logo
Fredonia standoff: man in custody identified, charges pending

Fredonia standoff: man in custody identified, charges pending

Yahoo23-05-2025

The Brief
37-year-old Matthew Novak of Fredonia is now in custody at the Ozaukee County Jail after a days-long standoff.
A tactical situation started on the night of Thursday, May 8, and lasted nearly 38 hours, ending on Saturday morning, May 10.
An initial court appearance for Novak will be scheduled once formal charges are filed by the District Attorney's Office.
FREDONIA, Wis. - The man arrested after a days-long standoff in a Fredonia home has been identified.
What we know
The Ozaukee County Sheriff's Office said 37-year-old Matthew Novak of Fredonia is now in custody at the Ozaukee County Jail.
He was previously in custody at a behavioral health facility and was released around 3 p.m. on Thursday, May 22, before being taken into custody at the jail.
FREE DOWNLOAD: Get breaking news alerts in the FOX LOCAL Mobile app for iOS or Android
The following criminal charges have been referred to the Ozaukee County District Attorney's Office:
Battery or threat to a law enforcement officer
Endanger safety by use of a dangerous weapon
First-degree reckless endangering safety
Failure to comply with law enforcement officer's attempt to take person into custody
The backstory
A tactical situation started on the night of Thursday, May 8. It lasted nearly 38 hours and ended with the suspect in custody on Saturday morning, May 10.
The Ozaukee County Sheriff's Office said a man with weapons had barricaded himself inside a home and was "extremely dangerous." After Novak was taken into custody, the sheriff's office said there wa no longer a threat to the public.
According to the Ozaukee County Sheriff's Office, it all started with reports of multiple gunshots on Fox Glen Road. Deputies monitored the area but didn't hear any gunshots.
Law enforcement was able to reach the suspect over the phone – who acknowledged he was playing loud music and firing weapons. The suspect then said he was going to keep playing music and would shoot anyone who came to his home.
Shortly after that call, deputies heard multiple gunshots coming from the home. Further investigation determined the suspect was firing several guns – including an automatic rifle – in unknown directions, posing a "significant threat" to the community and deputies.
The sheriff's office advised neighbors to shelter in place, specifically in the basements of their homes, due to the high-powered nature of the suspect's weapons.
SIGN UP TODAY: Get daily headlines, breaking news emails from FOX6 News
Negotiators tried to engage the suspect and deescalate the situation for several hours, but the sheriff's office said the suspect remained uncooperative and threatened to "go full auto" and kill anyone who approached. He provided further information that he was heavily armed and would use force against officers.
The sheriff's office said the suspect was seen aiming a file toward law enforcement vehicles on multiple occasions.
What's next
An initial court appearance for Novak will be scheduled once formal charges are filed by the District Attorney's Office.
The Source
Information in this report is from the Ozaukee County Sheriff's Office and prior FOX6 News coverage.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Phone chipmaker Qualcomm fixes three zero-days exploited by hackers
Phone chipmaker Qualcomm fixes three zero-days exploited by hackers

TechCrunch

time4 hours ago

  • TechCrunch

Phone chipmaker Qualcomm fixes three zero-days exploited by hackers

Chipmaker giant Qualcomm released patches on Monday fixing a series of vulnerabilities in dozens of chips, including three zero-days that the company said may be in use as part of hacking campaigns. Qualcomm cited Google's Threat Analysis Group, or TAG, which investigates government-backed cyberattacks, saying the three flaws 'may be under limited, targeted exploitation.' According to the company's bulletin, Google's Android security team reported the three zero-days (CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038) to Qualcomm in February. Zero-days are security vulnerabilities that are not known to the software or hardware maker at the time of their discovery, making them extremely valuable for cybercriminals and government hackers. Because of Android's open source and distributed nature, it's now up to device manufacturers to apply the patches provided by Qualcomm, which means some devices may still be vulnerable for several more weeks, despite the fact that there are patches available. Contact Us Do you have more information about these Qualcomm zero-days? Or other zero-day exploits or zero-day makers? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or Do you have more information about these Qualcomm zero-days? Or other zero-day exploits or zero-day makers? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email . Qualcomm said in the bulletin that the patches 'have been made available to [device makers] in May together with a strong recommendation to deploy the update on affected devices as soon as possible.' Google spokesperson Ed Fernandez told TechCrunch that the company's Pixel devices are not affected by these Qualcomm vulnerabilities. When reached by TechCrunch, a spokesperson for Google's TAG did not immediately provide more information about these vulnerabilities, and the circumstances in which TAG found them. Qualcomm did not respond to a request for comment. Chipsets found in mobile devices are frequent targets for hackers and zero-day exploit developers because chips generally have wide access to the rest of the operating system, which means hackers can jump from there to other parts of the device that may hold sensitive data. In the last few months, there have been documented cases of exploitation against Qualcomm chipsets. Last year, Amnesty International identified a Qualcomm zero-day that was being used by Serbian authorities, likely by using phone unlocking tool maker Cellebrite.

