GE2025: WP's Pritam Singh leads team with two new faces Fadli Fawzi, Kenneth Tiong against PAP in Aljunied GRC
Faisal, who made his political debut in 2011, will be leading WP's team of of four first-timers in Tampines GRC
The WP team for Aljunied GRC comprises Singh, who is Leader of the Opposition, two incumbents – party chair Sylvia Lim and Gerald Giam, as well as Fadli Fawzi and Kenneth Tiong.
Fadli, a lawyer, first contested as part of the WP's Marine Parade GRC team, whereas Kenneth Tiong, a first-timer, is an AI startup founder.
Ahead of Nomination Day, there had been speculation that one of WP's senior party leaders may strike out elsewhere, with Aljunied GRC now come to be seen as one of WP's stronghold.
Faisal's move mirrors that of former WP chief Low Thia Kiang, who ventured out of Hougang SMC after 20 years to contest in Aljunied GRC in GE2011.
BT in your inbox
Start and end each day with the latest news stories and analyses delivered straight to your inbox.
Sign Up
Sign Up
The PAP's team led by Chan Hui Yuh, who contested in the previous election, consists of four first-timers: company director Adrian Ang, managing director of an urban planning consultancy Daniel Liu, dental surgeon Faisal Abdul Aziz and unionist Jagathishwaran Rajo.
Meanwhile, WP's Dennis Tan, the incumbent at Hougang SMC, will defend his ward against PAP new face and lawyer Marshall Lim.
Both parties arrived at Poi Ching School, one of the nine Nomination Centres across Singapore, at shortly before 11am on Wednesday (Apr 23), flanked by supporters.
Both parties' candidacies were confirmed at 12.30pm, with no objections raised by any of the candidates.
Aljunied GRC became the first GRC to be won by the opposition in GE2011, when WP's historic victory unseated three political heavyweights in one fell swoop, including then-foreign affairs minister George Yeo.
The GRC has come to be seen as one of WP's two crown jewels, alongside Hougang SMC, which the party has held since 1991.
The PAP has not been able to reclaim the GRC despite coming very close in 2015, when WP scraped a victory with a much smaller margin – securing just 50.96 per cent of the votes. That year, all wards saw a big swing towards the ruling party as Singaporeans celebrated SG50 and mourned the death of founding prime minister Lee Kuan Yew.
However, WP bounced back by GE2020, held in the middle of a global pandemic, when they took a decisive 59.95 per cent of the votes. The party also won its second GRC — Sengkang GRC — the same year.
If elected, Tiong will replace former MP Leon Perera, who resigned in 2023 after his extramarital affair with fellow party member Nicole Seah was exposed.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Straits Times
6 hours ago
- Straits Times
WP chairwoman Sylvia Lim to publish memoir with Epigram Books in 2027
The agreement between Ms Lim and the home-grown publisher was signed in recent weeks. SINGAPORE – Workers' Party chairwoman and MP for Aljunied GRC Sylvia Lim will publish her memoirs with Epigram Books, expected to hit major bookstores in the second half of 2027. The agreement between Ms Lim and the home-grown publisher – an imprint of the newly formed non-profit Epigram Literary Foundation – was signed in recent weeks. A book title is as yet not forthcoming, with writing still in its preliminary stages. But the surprise memoir is expected to offer a rare glimpse into the mind of one of Singapore's pioneer women in opposition politics – a police inspector and lawyer turned self-professed proud 'Mama Bear' heading a slate of WP female candidates at the recent general election. On her decision to ink the deal, Ms Lim said: 'There has been interest from several quarters about the paths I have walked and the places I have been, as well as the people who made me whole. 'As I turn 60 this year, it feels right to start to reflect on my experiences of life, vocation and love which, hopefully, will be meaningful not just now, but also for posterity.' The 14-year MP has struck a more mellow note of late, brandishing her PAssion Silver Concession Card at a WP rally in April to cheers – 'The last time I stood on this stage, I still had black hair.' To a question on WP's party leadership succession during a press conference in the same month, she had said: 'I would say that when the time comes for me, personally, to step down as chairperson, I won't be sorry.' Top stories Swipe. Select. Stay informed. Singapore 2 workers stranded on gondola dangling outside Raffles City Tower rescued by SCDF Asia Japan PM Ishiba vows to take responsibility for election loss, to stay in office to deal with US tariff talks Business $1.1 billion allocated to three fund managers to boost Singapore stock market: MAS Singapore Proof & Company Spirits closes Singapore distribution business Life Travel Journal: Safari tourism with a side of moral crisis Singapore Mandai Wildlife Group group CEO Mike Barclay to retire; Bennett Neo named as successor Singapore Jail, caning for man who held metal rod to cashier's neck in failed robbery attempt Singapore Fresh charge for woman who harassed nurse during pandemic, created ruckus at lion dance competition Mr Edmund Wee, founder of Epigram Books, said he also specifically requested that Ms Lim include her relationship with former national footballer Quah Kim Song , whom she had dated for 12 years before their church wedding in January 2025. The publisher got in touch with Ms Lim through a mutual friend and had tried cajoling her for the project as early as 2021 during the coronavirus lockdown period, with satisfaction delayed till now. Mr Wee said: 'Sylvia Lim's achievements and life should be an inspiration to Singaporeans, especially to all the young women out there.' Few senior leaders from WP, Singapore's most successful opposition party post-independence, have put their thoughts to the page. Former secretary-general of WP J.B Jeyaretnam hawked his own books on the streets after being declared bankrupt and losing his seat, including The Hatchet Man Of Singapore, published in 2003. The most recent and probably most well-known is WP member and former Non-Constituency MP Yee Jenn Jong's Journey In Blue: A Peek Into The Workers' Party Of Singapore (2020). Among other revelations, it disclosed that former WP chief Low Thia Khiang had begun planning to step down as early as 2016 following an intra-party leadership challenge, rather than in 2020 after a fall at home as commonly assumed. Ms Lim was a law lecturer at Temasek Polytechnic specialising in civil and criminal procedures when she was elected WP's first woman chairperson in 2003 and led a team to become the 'best losers' in the contest for Aljunied GRC in 2006. After a stint as NCMP from 2006 to 2011, she was part of the team that won Aljunied GRC for WP in 2011. She will begin her fourth term when Parliament reconvenes on Sept 5.


