logo
Crime victims groups stripped of federal grant awards by Trump administration

Crime victims groups stripped of federal grant awards by Trump administration

CBS News24-04-2025
A number of nonprofit safety and victims organizations tell CBS News they are being stripped of federal grant funding by the Department of Justice. One of the organizations, the National Center for Victims of Crime, said it will have to shutter its hotline service for crime victims as early as Friday due to the funding reduction.
CBS News has obtained a copy of a memo sent Tuesday by the DOJ's Office of Justice Programs to some nonprofit organizations. The memo alerts the groups that their federal grant awards are being "terminated" because the funding "no longer effectuates the program goals or agency priorities."
Among the organizations who have been stripped of their federal funding is a major Maryland criminal victims organization, which provides healing services for major city violent crime victims. The organization requested its name not be revealed by CBS News to avoid retribution.
In an internal memo obtained by CBS News, the organization's leader wrote, "We are not the only organization impacted. Funding cuts and cancellations were also announced to approximately 55 other violence prevention, victim advocacy and substance abuse programs nationwide."
Another impacted organization is the Youth Alive nonprofit in Oakland, California, which has helped young people who have suffered from violent crime. The organization, founded in 1991, touts its work supporting gunshot victims, including at hospital bedsides.
Executive Director Joseph Griffin told CBS News the loss of funding is a "devastating blow."
"We're not just responding to violence — we're stopping it before it starts, supporting survivors in the aftermath, and walking with families through their deepest pain. When someone is shot in Oakland, we show up. Without this support, survivors will be left alone to languish in hospital beds with no roadmap to recovery — just pain, fear, and retaliation," Griffin said.
Former Department of Justice Civil Rights Division official Stacey Young told CBS News, "This administration can't claim to care about things like supporting crime victims, curbing gun violence, and reducing opioid deaths while slashing grants to entities that do the hard work to achieve these goals."
Young is the founder of Justice Connection, an organization of Justice Department alumni who've spoken out against some of the Trump administration's overhaul of the agency.
The National Center for Victims of Crime said the reduction in federal funding is potentially debilitating to its mission.
"We're shocked that an administration that claims to care about protecting victims would leave so many vulnerable Americans without access to an essential lifeline," said Renée Williams, CEO of the National Center for Victims of Crime.
Williams told CBS News the funding reduction could force the shuttering of a crime victims hotline by Friday, April 25. Williams said the hotline had been used 16,000 times by crime survivors last year.
"After calling us, countless victims indicated that they had nowhere else to turn, but found hope, help and comfort from our services," she said. "The termination of this federal grant has had an immediate impact."
Williams added, "The Justice Department also canceled a grant through which the National Center for Victims of Crime is building peer-support group programs for crime victims at 10 sites across the country, as well as a grant through which our team creates educational content for National Crime Victims' Rights Week."
The DOJ did not immediately respond to requests for comment.
Attorney General Pam Bondi, a former state attorney general in Florida, touted other grant cuts in a social media post Wednesday evening.
"The Department of Justice has started cutting millions of dollars in wasteful grants," her post said. She listed three examples: $2 million for "national listening sessions of individuals with lived experience," $695,000 for "a parallel convergent mixed-methods case study research design to assess the efficacy of police departments' LGBTQ liaison services" and $250,000 for "working with incarcerated transgender individuals providing gender affirming care to including housing in gender appropriate facilities."
The memo distributed to some victims' organizations specifies that any further expenses will not be reimbursed by the Justice Department and federal agencies after receipt of the memo.
"The use of award funds will not be allowed for obligations incurred, or expenditures made, after receipt of this notice, other than pursuant to closeout responsibilities," the memo said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Trump approval is at second-term low, with shift among Latinos, new poll finds
Trump approval is at second-term low, with shift among Latinos, new poll finds

