logo
Who is Heston James? TikTok influencer arrested for viral pranks disrupting businesses

Who is Heston James? TikTok influencer arrested for viral pranks disrupting businesses

Hindustan Times3 days ago
Police have arrested Heston Cobb, an Arizona based influencer, for disrupting local businesses through a series of pranks. Heston Cobb was arrested at his home on July 23.(X/@MAGAgeddon)
Authorities said businesses in Tempe, Arizona, reported numerous instances of groups of men who entered their stores dressed as employees and then refused to leave when asked. Probing these incidents, cops found them linked to viral prank videos uploaded to social media by Cobb, who enjoys a 1.6 million-strong following on TikTok, People reported.
Who is Heston Cobb?
Heston Cobb or Heston James, as he's known to his followers, is a TikTok influencer. He was arrested at his home on July 23. Cobb was booked on one count of burglary, two counts of criminal impersonation, five counts of disorderly conduct and five counts of criminal trespass.
Also Read | TikTok will go dark in US without Chinese approval of sale deal, says Howard Lutnick
If Cobb gets the maximum punishment under Arizona law, he could be looking at up to nine years in jail and a fine of $315,000.
What viral prank was Heston Cobb playing?
Cobb, in a series of videos, from March to May, could be seen shrieking in various stores, then pretending not to know where the screams came from, when approached by staff.
On July 4, he posted a TikTok video, where he claims to be an employee of a car mechanic shop. He says he's 'from corporate' and has gotten 'multiple complaints'. Then, a van full of men in jumpsuits enter the place of business and begin operating on cars there.
'These videos are definitely not pranks. They are crossing the line from something that's fun and playful into criminal territory. They're breaking laws,' Tempe Police Officer Jessica Ells said to AZFamily, adding, 'They are going into these businesses and impersonating the employees. That actually is a felony charge.'
Pep Boys, Hyland Auto Repair, Big Brand Tire & Service, Jiffy Lube and Chipotle were among businesses impacted by Cobb's pranks.
'Hopefully this will put pressure on Instagram, YouTube, and all of the other platforms to really look at what people are posting,' Hyland Auto owner told the publication.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

‘Film producer' arrested for providing mule account to Chinese national
‘Film producer' arrested for providing mule account to Chinese national

Hindustan Times

time2 hours ago

  • Hindustan Times

‘Film producer' arrested for providing mule account to Chinese national

PUNE: The Cyber Cell of the Pimpri Chinchwad police arrested a film producer for providing his mule bank accounts to a Chinese cyber criminal for crediting money acquired through cyber frauds. The accused has been identified as Shivam Balkrishna Samvatsarkar from Erandwane. The Cyber Cell of the Pimpri Chinchwad police arrested a film producer for providing his mule bank accounts to a Chinese cyber criminal for crediting money acquired through cyber frauds. The accused has been identified as Shivam Balkrishna Samvatsarkar from Erandwane. (Shutterstock) The police said a complaint was filed on 23 July after the complainant lost more than ₹57 lakh in a share market fraud. The complainant, who is a highly qualified IT professional, was surfing on Youtube when he saw a video on the stock market. When he clicked on the link, he came in contact with an individual, who offered him tips to get good returns on investments. Accordingly, the victim invested and initially, his dashboard showed profits. However, when he tried to withdraw his profits, he was asked to pay various charges first. Realising then that he had been duped, he approached the police. During police investigation, it was revealed that a fraud amount was received in Balaji Enterprises' HDFC bank account. With the help of Deccan police, Pimpri Chinchwad police identified the account holder and arrested him. Pravin Swami, assistant inspector at Cyber Police Station, Pimpri Chinchwad, said, 'Initially, the accused did not admit to any crime, saying he was a film producer. Later, he revealed that he and a Chinese person who goes by the name, Bambino, were involved in this case.' Ravikiran Nale, senior inspector, Cyber Police said, 'Total 15 complaints of cyber fraud have been reported against his bank account and till date ₹86,43,119 have been received in his account via various frauds.' Their investigation also revealed that for sharing mule accounts with cyber fraudsters, the accused used to get 10 % commission. For the last six months, the accused shared his bank account details with many Chinese nationals. Police said some of the friends of the accused were involved in mule account-sharing business. They were earning good income without coming under the radar of the police. Hence, the accused also decided to enter the field but got caught by the Pimpri Chinchwad police. A case has been filed at the Pimpri Chinchwad Police Station under sections of 318(4), 316(2) 3(5)of the BNS and sections 66 (c) and 66 (d) of the Information Technology Act.

