Mapunapuna FBI raid ends with state eviction notice for tenant
The businesses said the warehouse was a hub for illegal activity for years, and the state had been trying to evict the tenant for months.
Report: Two Hawaii beaches among most polluted in the country
The FBI, Honolulu Police, Humane Society and other agencies were all seen outside the warehouse early on the morning of May 29, prompting road closures in the area.
But on May 30, businesses were happy to see the area looking cleaner than normal.
'It's been a long time coming,' said one nearby business owner Chris Waidzunas. 'It just needed to happen, the homeless thing was really bad for quite a few years.'
Businesses said they've dealt with break-ins, dog attacks, thefts, fires and cleaning up feces for years.'A lot of it was coming from the dive shop which was the catalyst and center for drugs,' said another business owner. 'People were buying and selling stolen items 24-hours a day, people were dropping off stolen items.'
The man didn't want to go on camera and fears for his safety.
'People have died in the last six months over here, and it's all connected with dive shop and that group of people,' the business owner continued.
The businesses have leases with the Department of Hawaiian Homelands, which put up an eviction notice overnight for the former dive shop.
Download the free KHON2 app for iOS or Android to stay informed on the latest news
KHON2 asked HPD how many times they had received calls for illegal activities at the warehouse but they referred us to the lead agency which was the FBI. KHON2 then asked DHHL if they knew about the illegal activities taking place, but they also referred us to the FBI.
But court documents show DHHL started efforts to evict the tenant in October 2024 for not paying rent.
The following month, HPD told DHHL they suspected an illegal gambling room on the property, and in February 2025 the fire department requested the property be secured as people were tapping into the power lines.
In March 2025, DHHL enforcement officers posted a cease and desist on the door but court documents say the tenant and others continued to access the property.
Kaiser purchases Maui News building, newspaper to move out
'It's not a safe environment for us where we have bodies showing up, crazy people yelling, abusing our workers, throw things at vehicles, people throwing bricks at people the other day,' the business owner added.
According to HPD crime mapping, there have been 15 crimes reported on this corner in the last four months including stolen cars, theft, burglary, weapons, aggravated assault and property damage.
The FBI confirmed they conducted court authorized activity but could not provide details.
Businesses hope the tenants will be gone for good soon.
'Now, hopefully its done, it gets cleaned up and this neighborhood gets restored to what its supposed to be — an industrial area,' Waidzunas concluded.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
a few seconds ago
- Forbes
AI Scams Are Coming For Your Parents—Here's How To Fight Back
The pop-up looked official enough to fool anyone—blue shield, Microsoft font, a blinking 'SECURITY ALERT' and a 1-800 number 'to prevent shutdown.' On the other end of the line, a calm voice turned menacing: 'If you don't cooperate, we will have to disable your computer permanently.' My client's 79-year-old mother—let's call her 'Mary'—felt her chest tighten. She wasn't reckless; she was kind, trusting, and alone with a machine that suddenly felt hostile. The scammer pressed for remote access and a wire 'to unlock' her accounts. That's when her son (our client) became the hero. He had already installed account alerts, restricted daily transfer limits, and set up multi-factor authentication. In minutes, he froze the right accounts, shut down remote access, and called the real bank on a published number. The thief never got a dime. Mary got her peace back. That scene is becoming more common, and more convincing, for one reason: automation plus psychology. Today's criminals use generative AI to write flawless emails, mimic support scripts, and even clone voices. The con feels human—because, in a way, it is. AI Scams Are Accelerating The emotional story is real, but so are the numbers. Internet crime losses reported to the FBI hit more than $16 billion in 2024, up 33% from 2023, on 859,532 complaints—both records. Seniors are being targeted with particular ferocity: in 2024, Americans age 60+ reported $4.9 billion in losses across 147,127 complaints—double-digit growth in both complaints and dollars. It isn't just the FBI's data. The FTC's 2024 Consumer Sentinel figures show consumers reported $12.5 billion in fraud losses—25% higher year-over-year. What's amplifying the trend? More organizations—and households—are adopting AI, which accelerates both productivity and abuse. In the World Economic Forum's 2025 outlook, two-thirds of security leaders expect AI to materially reshape cyber risk in the next 12 months, yet barely a third have mature guardrails in place. On the ground, incident volume is rising: Verizon's 2025 DBIR analyzed 22,052 incidents and 12,195 confirmed breaches—the most in the report's history. Translation: the con artists are faster, more believable, and more scalable than ever. Jocelyn King, 'The Queen of Online Safety,' is a Top 10 Woman in Cybersecurity and CEO/founder of Smarter Online Safety. She says the situation is daunting but not hopeless. 