Clark County reaches $3.5 million settlement in deputy's fatal shooting of unarmed man
Clark County Council voted to approve the $3.5 million settlement surrounding Jenoah Donald's death on Wednesday, according to Mark Lindquist Law. The Tacoma-based firm said the case was set to go to trial in Seattle federal court next month.
New recovery treatment center in Portland's central eastside brings 'mix of emotions'
'This outcome honors Jenoah Donald's life and underscores a simple truth: when officers ignore their training and resort to needless lethal force, they will be held accountable,' Attorney Angus Lee said in a statement. 'The family's determination ensures their story will not be forgotten.'
The family's lawsuit was sparked by a traffic stop that turned deadly.
In February 2021, three deputies with the Clark County Sheriff's Office stopped Donald near NE 68th Street and NE 2nd Avenue in Hazel Dell due to a modified exhaust and defective rear light. Investigators told KOIN 6 the 30-year-old man did not exit the vehicle after he was asked to.
'Vulnerable people' in jeopardy due to Multnomah County budget cuts, public defender says
A physical confrontation ensued as Deputy Sean Boyle attempted to get Donald out, punching him in the nose. When the vehicle was knocked into gear, Boyle opened fire twice — with one gunshot hitting Donald. He was hospitalized for about a week before being taken off life support.
Later in July 2021, an determined Boyle acted lawfully and that the vehicle from the incident could be constituted as a 'weapon' after being put into gear.
Mark Lindquist Law said Donald was on the autism spectrum. The firm also accused the county of having 'constitutionally deficient' policies on deadly force.
Molalla city councilor facing felony charges after theft investigation
According to a statement from Sheriff John Horch, the deputies acted lawfully.
'We never want to see an incident that results in the loss of another person's life, and any loss of life is tragic,' Horch said. 'In this situation, deputies responded according to training and state law to protect themselves and others. Both the independent investigation and the independent prosecutorial review concluded that the decision to use deadly force was justifiable and done in good faith under state law.'
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Associated Press
14 minutes ago
- Associated Press
Trump weaponization czar urged New York Attorney General James to resign over mortgage probe
NEW YORK (AP) — President Donald Trump's political weaponization czar sent a letter urging New York Attorney General Letitia James to resign from office 'as an act of good faith' four days after starting his mortgage fraud investigation of her. Then he showed up outside her house. Ed Martin, the director of the Justice Department's Weaponization Working Group, told James' lawyer on Aug. 12 the Democrat would best serve the 'good of the state and nation' by resigning and ending his probe into alleged paperwork discrepancies on her Brooklyn townhouse and a Virginia home. 'Her resignation from office would give the people of New York and America more peace than proceeding,' Martin wrote. 'I would take this as an act of good faith.' Then last Friday, Martin turned up outside James' Brooklyn townhouse in a 'Columbo'-esque trench coat, accompanied by an aide and New York Post journalists. He didn't meet with James or go inside the building. A Post writer saw him tell a neighbor: 'I'm just looking at houses, interesting houses. It's an important house.' James' lawyer Abbe Lowell shot back on Monday, telling Martin in a letter his blunt request for James' resignation defied Justice Department standards and codes of professional responsibility and legal ethics. The Justice Department 'has firm policies against using investigations and against using prosecutorial power for achieving political ends,' Lowell wrote. 'This is ever more the case when that demand is made to seek political revenge against a public official in the opposite party.' 'Let me be clear: that will not happen here,' Lowell added. Lowell also blasted Martin's visit to James' home as a 'truly bizarre, made-for-media stunt' and said it was 'outside the bounds' of Justice Department rules. He included an image from security camera footage showing Martin, in his trench coat, posing for a photo in front of James' townhouse. He said Martin looked as if he were on a 'visit to a tourist attraction.' The Associated Press obtained copies of both letters on Tuesday. A message seeking comment was left for Martin's spokesperson. James' office declined to comment. The letters were the latest salvos in a monthslong drama involving Trump's retribution campaign against James and others who've battled him in court and fought his policies. James has sued the Republican president and his administration dozens of times and last year won a $454 million judgment against Trump and his companies in a lawsuit