logo
Fentanyl homicide; North Fond du Lac man sentenced, 9 years prison

Fentanyl homicide; North Fond du Lac man sentenced, 9 years prison

Yahoo2 days ago

The Brief
Jeremy Stoll has been sentenced to nine years in prison in connection with the fentanyl overdose death of a man.
That overdose death happened in June 2022 in the Town of Lamartine.
Officials said the victim had 45 ng/mL of fentanyl in his blood, along with numerous other drugs.
FOND DU LAC, Wis. - The Fond du Lac County District Attorney's Office announced on Monday, June 2 that Jeremy Stoll has been sentenced to nine years in prison and an additional 15 years of extended supervision in connection with the fentanyl overdose death of a man.
What we know
A news release said the sentence stemmed from Stoll's conviction for first-degree reckless homicide from the June 2022, overdose death of a man in the Town of Lamartine.
FREE DOWNLOAD: Get breaking news alerts in the FOX LOCAL Mobile app for iOS or Android
Officials said the victim had 45 ng/mL of fentanyl in his blood, along with numerous other drugs.
What they're saying
"The deadly effects of fentanyl destroy families and devastate communities. We will continue to aggressively prosecute those that distribute fentanyl and other drugs into our communities, in an effort seek justice for those impacted by the opioid epidemic and to protect the community. We hope this helps spur those suffering from addiction to seek treatment," said Fond du Lac County District Attorney Eric Toney.
The Source
The information in this post was provided by the Fond du Lac County District Attorney's Office and Wisconsin Circuit Court Access.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

No transfer bids for Emi Martinez as Aston Villa star speaks out
No transfer bids for Emi Martinez as Aston Villa star speaks out

Yahoo

time16 minutes ago

  • Yahoo

No transfer bids for Emi Martinez as Aston Villa star speaks out

Aston Villa haven't received any formal contact regarding goalkeeper Emi Martinez, who has dominated the transfer headlines since the end of the season. The 32-year-old's future has come under scrutiny after he was seen in tears at the end of Villa's final home game of the season against Tottenham last month. Advertisement Martinez signed a long-term contract extension in August but has attracted interest from Atletico Madrid, other European clubs, and teams in Saudi Arabia. READ MORE: Nassef Sawiris agreement as expletive fired off in 'stupid' Man Utd transfer rant READ MORE: Manager warns that Aston Villa transfer target 'is not ready for the Premier League' He joined up with the Argentina national team over the weekend and remained coy about his future when asked. 'My future? I don't know,' he told the press. 'I'm here to play for the national team, and that's all I care about right now. Do I want to change clubs? The transfer market has just opened, so there's still a lot to happen.' Advertisement As it stands, no club has submitted a formal offer for Martinez. Meanwhile, Villa are not under a huge amount of pressure to generate significant funds through player sales this summer, thanks to the financial boost from their Champions League campaign. Unai Emery's side earned around £100 million after reaching the quarter-finals, where they were narrowly beaten 5–4 on aggregate by eventual champions Paris Saint-Germain. However, after failing to qualify for next season's Champions League, they won't have such revenue to call on in the 2026 summer window. Aston Villa goalkeeper Emi Martinez -Credit:Getty Images Would you allow Martinez to leave Villa? Have your say HERE Everyday, the BirminghamLive football desk strive to deliver all manner of news, features and transfer-related stories as a part of our overall package of Aston Villa content. Advertisement Our dedicated reporter John Townley - who you can follow on X by clicking here - follows Villa home and away and offers you comprehensive coverage from matchdays, press conferences and everything that happens in between. So much happens day to day and sometimes you can struggle to keep on top of the very latest updates as and when they occur - that's why we have produced a daily newsletter which you can sign up to, for free, and which means you'll have a round-up of the key stories land in your email inbox. Sign up to the Villa newsletter here. You can also get all your favourite content from BirminghamLive's Villa team on WhatsApp. Click here to sign up for breaking updates about the biggest stories in and around the club. If you prefer reading our Villa stories on your phone, consider downloading the BirminghamLive app, in which you can personalise the content you see by selecting Villa as one of your designated topics. You can get it from Apple here and for Android here. Our weekly Aston Villa podcast, Claret And Blue, is also available to watch and listen on all major streaming services. You can subscribe to the YouTube channel here, while you can access the podcast on Spotify here and via Apple here.

