logo
Man wounded in shooting outside house party in El Paso's Upper East Side

Man wounded in shooting outside house party in El Paso's Upper East Side

Yahoo29-06-2025
A 20-year-old man was wounded in a shooting outside a house party in an Upper East Side neighborhood in an unsolved case of gun violence that is Crime Stoppers of El Paso's Crime of the Week.
The shooting occurred after an argument escalated into a fight at about 1:54 a.m. June 14 during a house party attended by a large number of people in the 14500 block of Petralia Avenue, Crime Stoppers liaison El Paso police Sgt. Javier Sambrano said in a news release.
Shooting deaths: Cameras, witnesses saw shooter in El Paso homicide at Nations Tobin Park
The fight devolved into gunshots fired outside near Petraila Avenue and Tierra Murcia Street, police said. The 20-year-old man was wounded and taken to a hospital for medical treatment.
The address is in a neighborhood just east of Pebble Hills High School, not far from the El Paso Police Department's new Upper East Side Regional Command Center that opened last fall.
"We know that somebody has information on those involved in this case," Sambrano said.
Anyone with any information on the shooting may anonymously call Crime Stoppers of El Paso at 915-566-8477 (TIPS) or leave a tip online at cselpaso.org. Callers could be eligible for a cash reward if information leads to an arrest.
Gun violence: 1 dead, 2 wounded, 4 in custody after shooting in El Paso's Lower Valley
This article originally appeared on El Paso Times: El Paso Crime of the Week: Shooting wounds man outside house party
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Second adult charged in connection to abduction of Jamal White, 7
Second adult charged in connection to abduction of Jamal White, 7

Yahoo

time14 minutes ago

  • Yahoo

Second adult charged in connection to abduction of Jamal White, 7

A second adult faces kidnapping charges in the July 11 abduction of seven-year-old Jamal White. Jamal, known as Baby J, was abducted at gunpoint from outside his father's house. He was recovered the following day, less than 24 hours after Milwaukee Police Department designated him as "critically missing" and an Amber alert was issued. Corey Williams, 25, was arrested on July 13 from the house where Jamal was found, and criminal charges were filed against him the next day. On July 15, Fabian Johnson, 38, was arrested in connection with the abduction. Johnson was charged Sunday with being a party to the crime of kidnapping by forcibly seizing or confining another individual. According to a Milwaukee Police Department detective's interview with Williams quoted in criminal complaints filed against Johnson and Williams, the two men and an unnamed 14-year-old companion planned to rob Jamal's mother at gunpoint at her home. Williams said that both Johnson and the 14-year-old wore masks and brought guns, and that the three drove in a borrowed white Jeep. When they arrived at Jamal's mother's home and did not see her, the 14-year-old suggested that they try to rob Jamal's father at his home instead. When they arrived, they saw Jamal riding his bike outside the home. Williams noted in the interview that Jamal's father was also outside at that time. According to the complaint, Johnson and the 14-year-old left the Jeep carrying hand guns and ran at Jamal's father, who ran into the house. The 14-year-old then grabbed Jamal and took him into the Jeep. The group then drove to Williams' residence. Later that night, Williams recalled, Johnson called Jamal's mother and demanded $100,000 and jewelry in exchange for Jamal, offering to meet at a nearby park. According to Williams, Jamal's mother did not show up to the meeting. Once the men became aware of the Amber alert issued for Jamal, Johnson and the 14-year-old left the child with Williams at Williams' house. According to the complaint, Williams told the detective that there were conversations about whether Johnson or the 14-year-old should harm Jamal, but they ultimately decided not to. The charge against Johnson, a class C felony, is less severe than the charges that Williams faces. Williams was charged with being party to the crime of kidnapping, a class B felony, as well as being party to the crime of taking hostages. Williams was also charged with contributing to the delinquency of a child because of the 14-year-old's role in the kidnapping. According to online court records, Johnson was convicted on drug charges and possessing a firearm as a formerly convicted felon in four cases filed between 2006 and 2013. This article originally appeared on Milwaukee Journal Sentinel: Second adult charged in Jamal White kidnapping Solve the daily Crossword

5 years after Ohio's $60M bribery scandal, critics say more could be done to prevent a repeat
5 years after Ohio's $60M bribery scandal, critics say more could be done to prevent a repeat

Yahoo

time14 minutes ago

  • Yahoo

5 years after Ohio's $60M bribery scandal, critics say more could be done to prevent a repeat