alleging he lied about the value of his assets on financial statements given to banks. An appeals court has yet to rule on Trump's bid to overturn that verdict. Earlier this month, the AP reported, the Justice Department subpoenaed James for records related to the civil fraud lawsuit and a lawsuit she filed against the National Rifle Association. Martin's investigation stems from a letter Federal Housing Finance Agency Director William Pulte sent to Attorney General Pam Bondi in April asking her to investigate and consider prosecuting James, alleging she had 'falsified bank documents and property records.' Pulte, whose agency regulates mortgage financiers Fannie Mae and Freddie Mac, cited 'media reports' claiming James had falsely listed a Virginia home as her principal residence, and he suggested she may have been trying to avoid higher interest rates that often apply to second homes. Records show James was listed as a co-borrower on a house her niece was buying in 2023. Lowell said records and correspondence easily disproved Pulte's allegation. While James signed a power-of-attorney form that, Lowell said, 'mistakenly stated the property to be Ms. James' principal residence,' she sent an email to her mortgage loan broker around the same time that made clear the property 'WILL NOT be my primary residence.' Pulte also accused James of lying in property records about the number of apartments in the Brooklyn townhouse she has owned since 2001. A certificate of occupancy issued to a previous owner authorized up to five units in the building, where James lives and has rented out apartments. Other city records show the townhouse has four units, a number James has listed in building permit applications and mortgage documents. On Aug. 8, Bondi appointed Martin, a former Republican political operative, to investigate. Martin, the current U.S. pardon attorney and former acting U.S. attorney for Washington, D.C., is also investigating mortgage fraud allegations against Sen. Adam Schiff, D-Calif. Schiff's lawyer called the allegations 'transparently false, stale, and long debunked.' Lowell said it appears the working group Martin leads 'is aptly named as it is 'weaponizing'' the Justice Department 'to carry out the President's and Attorney General's threats.'
Yahoo
42 minutes ago
- Yahoo
Justice Department investigating DC police over Trump allegations of ‘fake' crime data
The Department of Justice is reportedly investigating whether Washington, D.C. officials manipulated crime data after Donald Trump accused the capital city of creating 'fake crime numbers' to undermine his federal takeover. On his Truth Social account on Monday, Trump accused D.C. officials of manipulating data to create a 'false illusion of safety' while his critics accuse the White House of exaggerating reports of violent crime to justify an unprecedented mandate. 'This is a very bad and dangerous thing to do, and they are under serious investigation for so doing!' Trump wrote. Last week, the president declared what he called a 'crime emergency' to justify his administration taking control of the city's Metropolitan Police Department while deploying National Guard troops and federal law enforcement agents into the city's streets, claiming that the White House must 'rescue' the city from 'crime, bloodshed, bedlam and squalor and worse.' He claimed the city is overrun with 'bloodthirsty criminals, roving mobs of wild youth, drugged-out maniacs and homeless people,' though reports of violent crime in the city have plummeted, along with national downward trends of violent crime rates. The capital city 'was the most unsafe 'city' in the United States, and perhaps the World,' he wrote on Monday. 'Now, in just a short period of time, it is perhaps the safest, and getting better every single hour!' The White House has pointed to a previous investigation into D.C. police commander Michael Pulliam, who was suspended earlier this year facing allegations that he made 'questionable' changes to crime data, according to a report from NBC4 Washington last month. A federal investigation is expected to go further than the local probe into Pulliam's time in office. The Independent has requested comment from MPD. Despite the administration's claims that crime is 'out of control' in D.C., data has shown the opposite: 2024 saw the lowest violent crime rates in the capital in more than 30 years, while reports of violent crime within the first seven months of 2025 have plunged 27 percent from last year. Those rates mirror national downward trends, according to FBI crime data released during Trump's administration. Homicides in D.C. are down 11 percent, according to city data. The city's homicide rate in 2024 was roughly 25 per 100,000 residents — nearly twice the rate in 2012, when it was nearly 14 per 100,000 residents. This is a developing story


Axios
2 hours ago
- Axios
How North Korea's IT army is hacking the global job market