'Hacker's number one tool is not AI or software algorithms. Their number one tool is people's lack of knowledge and action. If you believe your bank or the IRS or DMV is really trying to reach you, leave the conversation and contact a known number and speak to an actual agent,' she advises. 5 Practical Moves To Protect Everyday People You don't need a six-figure tech stack to get safer. You just need guardrails. Create a house rule—especially for elders—that nothing involving money or access happens in real time. If someone calls, texts, or pops up on screen asking for action, hang up or close the window. No legitimate company demands install payment over email, text or the phone. Hang up and then call the real company using a known, published number from the back of the card or the company's actual website. Add a family 'safe word' for urgent requests that claim to be from relatives ('Grandma, it's me; I need bail'). No safe word, no action. Make it a word or phrase that is not something shared on social media. Before trouble strikes, set account alerts (every transaction), MFA (multi-factor authentication) on banking, brokerage, email and password manager, and daily transfer limits small enough to sting a fraudster. Jocelyn says, 'For seniors who are not tech savvy, are too trusting, or are losing some cognitive ability, put a trusted family member's phone number on the MFA account access number. It's far better to get interrupted in a busy meeting seeing that a retirement account is being accessed for an oversees wire transfer than to later fail at trying to recover a loved one's transferred lifesavings.' Consider credit freezes at all three bureaus for seniors who don't need new loans often; it's free and reversible. When available, passkeys (face/fingerprint + device) beat passwords because there's nothing useful for criminals to steal or phish. Legitimate tech support will never cold-call you, threaten to 'shut down' your PC, or demand payment to 'unlock' anything. Uninstall unattended remote-control apps your family doesn't use. If a pop-up includes a phone number, that is itself the red flag. Close the browser entirely or power the device off. If you think malware may have been installed, consult a trusted local tech or the device maker's official support—not the number in the pop-up. Set your lock screen. Turn on automatic updates for the operating system and browsers. Use a reputable DNS filter (often free from your router or ISP) to block known malicious sites. Give every user a standard (non-admin) account for daily use and reserve admin rights for installs. On phones, disable sideloading and review app permissions—especially anything with accessibility or screen-sharing rights. When adrenaline spikes, checklists win. Review this as a family or organization and keep it in a secure location away from any visitors or prying eyes. • Bank/Broker: call fraud department on the card back; freeze cards; reverse transfers. • Email & Cloud: change passwords from a clean device; revoke suspicious sessions; enable TFA/MFA everywhere possible. • Credit: freeze your credit with all three credit bureaus; place a fraud alert. • Block and Report: file with and help investigators see patterns and may speed restitution. Why This Works Criminals rely on four levers: urgency, authority, isolation, and confusion. Your job is to remove at least two of the four. The Pause Protocol kills urgency. Known-number callbacks puncture fake authority. Family safe words and checklists reduce isolation and confusion. Money guardrails like these mean that even if someone clicks once, the blast radius is small. 'If you want to be safe online, it's critical that you realize you're in an unfair battle for your privacy, safety and money against an AI cybercrime tsunami hitting our shores," says Jocelyn. "You can't afford to miss one key area, because as we say in cybersecurity: The bad guys only have to be right once.' Let's circle back to Mary. She felt embarrassed afterward, but she shouldn't. This con was designed to bypass human logic and hijack human emotion. What saved her were systems installed in advance by someone who loved her. In an era when AI makes scams look and sound legitimate, that's the blueprint: a warmer conversation around money and technology, plus a few well-placed speed bumps that buy time for common sense to catch up. If you remember one thing, make it this: Trust your pause, not the pop-up. The right small steps—today—can turn a would-be catastrophe into nothing more than a story your family tells over dinner about the day you outsmarted a machine.

