
1 person killed in California house fire after fireworks explode in garage
The fire erupted in the garage and spread to the attic and main areas of the home in Simi Valley, California, part of Ventura County about 40 miles northwest of Los Angeles, officials said.
The Ventura County Fire Department and Simi Valley Police Department responded to the fire at the residence at about 11:48 a.m. on July 3. Calls reported what sounded like a large explosion followed by a series of smaller ones, said Simi Valley police Sgt. Rick Morton. When the first police supervisor arrived at 12:08 p.m., he could still hear small explosions.
The garage and attic were fully engulfed in flames and the roof had collapsed, Morton said.
"The explosions were determined to be fireworks," the Simi Valley Police Department said in a statement.
Firefighters on the scene issued a second alarm as the flames spread, officials said on social media.
"I was in bed and woke up when I heard the explosion," said Wilfredo Aceves-Velasquez, 25, who lives nearby on Hudspeth Avenue.
Are fireworks safe? Fireworks needlessly destroy fingers, hands and lives every year, doctors say
By 1:45 p.m., caution tape closed off portions of Edmund Street where fire engines and utility trucks parked along the roadway. The home's garage door was blown from its hinges and could be seen near the curb across the street.
At the scene, Scott Thomsen, county fire spokesman, confirmed the explosion. The cause of the fire was under investigation.
Fireworks, which are illegal in Simi Valley, were found in the garage and in a truck in the driveway. Investigators have not yet confirmed what started the fire, Morton said.
Police said the person killed was an adult male but did not release his identity.
A mother and an adult son reportedly live in the residence. The mother was at work when the explosion occurred, Morton said. She returned home as firefighters worked to extinguish the flames, he said.
Another fireworks explosion sparked huge fire
Over 400 miles away from Simi Valley in the northern part of the state, another explosion at a fireworks factory sparked a fire earlier in the week, authorities there said.
The factory exploded on July 1 in Yolo County northwest of Sacramento shortly after 6 p.m. The blast caused fires at several nearby structures and the fire spread to 78 acres. It was 60% contained as of July 4, according to CalFire. Video of that explosion showed a fire and huge plume of smoke with fireworks continuously going off within the smoke.
The fire and explosion prompted evacuation orders and crews worked to locate seven people unaccounted for.
Fireworks kill and injure Americans every year
Last year, 11 Americans died from fireworks injuries and more than 14,700 were treated in emergency rooms, according to the U.S. Consumer Product Safety Commission. Injuries include burns to the hands and fingers or head, face and ears in more than one-third of cases.
"These are effectively bombs people are holding in their hands," Dr. Nicolas Lee, a professor of clinical orthopedic surgery at the University of California San Francisco who directs a hand reconstruction program, previously told USA TODAY. "We see hands and fingers blown off, groin injuries, facial burns and damage. I've had kids blow off their eyelids so they can't close their eyes."
Experts say following these safety tips can help prevent a life-changing injury or death:
Ernesto Centeno Araujo covers breaking news for the Ventura County Star. He can be reached at ecentenoaraujo@vcstar.com.
Contributing: Elizabeth Weise and Anthony Robledo, USA TODAY

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


New York Post
an hour ago
- New York Post
Sen. Chuck Grassley demands probe of ‘bureaucrats' who sidelined CBP whistleblowers — and were promoted
WASHINGTON — Sen. Chuck Grassley (R-Iowa) is demanding an investigation of US Customs and Border Protection (CBP) officials who allegedly retaliated against whistleblowers who flagged failures to fingerprint potentially dangerous criminal migrants, The Post can exclusively reveal. The Senate Judiciary Committee chairman fired off a letter Monday to CBP Commissioner Rodney Scott naming and shaming those 'bureaucrats' who were promoted even after they sidelined whistleblowers Fred Wynn, Mike Taylor and Mark Jones. 