Dangerous new Android malware is adding fake contacts to your phone while draining bank accounts
Dangerous new Android malware is adding fake contacts to your phone while draining bank accounts

Tom's Guide

time5 hours ago

  • Tom's Guide

Dangerous new Android malware is adding fake contacts to your phone while draining bank accounts

A new Android malware strain is making the rounds online that makes it incredibly difficult to distinguish who's actually calling you as it was recently updated with the ability to add fake contacts to your phone. As reported by BleepingComputer, the malware in question is called Crocodilus, and it was first discovered back in March of this year by Threat Fabric. While it was initially used to target crypto users in Turkey to drain their wallets, the malware is now being distributed on a global scale and is currently being used to target the best Android phones in the U.S., Spain, Argentina, Brazil, Indonesia and India. In a blog post, the cybersecurity firm Field Effect explains that Crocodilus is distributed using a custom dropper so that it can bypass Android's built-in security measures. For instance, it doesn't need access to Android's Accessibility Services or other user permissions to end up on a vulnerable smartphone. Likewise, it's also able to bypass the built-in defenses of Google Play Protect. Crocodilus' latest new ability is particularly worrying since hackers can easily use it in social engineering attacks. For instance, you might see a call come through from your bank after visiting a malicious website on your phone. However, since Crocodilus can now be used to add fake contacts to your phone, it could actually be hackers trying to scam you out of your hard-earned cash on the other end of the line. Here's everything you need to know about this new threat, including some tips and tricks to help you stay safe from hackers trying to infect your smartphone with malware. Though still quite new, Crocodilus is already a full-featured Android malware with loads of malicious capabilities. For example, it can remotely take over your smartphone, steal data from it and use overlay attacks to mimic popular financial and banking apps to steal your credentials. Now, in the latest version of this malware, the ability to add fake contacts to a victim's phone has been added to Crocodilus. Once this is done, the device will display the name listed in a caller's contact profile as opposed to their caller ID when an incoming call is received. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. With this new capability, hackers using the Crocodilus malware in their attacks can easily impersonate banks, trusted companies and even your friends and family members. Given that more people text than call these days, potential victims could easily fall for a text from a friend or family member asking them to send money in an emergency and have no idea that they did so. It's also worth noting that these fake contacts aren't tied to your Google account. Instead, they remain on an infected phone and won't sync with your other devices once you log in to them. At this time, it's currently unknown how Android users are being tricked into infecting their phones with the Crocodilus malware. However, Field Effect's researches suggest that the malware is likely being distributed via malicious sites, fake promotions sent through social media or via text and on third-party app stores. You can never be too careful on your phone and this is especially true with new malware strains like Crocodilus. From clicking a bad link to downloading a malicious app, there are plenty of ways in which your devices can become infected with a virus. For this reason, I always recommend limiting the number of apps on your phone. This is because even good apps can go bad when injected with malicious code and it's always easier to ensure that the apps you do have installed are up to date when there are few of them overall. At the same time, you want to stick to downloading new apps from the Google Play Store or other first-party Android app stores like the Samsung Galaxy Store or the Amazon App Store. The reason being is that the apps on unofficial, third-party app stores don't go through the same rigorous security checks that they would on other platforms. To stay safe from Android malware, first and foremost, you want to make sure that Google Play Protect is enabled on your smartphone. This free security tool scans all of the new apps you download as well as any existing apps on your phone for malware and other threats. However, as hackers will often find ways to bypass Android's built-in security tools like we've seen here, you may also want to consider downloading and installing one of the best Android antivirus apps for extra protection. If you want to be extra safe, though, the best identity theft protection services can help you regain your identity and any funds lost to fraud after a major malware attack. Given that the Crocodilus malware has already been updated quite frequently despite it being fairly new, I expect this won't be the last we hear of this Android malware strain, especially now that hackers are using it in attacks in even more countries.

