logo
Muhlenberg County man sentenced to 5 years for child exploitation offense

Muhlenberg County man sentenced to 5 years for child exploitation offense

Yahoo21 hours ago

HENDERSON, Ky. (WEHT) – Court officials say a Muhlenberg County man was sentenced on June 10 to five years in federal prison for distribution of child pornography.
According to court documents, James Matthew Rosenkranz, 41, was sentenced to five years in federal prison, followed by 10 years of supervised release, for one count of distribution of child pornography. There is no parole in the federal system. The case was investigated by the FBI Owensboro Resident Office.
Father of child that died after gunshot incident allegedly doesn't make court appearance
Officials say this case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. For more information about internet safety education, please visit this website.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

The FBI Outlines A New Threat To Your Identity
The FBI Outlines A New Threat To Your Identity

Forbes

timean hour ago

  • Forbes

The FBI Outlines A New Threat To Your Identity

Skip Sanzeri is a strategic advisor at iValt, a leader in identity validation, and founder at QuSecure, a leader in quantum cybersecurity. A recent and stark FBI warning reminds us that we need new solutions to protect our identities in a world driven by criminals now powered by AI. The FBI states that in this new type of attack, cybercriminals are mimicking many of the sites we use on a daily basis to trick users into inputting their credentials by using search engine advertisements. Thanks to ever-increasing online access and connectivity, AI, and quantum computing, it is increasingly difficult for legitimate businesses and sites to know the true identity of users accessing their systems. Think in terms of deepfakes, where video and audio can be created to mimic the real user. And since our daily activities, thoughts and preferences are tracked and stored, data is available everywhere on all of us. Any person or system from anywhere in the world can access nearly any information on government or corporate systems due to our pervasive use of the Internet, leading to predictions from groups like Forrester that cybercrime could cost up to $12 trillion this year alone. Let's say you are registered with a payroll site for your employment where you can access payroll records, benefits or other information. Cybercriminals will run an advertisement on your search engine that looks like the normal link you might click on to access the payroll site. The fraudulent link has almost no discernible differences, and it may trick you into clicking and entering your credentials. Once you enter your login and password, they are captured and linked with other data from social engineering or information about you that is already stolen or on the dark web. This gives hackers the ability to access your various accounts, whether business-related or personal. Additionally, once attackers have this information, they may also call the victims, masquerading as an employee from the site you usually access to gain a token or other information, which gives them deeper access to your account. This, in turn, allows them to transfer money, create an unemployment account or even change direct deposits and redirect future payments from that retirement account. Of course, this technique can be used for almost any site where you log in. It's clear that two-factor authentication and even tokens are not enough. All of these standard identity validation mechanisms are failing. The key for company and government website owners is to know exactly who we are. This cannot be done with only logins, passwords and tokens since none of these have any relationship to us. They are just keys to a door. If the key to your office gets stolen, the lock doesn't care who is using it. We need to integrate new ways of identifying users, including: • Biometrics: This includes facial recognition, voice recognition, handprint and other methods. These are unique identifiers that, in combination with other factors, help create stronger identity validation. • Machine ID: Mobile phone and machine numbers, or system numbers, that uniquely identify the phone or system you are using. • Geofencing: This is where we can pre-set exact geographic areas such as ZIP codes, cities or states from where we access sites. As an example, if you live in a 35401 ZIP code, you can preprogram the system to only allow access from that ZIP code. This really helps because a lot of hackers access sites from other areas in the world. By geo-fencing to specific areas, it's one more step that hackers would have to figure out. It can also be used for travel so that if you access a site while on business or vacation, you can program that exact location and time (see the next bullet point). • Time Bounding: Being able to specifically program times when you access sites makes it nearly impossible for a cybercriminal to figure out how to impersonate you. As an example, if you only access your payroll account or brokerage account between 9:00 a.m. and noon on Wednesdays, you can time-bound that access so that any cybercriminal trying to hack your account would have to know that timeslot and all other attempts would be rejected. Using another example, a database administrator may turn off all access to a system between 11:00 p.m. and 8:00 a.m. No more hackers accessing systems overnight. According to a report from Malwarebytes (via Infosecurity Magazine), the majority of ransomware attacks occur between 1:00 a.m. and 5:00 a.m. local time, taking advantage of when systems are least protected by humans. • Take an interest in your own security. Let corporate and government sites you access know that you want better security. You can do this by going to the feedback or comment sections or sending emails to the site owners. Let them know that there are technologies available that provide much more advanced identity validation (as discussed above) than most sites are using today. • Don't click on any links provided to you in text, email or via web browsers (like ads or other links that look legitimate). Instead, use your saved links in bookmarks and favorites or type the URL into the browser yourself. This will keep you from clicking on any links that could be harmful. • Use Ad blocking in your browser. Usually, you can find out how to do this in your browser's settings. Additionally, you can buy third-party ad blockers and install them as extensions in your browser. • Use the existing security mechanisms that come with your computer such as Microsoft or others. Also, it's worth it to buy some well-known third-party software that will help identify threats and clean up your system when necessary. If there was an equivalent of Smokey the Bear for protecting you against hackers, he would say something like "Only you can prevent cyber theft." While not entirely true since corporations and governments need to do their part, you get the point. Be very diligent about your online access and presence and communicate with site owners to let them know you want better identity protection. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