'To ensure that retaliation does not happen again at [Department of Homeland Security], CBP, or any of the Department's other component agencies, the bureaucrats that retaliated against Mr. Wynn, Mr. Taylor, and Mr. Jones must be held accountable,' Grassley told Scott. Advertisement 6 Sen. Chuck Grassley (R-Iowa) is demanding an investigation into US Customs and Border Protection (CBP) officials who allegedly retaliated against whistleblowers pointing out failures to fingerprint criminal migrants in custody. REUTERS 'Although it's unclear to me whether all retaliators have faced consequences, I've been made aware that some have been promoted,' he added. The Iowa Republican singled out Ronald Ocker, assistant commissioner of CBP's Office of Intelligence, and Juan Fernandez, the executive director of that office, for having 'improperly removed' the whistleblowers nearly a decade ago from a pilot program to implement the DNA Fingerprint Act of 2005. Advertisement Jones, Taylor and Wynn worked in the agency's Weapons of Mass Destruction Division between 2016 and 2018 — and found out that federal law enforcement officers weren't enforcing the statute. 6 All three CBP agents worked in the agency's Weapons of Mass Destruction Division between 2016 and 2018 — and uncovered that federal law enforcement officers weren't enforcing the statute. James Keivom As a result, DNA from criminal arrestees hadn't been collected since 2009, allowing 'subjects subsequently accused of violent crimes, including homicide and sexual assault, to elude detection even when detained multiple times by CBP or Immigration and Customs Enforcement (ICE),' according to an earlier investigation by the US Office of Special Counsel (OSC). Those 'exceptions to DNA sample collection from criminal arrestees' had been approved by former Attorney General Eric Holder during the Barack Obama administration. Advertisement 'I believe that if you could get the totality for that period of time [since 2009] … of how many Americans ended up being killed as a result, I think it probably exceeds the number of Americans who died on 9/11,' one source with direct knowledge of the security failure previously told The Post. 6 In his April confirmation hearing, CBP commissioner-designate Rodney Scott had promised Grassley he would 'look into' the case and 'hold people accountable if they've violated policies.' Paul Martinka When the whistleblowers drew attention to the issue, they faced professional and financial consequences — including being kicked off of the WMD pilot program by Ocker and Fernandez, according to Grassley's letter. Jones, who served as acting director of the pilot WMD fingerprint program, was passed over for the director position at a new office called the Operational Field Testing Division, which conducted similar law enforcement work Advertisement Taylor lost retirement benefits and had his pension payments stopped. Both he and Jones were also stripped of their guns and badges. 6 But when they drew attention to it, the CBP whistleblowers faced professional and financial consequences — including being kicked off of the WMD pilot program by Ocker and Fernandez, according to Grassley's letter. Catherine Herridge Reports OSC's investigation concluded that CBP officials 'retaliated against' the three agents 'for actual or perceived disclosures of wrongdoing,' Grassley noted in his letter. 'OSC also noted that Fernandez did not name Mr. Jones Acting Deputy Director of Operational Field Testing Division (OFTD), despite stating in a March 6, 2018, email that it would happen,' the senator also stated. 'Further, OSC found that both Ocker and Fernandez engaged in retaliation when they passed Mr. Jones over for Director of the OFTD when it stated, 'the agency does not have strong evidence in support of its stated reason or decision not to interview Mr. Jones or fairly consider him for the OFTD Director position.'' 6 Grassley had also relayed details of their case to DHS Inspector General Joseph Cuffari in May 2024. REUTERS Jones, Taylor and Wynn were only given new supervisory roles, backpay and their retirement benefits back in May after Grassley highlighted the 'seven-year nightmare these brave whistleblowers endured.' In his April confirmation hearing, Scott had promised Grassley he would 'look into' the case and 'hold people accountable if they've violated policies.' Advertisement 'Thank you for always stepping up and supporting the whistleblowers. I think it's a critical part of our government, it pushes transparency,' Scott also told the Republican senator. 6 The trio received new supervisory roles, backpay and retirement benefits in May after Grassley highlighted the 'seven-year nightmare these brave whistleblowers endured.' AP 'I do know those three, and I know one allegation that's never been levied against them is a challenge of their integrity.' Grassley had also relayed details of the case to DHS Inspector General Joseph Cuffari in May 2024. That office is still believed to be investigating the matter as well. Reps for CBP did not immediately respond to a request for comment.


