logo
Feds on alert for Tesla 'Global Day of Action' after nationwide violence leads to arrests

Feds on alert for Tesla 'Global Day of Action' after nationwide violence leads to arrests

Yahoo29-03-2025
As Americans flock to the streets to enjoy the spring weather this weekend, protesters across the world are set to participate in the pre-planned "Tesla Takedown's Global Day of Action" on Saturday.
The protesters' goal, according to the organization's website, is to send a crystal clear message that they are against Tesla CEO Elon Musk. The group describes itself as a decentralized grassroots movement that will "protest Tesla for as long as Elon Musk continues to shred public services." Organizers plan to hold rallies at over 200 Tesla locations across the U.S.
Fox News Digital spoke with Joshua Schirard, the director of Byrna Law Enforcement and a former Galveston, Texas police and SWAT captain, on how everyday Americans, as well as owners of the electric vehicles, can stay on high alert.
"This weekend, when we have this Tesla Takedown day, have extra situational awareness and put in a little bit more effort into planning what you're going to do, some routes you're going to take this weekend," he said.
The Loudest Silence: Top Democrats Remain Mum Amid Violent Attacks On Tesla
The organization's website notes that the Tesla Takedown is a "peaceful protest movement."
Read On The Fox News App
"We oppose violence, vandalism and destruction of property," they wrote. "This protest is a lawful exercise of our First Amendment right to peaceful assembly."
Despite the organization's casting the weekend protests as peaceful, past actions have placed the demonstrations in an illegal light. From Oregon to Massachusetts, Tesla cars and facilities have been vandalized in at least 10 locations this year.
WATCH: EXCLUSIVE FOX NEWS INTERVIEW
What began as protests against Elon Musk and his Department of Government Efficiency (DOGE) have escalated into violent incidents against the Trump ally's company, including shots fired at a building, destroyed dealership windows and charging stations set on fire.
The rise in incidents has caused the FBI to launch a task force to crack down on Tesla crime, and the Justice Department to announce charges against arson suspects with Attorney General Pam Bondi labeling the attacks "domestic terrorism."
Schirard said that there has "clearly" been communication on how to target Tesla dealerships and owners this weekend.
"If I had a Tesla, I might park it for the weekend just to be safe," he said. "I wish we didn't have to say that, but unfortunately we do."
Vandal Strikes Cybertruck, Tesla Owner Hits Back
For Tesla owners, Schirard recommends purchasing a tarp and placing the electric vehicle on its "Sentry Mode," a feature that acts as a surveillance system. When in this mode, the vehicle's cameras and sensors are able to record activity around it.
"Think of Sentry Mode as an intelligent vehicle security system that alerts you when it detects possible threats nearby," according to the Tesla Model 3 owner's manual.
Residents who are not Tesla owners can still participate in keeping public property safe – and prevent bad actors from violent activism.
Disabled Tesla Owner Targeted In Vandalism, Says Anti-musk Protesters Are Just 'Hurting Families'
"For the rest of the American citizens out there that maybe aren't Tesla drivers, while you're out and about this weekend, you need to stay extra vigilant to help each other out," Schirard said. "If you're passing a Tesla dealership, take a look and see if there's some active protest or some vandalism, some violence going on."
The law enforcement expert shared the classic adage – see something, say something – rings true for violence against Tesla vehicles, dealerships and owners.
"The police are already taxed and stretched thin enough as it is. The only way that we can successfully protect a community is with the help, the support and the contributions of those citizens," Schirard said. "So make sure if you see something, even though it might look minor, call 911."
"Let them know what's going on. That way, police have an idea of how to divert resources properly to make sure that we can protect the citizens where we really need to," he said.
Schirard said that he is confident that law enforcement authorities across the nation are discussing how to approach and combat Tesla violence.
"Most police departments now are very intel-driven. We're constantly looking at what that future threat could be. And we have a lot of talk on social media, on mainstream media and from local sources about this Tesla Takedown," he said.
"It's very likely that we're going to see some diverted resources in police departments just to make sure that some of those bigger Tesla dealerships are covered, and that more public and commercial spots have some extra coverage as well."
Fox News Digital has reached out to Tesla for comment.Original article source: Feds on alert for Tesla 'Global Day of Action' after nationwide violence leads to arrests
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