Temu accused by EU regulators of failing to prevent sale of illegal products
Temu accused by EU regulators of failing to prevent sale of illegal products

The Hindu

time3 hours ago

  • The Hindu

Temu accused by EU regulators of failing to prevent sale of illegal products

Chinese online retailer Temu was accused by European Union watchdogs on Monday of failing to prevent the sale of illegal products on its platform. The preliminary findings follow an investigation opened last year under the bloc's Digital Services Act. It's a wide-ranging rulebook that requires online platforms to do more to keep internet users safe, with the threat of hefty fines. The European Commission, the 27-nation bloc's executive branch, said its investigation found 'a high risk for consumers in the EU to encounter illegal products' on Temu's site. Investigators carried out a 'mystery shopping exercise' that found 'non-compliant' products on Temu, including baby toys and small electronics, it said. Temu said in a brief statement that it 'will continue to cooperate fully with the Commission.' The commission didn't specify why exactly the products were illegal, but noted that a surge in online sales in the bloc also came with a parallel rise in unsafe or counterfeit goods. EU regulators said when they opened the investigation that they would look into whether Temu was doing enough to crack down on 'rogue traders' selling 'non-compliant goods' amid concerns that they are able to swiftly reappear after being suspended. In its preliminary findings, the Commission found that Temu could have had 'inadequate mitigation measures' because the company was using an 'inaccurate' risk assessment that relied on general industry information, rather than specifics about its own marketplace. 'We shop online because we trust that products sold in our Single Market are safe and comply with our rules,' Henna Virkkunen, the EU's executive vice-president for tech sovereignty, security and democracy, said in a news release. "In our preliminary view, Temu is far from assessing risks for its users at the standards required by the Digital Services Act. Temu has grown in popularity by offering cheap goods - from clothing to home products — shipped from sellers in China. The company, owned by Pinduoduo Inc., a popular e-commerce site in China, has 92 million users in the EU. The company will have the chance to examine the Commission's investigation files and respond to the accusations before the EU watchdogs make a final decision. Violations of the DSA could result in fines of up to 6% of a company's annual global revenue and an order to fix the problems.

Op Mahadev: How Chinese device gave Pahalgam mastermind away and led to his killing
Op Mahadev: How Chinese device gave Pahalgam mastermind away and led to his killing

First Post

time4 hours ago

  • First Post

Op Mahadev: How Chinese device gave Pahalgam mastermind away and led to his killing