Axios
2 hours ago
- Axios
How North Korea's IT army is hacking the global job market
Nearly every Fortune 500 company is hiding the same uncomfortable secret: they have hired a North Korean IT worker. Why it matters: Despite how widespread the issue is, few companies are willing to talk publicly about it. Experts say reputational risk, legal uncertainty, and embarrassment all contribute to the silence — which in turn makes the problem harder to solve. Dozens of resumes, LinkedIn profiles, and fraudulent identity documents shared with Axios lay bare the scale and sophisticated of the scams. The big picture: For North Korea, this is a precious revenue stream that evades American sanctions — capitalizing on the wealth of high-paying remote worker roles in the U.S. to route cash back to Pyongyang. In the past two years, companies and their security partners have begun to grasp the scale of the problem — and now, they're sounding the alarm about where it's headed next. "They've been stealing intellectual property and then working on the projects themselves," Michael "Barni" Barnhart, principal investigator at DTEX Systems, told Axios. "They're going to use AI to magnify exponentially what they're already doing — and what they're doing now is bad." Between the lines: It sounds easy to simply weed out North Korean job applicants. But some of the world's biggest firms have found it devilishly difficult. That's because the North Korean operation has become as complex as a multi-national corporation. It involves several North Korean government offices, dozens of China-based front companies and Americans willing to facilitate the fraud. And the undercover North Korean IT workers are often exceptional at their jobs — at least until they start stealing sensitive data or extorting companies that try to fire them. Google Threat Intelligence VP Sandra Joyce recalled the response of one employer when told they likely had a North Korean fraudster on staff: "You guys better be right, because that is my best guy." The groups running the show North Korea has invested years into building up its remote IT labor force, providing training not just for remote job fraud but also corporate espionage and IP theft. Workers are selected and trained at elite institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong — some with specializations in software development, AI or cryptography. Research from DTEX shows that the most advanced worker scams are often coordinated with units like APT 45, a notorious government hacking group known for infiltrating companies, running scams and laundering money. Other participants in the scheme include the Lazarus Group, which typically leads the regime's cryptocurrency hacks and has positioned insiders within crypto companies, and Research Center 227, a new AI research unit inside North Korea's intelligence agency. The intrigue: Cybersecurity companies have been discovering and naming new groups running these hacks, with names like Jasper Sleet, Moonstone Sleet and Famous Chollima. The scale Driving the news: Nine security officials who spoke with Axios all said they've yet to meet a Fortune 500 company that hasn't inadvertently hired a North Korean IT worker. Google told reporters at the RSA Conference in May that it had seen North Koreans applying to its jobs. SentinelOne and others have said the same. KnowBe4, a cybersecurity training company, admitted last year that it hired a North Korean IT worker. A smaller cryptocurrency startup told the WSJ that they accidentally had North Korean workers on their payroll for almost two years. In one case, Sam Rubin, senior vice president of Palo Alto Networks' Unit 42 consulting and threat intelligence team, told Axios that within 12 hours of a large client posting a new job, more than 90% of the applicants were suspected to be North Korean workers. "If you hire contract IT workers, this has probably happened to you," Rubin said. The intrigue: Even small-to-mid-sized companies that rely on remote IT talent or outsource their IT needs to a consulting firm have encountered this problem, Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said. CrowdStrike has investigated more than 320 incidents where North Korean operatives landed jobs as remote software developers, according to the company's annual threat hunting report published earlier this month. How it works Getting a job at a U.S. company — and going undetected — is a team effort that involves several North Korean IT workers, China-based companies and even a handful of Americans. Some of the North Korean workers are even stationed in China and other nearby countries to keep suspicions low. First, the workers identify potential identities they can assume. Those are often stolen from a real person, or even from a dead U.S. citizen. To pull off this deception, they create fake passwords, Social Security cards and utility bills. Many of them use the same recognizable tablecloth in the background of fake ID photos, Meyers said. For instance, in a December indictment of 14 North Koreans, the workers were found using stolen identities to apply to dozens of jobs. Second, the workers find open jobs in software development, technical support and DevOps posted on Upwork, Fiverr, LinkedIn, and third-party staffing platforms. Much of this is streamlined through AI tools that help track and manage their job applications. Many of them will use AI tools to help generate passable resumes and LinkedIn profiles, according to Trevor Hilligoss, senior vice president at SpyCloud Labs. "There's a hierarchy: There's a group of people who are the interviewers, and they're the ones with the really good English specialties," Hilligoss told Axios. "When they get hired, that gets turned over to somebody that's a developer." Those developers will often juggle several jobs and multiple different personas. Zoom in: Job interviews would seem like the obvious time to catch a fraudulent application. But the "applicants" — whether they're using their real faces and voices or AI-enabled personas — are practiced interviewers with the skills necessary to complete technical coding assignments. In multiple cases, hiring managers only realized something was wrong weeks later when employees looked or behaved