Miami Herald

time5 minutes ago

  • Miami Herald

Trump approval is at second-term low, with shift among Latinos, new poll finds

President Donald Trump's approval rating now stands at a second-term low, according to a new Reuters/Ipsos survey. This decline is fueled in part by waning support from Hispanic voters, a demographic that helped propel Trump to victory in the 2024 election. The poll arrives during a packed summer for Trump, marked by his signing of a sweeping tax-and-spending package, his nationwide crackdown on immigration, and ongoing diplomatic efforts to resolve the Russia-Ukraine war. It also comes after Trump announced new tariffs on dozens of countries and as labor market conditions have worsened, leading Trump to fire the Bureau of Labor Statistics commissioner. Conducted over six days in August, the poll found 40% of respondents approve of Trump's job performance so far. This figure, while the lowest recorded since Trump's inauguration, is unchanged from July. But it is down 7 points from January, when a record-high 47% of Americans approved of Trump. By comparison, at the same point during his first term, Trump's approval rating was slightly lower: 35%. In August 2021, former President Joe Biden's rating hovered around 50%. Trump's recent drop in support has been borne out by other recent polls. A July Gallup survey found Trump's overall approval rating had slipped to a record low, while also dropping on key issues. The survey — which sampled 4,446 U.S. adults with a margin of error of about 2 percentage points — also found Trump's approval rating has fallen among Hispanics. About one-third of Hispanic respondents, 32%, said they approved of Trump's job performance, on par with a previous low recorded this year. By comparison, the president's approval rating among Hispanic adults stood at 34% in April and 37% in January, marking a 5-point decline, according to The Hill. In the 2024 presidential election, 46% of Hispanic voters backed the Republican president, up from the 32% he won in 2020. Additionally, the survey found that 54% of respondents believe Trump is 'too closely aligned with Russia.' It comes after he held a diplomatic summit with Russian President Vladimir Putin in Anchorage, Alaska, on Aug. 15. Three days later, Trump hosted Ukrainian President Volodymyr Zelenskyy — and other European leaders — at the White House to discuss terms for ending the war. Further, 42% of respondents said they approved of the president's handling of crime. In early August, Trump federalized the Washington, D.C., police department and deployed the National Guard to the capital in an attempt to crack down on crime. It echoed tactics used to quell protests in Los Angeles earlier this summer. An additional 43% of respondents said they backed Trump's immigration policy. Since taking office, Trump has dramatically reduced southern border crossings and ramped up deportations. On every issue, the vast majority of support for Trump came from Republicans.

US pediatricians' new COVID-19 shot recommendations differ from CDC advice
US pediatricians' new COVID-19 shot recommendations differ from CDC advice

Boston Globe

time5 minutes ago

  • Boston Globe

US pediatricians' new COVID-19 shot recommendations differ from CDC advice

'It is going to be somewhat confusing. But our opinion is we need to make the right choices for children to protect them,' he added. The AAP is strongly recommending COVID-19 shots for children ages 6 months to 2 years. Shots also are advised for older children if parents want their kids vaccinated, the AAP said. Advertisement That differs from guidance established under US Health Secretary Robert F. Kennedy Jr., which doesn't recommend the shots for healthy children of any age but says kids may get the shots in consultation with physicians. Get Starting Point A guide through the most important stories of the morning, delivered Monday through Friday. Enter Email Sign Up Children ages 6 months to 2 years are at high risk for severe illness from COVID-19, and it was important that recommendations continue to emphasize the need for them to get vaccinated, said Campbell, a University of Maryland infectious diseases expert. Vaccinations also are recommended for older children who have chronic lung diseases or other conditions that put them at higher risk for severe disease, the AAP said. In a statement, Department of Health and Human Services spokesperson Andrew Nixon said 'the AAP is undermining national immunization policymaking with baseless political attacks.' He accused the group of putting commercial interests ahead of public health, noting that vaccine manufacturers have been donors to the AAP's Friends of Children Fund. The fund is currently paying for projects on a range of topics, including health equity and prevention of injuries and deaths from firearms. Advertisement The 95-year-old Itasca, Illinois-based organization has issued vaccination recommendations for children since the 1930s. In 1995, it synced its advice with recommendations made by the federal government's Centers for Disease Control and Prevention. There have been a few small differences between AAP and CDC recommendations since then. For example, the AAP has advised that children get HPV vaccinations starting at age 9; the CDC says that's OK but has emphasized vaccinations at ages 11 and 12. But in 30 years, this is the first time the recommendations have differed 'in a significant or substantial way,' Campbell said. Until recently, the CDC — following recommendations by infectious disease experts — has been urging annual COVID-19 boosters for all Americans ages 6 months and older. But in May, US Health Secretary Robert F. Kennedy Jr. announced that COVID-19 vaccines are no longer recommended for healthy children and pregnant women. A few days later, the CDC issued language that healthy children may get the shots, but that there was no longer a 'should' recommendation. The idea that healthy older kids may be able to skip COVID-19 boosters has been brewing for some time among public health experts. As the COVID-19 pandemic has waned, experts have increasingly discussed the possibility of focusing vaccination efforts on people 65 and older — who are among those most as risk for death and hospitalization. A CDC expert panel in June was set to make recommendations about the fall shots. Among the options the panel was considering was whether suggest shots for high-risk groups but still giving lower-risk people the choice to get vaccinated. Advertisement But Kennedy bypassed the group, and also decided to dismiss the 17-member panel and appoint his own, smaller panel, that included vaccine skeptics. Kennedy also later excluded the AAP, the American Medical Association and other top medical organizations from working with the advisers to establish vaccination recommendations. Kennedy's new vaccine panel has yet to vote on COVID-19 shot recommendations. The panel did endorse continuing to recommend fall flu vaccinations, but also made a decision that led to another notable difference with the AAP. The new advisory panel voted that people should only get flu vaccines that are packaged as single doses and do not contain the preservative thimerosal. The AAP said there is no evidence of harm from the preservative, and recommended doctors use any licensed flu vaccine product that's appropriate for the patient.

