Man shot at during test drive says teens tried to carjack him
A Charlotte man said he was nearly killed during a test drive when a group of teens tried to force their way into the car and opened fire in a church parking lot.
Detectives investigate death in north Charlotte
Caleb McIlwain Sr. said he was pre-approved Wednesday for a financing on a new car, something he badly needed for his catering business.
After work, he went to the dealership and drove the Chevy Equinox to a church parking lot on Tom Hunter Road at about 6 p.m., which was when a blue car drove up to him.
'They stopped right in front of me. After trying to get them to move, they just stayed there,' McIlwain said. 'There were three guys that exited the vehicle.'
He said three teens started pulling on the door handles demanding to be let in.
McIlwain said he put the car in reverse to warn the kids to back away, but the situation escalated.
'One of the guys screamed out, 'Pops, get the gun. Shoot this guy,'' the victim said.
Two bullet holes were shot into the passenger side of the car. McIlwain ducked for cover and a round narrowly missed him.
'One went right past my head as I was hitting the gas leaving,' he said. 'After that hard right turn, I was down below with my head between the radio and the console and I heard one hit the door and one right past my face. Right into the glove compartment.'
He got away by driving over the curb.
Officers with the Charlotte-Mecklenburg Police Department met him at the dealership where the manager was watching his son.
McIlwain said if either the father and son were in the front seat, he would have been shot.
'I'm a Charlotte native, born and raised, '96, Bank of America, go Panthers,' McIlwain said. 'I love Charlotte. I know this area. For you to do something like that in broad daylight, there's children getting off the bus. There's senior citizens sitting outside and you're firing into a dwelling not thinking about anything else.'
He said police got video of the suspects' car.
VIDEO: Man sentenced to life in prison for murder of 17-year-old in north Charlotte
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
7 hours ago
- Yahoo
1 sent to hospital in southwest Charlotte shooting, MEDIC says
One person was sent to the hospital after a shooting in southwest Charlotte on Saturday morning, MEDIC said. MEDIC responded to the scene on Wrights Crossing Drive near Whiteside Drive before 6 a.m. READ: Dilworth man accused of trying to make home explosion look like an accident Officials said one person was transported to the hospital with life-threatening injuries. No additional details have been made available. This is a developing story. Check back with for updates. WATCH: Dilworth man accused of trying to make home explosion look like an accident
Yahoo
8 hours ago
- Yahoo
One injured in southwest Charlotte shooting: Medic
CHARLOTTE (QUEEN CITY NEWS) — One person is in the hospital after a shooting early Saturday morning, according to the Mecklenburg EMS Agency (Medic). The incident was first reported around 5:30 a.m. on June 7 on Wright Crossing Drive near Whitside Drive. This is a residential area near the intersection of South Tryon Street and Steele Creek Road. Authorities have not said what led up to the incident or if anyone has been arrested. Medic did say that it took one person to the hospital with life-threatening 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.


WIRED
12 hours ago
- WIRED
The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking
Plus: A 22-year-old former intern gets put in charge of a key anti-terrorism program, threat intelligence firms finally wrangle their confusing names for hacker groups, and more. Democratic presidential nominee, U.S. Vice President Kamala Harris, speaks during a campaign rally at the PNC Music Pavilion on November 02, 2024 in Charlotte, North Carolina. With Photo-Illustration: WIRED Staff; Photograph:Since it's already chaos out there, this week, we thought we'd lean into the madness by envisioning the future threats that you're not ready for. From cyberattacks on the US grid to GPS blackouts, rampant deepfake scams, AI-powered super hackers, and widespread communication system collapse, there's a whole spectrum of scenarios that could take things from bad to worse. All is not lost, however—at least if you're Ross Ulbricht. The creator of the Silk Road dark web market, who was pardoned by President Donald Trump earlier this year, received a mysterious $31 million bitcoin donation last weekend. Crypto-tracing firm Chainalysis now suspects the lavish gift may have come from a vendor at another now-defunct black market, AlphaBay. A trove of public records reviewed by WIRED this week reveal a years-long effort by a farming industry group to get the FBI to treat animal rights activists as a 'bioterrorist' threat. The Animal Agriculture Alliance (AAA) was repeatedly in contact with the bureau's Weapons of Mass Destruction Directorate about the activities of groups like Direct Action Everywhere, or DxE. The records show that AAA fed intelligence about DxE to the FBI and used corporate spies to infiltrate the group's activities. Immigration and Customs Enforcement recently updated its guidance for agents who carry out courthouse raids and other 'enforcement actions' in and nearby court houses, according to an agency document reviewed by WIRED. The updated policy removes language that explicitly instructed agents to ensure they followed local and state laws. Anyone who was trying to play a new video game on Christmas Day in 2014 likely remembers the infamous Lizardsquad hack of Xbox Live and Playstation Network. Now, more than a decade later, we finally have the full