COLUMBUS, Ohio (AP) — Five years after a $60 million bribery scheme funded by FirstEnergy Corp. came to light in Ohio, expert observers say the resulting prosecutions, lawsuits, penalties and legislation haven't led to enough change and accountability to prevent politicians and corporate executives from cutting similar deals in the future. The scheme — whose prospective $2 billion-plus pricetag to consumers makes it the largest infrastructure scandal in U.S. history — surfaced with the stunning arrests of a powerful Republican state lawmaker and four associates on July 21, 2020. That lawmaker, former House Speaker Larry Householder, is serving 20 years in federal prison for masterminding the racketeering operation at the center of the scandal. Jurors agreed with prosecutors that money that changed hands wasn't everyday political giving, but an elaborate secret scheme orchestrated by Householder to elect political allies, become the House speaker, pass a $1 billion nuclear bailout law in House Bill 6 and crush a repeal effort. One of the dark money groups Householder used also pleaded guilty to racketeering. Householder and a former lobbyist have unsuccessfully challenged their convictions. Two of the arrested associates pleaded guilty, and the other died by suicide. Dark money keeps flowing Any hope that the convictions would have clarified federal law around 501(c)4 nonprofit 'dark money' groups or prompted new restrictions on those hasn't materialized, said former U.S. Attorney David DeVillers, who led the initial investigation. 'I think it's actually worse than it was before,' he said. 'Nationally, you have both Democrats and Republicans using these, so there's no political will to do anything about it.' Indeed, a study released in May by the Brennan Center for Justice found that dark money unleashed by the 2010 Citizens United decision hit a record high of $1.9 billion in 2024 federal races, nearly double the $1 billion spent in 2020. The vast majority of money from undisclosed donors raised into dark money accounts now goes to super PACs, providing them a way to skirt a requirement that they make their donors public, the study found. DeVillers said one positive result of the scandal is that Ohio lawmakers appear genuinely concerned about avoiding quid pro quos, real or perceived, between them and their political contributors. Anti-corruption legislation perennially introduced by Ohio Democrats since the scandal broke has gone nowhere in the GOP-dominated Legislature. Republican legislative leaders have said it is outside their authority to amend federal campaign finance law. The U.S. Attorney's office declined to discuss the investigation because prosecutions remain ongoing. Two fired FirstEnergy executives have pleaded not guilty on related state and federal charges and await trial. Former Public Utilities Commission of Ohio Chairman Samuel Randazzo, to whom FirstEnergy admitted giving a $4.3 million bribe in exchange for regulatory favors, had faced both federal and state charges. He died by suicide after pleading not guilty. State regulator hasn't penalized FirstEnergy Akron-based FirstEnergy — a $23 billion Fortune 500 company with 6 million customers in five states — admitted using dark money groups to bankroll Householder's ascendance in exchange for passage of the bailout bill. It agreed to pay $230 million and meet other conditions to avoid prosecution, and faced other sanctions, including a $100 million civil penalty by the U.S. Securities and Exchange Commission. But FirstEnergy hasn't yet faced consequences from the state regulator. 'They never actually got penalized by regulators at the PUCO level,' said Ohio Consumers' Counsel Maureen Willis, the lawyer for Ohio utility customers. Testimony in four PUCO proceedings stemming from the scandal finally began last month after the cases were delayed for nearly two years, in part at the request of the Justice Department. They're intended to determine whether FirstEnergy used money for bribes that was meant for grid modernization and whether it improperly comingled money from its different corporate entities. FirstEnergy spokeperson Jennifer Young said it invested $4 billion in grid upgrades in 2024 and plans to spend a total of $28 billion through 2029. Young said FirstEnergy has redesigned its organizational structure, established a dedicated ethics and compliance office, overhauled the company's political activity and lobbying practices and strengthened other corporate governance and oversight practices. 'FirstEnergy is a far different company today than it was five years ago,' she said. The PUCO also made changes in response to the scandal. Chair Jenifer French told state lawmakers that ethics training has been enhanced, staff lawyers and the administrative law judges who hear cases now report to different directors to ensure legal independence, and she never takes a meeting alone. Some tainted money hasn't been returned to customers Ashley Brown, a retired executive director of the Harvard Electricity Policy Group who previously served as a PUCO commissioner, said the commission is the only state entity with the power to order FirstEnergy to return tainted cash — including the bribe money — to customers. That largely hasn't happened. He said the Ohio commission had vast power to hold FirstEnergy accountable for its misdeeds but hasn't conducted its own management audit of the energy giant, demanded an overhaul of FirstEnergy's corporate board or pressed for public release of FirstEnergy's own internal investigation of the scandal, whose findings remain a mystery. Shareholders won some accountability measures as part of a $180 million settlement in 2022, but they continue to fight in court for release of the investigation. Willis does, too. 'How do you allow a utility to operate a vast criminal conspiracy within the utility (with) consumer dollars, and you don't even look at what went wrong?' Brown said. PUCO spokesperson Matt Schilling reiterated that the commission's probes are ongoing. He said the panel has vowed to take its proceedings 'wherever the facts lead.' The portion of HB 6 that bailed out two FirstEnergy-affiliated nuclear plants was repealed in 2021, and $26 million was refunded to customers. The scandal investigation revealed that other power distribution companies got a lucrative payout of their own added to the bill in exchange for their buy-in: subsidies for two unprofitable Cold War-era coal plants. It wasn't until April that a law was passed repealing those subsidies. Until that takes effect Aug. 14, the charges cost Ohio ratepayers $445,679 a day — and it's unclear if or when they'll get that money back. A ticker on Willis' website puts the total they've paid at more than $500 million and counting. Julie Carr Smyth, The Associated Press Sign in to access your portfolio