This Texas Democrat Is Stuck Inside The Statehouse After Refusing A GOP-Mandated Law Enforcement Escort
This Texas Democrat Is Stuck Inside The Statehouse After Refusing A GOP-Mandated Law Enforcement Escort

Yahoo

time18 minutes ago

  • Yahoo

This Texas Democrat Is Stuck Inside The Statehouse After Refusing A GOP-Mandated Law Enforcement Escort

Texas state representative Nicole Collier spent last night on the floor of the statehouse. Collier was one of more than 50 Texas Democrats who left the state earlier this month in protest of Republican-led redistricting that would likely flip five national House of Representatives seats from Democrat to Republican. Texas Democrats have described the plan as "gerrymandering," which means dividing up the district map strategically for the purpose of political gains. Related: Now that Collier and her fellow Democrats have returned to Texas, Texas House Speaker Dustin Burrows said Monday that representatives who had warrants issued against them during their absence would not be allowed to leave the chamber without agreeing to one very specific condition. "Members who have not been present until today, for whom arrest warrants were issued, will be granted written permission to leave only after agreeing to be released into the custody of a designated [Department of Public Safety] officer appointment under the rules of the house." Collier, however, refused the escort, which led to her spending the night in the Texas statehouse. In a statement to the Fort Worth Report, Collier wrote, "I don't know how long I will be here. Instead of DPS officers looking for pedophiles, they have been assigned to follow Democratic state representatives around only to ensure their return to the Capitol on Wednesday (when the House reconvenes). I sure hope the public feels safe without those officers on beat." Related: According to Republican Rep. Charlie Geren, Collier may stay in the chamber or go to her office, but she is not allowed to leave the state capitol grounds. She is the only Democrat who refused a law enforcement escort, but other members have reportedly visited her. Online, people have a lot of thoughts about the situation. "They have a duly elected lawmaker locked in the Texas Capitol because she refused her Republican-assigned police babysitter," one person wrote. Related: In a tweet, Representative Jasmine Crockett called it "beyond outrageous," and wrote, "That's some old Jim Crow playbook. Texas Republicans have lost their damn minds." Some are calling it "kidnapping." And others are calling it "authoritarianism." Related: But others are applauding Collier for taking a stand, like this Arizona state senator who wrote simply, "American hero." As one Twitter user put it, "Not all heroes wear capes. Some wear bonnets!" Also in In the News: Also in In the News: Also in In the News:

Texas Democrat Defies GOP Law Enforcement Escort
Texas Democrat Defies GOP Law Enforcement Escort

Buzz Feed

timean hour ago

  • Buzz Feed

Texas Democrat Defies GOP Law Enforcement Escort

Texas state representative Nicole Collier spent last night on the floor of the statehouse. Collier was one of more than 50 Texas Democrats who left the state earlier this month in protest of Republican-led redistricting that would likely flip five national House of Representatives seats from Democrat to Republican. Texas Democrats have described the plan as "gerrymandering," which means dividing up the district map strategically for the purpose of political gains. Now that Collier and her fellow Democrats have returned to Texas, Texas House Speaker Dustin Burrows said Monday that representatives who had warrants issued against them during their absence would not be allowed to leave the chamber without agreeing to one very specific condition. "Members who have not been present until today, for whom arrest warrants were issued, will be granted written permission to leave only after agreeing to be released into the custody of a designated [Department of Public Safety] officer appointment under the rules of the house." Collier, however, refused the escort, which led to her spending the night in the Texas statehouse. In a statement to the Fort Worth Report, Collier wrote, "I don't know how long I will be here. Instead of DPS officers looking for pedophiles, they have been assigned to follow Democratic state representatives around only to ensure their return to the Capitol on Wednesday (when the House reconvenes). I sure hope the public feels safe without those officers on beat." According to Republican Rep. Charlie Geren, Collier may stay in the chamber or go to her office, but she is not allowed to leave the state capitol grounds. She is the only Democrat who refused a law enforcement escort, but other members have reportedly visited her. Online, people have a lot of thoughts about the situation. "They have a duly elected lawmaker locked in the Texas Capitol because she refused her Republican-assigned police babysitter," one person wrote. In a tweet, Representative Jasmine Crockett called it "beyond outrageous," and wrote, "That's some old Jim Crow playbook. Texas Republicans have lost their damn minds." Some are calling it "kidnapping." And others are calling it "authoritarianism." But others are applauding Collier for taking a stand, like this Arizona state senator who wrote simply, "American hero." As one Twitter user put it, "Not all heroes wear capes. Some wear bonnets!"