How North Korea's IT army is hacking the global job market
How North Korea's IT army is hacking the global job market

Axios

time5 minutes ago

  • Axios

How North Korea's IT army is hacking the global job market

Nearly every Fortune 500 company is hiding the same uncomfortable secret: they have hired a North Korean IT worker. Why it matters: Despite how widespread the issue is, few companies are willing to talk publicly about it. Experts say reputational risk, legal uncertainty, and embarrassment all contribute to the silence — which in turn makes the problem harder to solve. Dozens of resumes, LinkedIn profiles, and fraudulent identity documents shared with Axios lay bare the scale and sophisticated of the scams. The big picture: For North Korea, this is a precious revenue stream that evades American sanctions — capitalizing on the wealth of high-paying remote worker roles in the U.S. to route cash back to Pyongyang. In the past two years, companies and their security partners have begun to grasp the scale of the problem — and now, they're sounding the alarm about where it's headed next. "They've been stealing intellectual property and then working on the projects themselves," Michael "Barni" Barnhart, principal investigator at DTEX Systems, told Axios. "They're going to use AI to magnify exponentially what they're already doing — and what they're doing now is bad." Between the lines: It sounds easy to simply weed out North Korean job applicants. But some of the world's biggest firms have found it devilishly difficult. That's because the North Korean operation has become as complex as a multi-national corporation. It involves several North Korean government offices, dozens of China-based front companies and Americans willing to facilitate the fraud. And the undercover North Korean IT workers are often exceptional at their jobs — at least until they start stealing sensitive data or extorting companies that try to fire them. Google Threat Intelligence VP Sandra Joyce recalled the response of one employer when told they likely had a North Korean fraudster on staff: "You guys better be right, because that is my best guy." The groups running the show North Korea has invested years into building up its remote IT labor force, providing training not just for remote job fraud but also corporate espionage and IP theft. Workers are selected and trained at elite institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong — some with specializations in software development, AI or cryptography. Research from DTEX shows that the most advanced worker scams are often coordinated with units like APT 45, a notorious government hacking group known for infiltrating companies, running scams and laundering money. Other participants in the scheme include the Lazarus Group, which typically leads the regime's cryptocurrency hacks and has positioned insiders within crypto companies, and Research Center 227, a new AI research unit inside North Korea's intelligence agency. The intrigue: Cybersecurity companies have been discovering and naming new groups running these hacks, with names like Jasper Sleet, Moonstone Sleet and Famous Chollima. The scale Driving the news: Nine security officials who spoke with Axios all said they've yet to meet a Fortune 500 company that hasn't inadvertently hired a North Korean IT worker. Google told reporters at the RSA Conference in May that it had seen North Koreans applying to its jobs. SentinelOne and others have said the same. KnowBe4, a cybersecurity training company, admitted last year that it hired a North Korean IT worker. A smaller cryptocurrency startup told the WSJ that they accidentally had North Korean workers on their payroll for almost two years. In one case, Sam Rubin, senior vice president of Palo Alto Networks' Unit 42 consulting and threat intelligence team, told Axios that within 12 hours of a large client posting a new job, more than 90% of the applicants were suspected to be North Korean workers. "If you hire contract IT workers, this has probably happened to you," Rubin said. The intrigue: Even small-to-mid-sized companies that rely on remote IT talent or outsource their IT needs to a consulting firm have encountered this problem, Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said. CrowdStrike has investigated more than 320 incidents where North Korean operatives landed jobs as remote software developers, according to the company's annual threat hunting report published earlier this month. How it works Getting a job at a U.S. company — and going undetected — is a team effort that involves several North Korean IT workers, China-based companies and even a handful of Americans. Some of the North Korean workers are even stationed in China and other nearby countries to keep suspicions low. First, the workers identify potential identities they can assume. Those are often stolen from a real person, or even from a dead U.S. citizen. To pull off this deception, they create fake passwords, Social Security cards and utility bills. Many of them use the same recognizable tablecloth in the background of fake ID photos, Meyers