differently than during the interview, Barnhart said. After landing the job, the developers step in and request that their company laptop be shipped to a U.S. address — often citing a last-minute move or family emergency. That address often belongs to an American accomplice, who typically operates what's known as a "laptop farm." These facilitators are told to install specific remote desktop software onto the laptops so the North Korean worker can operate the laptop from abroad. In July, the FBI said it executed searchers of 21 premises across 14 states that were known or suspected laptop farms, seizing 137 laptops. Then there's the challenge of ensuring the salaries actually reach the North Korean regime. That often requires the facilitators forward the paychecks to front companies across China or funnel it through cryptocurrency exchanges. In a report published in May, researchers at Strider Technologies identified 35 China-based companies linked to helping North Korean operations. Challenges Hiring processes are so siloed that it's difficult for managers to see all the signs of fraud until the North Korean workers start their roles, Kern said. Even if a company suspects something is wrong, the forensic signals can be subtle and scattered. Security teams may detect unusual remote access tools or strange browser behavior. HR might notice recycled references or resumes that reuse the same phone number. But unless those insights are pooled together, it rarely raises alarms. "There's not one giant red flag to point to," said Sarah Kern, a leading North Korea analyst at Sophos' Counter Threat Unit. "It is multiple technical forensic aspects and then such a human aspect of small things to pick up on that aren't necessarily going to be in telemetry data from an endpoint detection standpoint." Yes, but: Even when these workers are detected, they're not easy to fire. Many of them are so talented that managers are reluctant to even believe they could actually be in North Korea, Alexandra Rose, director at Sophos' Counter Threat Unit, told Axios. If these workers are caught, employers then face a litany of problems: Some workers will download sensitive internal data and extort the companies for a hefty sum in a last-ditch effort to bleed the company of whatever money they can. Some workers have filed legal complaints, including workers' compensation claims, Barnhart said. In one case, Barnhart said he had a worker try to claim domestic violence protections as they were being fired just to buy time. "There is a lot of focus on companies that cybersecurity shouldn't just be for the CISO," Rose said. "You want a bit of that security feel throughout the company, and this is the kind of case that really demonstrates why that is." The bottom line: Some companies also hesitate to report these incidents, fearing they could be penalized for unknowingly violating U.S. sanctions — even though law enforcement officials have said they're more interested in cooperation than prosecution. What's next Right now, the operations are predominantly focused on making money for North Korea's regime. Threat level: But the hacking groups involved are evolving into something more sophisticated and dangerous — including by potentially building their own AI models and feeding in sensitive U.S. company data. That's a particular concern in the defense sector. Barnhart says his teams have seen North Korean IT workers increasingly studying information about AI technologies, drone manufacturing and other defense contract work. What to watch: As U.S. companies become more alert, North Korean IT workers are shifting their focus abroad as they seek employment at other companies and set up laptop farms throughout Europe — suggesting the operation is only just now ramping up, instead of slowing down.
Yahoo
3 hours ago
- Yahoo
Bondi: 68 arrested overnight in DC
Attorney General Pam Bondi said on Sunday that authorities arrested 68 people overnight in Washington, D.C., amid a federal crackdown on crime in which President Trump has sent the National Guard to the nation's capital and federalized the police force. 'Over 300 arrests in D.C. — and counting: Just last night, our federal and DC law enforcement partners made 68 arrests and seized 15 illegal firearms,' Bondi said in a post on the social platform X. 'Homicide suspects, drug traffickers, and more are being charged. I'll continue to stand with you as we make DC safe again!' Trump last week said he would take federal control of D.C.'s police department and deploy the National Guard to the city. The president's moves have drawn heavy blowback from Democrats and D.C. residents. White House deputy chief of staff Stephen Miller, who also recently compared the nation's capital to multiple foreign war zones, said in a post on X that 'graffiti is coming down in Washington, DC.' 'Graffiti left untouched to scar public spaces is the visual declaration of a society's surrender,' Miller said in his Sunday post. On Sunday, Sen. Chris Murphy (D-Conn.) dismissed Trump's recent crackdown on the nation's capital as a 'stunt' and suggested, like other Democrats, that the effort is meant to distract from other events in the news. 'What's happening here in Washington, D.C., is just a stunt. Donald Trump didn't like the fact that the walls were closing in on him, that his own base was questioning why he wouldn't release the Epstein files, why he was protecting very powerful people,' Murphy told NBC News's Kristen Welker on 'Meet the Press.' 'He didn't want to talk anymore about the fact that our health care system is about to collapse because of the cuts that they have made, that premiums are going to go up by 75 percent on Americans,' the Connecticut senator added. But Republicans and the administration have argued the federal crackdown is a necessary step given high murder and crime rates in D.C., while suggesting that Democrats running cities have done a poor job handling the issue. A White House official told The Hill's sister network NewsNation Sunday that the Saturday night D.C. law enforcement operations involved 1,800 participants and that the National Guard was 'not making arrests at this time.' This story was updated at 4:57 p.m. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.