logo
Opelika police seek public's help identifying men in Ulta theft

Opelika police seek public's help identifying men in Ulta theft

Yahoo15-04-2025

— The Opelika Police Department is asking for the public's assistance in identifying two men wanted for questioning in connection to an organized retail theft at a local Ulta store.
According to police, the incident happened around 12:25 p.m. on March 20, 2025, at the Ulta located at 2690 Enterprise Drive. Authorities say two males entered the store and stole more than $500 worth of merchandise before leaving the scene.
Surveillance footage shows one suspect wearing an orange collared shirt, a black jacket, and blue jeans. The second suspect is seen wearing glasses, a black facial mask, and khaki pants.
Anyone with information about the suspects or the incident is urged to contact the Opelika Police Department's Detective Division at (334) 705-5220 or call the Secret Witness Hotline at (334) 745-8665. Tips can also be submitted anonymously through the Opelika Police Mobile App.
Additionally, tips may be shared with Central Alabama Crime Stoppers by calling (334) 215-STOP (7867), toll-free at 1-833-AL1-STOP, visiting www.215STOP.com, or messaging their Facebook page at facebook.com/215stop.
Police have released surveillance photos of the suspects and are encouraging anyone who may recognize the individuals to come forward.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Fraud is evolving, and so must we
Fraud is evolving, and so must we

Yahoo

timea day ago

  • Yahoo

Fraud is evolving, and so must we

With fraud now the most prevalent crime in the UK, and attempts continuing to increase, as reported by the Office of National Statistics (ONS) with a 19% surge over the last year, the urgency for immediate action is apparent. Yet, despite UK Finance recording 3.31 million instances of fraud in 2024, the UK remains a global leader in reducing fraud losses. The industry prevented £1.14bn of unauthorised fraud last year, equivalent to stopping 67p for every £1 a fraudster tried to steal, and reimbursed customers for 98% of all unauthorised fraud. There is no time for complacency, however. Criminals are always among the first to embrace new technologies, ceaselessly innovating, and evolving their tactics. The industry must act now, collaborating on preventive strategies to protect consumers proactively. Success in preventing Authorised Push Payment (APP) fraud – with case volumes dropping in 2024 to their lowest level since 2021 – has led fraudsters to seek fertile new grounds for attack. Remote purchase fraud, for example, has surged, while pressure for the Single European Payment Area to adopt real-time cross-border payments presents a significant opportunity for criminals to abuse. The UK's success in mitigating fraud and reimbursing customers is no reason to stop adapting. Fraud is often just as emotionally damaging as it is financially draining, with a Lloyds Banking Group survey last year finding more than two-thirds of fraud victims suffered negative psychological impacts from the experience. To protect victims from trauma and prevent fraudsters from realising any profits, continuous adaptation and early intervention, not just reimbursement, is needed. Behavioural and device intelligence – including keystroke and mouse activity, touch screen behaviour, and physical device attributes – empowers banks to recognise and stop fraud in real-time, before any money leaves a would-be-victim's account. Banks cannot do this alone, however. They are often the last line of defence. Fraud typically begins upstream, with phishing, fake ads, and scam calls occurring on social media and other online channels. Other sectors need to bear some responsibility for the origins of these attacks and adopt the same commitment to fraud prevention as their financial services counterparts. Regulators must also hold those other sectors accountable. The Online Safety Act, while a step in the right direction, has fallen short of enforcing responsibility among tech giants. The government's future strategy must provide direction and incentives to ensure collaboration between the tech, telecoms and banking sectors. International examples provide a blueprint. In Australia, for example, banks are now working together as part of the world's first behaviour-based financial crime intelligence-sharing network, discussing fraud prevention strategies, new intelligence, and potential risks. With well-designed regulations and the motivation to collaborate across sectors, we as a society can better innovate and devote more resources to the fight against fraud. Public awareness also plays a crucial role. Australian banks, through their financial crime intelligence network, are supporting customers in actively identifying risks, and the National Australia Bank (NAB) alone has reportedly stopped around $50m of payments by customers within just two months. This outcome highlights the importance of public awareness in preventing fraud and encourages more proactive customer behaviour. While public awareness is crucial, it's equally important to strike a balance in educating people about the risks of fraud without discouraging them from using digital services. Reduced reliance on technology can lead to lower efficiency and productivity, as well as higher costs, ultimately harming innovation, investment, and economic growth. Getting this balance right is essential. Even with collective action, we cannot eliminate fraud, but we can disrupt, deter, and make it unprofitable for criminals. By fostering collaboration across the financial services sector, technology, telecoms, government, and society, we can transition from a reactive to a proactive approach, creating friction for fraudsters while reducing friction for consumers. Jonathan Frost is Director of Global Advisory for EMEA at BioCatch "Fraud is evolving, and so must we" was originally created and published by Retail Banker International, a GlobalData owned brand. The information on this site has been included in good faith for general informational purposes only. It is not intended to amount to advice on which you should rely, and we give no representation, warranty or guarantee, whether express or implied as to its accuracy or completeness. You must obtain professional or specialist advice before taking, or refraining from, any action on the basis of the content on our site. 擷取數據時發生錯誤 登入存取你的投資組合 擷取數據時發生錯誤 擷取數據時發生錯誤 擷取數據時發生錯誤 擷取數據時發生錯誤

