Connect with us


BIG STORY

Hushpuppi In Fresh Trouble, Linked With North Korean Hackers Described As World Biggest Bank Robbers [US Dept Full Statement]

Published

on

Nigerian Ramon Olorunwa Abbas, a.k.a Hushpuppi, now incarcerated in California as he awaits trial for cyber fraud was linked on Friday, 19 February 2021 by the FBI to North Korean hackers, said to be the biggest bank robbers in the world.

The Justice Department in a detailed statement released Friday said Abbas took part in a “North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019.”

His role was as a collaborator with a North Korean money launderer, Ghaleb Alaumary, based in Mississauga, Ontario, Canada.

The 37-year-old Alaumary was one of the people charged today by the FBI for many criminal schemes. The others are three North Koreans.

“Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020”, according to the statement.

“Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

“With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018.
“Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019”.

Abbas already has a case of his own.

Last year, the U.S. Attorney’s Office in Los Angeles charged him in a separate case alleging that he conspired to launder hundreds of millions of dollars from BEC frauds and other scams.

In a July statement, the Justice Department referred to the Maltese bank attack as “a $14.7 million cyber-heist from a foreign financial institution.”

“Both the date and amount match that of the attack on Malta’s Bank of Valletta in February 2019”, reported Forbes.

Abbas, 38, was arrested in Dubai last year.

He arrived in the U.S. on July 3 to face criminal charges over allegations that he made “hundreds of millions of dollars” from business email compromise frauds and other scams.
His trial was to have commenced late last year but was delayed by the COVID-19 pandemic.
Read the full US Justice Department statement on the indictment of three North Korean military hackers involved in cyber heists running into over $1.3billion:

A federal indictment unsealed today charges three North Korean computer programmers with participating in a wide-ranging criminal conspiracy to conduct a series of destructive cyberattacks, to steal and extort more than $1.3 billion of money and cryptocurrency from financial institutions and companies, to create and deploy multiple malicious cryptocurrency applications, and to develop and fraudulently market a blockchain platform.

A second case unsealed today revealed that a Canadian-American citizen has agreed to plead guilty in a money-laundering scheme and admitted to being a high-level money launderer for multiple criminal schemes, including ATM “cash-out” operations and a cyber-enabled bank heist orchestrated by North Korean hackers.

“As laid out in today’s indictment, North Korea’s operatives, using keyboards rather than guns, stealing digital wallets of cryptocurrency instead of sacks of cash, are the world’s leading bank robbers,” said Assistant Attorney General John C. Demers of the Justice Department’s National Security Division. “The Department will continue to confront malicious nation-state cyber activity with our unique tools and work with our fellow agencies and the family of norms abiding nations to do the same.”

“Today’s unsealed indictment expands upon the FBI’s 2018 charges for the unprecedented cyberattacks conducted by the North Korean regime,” said the FBI Deputy Director Paul Abbate. “The ongoing targeting, compromise, and cyber-enabled theft by North Korea from global victims was met with the outstanding, persistent investigative efforts of the FBI in close collaboration with U.S. and foreign partners. By arresting facilitators, seizing funds, and charging those responsible for the hacking conspiracy, the FBI continues to impose consequences and hold North Korea accountable for its/their criminal cyber activity.”

“The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,” said Acting U.S. Attorney Tracy L. Wilkison for the Central District of California. “The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime.”

“This case is a particularly striking example of the growing alliance between officials within some national governments and highly sophisticated cyber-criminals,” said U.S. Secret Service Assistant Director Michael R. D’Ambrosio. “The individuals indicted today committed a truly unprecedented range of financial and cyber-crimes: from ransomware attacks and phishing campaigns to digital bank heists and sophisticated money-laundering operations. With victims strewn across the globe, this case shows yet again that the challenge of cybercrime is, and will continue to be, a struggle that can only be won through partnerships, perseverance, and a relentless focus on holding criminals accountable.”

The hacking indictment filed in the U.S. District Court in Los Angeles alleges that Jon Chang Hyok (전창혁), 31; Kim Il (김일), 27; and Park Jin Hyok (박진혁), 36, were members of units of the Reconnaissance General Bureau (RGB), a military intelligence agency of the Democratic People’s Republic of Korea (DPRK), which engaged in criminal hacking. These North Korean military hacking units are known by multiple names in the cybersecurity community, including Lazarus Group and Advanced Persistent Threat 38 (APT38). Park was previously charged in a criminal complaint unsealed in September 2018.