A Chinese communication device that turned on two days ago helped Indian security officials track down three terrorists inside the Dachigam forest of Jammu and Kashmir. It took a team of highly-trained personnel less than three hours to complete the mission, resulting in the deaths of the three, who were reportedly linked to the Pahalgam attack, including the mastermind Hashim Musa read more Security personnel keep vigil after after Operation Mahadev in which three terrorists were killed in an encounter, near Dachigam in Srinagar district, Jammu and Kashmir. PTI 'Those who are gone won't return, but terror must end. We are proud of the Indian Army.' 'The pain will never go, the closure may never come. But at least now, we can sleep a little better knowing that those who killed my husband are no more.' These were just some of the reactions from families of the victims of the Pahalgam attack shortly after the Indian Army successfully eliminated three terrorists, including the mastermind of the April 22 tragedy, in an operation dubbed Operation Mahadev on Monday (July 28). STORY CONTINUES BELOW THIS AD The operation resulting in the deaths of the terrorists, was launched by the Chinar Corps of the Indian Army in the general area of Lidwas in Jammu and Kashmir. Hours after the operation, the three slain terrorists were identified as Hashim Musa alias Suleiman, widely regarded as the mastermind behind the Pahalgam attack. The other two have also been identified as Yasir, Abu Hamza. All three of them were foreign nationals affiliated with the Pakistan-based terror outfit Lashkar-e-Taiba (LeT). But how did Indian authorities track these three terrorists down and kill them? What's the significance of the name behind the operation? We get you all the answers and much, much more. Tracking the 3 terrorists down Ever since the April 22 Pahalgam attack in which 26 people were horrifically killed, the security personnel in Kashmir have been on high alert and been searching for any clues to find those involved in the attack. They finally received a breakthrough 14 days ago when they received suspicious communication. The forces got a clue about a Chinese ultra radio communication being active, after which the operation was carried out. The LeT uses the Chinese radio for encrypted messages and reportedly even used them during the planning and execution of the Pahalgam terror attack. Then two days ago, the group of terrorists activated the communication device once again, allowing for the security officials to pick up their precise location — the Dachigam forest area. Official sources revealed that local nomads also provided inputs, helping the forces to narrow down the location of the terrorists. The encounter occurred in General Area Lidwas and drone footage showed three bodies, confirming that three terrorists were neutralised. PTI Trapping the three terrorists Narrowing down their location to the Dachigam forests in Jammu and Kashmir, officials deployed several units in the area to further pinpoint their exact spot. The Dachigam forest has two sides — one extending towards Pahalgam in south Kashmir's Anantnag district and another connecting Ganderbal district. Once the terrorists were located, the security personnel launched a drone on Monday in that area to get a clear visual of the terrorists. Once they received visuals, personnel from the Rashtriya Rifles (RR) and Para Special Forces commandos and ascended the Mahadev hill. STORY CONTINUES BELOW THIS AD Then using the element of surprise, the team encircle the terrorists around 11.30 am and swiftly neutralised them. An NDTV report states that 45 minutes later, a cleansing operation was launched in a two-kilometre radius of the encounter site. And at 12:45 pm, the terrorists' bodies were identified and photographed. Sources told India Today that at the time of the encounter, the terrorists were napping and caught completely unaware. OP MAHADEV - Update Three terrorist have been neutralised in an intense firefight. Operation Continues.#Kashmir@adgpi@NorthernComd_IA — Chinar Corps🍁 - Indian Army (@ChinarcorpsIA) July 28, 2025 Weapons, pots at encounter site Amid the cleansing stage of Operation Mahadev, security troops also recovered weapons from the site. Preliminary reports suggest a US-made carbine, an AK-47, 17 rifle grenades, and other materials were recovered. For those who don't know, rifle grenades are explosive devices fired from the barrel or grenade launcher of a rifle, not thrown by hand. They are capable of hitting targets that are over 200 metres away. STORY CONTINUES BELOW THIS AD The recovery of such weapons indicates that the terrorists were well-equipped and possibly planning another major strike. Eatables and cooking utensils were also spotted at the hideout. Security personnel during the cordon and search operation, near Dachigam in Srinagar district. PTI Reactions to Operation Mahadev The killing of the three terrorists in Operation Mahadev led to many praising and congratulating those involved in it. J&K Lieutenant-Governor Manoj Sinha congratulated the security forces for the Dachigam operation. 'The police and security forces can provide more details after the operation will be over. Such operations have been ongoing for several months now, jointly carried out by the J&K Police, Army, and CRPF, in which terrorists are being eliminated.' Meanwhile, families of the victims of the Pahalgam terror attack said they have received some kind of closure following the killing of the terrorists. Reacting to the news, Vikas Kumrawat, who lost his elder brother in the Pahalgam attack told PTI, 'We were thinking for a long time why the terrorists involved in the Pahalgam attack have not been caught yet? We are very happy and relieved with the news of the army killing the mastermind of this attack. This action is a special achievement of our government and the army.' In Haryana's Nawal, Rajesh Narwal, father of slain Indian Navy officer Lt Vinay Narwal, praised the Armed Forces for their bravery. 'I want to salute the Army, our paramilitary and J-K police jawans for their bravery,' said Rajesh Narwal. 'The way they did not care for their lives and hunted them down is not an easy task. I salute them for their bravery. They should be honoured for this,' he further said. STORY CONTINUES BELOW THIS AD Significance of name behind Operation Mahadev Carried out jointly by the Indian Army, Jammu and Kashmir Police and the CRPF, what's the reasoning behind the name of the operation? The choice isn't just symbolic but also tactical. That's because it took place near Mahadev peak, which is part of the Zabarwan Range and holds both strategic and spiritual value. Kashmiri folklore states that this is the path that Lord Shiva took to reach the Amarnath Cave, where he related the Amar Katha (the tale of immortality) to Goddess Parvati. With inputs from agencies

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store