Nearly every Fortune 500 company is hiding the same uncomfortable secret: they have hired a North Korean IT worker. Why it matters: Despite how widespread the issue is, few companies are willing to talk publicly about it. Experts say reputational risk, legal uncertainty, and embarrassment all contribute to the silence — which in turn makes the problem harder to solve. Dozens of resumes, LinkedIn profiles, and fraudulent identity documents shared with Axios lay bare the scale and sophisticated of the scams. The big picture: For North Korea, this is a precious revenue stream that evades American sanctions — capitalizing on the wealth of high-paying remote worker roles in the U.S. to route cash back to Pyongyang. In the past two years, companies and their security partners have begun to grasp the scale of the problem — and now, they're sounding the alarm about where it's headed next. "They've been stealing intellectual property and then working on the projects themselves," Michael "Barni" Barnhart, principal investigator at DTEX Systems, told Axios. "They're going to use AI to magnify exponentially what they're already doing — and what they're doing now is bad." Between the lines: It sounds easy to simply weed out North Korean job applicants. But some of the world's biggest firms have found it devilishly difficult. That's because the North Korean operation has become as complex as a multi-national corporation. It involves several North Korean government offices, dozens of China-based front companies and Americans willing to facilitate the fraud. And the undercover North Korean IT workers are often exceptional at their jobs — at least until they start stealing sensitive data or extorting companies that try to fire them. Google Threat Intelligence VP Sandra Joyce recalled the response of one employer when told they likely had a North Korean fraudster on staff: "You guys better be right, because that is my best guy." The groups running the show North Korea has invested years into building up its remote IT labor force, providing training not just for remote job fraud but also corporate espionage and IP theft. Workers are selected and trained at elite institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong — some with specializations in software development, AI or cryptography. Research from DTEX shows that the most advanced worker scams are often coordinated with units like APT 45, a notorious government hacking group known for infiltrating companies, running scams and laundering money. Other participants in the scheme include the Lazarus Group, which typically leads the regime's cryptocurrency hacks and has positioned insiders within crypto companies, and Research Center 227, a new AI research unit inside North Korea's intelligence agency. The intrigue: Cybersecurity companies have been discovering and naming new groups running these hacks, with names like Jasper Sleet, Moonstone Sleet and Famous Chollima. The scale Driving the news: Nine security officials who spoke with Axios all said they've yet to meet a Fortune 500 company that hasn't inadvertently hired a North Korean IT worker. Google told reporters at the RSA Conference in May that it had seen North Koreans applying to its jobs. SentinelOne and others have said the same. KnowBe4, a cybersecurity training company, admitted last year that it hired a North Korean IT worker. A smaller cryptocurrency startup told the WSJ that they accidentally had North Korean workers on their payroll for almost two years. In one case, Sam Rubin, senior vice president of Palo Alto Networks' Unit 42 consulting and threat intelligence team, told Axios that within 12 hours of a large client posting a new job, more than 90% of the applicants were suspected to be North Korean workers. "If you hire contract IT workers, this has probably happened to you," Rubin said. The intrigue: Even small-to-mid-sized companies that rely on remote IT talent or outsource their IT needs to a consulting firm have encountered this problem, Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said. CrowdStrike has investigated more than 320 incidents where North Korean operatives landed jobs as remote software developers, according to the company's annual threat hunting report published earlier this month. How it works Getting a job at a U.S. company — and going undetected — is a team effort that involves several North Korean IT workers, China-based companies and even a handful of Americans. Some of the North Korean workers are even stationed in China and other nearby countries to keep suspicions low. First, the workers identify potential identities they can assume. Those are often stolen from a real person, or even from a dead U.S. citizen. To pull off this deception, they create fake passwords, Social Security cards and utility bills. Many of them use the same recognizable tablecloth in the background of fake ID photos, Meyers said. For instance, in a December indictment of 14 North Koreans, the workers were found using stolen