Associated Press
a few seconds ago
- Associated Press
Prosecutors to seek death penalty for man accused of killing 2 police officers in Utah
TREMONTON, Utah (AP) — Prosecutors intend to seek the death penalty for a man accused of fatally shooting two police officers in northern Utah last weekend, according to new court documents. Ryan Michael Bate faces 20 charges, including two counts of capital murder, for the deaths of Sgt. Lee Sorensen and Officer Eric Estrada. The Box Elder County Attorney's Office filed a notice to the court late Wednesday that they plan to seek the death penalty for Bate. Police say Bate, 30, killed the officers from the Tremonton-Garland Police Department with a high-powered rifle while they were responding to a domestic disturbance call at his home. Bate's wife had called 911 and hung up multiple times to get help after Bate 'slammed her head with a door, and grabbed her by the throat and pushed her against the wall,' according to charging documents. She later told police he had repeatedly threatened to kill her. Box Elder County sheriff's deputy Mike Allred and his police K-9 Azula, a 3-year-old Belgian Malinois, arrived at the scene as backup and were injured in the shooting. Bystanders persuaded Bate to drop the gun and he was taken into custody. Bate was arrested last year on aggravated assault and domestic violence charges that were later dismissed, according to court records. He was charged late Wednesday with several counts of assault and domestic violence, in addition to the murder and attempted murder charges. Utah Gov. Spencer Cox told reporters on Thursday that he thinks it is appropriate for prosecutors to seek the death penalty in this case. An attorney was not listed for Bate in court documents Thursday.


New York Times
a few seconds ago
- New York Times
Noem's Spending Rule Causes Delays at Homeland Security Dept.
The new rule came down from Kristi Noem, the homeland security secretary, in June — a decree that she would crack down on wasteful spending by personally approving any expense over $100,000. But Ms. Noem has been slow to sign off on new spending requests, including hundreds of projects that officials have deemed critical to protecting national security and advancing President Trump's immigration agenda, according to internal documents reviewed by The New York Times. As of July 30, the most recent date reflected in most of the documents, at least 530 spending requests were awaiting Ms. Noem's approval, while more than 1,500 other spending requests were awaiting review by lower-level officials before they could land on her desk, according to the documents. And while Ms. Noem said in a June memo that her reviews of the requests could take five days, in many cases they are taking weeks, the documents show. A Department of Homeland Security spokeswoman said that as of Monday, Ms. Noem did 'not have a single contract on her desk awaiting signature' — a statement that could not be independently verified. But what is clear, from documents and interviews with people briefed on the spending requests, is that the bottleneck in the approval process has halted some operations while threatening further disruptions across the sprawling department, which includes more than a dozen agencies and divisions focused on issues as varied as immigration enforcement, airport security and disaster response. At the Transportation Security Administration, for example, a contract for airport screening equipment that helps detect fake passports expired in early July while awaiting approval. A lapse in the contract 'increases the likelihood of bad actors boarding aircraft using fraudulent identification,' T.S.A. officials wrote in the internal documents. 'Failure to award this contract action will significantly impact TSA's ability to monitor and analyze vulnerabilities across the agency's field information systems. … The most affected system will be TSA's Credential Authentication Technology which checks passenger identification and Secure Flight vetting status. During an outage, Secure Flight data cannot be fed to the system, thereby requiring Transportation Security Officers to use less secure, manual methods for verifying passenger identification. This increases the likelihood of bad actors boarding aircraft using fraudulent identification and severely impacts passenger throughput at checkpoints.' Want all of The Times? Subscribe.