The indictment alleges a broad array of criminal cyber activities undertaken by the conspiracy, in the United States and abroad, for revenge or financial gain. The schemes alleged include:

Cyberattacks on the Entertainment Industry: The destructive cyberattack on Sony Pictures Entertainment in November 2014 in retaliation for “The Interview,” a movie that depicted a fictional assassination of the DPRK’s leader; the December 2014 targeting of AMC Theatres, which was scheduled to show the film; and a 2015 intrusion into Mammoth Screen, which was producing a fictional series involving a British nuclear scientist taken prisoner in DPRK.

Cyber-Enabled Heists from Banks: Attempts from 2015 through 2019 to steal more than $1.2 billion from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta, and Africa by hacking the banks’ computer networks and sending fraudulent Society for Worldwide Interbank Financial Telecommunication (SWIFT) messages.

Cyber-Enabled ATM Cash-Out Thefts: Thefts through ATM cash-out schemes – referred to by the U.S. government as “FASTCash” – including the October 2018 theft of $6.1 million from BankIslami Pakistan Limited (BankIslami).

Ransomware and Cyber-Enabled Extortion: Creation of the destructive WannaCry 2.0 ransomware in May 2017, and the extortion and attempted extortion of victim companies from 2017 through 2020 involving the theft of sensitive data and deployment of other ransomware.

Creation and Deployment of Malicious Cryptocurrency Applications: Development of multiple malicious cryptocurrency applications from March 2018 through at least September 2020 – including Celas Trade Pro, WorldBit-Bot, iCryptoFx, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale – which would provide the North Korean hackers a backdoor into the victims’ computers.
Targeting of Cryptocurrency Companies and Theft of Cryptocurrency: Targeting of hundreds of cryptocurrency companies and the theft of tens of millions of dollars’ worth of cryptocurrency, including $75 million from a Slovenian cryptocurrency company in December 2017; $24.9 million from an Indonesian cryptocurrency company in September 2018; and $11.8 million from a financial services company in New York in August 2020 in which the hackers used the malicious CryptoNeuro Trader application as a backdoor.

Spear-Phishing Campaigns:

Multiple spear-phishing campaigns from March 2016 through February 2020 that targeted employees of United States cleared defense contractors, energy companies, aerospace companies, technology companies, the U.S.Department of State, and the U.S. Department of Defense.

Marine Chain Token and Initial Coin Offering:

Development and marketing in 2017 and 2018 of the Marine Chain Token to enable investors to purchase fractional ownership interests in marine shipping vessels, supported by a blockchain, which would allow the DPRK to secretly obtain funds from investors, control interests in marine shipping vessels, and evade U.S. sanctions.

According to the allegations contained in the hacking indictment, which was filed on Dec. 8, 2020, in the U.S. District Court in Los Angeles and unsealed today, the three defendants were members of units of the RGB who were at times stationed by the North Korean government in other countries, including China and Russia. While these defendants were part of RGB units that have been referred to by cybersecurity researchers as Lazarus Group and APT38, the indictment alleges that these groups engaged in a single conspiracy to cause damage, steal data and money, and otherwise further the strategic and financial interests of the DPRK government and its leader, Kim Jong Un.

Money Launderer Charged in California and Georgia

Federal prosecutors today also unsealed a charge against Ghaleb Alaumary, 37, of Mississauga, Ontario, Canada, for his role as a money launderer for the North Korean conspiracy, among other criminal schemes. Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020. Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018.

Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019. Last summer, the U.S. Attorney’s Office in Los Angeles charged Abbas in a separate case alleging that he conspired to launder hundreds of millions of dollars from BEC frauds and other scams.

Accompanying Mitigation Efforts

Throughout the investigation, the FBI and the Justice Department provided specific information to victims about how they had been targeted or compromised, as well as information about the tactics, techniques, and procedures (TTPs) used by the hackers with the goals of remediating any intrusion and preventing future intrusions. That direct sharing of information took place in the United States and in foreign countries, often with the assistance of foreign law enforcement partners. The FBI also collaborated with certain private cybersecurity companies by sharing and analyzing information about the intrusion TTPs used by the members of the conspiracy.