Ex-CIA analyst gets three years in prison for sharing top secret information
Ex-CIA analyst gets three years in prison for sharing top secret information

UPI

time2 days ago

  • UPI

Ex-CIA analyst gets three years in prison for sharing top secret information

Asif William Rahman, 34, of Vienna, had been a CIA employee since 2016 with a Top Secret security clearance and had access to sensitive information, officials said. File Pool Photo by Dennis Brack/UPI | License Photo June 12 (UPI) -- A former CIA analyst has been sentenced to more than three years in prison for obtaining and sending top secret Defense Department information to unauthorized recipients who then posted it on social media, the Justice Department announced Thursday. Asif William Rahman, 34, of Vienna, had been a CIA employee since 2016 with a top secret security clearance and had access to sensitive information until his termination, a release from the Justice Department said. "For months, this defendant betrayed the American people and the oaths he took upon entering his office by leaking some of our nation's most closely held secrets," John Eisenberg, assistant attorney general for national security, said. "As this case demonstrates, the Department of Justice will continue to protect our nation by vigorously investigating and prosecuting leakers who compromise our nation's security." Court documents show that Rahman accessed and printed two top secret documents about a foreign ally and its plans against a foreign adversary. "Rahman removed the documents, photographed them, and transmitted them to individuals he knew were not entitled to receive them," the Justice Department release said. "By Oct. 18, 2024, the documents appeared publicly on multiple social media platforms, complete with the classification markings." Court records show Rahman continued to access and share top secret information with unauthorized recipients until early November 2024. He then began a "deletion campaign" of work saved on his top secret workstation. Rahman was indicted by a grand jury on Nov. 7, 2024, and was arrested by FBI agents while arriving at work five days later. He pleaded guilty to two counts of willful retention and transmission of classified information related to national defense. He has remained in custody since his arrest.

Pentagon investigator admits to faking dozens of Top Secret security clearance background checks
Pentagon investigator admits to faking dozens of Top Secret security clearance background checks

Yahoo

time3 days ago

  • Yahoo

Pentagon investigator admits to faking dozens of Top Secret security clearance background checks

