
Proposed Howard County Bill aims to tackle sex trafficking by prohibiting hourly motel room rentals
Howard County Council members are working to tackle sex trafficking. A proposed bill, CB19-2025, would prohibit employees of lodging establishments from offering rooms on an hourly basis. The restriction would apply to any hotel, motel, or similar business with at least four rooms available
Introduced on Feb. 3, the bill is set to be heard on Monday.
The legislative proposal comes after
a Baltimore man
, Robert Bennett Jr.,was charged for allegedly conducting a sex trafficking operation at the Terrace Motel in Elkridge.
Investigators allege Bennett arranged prostitution encounters for several adult women, assaulted them, and stole their money, sometimes at gunpoint. According to police, he controlled victims by providing drugs and making threats.
Bennett is charged with sex trafficking, prostitution, armed robbery, theft, and weapons violations. He remains held without bond at the Howard County Detention Center.
Bennett's arrest follows another recent Maryland sex trafficking case. On March 3, Kenika Leach, 33, was sentenced to 15 years in prison for trafficking women from Hagerstown to hotels in Baltimore and Anne Arundel County. Prosecutors said Leach exploited victims' drug addictions and used physical violence to maintain control.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Hamilton Spectator
3 hours ago
- Hamilton Spectator
Port Moody food truck company ordered to fork over unpaid wages to former cook
A Port Moody food truck company must pay more than $2,100 in wages and penalties to a former cook after the B.C. Employment Standards Tribunal dismissed its appeal, ruling there was no legal basis to offset the debt with so-called 'advance payments.' In a decision released April 17, tribunal member Alysha Bennett upheld a July 2024 determination that BC Taco Restaurant Group Ltd. violated several sections of the Employment Standards Act (ESA) and must pay former employee Abel David Sanchez Florentino for unpaid earnings, including overtime, vacation pay, and statutory holiday wages. The company, which operates two taco trucks in Port Moody, had appealed the decision on two grounds: first, a breach of the principles of natural justice; and second, that new evidence – specifically, receipts showing advance payments – were not properly considered. But Bennett found neither argument convincing. 'The receipts simply record payments purportedly made by . . . BC Taco to the Employee. The receipts do not authorize a deduction from the employee's wages. They assign nothing. In fact, it is questionable whether the receipts reveal a credit obligation on behalf of the employee at all,' Bennet stated. At the centre of the appeal were three receipts BC Taco claimed it loaned to Florentino in 2021, totalling $6,552. The company argued these payments were advances on future wages and should reduce the amount of unpaid wages owed. But Florentino denied ever receiving the money and claimed the receipts were fake. He told the ESA investigators that BC Taco owner, Carlos de Ibarrola, forced him and other workers to sign the receipts during a 2021 Service Canada investigation. If he didn't, de Ibarrola threatened to report him to immigration authorities, and said both he and the company would suffer consequences, according to Florentino. Florentino also said he never received these payments, he was never given copies of the receipts and that BC Taco never treated the amounts as loans – until after he filed his complaint in 2023. Ruling stands Following the original investigation, the director of employment standards issued a ruling requiring BC Taco to pay Florentino $2,181.34 in wages and interest and levied two administrative penalties. The determination found discrepancies between Florentino's wage statements and his timesheets – some periods showed overpayments, others showed underpayments. However, the director concluded that under the ESA, employers may not unilaterally deduct overpayments to balance out shortfalls in later pay periods. The same logic, the tribunal found, applied to BC Taco's claimed advance payments. 'Where an employer gives an employee an advance on wages, the employer is not permitted to unilaterally deduct or withhold from future wages,' said Bennett, unless the employee has signed a clear written agreement. The receipts provided by BC Taco did not meet that legal threshold. The tribunal questioned whether the receipts demonstrated a loan obligation at all. 