In addition to the criminal charges, the FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, in collaboration with the U.S. Department of Treasury, today released a joint cybersecurity advisory and malware analysis reports (MARs) regarding North Korean cryptocurrency malware. The joint cybersecurity analysis and MARs highlight the cyber threat North Korea – which is referred to by the U.S. government as HIDDEN COBRA – poses to cryptocurrency and identify malware and indicators of compromise related to the “AppleJeus” family of malware (the name given by the cybersecurity community to a family of North Korean malicious cryptocurrency applications that includes Celas Trade Pro, WorldBit-Bot, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale). The joint cybersecurity advisory and MARs collectively provide the cybersecurity community and public with information about identifying North Korean malicious cryptocurrency applications, avoiding intrusions, and remedying infections.

The U.S. Attorney’s Office and FBI also obtained seizure warrants authorizing the FBI to seize cryptocurrency stolen by the North Korean hackers from a victim in the indictment – a financial services company in New York – held at two cryptocurrency exchanges. The seizures include sums of multiple cryptocurrencies totalling approximately $1.9 million, which will ultimately be returned to the victim.

Jon, Kim, and Park are charged with one count of conspiracy to commit computer fraud and abuse, which carries a maximum sentence of five years in prison, and one count of conspiracy to commit wire fraud and bank fraud, which carries a maximum sentence of 30 years in prison.

In relation to the case filed in Los Angeles, Alaumary has agreed to plead guilty to one count of conspiracy to commit money laundering, which carries a maximum sentence of 20 years in prison.

The charges contained in the indictment are merely accusations and the defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt.

The investigation of Jon, Kim, and Park was led by the FBI’s Los Angeles Field Office, which worked closely with the FBI’s Charlotte Field Office. The U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center provided substantial assistance. The FBI’s Cyber Division also provided substantial assistance.

The investigations of Alaumary were conducted by the U.S. Secret Service’s Savannah Field Office, FBI’s Los Angeles Field Office, and the U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center. The FBI’s Criminal Investigative Division also provided substantial assistance.

The case against Jon, Kim, and Park is being prosecuted by Assistant U.S. Attorneys Anil J. Antony and Khaldoun Shobaki of the Cyber and Intellectual Property Crimes Section, with substantial assistance from Trial Attorney Scott Claffee of the Department of Justice National Security Division’s Counterintelligence and Export Control Section.

Assistant U.S. Attorneys Antony and Shobaki are also prosecuting the case against Alaumary, in which the U.S. Attorney’s Office for the Southern District of Georgia and the Criminal Division’s Computer Crimes and Intellectual Property Section (CCIPS) provided substantial assistance. Assistant U.S. Attorneys Antony and Shobaki, along with Assistant U.S. Attorney Jonathan Galatzan of the Asset Forfeiture Section, also obtained the seizure warrants for cryptocurrency stolen from the financial services company in New York.

The Criminal Division’s Office of International Affairs provided assistance throughout these investigations, as did many of the FBI’s Legal Attachés, as well as foreign authorities around the world. Numerous victims cooperated and provided valuable assistance.

 

Source: PM News

BIG STORY

Port Harcourt Refinery Halts Operations Over Calibration, Loading Bay Empty

Published

on

The fanfare and cheers that greeted the resumption of activities at the Port Harcourt Refining Company on Tuesday may have faded, leaving the hopes and expectations of many Nigerians uncertain.

A visit (by Saturday Punch) to the refinery on Friday revealed that there was no activity on-site, with some workers stating that the refinery was undergoing calibration, which might last until next week.

The Port Harcourt Refinery has faced numerous delays and missed deadlines for resuming operations.

However, on Tuesday, the Group Chief Executive Officer of the Nigeria National Petroleum Company Limited, Melee Kyari, inaugurated the new plant at the Area 5 terminal of the refinery. It was claimed that 200 petrol trucks were loading daily from the plant.

Despite the announcement, skepticism arose as reports circulated that the trucks were being loaded with old products from the storage tanks.

Upon visiting the Port Harcourt Refinery Area 5, it was observed that there were no signs of activity.

An official, who spoke on condition of anonymity, revealed that the loaded trucks contained “dead stock.”

He said, “Before the refinery was shut down between 2015/2016, we had dead stock left in the tank, including some Premium Motor Spirit (petrol) DPK (kerosene), and Automated Gas Oil (diesel).