How North Korea's IT army is hacking the global job market
How North Korea's IT army is hacking the global job market

Axios

timean hour ago

  • Axios

How North Korea's IT army is hacking the global job market

Nearly every Fortune 500 company is hiding the same uncomfortable secret: they have hired a North Korean IT worker. Why it matters: Despite how widespread the issue is, few companies are willing to talk publicly about it. Experts say reputational risk, legal uncertainty, and embarrassment all contribute to the silence — which in turn makes the problem harder to solve. Dozens of resumes, LinkedIn profiles, and fraudulent identity documents shared with Axios lay bare the scale and sophisticated of the scams. The big picture: For North Korea, this is a precious revenue stream that evades American sanctions — capitalizing on the wealth of high-paying remote worker roles in the U.S. to route cash back to Pyongyang. In the past two years, companies and their security partners have begun to grasp the scale of the problem — and now, they're sounding the alarm about where it's headed next. "They've been stealing intellectual property and then working on the projects themselves," Michael "Barni" Barnhart, principal investigator at DTEX Systems, told Axios. "They're going to use AI to magnify exponentially what they're already doing — and what they're doing now is bad." Between the lines: It sounds easy to simply weed out North Korean job applicants. But some of the world's biggest firms have found it devilishly difficult. That's because the North Korean operation has become as complex as a multi-national corporation. It involves several North Korean government offices, dozens of China-based front companies and Americans willing to facilitate the fraud. And the undercover North Korean IT workers are often exceptional at their jobs — at least until they start stealing sensitive data or extorting companies that try to fire them. Google Threat Intelligence VP Sandra Joyce recalled the response of one employer when told they likely had a North Korean fraudster on staff: "You guys better be right, because that is my best guy." The groups running the show North Korea has invested years into building up its remote IT labor force, providing training not just for remote job fraud but also corporate espionage and IP theft. Workers are selected and trained at elite institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong — some with specializations in software development, AI or cryptography. Research from DTEX shows that the most advanced worker scams are often coordinated with units like APT 45, a notorious government hacking group known for infiltrating companies, running scams and laundering money. Other participants in the scheme include the Lazarus Group, which typically leads the regime's cryptocurrency hacks and has positioned insiders within crypto companies, and Research Center 227, a new AI research unit inside North Korea's intelligence agency. The intrigue: Cybersecurity companies have been discovering and naming new groups running these hacks, with names like Jasper Sleet, Moonstone Sleet and Famous Chollima. The scale Driving the news: Nine security officials who spoke with Axios all said they've yet to meet a Fortune 500 company that hasn't inadvertently hired a North Korean IT worker. Google told reporters at the RSA Conference in May that it had seen North Koreans applying to its jobs. SentinelOne and others have said the same. KnowBe4, a cybersecurity training company, admitted last year that it hired a North Korean IT worker. A smaller cryptocurrency startup told the WSJ that they accidentally had North Korean workers on their payroll for almost two years. In one case, Sam Rubin, senior vice president of Palo Alto Networks' Unit 42 consulting and threat intelligence team, told Axios that within 12 hours of a large client posting a new job, more than 90% of the applicants were suspected to be North Korean workers. "If you hire contract IT workers, this has probably happened to you," Rubin said. The intrigue: Even small-to-mid-sized companies that rely on remote IT talent or outsource their IT needs to a consulting firm have encountered this problem, Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said. CrowdStrike has investigated more than 320 incidents where North Korean operatives landed jobs as remote software developers, according to the company's annual threat hunting report published earlier this month. How it works Getting a job at a U.S. company — and going undetected — is a team effort that involves several North Korean IT workers, China-based companies and even a handful of Americans. Some of the North Korean workers are even stationed in China and other nearby countries to keep suspicions low. First, the workers identify potential identities they can assume. Those are often stolen from a real person, or even from a dead U.S. citizen. To pull off this deception, they create fake passwords, Social Security cards and utility bills. Many of them use the same recognizable tablecloth in the background of fake ID photos, Meyers