'There is no evidence that the employee agreed, in writing or otherwise, to allow BC Taco to deduct the advance payments from his future wages,' Bennett stated. BC Taco also argued the director had failed to properly consider its evidence, amounting to a breach of natural justice. But the tribunal found the company had ample opportunity to respond to the allegations and was given full access to the investigation file, including a chance to correct or supplement the record. The tribunal noted all submissions – including the disputed receipts – were reviewed in the initial ruling. 'There is no evidence before me that would cast doubt on the adjudicating delegate's neutrality in the matter,' Bennett stated. Finally, the tribunal rejected BC Taco's claim that the receipts constituted 'new evidence' unavailable during the initial process. The records had, in fact, been submitted and considered during the original investigation and appeared in the final report. Even if they had been new, Bennett ruled they lacked sufficient 'probative value' to alter the outcome. The appeal was dismissed with the tribunal ruling it had no reasonable chance of success. BC Taco must now pay the full amount owing, plus any additional interest accrued since the original order. The decision closes the door on BC Taco's attempt to reverse the wage order. If the company wants to pursue reimbursement for the alleged advances, Bennett noted, it must do so through other legal avenues – such as civil court. Error! Sorry, there was an error processing your request. There was a problem with the recaptcha. Please try again. You may unsubscribe at any time. By signing up, you agree to our terms of use and privacy policy . This site is protected by reCAPTCHA and the Google privacy policy and terms of service apply. Want more of the latest from us? Sign up for more at our newsletter page .


Forbes
10 hours ago
- Forbes
Coinbase Hack Exposes 3 Insider Threat Enablers
Cybercriminals bribed Coinbase employees and contractors for customer data access. Bankrolling cybersecurity may soothe momentary leadership angst, but often does little to address rising insider threats and basic internal control failures. Coinbase joined a long and growing list of hacked companies undermined by bribed, planted or tricked employees. The crypto exchange giant disclosed that cybercriminals gained access to sensitive customer account data by 'paying multiple contractors or employees working in support roles outside the United States to collect information from internal Coinbase systems to which they had access in order to perform their job responsibilities.' Coinbase declined to pay the hackers $20 million ransom. Instead, the company posted a $20 million reward to catch and convict the extortionists. Despite the bold stance, remediation, reimbursement and indemnification costs are preliminarily estimated 'to be within the range of approximately $180 million to $400 million.' That's a hefty financial and reputational hit – even for a market-leading entity which closed 2024 with $9 billion in cash reserves and a penchant for spending heavily on cyber investments. The nefarious methods may seem novel, but the case is neither isolated nor unique. The 2025 Ponemon-Sullivan Security Report found almost half of insiders had more access than needed. While no cyber defense is impenetrable, fixating on technical design proves futile when incentives, incompetence and indifference undermine internal controls design, implementation and effectiveness. Data are digital era treasure. That's what hackers know, yet too many company directors and executives underestimate. While internal controls were first established to curb asset misappropriation, sharpen business processes and maintain financial integrity, they are widely viewed as mere compliance requirements. That's a dangerous mindset as IT systems and safeguards are often highly technical and considered 'invisible.' Compounding that AI-age naivete is excuse-making that insider threats are "rogue bad actors.' As reported on Forbes, Coinbase CEO Brian Armstrong lamented 'the criminals have been approaching our overseas customer support agents, looking for a weak leak , someone who would accept a bribe in exchange for sharing customer information with them. Unfortunately, they were able to find a few bad apples.' The problem wasn't that low-paid, offshored workers were susceptible to payola. Rather, access controls were inadequate, insufficient and/or non-existent. Even worse, the deficiencies were exploitable (and monetizable) for several months without detection. Those gaps are widespread. The 2023 Ponemon-Sullivan Security Report found that cyber incidents due to employee negligence (55%) outnumbered the combined total incidents involving criminal or malicious insiders (25%) and credential theft (20%). Fraud requires opportunity, incentives/pressure and rationalization -- cybercriminals and their AI tools prowl for such juicy vulnerabilities. Antidotes require meaningful assessment and action. That's