“So, these products were in large quantities in stores in those tanks. During the rehabilitation of the Port Harcourt Refinery, Old Area 5, those products were evacuated from the tanks for storage.”

However, he noted that the large quantity of refined petrol was “off-spec,” requiring separation from water to obtain the main product in preferred colours.

“But for DPK, it is in large quantity but they have not pushed it from the tank where it was kept after refined ready for commercial purposes.

“So, the product that was loaded was dead stock, that is the old product that was in the system. So, after these dead stocks, they will have to clean the tank, remove all the debris before pumping the new project into that tank, and redye it,” the source said.

The worker highlighted that refineries worldwide should operate electronically, not manually.

“But what they are trying to do at the Port Harcourt Refinery is manual, which cannot match the new digital pumps. Most of the pumps used for the event were refurbished,” he added.

He explained that during Kyari’s visit on Tuesday, seven trucks were prepared for loading, but only five were filled with petrol.

The Chairman of the Independent Petroleum Marketers Association of Nigeria, Taken Ikpaki, while speaking to journalists during the inauguration of the facility on Tuesday, had expressed optimism.

He stated that more trucks were expected to come into the facility to load products in the coming days.

But rather than more trucks coming into the refinery, the number of trucks has dwindled.

Around 1.30pm when our correspondent visited, he observed that most workers and drivers appeared idle as no machinery was operational.

Nine trucks were seen parked, but the loading bay, numbered from one to 18, was empty and deserted, with some workers lying down.

When asked about the lack of loading activity, a worker in overalls said, “They are de-watering, removing the water under the PMS. Maybe there will be loading after that, but we don’t know what time today.”

Another worker at the loading bay mentioned that ongoing calibration was the reason for the delay.

“They are calibrating the meters,” he said tersely.

Findings (by Saturday Punch) showed that the PMS left in the storage might not be enough to fill five trucks.

A source indicated that calibration would continue until Monday, with the loading of DPK (kerosene) and AGO (diesel) expected to start by then.

Speaking to our correspondent, a resident of Alode in Eleme Local Government Area of Rivers State, who simply identified himself as Osaro, said, “After that ceremony with Mele Kyari where they said the refinery had started operation and loading was taking place, what happened afterwards? They continued loading on air, that is on the pages of newspapers and social media.”

When contacted for his reaction on the lack of activities on Friday, the National Public Relations Officer of the Petroleum Product Retail Outlet Owners Association of Nigeria, Dr Joseph Obelle, said it was as a result of ongoing calibration.

Obelle, the PETROAN spokesman, said, “They are calibrating the loading pumps. They will be done today.”

Meanwhile, it was gathered that the Senate Committee on Petroleum visited the refinery on Thursday on a facility tour. The outcome of the visit had yet to be made public.

Calls and text messages to the spokesperson for the NNPC, Olufemi Soneye, were not replied as of the time of filing this report.

But the NNPC had in a statement denied claims by an Alesa community leader, Timothy Mgbere, that the Port Harcourt refinery was not producing fuel.

Soneye accused Mgbere of crass ignorance of how a refinery runs.

He said, “The old and new Port Harcourt refineries have since been integrated with one single terminal for product load-out. They share common utilities like power and storage tanks. This means that storage tanks and loading gantry which he claimed belongs to the new Port-Harcourt Refinery can also receive products from the Old Port Harcourt Refinery.”

He called on the public to disregard claims borne out of “sheer mischief and blatant display of ignorance.”

 

Credit: The Punch

Continue Reading

BIG STORY

Simon Ekpa To Spend Christmas In Detention As Finland Court Denies Him Bail

Published

on

  • Followers declare United States of Biafra in Finland

 

 

Pro-Biafran agitator Simon Ekpa, who was arrested in Finland for alleged terrorism-related activities, will spend Christmas in detention, as Finland’s legal system does not allow for bail.

Mikko Laaksonen, a Senior Detective Superintendent at Finland’s National Bureau of Investigation, confirmed this (to Saturday Punch) in an email.

The news comes as Ekpa’s supporters declared the establishment of the United States of Biafra during a conference held in Finland on Friday.

Last week, the Finnish government announced the arrest of Ekpa and four others on suspicion of terror-related offenses, including incitement to violence and terrorism financing.

Finnish police have confirmed that Ekpa, who calls himself the Prime Minister of the Biafra Republic Government-in-Exile, allegedly used social media to incite violence in the South-East region, targeting both civilians and authorities.