CNN security analyst defends Kristi Noem, agents who restrained Sen. Padilla
CNN security analyst defends Kristi Noem, agents who restrained Sen. Padilla

Yahoo

time3 hours ago

  • Yahoo

CNN security analyst defends Kristi Noem, agents who restrained Sen. Padilla

CNN security analyst and former FBI agent Josh Campbell defended Homeland Security Secretary Kristi Noem and the agents Thursday who forcibly removed Sen. Alex Padilla, D-Calif., during his viral outburst. Video of the incident showed Padilla trying to walk up to Noem while she was speaking at a podium during a press conference in Los Angeles about the riots. Padilla simultaneously attempted to shout over Noem, but law enforcement stepped in and forcefully stopped Padilla's advance. Padilla was eventually taken to the ground and handcuffed, the video showed. Fox News reporters who were present said Padilla appeared to be detained for a period of time. Padilla identified himself in the midst of the altercation. "I know we are in a politically charged climate, but from a law enforcement perspective, this was neither the fault nor the responsibility of DHS Secretary Noem," Campbell argued. "She's in the middle of a press conference. There's someone who interrupts and then makes it clear by his movements that he is not going to comply. He's taken out. Again, I don't think any of that was her responsibility." Padilla Hopes People Feel 'Outrage' Over His Forcible Removal And Detainment Earlier, he explained how the story could be divided into three distinct moments that will be scrutinized in the days to come. Read On The Fox News App "First, you have the DHS secretary who was addressing the press," he said. "This was not a Q&A period, and she was interrupted. She was interrupted by someone who was speaking very loudly. And so her security detail confronts what we obviously now know to be the senator. And at that point, he is now going to be escorted out. You can't interrupt something like that that's already in progress without having those consequences." Campbell explained one key moment when security agents at the event realized Padilla would refuse to comply. "But the second incident, in my view, happens the moment — as officers are trying to lead him out — he then turns and walks back towards kind of into those agents," Campbell said. "At that point, from a security detail perspective, we're taking this person out against their will. We've asked the person — and again, this is all happening very quickly — but the moment he then turns into them, they realize this is not someone who is going to comply." 'Spectacle Of Himself': Senate Republicans Blast Alex Padilla After His Forcible Removal From Dhs Presser The third incident, he noted, was when the agents had the senator handcuffed on the ground. "Now there will be big questions raised about those kinds of tactics," Campbell said. "Were there other options that were available to the federal agents as well — as the FBI police officer there — who is responsible for security in that FBI building? What they do is they actually order him to his knees and then quickly shove him down to the ground where he is then handcuffed." This incident, which has drawn outrage from Padilla's fellow Democrats, will face some scrutiny, he warned. Campbell also noted that Padilla's status as a senator did not make any difference in that particular room and to those agents. "In fact, that would have been special treatment for him if they had allowed him to continue to interrupt, you know, very loudly, this press conference," he said. An FBI spokesperson said Padilla was detained after being "disruptive." "During a press conference today held at the FBI's Los Angeles Field Office, Senator Alex Padilla was detained by members of the U.S. Secret Service assigned to Secretary Noem's detail when he became disruptive while formal remarks were being delivered," the spokesperson said Thursday. "Secret Service Agents were assisted by FBI Police who are in Los Angeles at this time. Senator Padilla was not wearing his senate security pin; however, was subsequently positively identified and released." A DHS spokesperson said Padilla was told "repeatedly" to back away, and "did not comply" with officers' commands. "[Secret Service] thought he was an attacker and officers acted appropriately," the spokesperson article source: CNN security analyst defends Kristi Noem, agents who restrained Sen. Padilla

