logo
14-year-old Lakewood Ranch High student arrested for making shooting threat on Snapchat: Deputies

14-year-old Lakewood Ranch High student arrested for making shooting threat on Snapchat: Deputies

Yahoo14-03-2025

The Brief
A 14-year-old Lakewood Ranch High School student was arrested for making a school shooting threat on Snapchat.
Manatee County deputies said they received a tip through the Fortify FL app about a shooting planned at the school for Friday.
Records from Snapchat helped deputies link an email address and phone number to the student, which led to his arrest.
LAKEWOOD RANCH, Fla. - A 14-year-old Lakewood Ranch High School student was arrested Thursday afternoon after making a school shooting threat on Snapchat, according to deputies.
Dig deeper
The Manatee County Sheriff's Office said they received a tip through the Fortify FL app that indicated a shooting was planned at the school for Friday, March 14. It prompted several students to speak up to school staff about concerning comments posted on Snapchat.
Follow FOX 13 on YouTube
Deputies said they began investigating and got records from Snapchat that included an email address and phone number linked to the 14-year-old, who was not identified by FOX 13 due to his age.
Detectives said they arrested the student at the school after confirming his cellphone number.
He was arrested on two charges, including making written threats to kill and disrupting a school function.
STAY CONNECTED WITH FOX 13 TAMPA:
Download the FOX Local app for your smart TV
Download FOX Local mobile app:Apple |Android
Download the FOX 13 News app for breaking news alerts, latest headlines
Download the SkyTower Radar app
Sign up for FOX 13's daily newsletter

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Sebastian man struck, killed by Brightline train; police investigation underway
Sebastian man struck, killed by Brightline train; police investigation underway

Yahoo

time2 hours ago

  • Yahoo

Sebastian man struck, killed by Brightline train; police investigation underway

SEBASTIAN − Police are investigating the death of a Sebastian man who they said was struck by a Brightline passenger train late June 4. The 69-year-old man was struck by a northbound Brightline train while he was on train tracks about a quarter mile north of the Main Street crossing at roughly 11:30 p.m., said Deputy Chief Timothy Wood with Sebastian Police Department. Database: Brightline train incidents on the Treasure Coast Wood said he was a local resident, however, police were not releasing his identity as of June 5. The man was the only person hit and was said to be on foot at the time. Whether the man was struck while crossing, or intentionally on the tracks, remains under investigation, along with if there was any evidence of possible intoxication, Wood said. More: Rabies advisory in part of St. Lucie County after raccoon killed June 1 More: IRCSO: Snapchat used to track down missing Vero Beach child; Man arrested on sex charges More: Vero Beach plane crash investigation pending recovery of aircraft, NTSB says Corey Arwood is a breaking news reporter for TCPalm. Follow Corey on Twitter @coreyarwood, or reach him by phone at 772-978-2246. This article originally appeared on Treasure Coast Newspapers: Sebastian man struck, killed by Brightline train; police investigating

Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says
Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says

Yahoo

time2 hours ago

  • Yahoo

Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says

One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potential hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a 'significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, pushed back on the findings. But Cole said the report was worth publishing for use by the cybersecurity research community. Apple's reputation is sterling among security professionals, and if it is confirmed a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. Cole, iVerify's CEO, responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. Under the Biden administration, the Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Walz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said. This article was originally published on

Navy Sailor, 21, Suddenly Disappears After She Was Last Seen at Station Barracks
Navy Sailor, 21, Suddenly Disappears After She Was Last Seen at Station Barracks

Yahoo

time2 hours ago

  • Yahoo

Navy Sailor, 21, Suddenly Disappears After She Was Last Seen at Station Barracks

Angelina Petra Resendiz, a 21-year-old Navy sailor from Texas, has disappeared, according to family and authorities Virginia State Police said the woman was last seen at her barracks in Norfolk on May 29 'She's spent no money, made no calls. She just stopped. She disappeared," her mother, Esmerelda Castle saidA Navy sailor has suddenly disappeared, and her family is desperate to find her. The Virginia State Police (VSP) announced on Tuesday, June 3, that a 'critically missing adult alert' has been issued for 21-year-old Angelina Petra Resendiz. Resendiz was last seen 'at her barracks in Miller Hall at Naval Station Norfolk' at 10 a.m. local time on Thursday, May 29, according to state police. She is described as a 5-foot-tall white/Hispanic woman with brown eyes and black hair, and weighing about 110 lbs. "She's very kind. She's very loving," said her mother, Esmeralda Castle, according to ABC affiliate WVEC. Castle lives in Texas, where Resendiz grew up, according to the report. She said her daughter goes by the nickname 'Angie' and is a culinary specialist with the Navy. Before her disappearance, Resendiz would talk to a family member or friend 'every single day,' Castle told WVEC. "Her and my sister have a 400-day streak on Snapchat,' she added. Last week, friends and family stopped hearing from Resendiz, and the Navy sailor missed work, according to Castle. She reached out to the Navy after she was unable to reach her daughter. "She just stopped existing Thursday,' the mom explained. 'She's spent no money, made no calls. She just stopped. She disappeared.' State police said Resendiz's disappearance 'poses a credible threat' to her health and safety. Castle told CBS affiliate WTKR that her daughter wouldn't leave work 'unauthorized' or 'without permission.' 'Angie's too scared to miss work; she wouldn't do that,' the mom explained. She said she is going to Virginia herself 'to find out what I can.' Never miss a story — sign up for to stay up-to-date on the best of what PEOPLE has to offer, from celebrity news to compelling human interest stories. Anyone with information about Resendiz's whereabouts is asked to contact the Naval Criminal Investigative Service at (877) 579-3648. Castle told WVEC that her daughter does not drive. Family described her as a fun and kind woman. "This isn't like Angie. I just want to find her," the mom said. Read the original article on People

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store