far more than hollow audit committee charters, toothless assurance models and self-congratulatory periodic reporting. Effective defenses, supported by stewardship workplace cultures, learn and adapt to pre-empt problems. Boards and c-suites need to ask serious questions and expect credible answers about how incentives, incompetence and indifference – the three common corporate post-mortem culprits – enable insider threats that put their organizations at risk. Hostile actors will do what they can to bribe, trick or, worse, plant employees. While payoffs cost Coinbase, in 2023, an employee impersonator verbally convinced MGM's IT help desk to share system access credentials. The subsequent breach shuttered casino operations costing over $100 million, spawning a lengthy remediation quagmire. Yet, planting real or fictitious employees is also a real challenge, especially from cash-desperate regimes. In February, Christina Chapman pled guilty in federal court to allegedly running a 'laptop farm' from her Arizona home which posed North Koreans as U.S. workers in remote IT positions at more than 300 U.S. enterprises, including multiple Fortune 500 companies. Chapman's three-year purported scheme netted over '$17 million in illicit revenue' for her and the Hermit Kingdom. The payroll largess was falsely reported to the tax agencies in the names of over seventy identify theft victims. Clearly, a few hundred organizations were susceptible to adding 'ghost' employees. Shay Colson, Intentional Cybersecurity managing partner, advises tech leaders to collaborate with HR to 'vet new employees and ensuring that you're not either supporting this sanctioned regime or giving up legitimate credentials to these threat actors.' That's a foundational step towards competence, care and control. Here are starter questions that boards can independently ask IT, HR and audit leaders: (Non) answers and 'not my job' responses will be quite telling. Digital era danger necessitates coordinated, prepared and tested defenses – well before a breach. Countless case examples, benchmarking data, tabletop exercises and technical performance reports hold little lasting value, if companies lack credible, strategic tech leaders who can articulate the competitive, financial, reputational and business consequences of cybersecurity inaction. Perhaps worse are gilded executive teams fixated on strategy (and compensation) acceleration, while risking everything by settling for disincentivized, demotivated, distracted and disloyal staff. Et tu, IT?
Yahoo
3 days ago
- Yahoo
Three people killed in crash on interstate in South Carolina, cops say
Three people were killed early Sunday morning in a crash on Interstate 85, according to the South Carolina Highway Patrol. The three-vehicle collision happened at about 12:15 a.m. in Spartanburg County, said Master Trooper William Bennett. A 2015 Honda sedan was driving south in the northbound lanes of I-85, according to Bennett. At the 75 mile marker the Honda collided head-on with a 2019 Toyota sedan that was driving north on I-85, Bennett said. After that collision, the Honda then crashed into a 2024 Ford Expedition that was also heading north on the interstate, according to Bennett. The driver, who was the only person in the Honda, as well as both the driver and a passenger in the Toyota died at the scene, Bennett said. The Spartanburg County Coroner's Office has not publicly identified any of the victims. In addition to the Ford driver, there were five passengers in the SUV, but none of those occupants were hurt, according to Bennett. No other injuries were reported. There was no word if anyone involved in the crash was wearing a seat belt. Information about how the Honda came to be driving toward oncoming traffic on I-85 was not available, but the wreck continues to be investigated by the Highway Patrol. Through June 1, at least 316 people had died on South Carolina roads in 2025, according to the state Department of Public Safety. Last year, at least 948 people died in crashes in South Carolina, DPS reported. At least 38 people have died in Spartanburg County crashes in 2025, according to DPS data. There were 60 deaths in the county in 2024, DPS reported. That includes a fatal crash on Saturday afternoon. At about 1:50 p.m., both a 2007 Dodge Ram and a 2008 Yamaha motorcycle were driving north on S.C. 11, Bennett said. When the pickup truck turned left onto Cannon Ford Road it was hit on the driver's side by the motorcycle, according to Bennett. The motorcycle driver, who died at the scene, has not been publicly identified by the coroner's office. Bennett said the pickup driver, who was the only person in the truck, was not hurt, and no other injuries were reported. This crash also continues to be investigated by the Highway Patrol.