FBI Confirms iPhone And Android Warning—Delete All These Texts
FBI Confirms iPhone And Android Warning—Delete All These Texts

Forbes

time4 hours ago

  • Forbes

FBI Confirms iPhone And Android Warning—Delete All These Texts

FBI confirms new DMV text attacks AFP via Getty Images Republished on June 13 with new calls on the federal government to intervene. Attacks on iPhone and Android users surged more than 700% this month, with malicious texts targeting multiple cities and states. Following alerts from police forces across the country, the FBI has now confirmed the latest warning and stepped in. This threat comes directly from China, and you need to delete all these texts immediately. As I reported earlier this week, the infamous unpaid toll texts that have plagued American smartphone users for more than a year 'have seen a significant decline recently. But the DMV texts that have replaced them are 'more threatening.' Attackers have learnt lessons from their unpaid toll texts, and this attack will be more dangerous. That's the warning from Guardio, whose researchers have been tracking these attacks for months. Its team 'spotted a 773% surge in DMV scam texts during the first week of June,' which shows no signs of slowing. 'These scam texts lead to phishing websites designed to steal people's credit card information and make unauthorized charges.' DMV scam surge Guardio Now the FBI has confirmed it is investigating the DMV scam. According to FBI Tennessee's Supervisory Special Agent David Palmer, the unpaid toll cybercriminals have 'pivoted to the DMV scam.' Confirming the gangs operate from overseas, Palmer warns these texts can 'put malware on your phone, which then can go in and steal information from your device, or collect your payment information.' Palmer warns smartphone users 'if you don't know who [a text] is from, don't click the link.' Those links use domains crafted to trick users into thinking they're legitimate. As Guardio explains, 'scammers generate a new domain for almost every DMV text. The format is usually the name of a state followed by a generic domain. Sometimes they include '.gov' as part of the URL to make the website appear legitimate.' There will be millions of these texts sent out over the coming weeks and months. As Resecurity warns, 'just one threat actor can send "up to 2,000,000 smishing messages daily,' which means targeting 'up to 60,000,000 victims per month, or 720,000,000 per year, enough to target every person in the U.S. at least twice every year.' DMV texts Guardio Just as with undelivered packages and unpaid tolls, the FBI's advice is to 'delete any smishing texts received.' You don't want the dangerous links left on your phone, even though many are only active for a few hours before they're detected and blocked. This surge in fake DMV texts has prompted Senator Tina Smith to 'press the Trump Administration to stop the widespread text message scam affecting Minnesotans,' just one of the many states now affected. Smith says this is 'beyond a simple nuisance,' and 'jeopardizes the financial security of those it victimizes. And these messages threaten the peace of mind of thousands of Minnesotans who face the uncertainty of whether these messages are authentic. This scale and sophistication of this scam campaign calls for a federal response.' Arizona's Attorney General has also issued a warning to the state's citizens. 'No matter which agency they're pretending to represent, government imposters share a common set of strategies to steal your information and savings,' AG Kris Mayes says. 'Not only is the scammer trying to steal consumers' money, but if you click the link, they could get your personal info (like your driver's license number) — and even steal your identity.' Meanwhile, Oregon's DMV is the latest to warn its drivers. "These messages are not from Oregon DMV,' the DMV's Chris Crabb warns. 'These are fake messages designed to get you to click on a link and provide personal information or send money.' The new DMV attacks go beyond the late payment lure with the toll texts, these cite a non-specific traffic offense and threaten suspensions of driving licenses and vehicle registrations. They create a sense of panic and urgency to push users to engage. Just as with other text attacks, the advice is very simple. You must not engage in any way. Every one of these texts is a scam. If you have any doubts, contact your DMV using public channels. You can report the text. But you must delete it

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store