said. For instance, in a December indictment of 14 North Koreans, the workers were found using stolen identities to apply to dozens of jobs. Second, the workers find open jobs in software development, technical support and DevOps posted on Upwork, Fiverr, LinkedIn, and third-party staffing platforms. Much of this is streamlined through AI tools that help track and manage their job applications. Many of them will use AI tools to help generate passable resumes and LinkedIn profiles, according to Trevor Hilligoss, senior vice president at SpyCloud Labs. "There's a hierarchy: There's a group of people who are the interviewers, and they're the ones with the really good English specialties," Hilligoss told Axios. "When they get hired, that gets turned over to somebody that's a developer." Those developers will often juggle several jobs and multiple different personas. Zoom in: Job interviews would seem like the obvious time to catch a fraudulent application. But the "applicants" — whether they're using their real faces and voices or AI-enabled personas — are practiced interviewers with the skills necessary to complete technical coding assignments. In multiple cases, hiring managers only realized something was wrong weeks later when employees looked or behaved differently than during the interview, Barnhart said. After landing the job, the developers step in and request that their company laptop be shipped to a U.S. address — often citing a last-minute move or family emergency. That address often belongs to an American accomplice, who typically operates what's known as a "laptop farm." These facilitators are told to install specific remote desktop software onto the laptops so the North Korean worker can operate the laptop from abroad. In July, the FBI said it executed searchers of 21 premises across 14 states that were known or suspected laptop farms, seizing 137 laptops. Then there's the challenge of ensuring the salaries actually reach the North Korean regime. That often requires the facilitators forward the paychecks to front companies across China or funnel it through cryptocurrency exchanges. In a report published in May, researchers at Strider Technologies identified 35 China-based companies linked to helping North Korean operations. Challenges Hiring processes are so siloed that it's difficult for managers to see all the signs of fraud until the North Korean workers start their roles, Kern said. Even if a company suspects something is wrong, the forensic signals can be subtle and scattered. Security teams may detect unusual remote access tools or strange browser behavior. HR might notice recycled references or resumes that reuse the same phone number. But unless those insights are pooled together, it rarely raises alarms. "There's not one giant red flag to point to," said Sarah Kern, a leading North Korea analyst at Sophos' Counter Threat Unit. "It is multiple technical forensic aspects and then such a human aspect of small things to pick up on that aren't necessarily going to be in telemetry data from an endpoint detection standpoint." Yes, but: Even when these workers are detected, they're not easy to fire. Many of them are so talented that managers are reluctant to even believe they could actually be in North Korea, Alexandra Rose, director at Sophos' Counter Threat Unit, told Axios. If these workers are caught, employers then face a litany of problems: Some workers will download sensitive internal data and extort the companies for a hefty sum in a last-ditch effort to bleed the company of whatever money they can. Some workers have filed legal complaints, including workers' compensation claims, Barnhart said. In one case, Barnhart said he had a worker try to claim domestic violence protections as they were being fired just to buy time. "There is a lot of focus on companies that cybersecurity shouldn't just be for the CISO," Rose said. "You want a bit of that security feel throughout the company, and this is the kind of case that really demonstrates why that is." The bottom line: Some companies also hesitate to report these incidents, fearing they could be penalized for unknowingly violating U.S. sanctions — even though law enforcement officials have said they're more interested in cooperation than prosecution. What's next Right now, the operations are predominantly focused on making money for North Korea's regime. Threat level: But the hacking groups involved are evolving into something more sophisticated and dangerous — including by potentially building their own AI models and feeding in sensitive U.S. company data. That's a particular concern in the defense sector. Barnhart says his teams have seen North Korean IT workers increasingly studying information about AI technologies, drone manufacturing and other defense contract work. What to watch: As U.S. companies become more alert, North Korean IT workers are shifting their focus abroad as they seek employment at other companies and set up laptop farms throughout Europe — suggesting the operation is only just now ramping up, instead of slowing down.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store