story. But that's not all! Each week, we round up the security and privacy news we didn't cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there. Mysterious iPhone Crashes Hint at a Chinese Hacks. Apple Denies It The security firm iVerify this week brought to light a series of suspicious iPhone crashes that researchers say might just indicate a stealthy, unprecedented Chinese zero-click hacking campaign victimizing American phones, including even those of staffers for the Harris-Walz presidential campaign. Or it's a random, not-particularly-dangerous bug that Apple has already squashed. In a report released Thursday, iVerify assessed with 'moderate confidence' that China-linked hackers may have targeted a series of iPhones with a sophisticated exploit, going after activists and dissidents critical of China, an EU government official, tech executives at AI firms competing with Chinese ones, and US political staffers—revealed by NBC News to be employees of the Harris-Walz campaign. iVerify didn't have a sample of the malware that might have infected those phones or other definitive proof that any hacking occurred. But it pointed to signs that seem like more than coincidences: The staffers whose phones had experienced the crashes had also been warned by the FBI that they'd already been targeted in China's Salt Typhoon hacking campaign against US telecoms. Another owner of the devices that crashed in the same way was later warned by Apple itself that he or she had been targeted by sophisticated hackers. All of that would represent a serious threat to national security. Except that, strangely, Apple flatly denies it happened. 'We strongly disagree with the claims of a targeted attack against our users,' Apple's head of security engineering, Ivan Krstić, wrote in a statement to WIRED. Apple has patched the issue that iVerify highlighted in its report, which caused iPhones to crash in certain cases when a message sender changed their own nickname and avatar. But it calls those crashes the result of a 'conventional software bug,' not evidence of a targeted exploitation. (That blanket denial certainly isn't Apple's usual response to confirmed iPhone hacking. The company has, for instance, sued hacking firm NSO group for its targeting of Apple customers.) The result is that what might have been a four-alarm fire in the counterintelligence world is reduced—for now—to a very troubling enigma. A 22-Year-Old Is Running a Key US Anti-Terrorism Program A 22-year-old former intern at the Heritage Foundation with no national security experience has reportedly been appointed to a key Department of Homeland Security role overseeing a major program designed to combat domestic terrorism. According to Propublica, Thomas Fugate last month assumed leadership of the Center for Programs and Partnerships (CP3), a DHS office tasked with funding nationwide efforts to prevent politically motivated violence—including school shootings and other forms of domestic terrorism. Fugate, a 2024 graduate of the University of Texas at San Antonio, replaced the former CP3 director, Bill Braniff, an Army veteran with 20 years of national security experience who resigned in March following staff cuts ordered by the Trump administration. According to CP3's most recent report to Congress, the office has funded more than 1,100 initiatives aimed at disrupting violent extremism. In recent months, the US has seen a string of high-profile targeted attacks, including a car bombing in California and the shooting of two Israeli Embassy aids in Washington, DC. Its $18 million grant program, designed to support local prevention efforts, is reportedly now under Fugate's supervision. Threat Intelligence Firms (Finally) Agree to a Glossary of Hacker Group Names Hacker group names have long been an unavoidable absurdity in the cybersecurity industry. Every threat intelligence company, in a scientifically defensible attempt to not make any assumption that they're tracking the same hackers as another firm, comes up with their own code name for any group they observe. The result is a somewhat silly profusion of overlapping naming systems based on elements, weather, and zoology: 'Fancy Bear' is 'Forest Blizzard' is 'APT28' is 'Strontium.' Now, several major threat intelligence players, including Google, Microsoft, CrowdStrike, and Palo Alto Networks, have finally shared enough of their internal research to agree to a glossary that confirms that they're referring to the same entities. The companies did not, however, agree to consolidate their naming systems into a single taxonomy. So this agreement doesn't mean the end of sentences in security reporting such as 'the hacker group Sandworm, also known as Telebots, Voodoo Bear, Hades, Iron Viking, Electrum, or Seashell Blizzard.' It just means we cybersecurity reporters can write that sentence with a little more confidence. Phone-Hacking Firm Corellium Acquired for $200 Million—After Trump Pardons Its Founder Chris Wade, the founder and CTO of mobile device reverse-engineering company Corellium, has had a wild last few decades: In 2005, he was convicted on criminal charges of enabling spammers by providing them proxy servers, and agreed to work undercover for law enforcement while avoiding prison. Then in 2020, he mysteriously received a pardon from President Donald Trump. He also settled a major copyright lawsuit from Apple. Now his company, which creates virtual images of Android and iOS devices so that customers can find ways to break into them, is being acquired by phone-hacking firm Cellebrite, a major law enforcement contractor, for $200 million—a significant payday for a hacker who has found himself on both sides of the law.