New Zealand grapples with gun law reform amid nationwide grief


  • English
  • Arabic

Gun reform is central to New Zealand Prime Minister Jacinda Arden's response to the country's deadliest mass shooting last week with the cabinet meeting to discuss new legislation.

The move comes as family and friends grieve for the 50 people confirmed killed in the attacks on two mosques in Christchurch, and amid nationwide demonstrations of solidarity with the Muslim community.

Semi-automatic rifles and shotguns were recovered from the car of a man arrested soon after the shootings at the Al Noor and Linwood mosques on Friday. Brenton Tarrant, a 28-year-old Australian, was charged with one count of murder in a court appearance on Saturday. He was licensed to own the weapons, although the rifles were reported to have been modified illegally.

While an outright ban on semi-automatic rifles is considered unlikely, Ms Ardern has said legislators will consider measures such as tighter controls on sales of ammunition magazines.

“I can tell you one thing right now: our gun laws will change,” Ms Ardern said at a press conference on Saturday. “There have been attempts to change our laws in 2005, 2012 and after an inquiry in 2017. Now is the time for change.”

She said Mr Tarrant obtained the category A licence in November 2017 and started purchasing firearms the next month.

New Zealand previously tightened its gun laws in response to its last mass shooting in 1990, when a man killed 13 people in the town of Aramoana following a dispute.

Authorities are yet to release the bodies of victims from Friday's attack as they work to confirm their identities, with relatives anxious to perform the burial rites as soon as possible in accordance with Islamic law. However, volunteers had arrived from across the country to help with the burials in Christchurch and authorities sent in backhoes to dig graves in a site that was fenced off and blocked from view with netting.

Ms Ardern said authorities hoped to release all the bodies by Wednesday, and Police Commissioner Mike Bush said authorities were working with pathologists and coroners to complete the task as soon as they could.

"We have to be absolutely clear on the cause of death and confirm their identity before that can happen," Mr Bush said. "But we are so aware of the cultural and religious needs. So we are doing that as quickly and as sensitively as possible."

Although the authorities have not yet released an official list of the victims, a provisional list circulated among families of the deceased showed that they ranged in age from three to 77. The document provides the names of 44 men and four women, but is missing the identities of two of the 50 victims confirmed as dead by police. They came from a wide range of countries, including nine from Pakistan and four each from Jordan and Egypt. Some had moved to New Zealand decade earlier while others were more recent arrivals, including a refugee family Syrian that arrived late last year.

Thirty-four wounded remain in hospital in Christchurch, with 12 in critical condition. A 4-year-old girl at a children's hospital in Auckland was also listed as critical.

Mourners arrived in a steady stream at the two mosques on Sunday to pay tribute to the victims at makeshift memorials. Among them were members of a notorious street gang who performed a haka – a traditional Maori war dance – near the Al Noor Mosque on Deans Avenue where the majority of the victims were shot.

Pope Francis, who had sent a message on Sunday, offered prayers for "our Muslim brothers" killed in the mosque attacks and renewed "an invitation to unite in prayer and gestures of peace to oppose hatred and violence".

Meanwhile attention has turned to the suspected attacker's travels in the recent years after he recounted trips to Europe and Asia in a hate-filled "manifesto" released online shortly before the shootings in Christchurch.

Turkish officials said they were tracing Mr Tarrant's movements and the people he contacted during two visits in 2016, particularly a six-week stay from September 13 to October 25.

“The Turkish investigation will clarify when he arrived in Istanbul and where he stayed and probably his cellphone communication if he had one,” said Yusuf Alabarda, a security analyst at Ankara’s Foundation for Political, Economic and Social Research.

According to Turkey's Hurriyet newspaper, investigators will initially focus on the area around Sultanahmet Square in the heart of Istanbul's tourist district that includes Hagia Sophia, a former church and mosque that is now a museum, and which Mr Tarrant had called for to be returned to Christian worship. They will also examine hotel, airport and bus records.

HERO%20CUP%20TEAMS
%3Cp%3E%3Cstrong%3E%3Cins%3EContinental%20Europe%3Cbr%3E%3C%2Fins%3E%3C%2Fstrong%3EFrancesco%20Molinari%20(c)%3Cbr%3EThomas%20Detry%3Cbr%3ERasmus%20Hojgaard%3Cbr%3EAdrian%20Meronk%3Cbr%3EGuido%20Migliozzi%3Cbr%3EAlex%20Noren%3Cbr%3EVictor%20Perez%3Cbr%3EThomas%20Pieters%3Cbr%3ESepp%20Straka%3Cbr%3EPlayer%20TBC%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E%3Cins%3EGreat%20Britain%20%26amp%3B%20Ireland%3C%2Fins%3E%3C%2Fstrong%3E%3Cbr%3ETommy%20Fleetwood%20(c)%3Cbr%3EEwen%20Ferguson%3Cbr%3ETyrrell%20Hatton%3Cbr%3EShane%20Lowry%3Cbr%3ERobert%20MacIntyre%3Cbr%3ESeamus%20Power%3Cbr%3ECallum%20Shinkwin%3Cbr%3EJordan%20Smith%3Cbr%3EMatt%20Wallace%3Cbr%3EPlayer%20TBC%3C%2Fp%3E%0A
Dubai Bling season three

Cast: Loujain Adada, Zeina Khoury, Farhana Bodi, Ebraheem Al Samadi, Mona Kattan, and couples Safa & Fahad Siddiqui and DJ Bliss & Danya Mohammed 

Rating: 1/5

UAE tour of Zimbabwe

All matches in Bulawayo
Friday, Sept 26 – UAE won by 36 runs
Sunday, Sept 28 – Second ODI
Tuesday, Sept 30 – Third ODI
Thursday, Oct 2 – Fourth ODI
Sunday, Oct 5 – First T20I
Monday, Oct 6 – Second T20I

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.