Microsoft SharePoint hack: An active cybersecurity incident could impact tens of thousands of servers
Microsoft SharePoint hack: An active cybersecurity incident could impact tens of thousands of servers

Fast Company

time16 minutes ago

  • Fast Company

Microsoft SharePoint hack: An active cybersecurity incident could impact tens of thousands of servers

On July 19, Microsoft alerted users that it was experiencing an active cyberattack on its SharePoint servers, which allow organizations to share and manage documents. According to The Washington Post, the attack—which is still ongoing—has likely put 'tens of thousands' of servers at risk, including several hosted by federal agencies, universities, and energy companies, which have reportedly already been breached. According to a blog posted by Microsoft, the hack only impacts SharePoint servers housed within an organization, and not those in the cloud through SharePoint Online in Microsoft 365. For Microsoft, this latest breach comes after a series of other security concerns in recent years. Last January, the tech giant reported that hackers backed by Russia had successfully stolen some of the company's source code, and, the following April, a federal review board found that Microsoft was at fault for security flaws that led to a Chinese hack of U.S. government officials' emails. Here's what to know about this latest hack: What's happened? The Netherlands-based research company Eye Security was the first to identify what it called 'large-scale exploitation of a new SharePoint remote-code execution (RCE) vulnerability chain in the wild' on the evening of July 18. The hack was what's known as a 'zero-day attack,' meaning it took advantage of a previously unknown hole in Microsoft's security system, leaving the company without any immediate way to patch the problem. Eye Security's report found 'dozens of systems actively compromised' between two waves of attack on July 18 and July 19. Per the firm's findings, the bug allows hackers to take private digital keys from SharePoint without any login credentials, enter an organization's servers, remotely plant malware, and gain access to the available files and data. Further, Eye Security warned, because SharePoint connects with other apps like Outlook and Teams, 'a breach can quickly lead to data theft, password harvesting, and lateral movement across the network.' Both the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have confirmed that they're actively working to assess the hack. The party (or parties) responsible is still unknown. Who has been impacted so far? According to a blog post from CISA on July 20, the scope of the hack is unclear so far. However, several private researchers informed The Washington Post that the impact could be widespread. Pete Renals, a senior manager with the cybersecurity research firm Unit 42, told the publication, 'We are seeing attempts to exploit thousands of SharePoint servers globally before a patch is available. We have identified dozens of compromised organizations spanning both commercial and government sectors.'' Multiple anonymous researchers claimed that at least two U.S. federal agencies have seen their servers breached. Further, Randy Rose, the vice president of the nonprofit Center for Internet Security, shared that the organization notified about 100 organizations—including public schools and universities—that they were vulnerable and potentially compromised. 'Anybody who's got a hosted SharePoint server has got a problem,' Adam Meyers, senior vice president with the cybersecurity firm CrowdStrike, told The Washington Post. 'It's a significant vulnerability.'' What is Microsoft doing about this? After its initial announcement of the hack on July 19, Microsoft followed up on July 20 with several updates. The company rolled out emergency patches for users of SharePoint Subscription Edition and SharePoint 2019, which can be downloaded right away. As of this writing, developers are still working to devise patches for supported versions of SharePoint 2019, as well as SharePoint 2016. What should I do if my organization hosts a SharePoint server? In an email to TechCrunch, Michael Sikorski, the head of Unit 42, advised that any organization with SharePoint on-premise 'should assume that you have been compromised at this point.' To mitigate potential attacks, Microsoft suggests the following steps: Use supported versions of on-premises SharePoint Server Apply the latest security updates, including the July 2025 Security Update Ensure the Antimalware Scan Interface (AMSI) is turned on and configured correctly, with an appropriate antivirus solution such as Defender Antivirus Deploy Microsoft Defender for Endpoint protection, or equivalent threat solutions Rotate SharePoint Server machine keys Microsoft's blog post Fast Company back to the blog.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store