Meta called out for tracking Android users across the web without their consent — what you need to know
Meta called out for tracking Android users across the web without their consent — what you need to know

Tom's Guide

timean hour ago

  • Tom's Guide

Meta called out for tracking Android users across the web without their consent — what you need to know

Academics at the Radboud University in the Netherlands and IMDEA Networks found that Meta has been tracking the web browsing activity of Android users without their knowledge or consent – even when the users were in incognito mode or using a VPN. As long as the Android owners were logged into Meta's apps, like Instagram and Facebook, Meta was able to track what users watched, clicked or bought in order to serve them more personalized ads. Initially spotted in January, the apps were loading a script that sent data back to other apps on the same device, basically bypassing Android's built-in security and privacy features. A professor at Radoud University realized that the Meta Pixel tracker (present on around 20% of popular websites) had been linked to Facebook and Instagram apps on one of the best Android phones. Instead of sending collected information to Meta, that linked the Pixel tracker to the cell phone apps and the user's identities as registered to Facebook and Instagram which allowed the company to bypass security protections enabled on Android devices. This behavior occurred on all major Android browsers, but Meta says it did stop earlier this week. According to BoyGenuisReport though,Meta has only been using this type of data collection since September of 2024. Google responded by saying the companies who collected sensitive data in this manner were using Android capabilities 'in unintended ways that blatantly violate our security and privacy principles.' They've also stated they have implemented changes to mitigate these types of invasive techniques, and have additionally launched their own investigation and are in direct contact with the involved parties. Meta has confirmed that they are in contact with Google by issuing their own statement. The company also confirmed that the tracking did occur but ended earlier this week. Likewise, Meta also told Sky News they would be looking into the issue and that they were discussing with Google 'a potential miscommunication regarding the application of their policies.' Get instant access to breaking news, the hottest reviews, great deals and helpful tips.

Android chipmaker Qualcomm fixes three zero-days exploited by hackers
Android chipmaker Qualcomm fixes three zero-days exploited by hackers

Yahoo

time2 hours ago

  • Yahoo

Android chipmaker Qualcomm fixes three zero-days exploited by hackers

Chipmaker giant Qualcomm released patches on Monday fixing a series of vulnerabilities in dozens of chips, including three zero-days that the company said may be in use as part of hacking campaigns. Qualcomm cited Google's Threat Analysis Group, or TAG, which investigates government-backed cyberattacks, saying the three flaws 'may be under limited, targeted exploitation.' According to the company's bulletin, Google's Android security team reported the three zero-days (CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038) to Qualcomm in February. Zero-days are security vulnerabilities that are not known to the software or hardware maker at the time of their discovery, making them extremely valuable for cybercriminals and government hackers. Because of Android's open source and distributed nature, it's now up to device manufacturers to apply the patches provided by Qualcomm, which means some devices may still be vulnerable for several more weeks, despite the fact that there are patches available. Do you have more information about these Qualcomm zero-days? Or other zero-day exploits or zero-day makers? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. Qualcomm said in the bulletin that the patches 'have been made available to [device makers] in May together with a strong recommendation to deploy the update on affected devices as soon as possible.' Google spokesperson Ed Fernandez told TechCrunch that the company's Pixel devices are not affected by these Qualcomm vulnerabilities. Kimberly Samra, a spokesperson for Google's TAG did not immediately provide more information about these vulnerabilities, and the circumstances in which TAG found them. Qualcomm acknowledged the fixes. "We encourage end users to apply security updates as they become available from device makers," said company spokesperson Dave Schefcik. Chipsets found in mobile devices are frequent targets for hackers and zero-day exploit developers because chips generally have wide access to the rest of the operating system, which means hackers can jump from there to other parts of the device that may hold sensitive data. In the last few months, there have been documented cases of exploitation against Qualcomm chipsets. Last year, Amnesty International identified a Qualcomm zero-day that was being used by Serbian authorities, likely by using phone unlocking tool maker Cellebrite. Updated to include Qualcomm's spokesperson comment. Sign in to access your portfolio

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store