
Granite Bay Residential Care Home owner, facility manager accused of Medi-Cal fraud
GRANITE BAY – The owner and facility manager of a Placer County residential care home are accused of billing Medi-Cal for services they didn't provide and receiving more than a half million dollars, federal prosecutors said on Thursday.
Federal prosecutors said the owner and the facility manager of Granite Bay Residential Care Home, which houses adults with special healthcare needs, were arrested on charges of false or fraudulent claims, conspiracy to commit false or fraudulent claims and grand theft by embezzlement.
The criminal complaint identifies the owner as Lovella Neberba Lucero and the facility manager as Ronnie Vi[inosa Neberba.
An investigation revealed that between January 2020 and September 2022, Lovella and Ronnie billed Medi-Cal for service they didn't provide and were overpaid more than $500,000, prosecutors said.
They are also accused of using the funds for personal purchases and stealing two iPhones and two Mac Book Pros that were bought with program funds, according to prosecutors.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
a day ago
- Yahoo
Spyware suspected on iPhones of US, EU political figures: Report
(NewsNation) — iPhones belonging to political figures could have been compromised and used to spy on their owners, a new report from mobile research company iVerify found. The six affected smartphones — belonging to people tied to a U.S. political campaign, media organizations, artificial intelligence companies and a European Union member state's government — had a bug that prompted rare crashes associated with the 'nickname' feature in iOS. 'If they do it in a very specific way, they can corrupt the memory on your phone, which allows them to conduct what's called a sandbox escape,' said Rocky Cole, iVerify's chief operating officer. Family of slain Florida teen alleges Grindr fails to protect minors That method essentially allows hackers to 'get around Apple's security architecture,' Cole said. Researchers said bad actors may have targeted the phones starting in November 2024. Apple fixed the vulnerability with an iOS update in early March. iVerify told NewsNation it was unable to share who the phones belonged to specifically, though some reports have pointed to the Harris-Walz campaign as a potential victim. Researchers said it's difficult to determine who was behind the potential hacks, but they told NewsNation there was a common thread between all targets: the Communist Party of China. AI disrupting entry-level job market for college graduates: Report iVerify said all the targets had either been previously surveilled by or engaged in some sort of activism against the CCP. Ivan Krstić, Apple's head of security engineering and architecture, pushed back on the findings in a statement to Axios. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users,' Krstić said. The research team said they released the findings to ensure people know mobile exploitation is real and happening in the United States. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.


Newsweek
2 days ago
- Newsweek
Apple and Google Face Accusations of Enabling Thieves Through Device Policies
Based on facts, either observed and verified firsthand by the reporter, or reported and verified from knowledgeable sources. Newsweek AI is in beta. Translations may contain inaccuracies—please refer to the original content. Apple and Google have been accused by UK lawmakers and police officials of not doing enough to stem a lucrative international black market in stolen smartphones. During a parliamentary hearing on Tuesday, June 3, Members of Parliament and the Metropolitan Police called on the tech giants to block stolen devices from accessing cloud services, a move they argue would drastically reduce resale value and help deter theft. Police said they have recorded 80,000 stolen phones in London in 2024—a 25% rise from 2023. Most of the thefts involve iPhones, and officials estimate the trade generates up to £50 million ($67,837,542) annually. Many devices are trafficked abroad to markets in Algeria, China and Hong Kong. Stock image of a Google smartphone and the Apple logo. Stock image of a Google smartphone and the Apple logo. Photo by Vadym Plysiuk / Getty Images Why It Matters Police officials argue that stolen smartphones are fueling violence and organized crime in the UK. The police want companies to block stolen phones based on their International Mobile Equipment Identity (IMEI) numbers and prevent them from accessing Apple and Google cloud services. While UK mobile networks already use IMEI blacklists, these blocks do not apply globally, which leaves a loophole for international criminal networks. What to Know Despite calls dating back to 2023, Apple and Google have not implemented the requested global blocks. Both companies raised concerns during the hearing that those measures could be exploited for fraud. "We worry, and we have had these discussions with the Met, that there is a vector for fraud," Gary Davis, global senior director for privacy and law enforcement at Apple, said during the session, as reported by The Register. Davis added, "Every month, over 1,000 people try to imitate legitimate users to seek data from us and delete accounts." Simon Wingrove, Google's software engineering manager, told MPs that "Android devices can be blocked from accessing the cloud services after they are stolen," but cautioned that changes based on IMEI data would require industry-wide coordination. What People Are Saying Former policing minister Kit Malthouse said it seemed Apple was "dragging your feet and sitting behind this is a very strong commercial incentive". He added, "The fact that £50m of phones are stolen in London every year—if that stopped, that would be £50m in sales that would be depressed." In a statement to Newsweek, Google said, "Google does not profit from phone theft. For years, Android has invested in advanced theft protection features, including the industry's first Theft Detection Lock and Offline Device Lock, to help prevent theft and block stolen devices. "We've built and evolved these features by listening to victims and partnering closely with law enforcement and industry." Newsweek reached out to Apple requesting further comment on June 4. What's Next Security firms have suggested that a central cloud-level block tied to the IMEI system could be feasible, provided devices are registered from their first activation. Dion Price, CEO of the locking tech firm Trustonic, told MPs that his company offers that service for clients, according to The Register. "If we get the signal from the legitimate owner of that device, then we can lock or unlock it within 30 seconds anywhere in the world," he said. Meanwhile, police in London have begun deploying high-speed e-bikes to pursue snatchers and reported a 15% drop in thefts during April and May. However, officials warned this reduction is likely due to increased enforcement and public awareness, and is not a permanent fix.
Yahoo
2 days ago
- Yahoo
Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says
One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potential hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a 'significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, pushed back on the findings. But Cole said the report was worth publishing for use by the cybersecurity research community. Apple's reputation is sterling among security professionals, and if it is confirmed a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. Cole, iVerify's CEO, responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. Under the Biden administration, the Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Walz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said. This article was originally published on