Japanese Hostages latest – Kenji Goto barbarically executed

Updated: IS Japanese Hostages Possibly Executed – Latest information as at 31 Jan 15 – 2200 GMT

The so called Islamic state has released a beheading video of Kenji Goto the Japanese journalist held by the IS and used as a negotiating pawn for the release of Sajida Mubarak Atrous al-Rishawi, reports Philip Ingram.

Al-Rishawi is an Iraqi woman suspected of being a failed suicide bomber from the Amman hotel attacks which killed 57 people in November 2005 when her husband’s suicide belt detonated but hers failed.  She is believed to be the sister of a key aide to Abu Musab al-Zarqawi, a founder of al-Qaeda who were the forerunners of the IS.

The negotiation between Japan and the IS have been through Jordanian intermediaries.  After the last video released by IS linking the release of al-Rishawi to the freeing of Kenji Goto and the saving of the life of First Lieutenant Maaz al-Kassasbeh of the Jordanian Airforce, the F16 pilot who crashed and was captured by the IS in December 2014.

Kenji execution

Throughout today the IS have released videos of the beheadings of a Jordanian Intelligence officer and Kurdish fighters.

In this latest video a man speaking with an english accent, believed to be Jihadi John carried out the barbaric act in a vide titled “A message to the Government of Japan”.  There is no information regarding the fate of First Lieutenant Maaz al-Kassasbeh.

The barbarism of the IS is something the countries trying to defeat them need to sit up and listen to.  Apart from Hitler who tried unsuccessfully to exterminate a whole race, we have not seen a level of inhumane barbarism like we see from the IS.  This threat can not be ignored or can be successfully dealt with through mere bombing raids.

More details to follow.

SecurityNewsDesk is working in conjunction with Global Risk Awareness to keep you updated.

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Tecnosicurezza

Tecnosicurezza Launches AmpliSec

Tecnosicurezza has launched AmpliSec – its first connected high-security electronic locking system designed specifically for safes…
Cover Story - Empowering the Mobile Workforce with HID

Cover Story – Empowering the Mobile Workforce with HID

HID presents the latest in portable readers, depicting a modern world where secure access moves with you…
Frank Mueller headshot

How LiDAR protects railways

Frank Mueller, Hexagon, presents a thought leadership perspective of the use of LiDAR in railway infrastructure.
IP Bridges in schools

Alertex IP Bridges in Education

Luminite are delighted to announce that, following feedback from larger school estates, Alertex IP Bridges can now be linked…
DuoKey at GISEC

A Breakthrough in Fraud Detection at GISEC

DuoKey will unveil its groundbreaking use case for encrypted financial intelligence at GISEC Global in Dubai next week.
access control integration

HID Redefines Physical and Digital Security Integration

HID announced the launch of HID Integration Service, a platform that integrates physical security, cybersecurity and digital identity…
Image provided by Netgenium

School Safety with new IP audio lockdown system

A Northwest primary school has invested in a new IP (Internet Protocol) audio lockdown system to improve the protection of staff…
Image provided by Customs support group

Hello Post-Brexit Security Protocols

Jo Cloherty, Senior Commercial Manager at Customs Support Group, explores the 2025 Safety and Security Protocols that have…
Image provided by ICT

ICT combines legacy and executive force

Integrated Control Technology (ICT) demonstrates the power of legacy and leadership in determining success and growth in industry  
Copyright: Security Buyer

Is Your Office Security Failing?

Unification and the user experience is transforming corporate security—enhancing access control, surveillance, and cybersecurity…
Scroll to Top