According to local publication Yle, Ekpa was remanded in custody by the Päijät-Häme District Court on charges of public incitement to commit a crime with terrorist intent.

The publication reported that the Finnish Central Criminal Police confirmed the arrest in a statement last Thursday, noting that other suspects were apprehended for allegedly financing terrorist activities.

Also, Ekpa is scheduled to face charges in May 2025, according to Finnish authorities.

When asked if Ekpa’s charges were bailable or if the prosecution was disposed to releasing him on bail, Laaksonen said, “Finnish criminal procedure/coercive measures do not recognise bail procedure.

“Our procedure is based on, depending on the case, remand or travel ban as coercive measures for limiting freedom of movement for persons suspected of offences to which such measures are applicable.”

  • Supporters Declare Biafra 

In Finland, Ekpa’s supporters converged on Lahti in Finland on Friday to declare the United States of Biafra.

A few days before the conference, videos circulated on social media showing a significant influx of Nigerians into Finland for the event tagged, ‘Biafra Mass Exodus 2024’.

An X user, @DOlewunne, tweeted, “Huge in Finland Under His Excellency the Prime Minister of Biafra Simon Ekpa (sic). The re-declaration of the Independent State of Biafra/United States of Biafra is in full swing. This historic independent moment is championed by the People of Biafra. We are a Nation! (sic).”

The convener of the convention, who introduced herself as the Chief of Staff of the United States of Biafra and the organiser of the Biafra Declaration of the Restoration of the United States of Biafra Convention 2024 in Finland, is Dr Ngozi Orabueze.

According to several online sources, Orabueze is a family nurse practitioner in Atlanta, Georgia, with expertise in treating diabetes, bipolar disorder, and depression, among other conditions.

She was first appointed by Ekpa in March 2023 as Minister of Health, Oil and Gas, Biafra Republic Government in Exile.

Orabueze, who has over 17,500 followers on X and more than 12,000 on Facebook, wrote on November 27 that the convention was to take place in Lahti, noting that it would kick off with a live X Space event.

On 28 November, she wrote, “Biafrans are trooping into Finland in droves ahead of the re-declaration of the independent state of Biafra,” attaching a video of a large Igbo-speaking crowd awaiting clearance at the Finnish airport.

On Friday afternoon, Orabueze posted on her verified X handle, @ngoziora, that Biafrans had declared an independent state and would now use their own currency (Biafra coins) and time (Biafra time), notifying the Nigerian government and the international community.

The declaration of Biafra’s independence, initially slated by Ekpa for December 2, faced some setbacks following Ekpa’s arrest and prosecution by the Finnish government.

Orabueze wrote, “Breaking: It is done. Biafrans in Finland for the declaration of the independent United States of Biafra. Power belongs to the people.” She later added, “Biafra has been re-declared today, 29th of November 2024, by Ngozi Orabueze, the Chief of Staff, United States of Biafra. Congratulations to all Biafrans all over the world.”

Before the declaration, a video of Ekpa addressing the audience was played online.

Ekpa stated, “We were free before Lord Lugard came. If you want the oil, take it and leave us alone. We are tired of living as baboons and monkeys. We want to be given the opportunity to practise what we have studied.”

As the video ended, the audience began to chant, “USB, USB, USB,” meaning the United States of Biafra.

Afterwards, Orabueze, taking the oath of office, listed the states within the newly re-declared United States of Biafra.

These included Anambra State, Okigwe State, Nnewi State, Ogoni State, Opobo State, Ikwerre State, Etche State, Okrika State, Ngwa State, Orlu State, among others. The crowd cheered her on in both Igbo and English.

After the declaration, the crowd sang an Igbo song, “Biafra aga’m arapu gi,” translating to “Biafra, I will never let you go.”

Earlier in videos and photos shared on X, several members of the group claimed they were just landing at the Finnish airport in Helsinki.

A woman, @Charedims, who took a video while on a flight, said, “Biafrans all over the world from different continents everywhere are converging on Lahti for the convention.

“On December 2, when all votes are counted and collated, a mandate will be given to our prime minister, Simon Ekpa Njoku, who is currently answering some questions with the Finnish authorities; when the votes are counted, he will then declare the restore of the independent state of Biafra, which means he has the legal rights to get us Biafra. That is why you are seeing everybody jumping up and down.”