A federal contractor tasked with performing background checks on Department of Defense employees seeking high-level security clearances copped to submitting reams of bogus reports when she claimed to have thoroughly vetted candidates who, in fact, had not been properly checked out. Of 39 allegedly fraudulent investigations Nousheen Qureshi carried out over the course of more than a year for the Defense Counterintelligence Security Agency, at least a half-dozen included fabricated 'interviews' with people who later said they had never even heard from her at all, according to a plea agreement obtained first by The Independent. 'The results of the background investigations conducted by [Qureshi] were used to determine whether to grant security clearances to individuals at various levels, including and up to Top Secret/Sensitive Compartmented Information ('TS/SCI') access,' states the plea agreement, which was unsealed Tuesday in Santa Ana, California federal court. 'To conduct the investigations, [Qureshi] herself had TS/SCI clearance.' Qureshi, a Mission Viejo resident, worked at the time for CACI International, a $7.7 billion Virginia-based conglomerate that bills itself as being 'ever vigilant in helping our customers meet their greatest challenges in national security.' Each of the 299 background investigations she turned in between July 2020 and August 2021 had to be re-worked by the agency, costing taxpayers nearly $250,000 extra, according to the plea agreement. Qureshi was subsequently hired by two other companies to run background checks for the Department of Homeland Security, doing more than 600 of them until her past finally came to light and she was removed from all DHS projects, the plea agreement says. She was charged by information on June 2, and the case has not been made public until now. Tucker Atkins, Qureshi's court-appointed lawyer, did not respond to a request for comment on Wednesday. Since the September 11 terrorist attacks there has been a tremendous increase in the number of security clearances issued by the federal government, according to attorney Dan Meyer, a former U.S. Navy officer who is now a national security partner in the Washington, D.C. office of Tully Rinckey, PLLC. As the system has become more and more overloaded, investigators have seen their workloads double, triple, or even quadruple to as many as 40 cases a week, Meyer told The Independent. Along with this, the incentive to cut corners has also increased, said Meyer. 'And once they start falsifying documents, there's a greater incentive to falsify documents because you've got to hide it once you've done it,' he said. Further, Meyer pointed out, the Trump administration has publicly undercut the importance of rigorous security clearances, where he said sends a message out to the rank-and-file, 'who start to think, 'Hey, maybe this isn't so important.'' A sham background report such as those generated by Qureshi can lead to extremely serious counterintelligence issues, according to Seamus Hughes, a senior researcher at the National Counterterrorism Innovation, Technology, and Education Center, a partnership between the University of Nebraska at Omaha and DHS. 'Intelligence officials are trusted with some of the nation's most important secrets. Fabricating background interviews and gaming the process has the potential to put those secrets at serious risk,' Hughes told The Independent. 'There's been an increasing number of criminal cases recently against government employees with high-level security clearances leaking classified information. A thorough security clearance review is paramount to preventing such disclosures.' The Defense Counterintelligence and Security Agency is responsible for ensuring U.S. government job candidates, as well as those already on the payroll, can be trusted with, among other things, classified information. As 'America's gatekeeper,' the Defense Counterintelligence Security Agency conducts over two million background checks each year on people applying for both civilian and military roles, and reinvestigates current employees' security clearances at regular intervals. Qureshi began working at CACI in June 2018, and was assigned to the Defense Counterintelligence Security Agency security clearance investigations, according to her plea agreement. 'In that capacity, [Qureshi] conducted background investigations for the Department of Defense,' the plea agreement says. 'The investigations included applicants for DoD employment, DoD employee background reinvestigations, and investigations for security clearances of defense contractors' employees.' Qureshi was responsible for interviewing friends, acquaintances, and associates of those under investigation, and writing reports on her findings, according to the plea filing. It says the clearances in question went all the way up to the TS/SCI level, which allows individuals with a demonstrated 'need to know' to access highly classified materials. To ensure security clearance investigations are being done properly, the agency's Quality Management Oversight Group randomly selects reports to review and re-contacts the individuals interviewed with written questionnaires about the process, the plea explains. In June 2021, amid a routine probe into one of Qureshi's reports, the agency heard from 'J.F.,' a person she had spoken to as part of background investigation into a Top Secret security clearance candidate identified in the plea filing as 'M.C.' 'J.F.'s response to DCSA stated that he provided information to [Qureshi] about M.C.'s drug use,' the plea states. '[Qureshi's] report of J.F.'s interview did not contain this derogatory information.' It also says that Qureshi 'willfully falsely reported that she had interviewed M.C.'s landlord, S.R., and that S.R. stated that M.C. had lived at a Lancaster, California residence alone.' However, the plea filing goes on, Qureshi 'well knew' that she had not interviewed S.R., and S.R. 'had not stated M.C. lived alone.' 'In a subsequent interview with S.R., DCIS Special Agents learned that M.C. lived at the Lancaster residence with four roommates and that two rooms at the residence were used as vacation rentals,' the plea continues, adding that Qureshi's 'false statements were material to the decisions' that followed by DCSA as to granting M.C. a security clearance. The plea agreement, which does not specify if M.C.'s clearance was ultimately approved or not, says CACI then pulled a sample of Qureshi's other background investigations, to recheck her work. Of the cases CACI reviewed, it came to find out that 'six individuals claimed they had not been interviewed' at all by Qureshi, who, the plea maintains, 'submitted six separate reports stating that she had interviewed those individuals and provided factual narratives of their conversations.' As a result, the plea says CACI fired Qureshi in August 2021. Once she was gone, the Defense Counterintelligence Security Agency 'reworked the 299 background investigations' Qureshi had conducted over the prior year, for which she had spoken to 1,025 sources, according to the plea. In all, it says special agents discovered no fewer than 39 false reports, and pegs the cost of redoing them at $240,306.04. Two months later, Qureshi hired on as an investigator at a pair of other federal contractors, Omniplex World Services Corporation and ADC Ltd., the plea filing states. It says the two companies had contracts with DHS to perform background checks on prospective employees applying for jobs at the agency. Between late October 2021 and February 2024, when the DHS Office of Inspector General connected the dots and had Qureshi removed from all assignments connected to the agency, she conducted 608 background investigations on applicants to U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, and U.S. Citizenship and Immigration Services, according to the plea. Messages seeking comment sent on Wednesday to CACI, Omniplex and ADC went unanswered. In 2020, another CACI employee conducting security clearance investigations for DCSA pleaded guilty to fabricating nearly 70 reports in 11 months. Two years later, a Defense Counterintelligence Security Agency staffer pleaded guilty to falsifying reports as part of security clearance investigations. In 2024, another agency investigator pleaded guilty to near-identical charges, admitting to having made up more than 40 security clearance interviews that never actually took place. Qureshi pleaded guilty to one count of making false statements, a charge that carries up to five years in prison and a $250,000 fine. In Qureshi's case, however, prosecutors are recommending she be sentenced to probation and home detention. Qureshi is due to appear in court on June 16.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store