identities to apply to dozens of jobs. Second, the workers find open jobs in software development, technical support and DevOps posted on Upwork, Fiverr, LinkedIn, and third-party staffing platforms. Much of this is streamlined through AI tools that help track and manage their job applications. Many of them will use AI tools to help generate passable resumes and LinkedIn profiles, according to Trevor Hilligoss, senior vice president at SpyCloud Labs. "There's a hierarchy: There's a group of people who are the interviewers, and they're the ones with the really good English specialties," Hilligoss told Axios. "When they get hired, that gets turned over to somebody that's a developer." Those developers will often juggle several jobs and multiple different personas. Zoom in: Job interviews would seem like the obvious time to catch a fraudulent application. But the "applicants" — whether they're using their real faces and voices or AI-enabled personas — are practiced interviewers with the skills necessary to complete technical coding assignments. In multiple cases, hiring managers only realized something was wrong weeks later when employees looked or behaved differently than during the interview, Barnhart said. After landing the job, the developers step in and request that their company laptop be shipped to a U.S. address — often citing a last-minute move or family emergency. That address often belongs to an American accomplice, who typically operates what's known as a "laptop farm." These facilitators are told to install specific remote desktop software onto the laptops so the North Korean worker can operate the laptop from abroad. In July, the FBI said it executed searchers of 21 premises across 14 states that were known or suspected laptop farms, seizing 137 laptops. Then there's the challenge of ensuring the salaries actually reach the North Korean regime. That often requires the facilitators forward the paychecks to front companies across China or funnel it through cryptocurrency exchanges. In a report published in May, researchers at Strider Technologies identified 35 China-based companies linked to helping North Korean operations. Challenges Hiring processes are so siloed that it's difficult for managers to see all the signs of fraud until the North Korean workers start their roles, Kern said. Even if a company suspects something is wrong, the forensic signals can be subtle and scattered. Security teams may detect unusual remote access tools or strange browser behavior. HR might notice recycled references or resumes that reuse the same phone number. But unless those insights are pooled together, it rarely raises alarms. "There's not one giant red flag to point to," said Sarah Kern, a leading North Korea analyst at Sophos' Counter Threat Unit. "It is multiple technical forensic aspects and then such a human aspect of small things to pick up on that aren't necessarily going to be in telemetry data from an endpoint detection standpoint." Yes, but: Even when these workers are detected, they're not easy to fire. Many of them are so talented that managers are reluctant to even believe they could actually be in North Korea, Alexandra Rose, director at Sophos' Counter Threat Unit, told Axios. If these workers are caught, employers then face a litany of problems: Some workers will download sensitive internal data and extort the companies for a hefty sum in a last-ditch effort to bleed the company of whatever money they can. Some workers have filed legal complaints, including workers' compensation claims, Barnhart said. In one case, Barnhart said he had a worker try to claim domestic violence protections as they were being fired just to buy time. "There is a lot of focus on companies that cybersecurity shouldn't just be for the CISO," Rose said. "You want a bit of that security feel throughout the company, and this is the kind of case that really demonstrates why that is." The bottom line: Some companies also hesitate to report these incidents, fearing they could be penalized for unknowingly violating U.S. sanctions — even though law enforcement officials have said they're more interested in cooperation than prosecution. What's next Right now, the operations are predominantly focused on making money for North Korea's regime. Threat level: But the hacking groups involved are evolving into something more sophisticated and dangerous — including by potentially building their own AI models and feeding in sensitive U.S. company data. That's a particular concern in the defense sector. Barnhart says his teams have seen North Korean IT workers increasingly studying information about AI technologies, drone manufacturing and other defense contract work. What to watch: As U.S. companies become more alert, North Korean IT workers are shifting their focus abroad as they seek employment at other companies and set up laptop farms throughout Europe — suggesting the operation is only just now ramping up, instead of slowing down.