Lewis said. "The defendant should have heard and seen the alarm bells. "She was being asked to transfer large sums of money to offshore accounts by people she hardly knew. "She was being questioned by the bank about their concerns... but nevertheless, it still happened." He urged the judge not to issue any discount for Winchester-Krishan's previous good character, given her previous dishonesty convictions, and pushed for a jail term or at least home detention. Defence counsel Martin Dillon said his client's remorse was genuine. While she had defended the charge at trial, he said she had only wanted to challenge whether she was reckless in transferring the money overseas. Sophie Winchester-Krishan transferred the couple's money to a number of offshore accounts in August 2021. Photo: NZME / Open Justice / Belinda Feek "She accepts that she was essentially blinded by the opportunity of an online job being given to her," Dillon said. "She did close her mind or eyes to what might have been red flags... she was not motivated by financial gain... but instead of getting back into the workforce and working again, albeit remotely from home." He suggested Winchester-Krishan moved the money within 24 hours, but Judge Arthur Tompkins disagreed. "That's not quite right," the judge said. "The money arrived and then there were about three days' worth of interactions with the bank. "This is not money-laundering where money arrives and it's flicked on immediately. "Winchester-Krishan had to visit the bank in person and then field inquiries from the bank as to the suspicious transaction, which she confirmed was a genuine payment." The judge said the transaction was clearly suspicious, as it was for a "fictitious orphanage in Turkey" with a different "tale" about where the money was going. Dillon also submitted that Winchester-Krishan had co-operated with police in their investigation and was assessed as a low risk of re-offending. He suggested that an end sentence of community detention and supervision was appropriate. Judge Tompkins said, while Winchester-Krishan's offending was not premeditated, she made "minimal" inquiries about where the money had come from, when it landed in her account. "Particularly, when the bank alerted her to suspicious transactions, she took some trouble to satisfy the bank that the transactions she sought to make were not suspicious." After considering all of the submissions, Judge Tompkins found that home detention was the most appropriate sentence and imposed a term of 10 months. Winchester-Krishan has spent some of the $5000 she was paid, but police were about to claw back $1400 of it. However, the full amount the couple lost was not being sought through the court. NZME understood the victims were trying to recover it through other avenues. Netsafe chief online safety officer Sean Lyons said business email compromise (BEC) scams were "a quiet kind of attack". "That's part of what makes it effective. "The email might come from a familiar name. The invoice might match work that's genuinely been done - it lands in the inbox at just the right time. "All of that lowers the chances anyone will pause and question it." However, BEC scams can hit from both sides, he said. A business might unknowingly send a doctored invoice from a compromised account or a customer might receive what looks like a routine bill from a supplier they trust. "Either way, the money ends up in the hands of criminals and it's often very difficult to recover." Lyons said, for businesses, email security was key, while for customers it paid to be "sceptical". "If payment details suddenly change or something feels slightly off, don't reply to the email. "Instead, contact the business directly, using a phone number or address you already know." * This story originally appeared in the New Zealand Herald.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store