said. For instance, in a December indictment of 14 North Koreans, the workers were found using stolen identities to apply to dozens of jobs. Second, the workers find open jobs in software development, technical support and DevOps posted on Upwork, Fiverr, LinkedIn, and third-party staffing platforms. Much of this is streamlined through AI tools that help track and manage their job applications. Many of them will use AI tools to help generate passable resumes and LinkedIn profiles, according to Trevor Hilligoss, senior vice president at SpyCloud Labs. "There's a hierarchy: There's a group of people who are the interviewers, and they're the ones with the really good English specialties," Hilligoss told Axios. "When they get hired, that gets turned over to somebody that's a developer." Those developers will often juggle several jobs and multiple different personas. Zoom in: Job interviews would seem like the obvious time to catch a fraudulent application. But the "applicants" — whether they're using their real faces and voices or AI-enabled personas — are practiced interviewers with the skills necessary to complete technical coding assignments. In multiple cases, hiring managers only realized something was wrong weeks later when employees looked or behaved differently than during the interview, Barnhart said. After landing the job, the developers step in and request that their company laptop be shipped to a U.S. address — often citing a last-minute move or family emergency. That address often belongs to an American accomplice, who typically operates what's known as a "laptop farm." These facilitators are told to install specific remote desktop software onto the laptops so the North Korean worker can operate the laptop from abroad. In July, the FBI said it executed searchers of 21 premises across 14 states that were known or suspected laptop farms, seizing 137 laptops. Then there's the challenge of ensuring the salaries actually reach the North Korean regime. That often requires the facilitators forward the paychecks to front companies across China or funnel it through cryptocurrency exchanges. In a report published in May, researchers at Strider Technologies identified 35 China-based companies linked to helping North Korean operations. Challenges Hiring processes are so siloed that it's difficult for managers to see all the signs of fraud until the North Korean workers start their roles, Kern said. Even if a company suspects something is wrong, the forensic signals can be subtle and scattered. Security teams may detect unusual remote access tools or strange browser behavior. HR might notice recycled references or resumes that reuse the same phone number. But unless those insights are pooled together, it rarely raises alarms. "There's not one giant red flag to point to," said Sarah Kern, a leading North Korea analyst at Sophos' Counter Threat Unit. "It is multiple technical forensic aspects and then such a human aspect of small things to pick up on that aren't necessarily going to be in telemetry data from an endpoint detection standpoint." Yes, but: Even when these workers are detected, they're not easy to fire. Many of them are so talented that managers are reluctant to even believe they could actually be in North Korea, Alexandra Rose, director at Sophos' Counter Threat Unit, told Axios. If these workers are caught, employers then face a litany of problems: Some workers will download sensitive internal data and extort the companies for a hefty sum in a last-ditch effort to bleed the company of whatever money they can. Some workers have filed legal complaints, including workers' compensation claims, Barnhart said. In one case, Barnhart said he had a worker try to claim domestic violence protections as they were being fired just to buy time. "There is a lot of focus on companies that cybersecurity shouldn't just be for the CISO," Rose said. "You want a bit of that security feel throughout the company, and this is the kind of case that really demonstrates why that is." The bottom line: Some companies also hesitate to report these incidents, fearing they could be penalized for unknowingly violating U.S. sanctions — even though law enforcement officials have said they're more interested in cooperation than prosecution. What's next Right now, the operations are predominantly focused on making money for North Korea's regime. Threat level: But the hacking groups involved are evolving into something more sophisticated and dangerous — including by potentially building their own AI models and feeding in sensitive U.S. company data. That's a particular concern in the defense sector. Barnhart says his teams have seen North Korean IT workers increasingly studying information about AI technologies, drone manufacturing and other defense contract work. What to watch: As U.S. companies become more alert, North Korean IT workers are shifting their focus abroad as they seek employment at other companies and set up laptop farms throughout Europe — suggesting the operation is only just now ramping up, instead of slowing down.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store