AsiaOne
2 days ago
- AsiaOne
Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam, Singapore News
SINGAPORE - The authorities are dealing with an ongoing attack on Singapore's critical information infrastructure by a state-sponsored cyber espionage group, UNC3886. Naming the nation's attacker for the first time on Friday (July 18), Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors. These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives. "UNC3886 poses a serious threat to us, and has the potential to undermine our national security," said Mr Shanmugam at the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner at Sands Expo and Convention Centre. "Even as we speak, UNC3886 is attacking our critical infrastructure right now." Mr Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886's sponsors, but experts have said that the group is linked to China. Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations - including those in the defence, technology and telecommunication sectors - on a global scale. APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim's system to evade detection. Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks. Mr Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners. Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: "The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets - vital infrastructure that delivers our essential services. "If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans." Mr Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024. Illustrating how APTs seriously threaten national security, Mr Shanmugam said a cyber attack on Singapore's power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport. "There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected," he said. Attacks on Singapore's telco systems and payment systems can have very serious consequences too, he added. He said attacks on the nation's systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains. Trust and confidence in Singapore as a whole can also be affected, he added. "Businesses may shy away if they are unsure about our systems - whether the systems are clean, resilient, safe," he said. Mr Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world," he said. "People want to get into our systems, to both influence us and threaten us." He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons. These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, which is critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack. Mr Shanmugam said Singapore has been and continues to be attacked by cyber threat actors. He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack. At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain. "We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore's cyberspace," he added. This article was first published in The Straits Times . Permission required for reproduction.


AsiaOne
2 days ago
- AsiaOne
Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam
SINGAPORE - The authorities are dealing with an ongoing attack on Singapore's critical information infrastructure by a state-sponsored cyber espionage group, UNC3886. Naming the nation's attacker for the first time on Friday (July 18), Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors. These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives. "UNC3886 poses a serious threat to us, and has the potential to undermine our national security," said Mr Shanmugam at the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner at Sands Expo and Convention Centre. "Even as we speak, UNC3886 is attacking our critical infrastructure right now." Mr Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886's sponsors, but experts have said that the group is linked to China. Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations - including those in the defence, technology and telecommunication sectors - on a global scale. APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim's system to evade detection. Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks. Mr Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners. Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: "The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets - vital infrastructure that delivers our essential services. "If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans." Mr Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024. Illustrating how APTs seriously threaten national security, Mr Shanmugam said a cyber attack on Singapore's power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport. "There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected," he said. Attacks on Singapore's telco systems and payment systems can have very serious consequences too, he added. He said attacks on the nation's systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains. Trust and confidence in Singapore as a whole can also be affected, he added. "Businesses may shy away if they are unsure about our systems - whether the systems are clean, resilient, safe," he said. Mr Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world," he said. "People want to get into our systems, to both influence us and threaten us." He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons. These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, which is critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack. Mr Shanmugam said Singapore has been and continues to be attacked by cyber threat actors. He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack. At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain. "We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore's cyberspace," he added. This article was first published in The Straits Times. Permission required for reproduction.