  • IPOB Disowns Group, MASSOB Denies Claim

Reacting to the development, IPOB’s spokesperson, Emma Powerful, rejected the notion that the group was behind the event.

He stated, “IPOB has no involvement in any conference. Those people (Ekpa’s faction) are criminals supporting illegal activities to destroy our land. There is no such thing as a declaration of Biafra from our side.

“Any claim that IPOB is hosting a conference is false. When IPOB decides to make such an important announcement, the whole world will know. Those making such statements are fake.”

The spokesperson for the Movement for Actualization of the Sovereign State of Biafra, Sunday Edeson, stated that if IPOB succeeded in the realisation of Biafra through its declaration, MASSOB would accept and rejoice with them.

He added that the British government would never support the freedom of Biafra.

“Everyone has the right to declare. They declared their freedom in Finland, but we know that we’re still under Nigerian leadership. We support them.

“Declaring independence in Finland doesn’t mean we’re free from the Nigerian government. We still use Nigerian currency, and security agencies are still from Nigeria. So, we’re still under Nigeria’s control,” Edeson said.

  • Extradition

Meanwhile, a spokesperson for the Ministry of Foreign Affairs, Kimiebi Ebienfa, told Saturday PUNCH that Nigeria did not have an extradition agreement with Finland.

Also, Finland through the Finnish Embassy in Nigeria said it could not comment on the matter.

The Director of Defence Information, Brig Gen Tukur Gusau, had said Ekpa, a self-proclaimed disciple of IPOB leader, Nnamdi Kanu, should be extradited to Nigeria to face criminal charges.

Many Nigerians online also demanded his repatriation to Nigeria to face terrorism charges.

In response to the call for Ekpa’s extradition, a lawyer during ‘The Morning Show’ on AriseTV, Chukwuma Ezeala, said that Finnish-based Nigerian was charged with terrorism and countries involved must cooperate.

He stated that he could be tried in Nigeria or Finland.

“On the issue of extradition, for him to be extradited, there must be a bilateral agreement. From all indications, Nigeria doesn’t have a bilateral agreement with Finland.

“However, since it’s an international crime, he can still be extradited to Nigeria based on international conventions.

“The question will now be, can Nigeria satisfy conditions or requirements of extraditing a person to Nigeria without a bilateral relationship,” Ezeala queried.

 

Credit: The Punch

Continue Reading

BIG STORY

Abuja Herbalist Hospitalised After Shooting Self While Testing ‘Bulletproof’ Charm

Published

on

A herbalist, Ismail Usman, suffered a life-threatening injury while testing a self-made ‘bulletproof’ charm. The incident occurred in Kuchibuyi village, Federal Capital Territory, Abuja, on November 23.

Usman used a locally fabricated gun to shoot himself in the stomach after fortifying himself with the charm. Unfortunately, the charm failed, leaving him severely injured.

FCT police command spokesperson Josephine Adeh confirmed the incident, stating that officers from the Byazhin Division rushed Usman to Kubwa General Hospital. Due to the severity of his injuries, he was later transferred to Gwagwalada Specialist Hospital.

Adeh said, “A distress call from Shandam Michael reported a shocking event involving Ismail Usman, a local herbalist known for his unconventional methods. In a misguided attempt to test the effectiveness of a self-made ‘bulletproof’ charm, Usman shot himself in the stomach with a shotgun.

“Unfortunately, the charm failed to protect him, resulting in life-threatening injuries. Officers from the Byazhin Division responded swiftly, arriving at the scene to find Usman in critical condition. He was quickly transported to Kubwa General Hospital for emergency treatment and later transferred to Gwagwalada Specialist Hospital for further care.

“In the aftermath, police conducted a thorough search of Usman’s home, recovering the homemade gun and an array of charms used in his reckless experiment.”

Adeh stated that Usman would face charges for unlawful possession of firearms and attempted suicide, violating Section 231 of the Penal Code Law of Northern Nigeria.

She said, “Investigations are ongoing, and Usman is expected to face charges for unlawful possession of firearms and attempted suicide under Section 231 of the Penal Code Law of Northern Nigeria.

“Commissioner of Police FCT, CP Olatunji Disu, condemned the incident, highlighting the dangers associated with illegal firearms.”

Continue Reading



 

Join Us On Facebook

Most Popular