Maxwell Anderson trial, Sade Robinson killed: Tuesday, June 3
Maxwell Anderson trial, Sade Robinson killed: Tuesday, June 3

Yahoo

time6 hours ago

  • Yahoo

Maxwell Anderson trial, Sade Robinson killed: Tuesday, June 3

The Brief Testimony in the trial of Maxwell Anderson resumes on Tuesday, June 3. Anderson is accused of killing and dismembering 19-year-old Sade Robinson. WARNING: During testimony, some content may not be suitable for all viewers. MILWAUKEE - Testimony in the trial of Maxwell Anderson, the Milwaukee man accused of killing and dismembering Sade Robinson, resumed on Tuesday, June 3. What we know Testimony on Tuesday, June 3 picked up where it left off on Monday with Det. Jake Puschnig of the Milwaukee Police Department on the stand. He described at length surveillance video that showed Anderson and Robinson at Duke's on Water drinking and playing a dice game at the bar. Det. Nathan Spittlemeister of the Milwaukee County Sheriff's Officewas also recalled to the stand. FREE DOWNLOAD: Get breaking news alerts in the FOX LOCAL Mobile app for iOS or Android We heard from Tim Sluga, a managing partner at Duke's on Water. Sluga mentioned that he was familiar with Maxwell Anderson and mentioned that he played beer pong in video that was shown in court. When asked about Anderson's date with Robinson, Sluga said he did not noticed anything odd. Detectives JoAnn Donner and Hoby Love then took the stand. Lemetra Griffin, who works security at Duke's on Water, testified on Tuesday morning. He indicated Anderson is a frequent patron of the bar. He spoke about surveillance video and photos that were displayed in court. Det. Kayla Bjerke of the Milwaukee County Sheriff's Office took the stand next – and testified at length about the search at the Anderson home. The backstory Anderson is charged with first-degree intentional homicide, mutilating a corpse, hiding a corpse and arson of property other than a building. He is accused of killing Robinson after a date, dismembering her and dumping her body parts across Milwaukee County. One of her arms was later found on an Illinois beach. SIGN UP TODAY: Get daily headlines, breaking news emails from FOX6 News Prosecutors said Anderson and Robinson showed up at a Menomonee Valley bar on April 1, 2024 – the night she was last seen or heard from. The next day, Robinson's burned-out car was found near 30th and Lisbon in Milwaukee. Surveillance photos show a man investigators believe is Anderson walking away from the area, and who was later seen on a bus heading back towards his home on the city's south side. Anderson had planned to kill Robinson weeks before her death, according to a statement from a "confidential informant" noted in court filings FOX6 News obtained. A search warrant also revealed prosecutors believe Anderson tried to cover up Robinson's death with a text message. Dig deeper FOX6 News is streaming the entire Anderson trial each day on FOX LOCAL. The app is free to download on your phone, tablet or smart TV. Day 5: Testimonyprovided our first look at Anderson's arrest Open Record: Maxwell Anderson trial Day 4: Video from Milwaukee, discovery of Sade Robinson's remains Day 3: Testimony resumes; law enforcement, friends of Sade Robinson take stand Day 2: Opening statements, testimony begins Day 1: Jury selected in single day Sade Robinson homicide: Timeline of events leading to criminal charges Sade Robinson homicide: Parents navigate grief ahead of trial Sade Robinson homicide: The psychology behind the murder Sade Robinson homicide: Lasting legacy, from tragedy to advocacy Open Record: A Date With Death The Source FOX6 News was in court for the Anderson trial. Information in this report is from the Milwaukee County District Attorney's Office, Wisconsin Circuit Court, and prior FOX6 coverage of the case.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store