
Soldier at a Colorado nightclub during an immigration raid charged with distributing cocaine
DENVER (AP) — A soldier present at an after-hours nightclub where more than 100 immigrants suspected of being in the U.S. illegally were taken into custody appeared in court Thursday to face charges that he distributed cocaine.
Staff Sgt. Juan Gabriel Orona-Rodriguez, who is assigned to Fort Carson, an Army post near the illegal club in Colorado Springs, was arrested Wednesday evening, the FBI said.
He allegedly sold cocaine to an undercover agent of the Drug Enforcement Administration days before the raid and is accused of working with others to distribute the drug since around September, according to his arrest affidavit.
Orona-Rodriguez — a member of the 1st Stryker Brigade Combat Team in the 4th Infantry Division — was dressed in camouflage pants and a khaki T-shirt and held court documents in his handcuffed hands during his brief court hearing. He listened as the magistrate judge explained his rights and agreed to appoint a public defender to represent him.
At the request of Assistant U.S. Attorney Garreth Winstead, Orona-Rodriguez will continue to be held until a hearing to discuss his detention on Tuesday. His lawyer, Josh Lilley, did not address the allegations against him during the hearing and declined to comment after the hearing, citing the public defenders' policy against speaking to the media.
More than 300 law enforcement officers and officials from multiple agencies participated in Sunday's operation at the nightclub, which had been under investigation for months, said Jonathan Pullen, special agent in charge of the DEA's Rocky Mountain Division.
Cocaine was among the drugs found, Pullen said at a news conference in Colorado Springs, whose leaders have declared that it is not a 'sanctuary city' for migrants.
Orona-Rodriguez was one of about 17 active-duty U.S. Army service members who were at the club, known as Warike, when it was raided early Sunday, the affidavit said.
He appears to have held a leadership role in a business that provides armed security at nightclubs, including at Warike, according to the document. However, it did not say whether he was working security there at the time of the raid. It notes that he had been warned by his commanding officer this spring that he could not work for the security company.
According to the arrest affidavit, police received 911 calls related to the club 'citing a wide variety of alleged crimes, including weapons violations, assault, narcotics, and other violent crime.'
Two people wanted in connection with criminal misdemeanor cases were also arrested during the raid, Colorado Springs police said.
Colorado Springs mayor Yemi Mobolade, a political independent and Nigerian immigrant, has expressed support for the operation, which he said was the 'result of clear evidence of serious criminal conduct.'
'Our residents deserve to live in a city where the rule of law is upheld and where illegal behavior is met with firm and decisive action,' he said in a statement.
President Donald Trump posted a link to the DEA video of the raid on his social media site, Truth Social. 'A big Raid last night on some of the worst people illegally in our Country — Drug Dealers, Murderers, and other Violent Criminals, of all shapes and sizes,' the president wrote.
Rodriguez received more than a dozen Army awards during his almost nine years in service, including an Army Commendation Medal with combat device, which is earned during a deployment where the soldier was 'performing meritoriously under the most arduous combat conditions,' according to Army descriptions of the award.
Of the 17 soldiers who were at the venue at the time of the raid, 16 were patrons and one was working there in a security role, a U.S. official said on the condition of anonymity to provide details not yet made public. Sixteen of the soldiers there were assigned to Fort Carson, the official did not know where the seventeenth was assigned.
Investigators suspect Orona-Rodriguez was getting cocaine from an unidentified Mexican citizen who is 'unlawfully present in the United States without admission,' according to the affidavit.
_____

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Hill
18 minutes ago
- The Hill
British soldier arrested in Kenya over what UK media report is a rape accusation
LONDON (AP) — A member of Britain's armed forces has been arrested in Kenya and U.K. military police are investigating, the Ministry of Defense said Sunday. The BBC and other British media reported that a British Army soldier was accused of rape. 'We can confirm the arrest of a Service person in Kenya,' the defense ministry said in a statement. 'As the matter is the subject of an ongoing investigation by the Defence Serious Crime Command, we will not comment further.' A U.K.-Kenya defense cooperation agreement allows thousands of British soldiers to train in the East African country each year. About 200 U.K. troops are based there permanently to train Kenyan soldiers. Some Kenyans have long complained about the soldiers' behavior and the atmosphere around their training camp near the town of Nanyuki. There was an outcry over the 2012 death of 21-year-old Agnes Wanjiru, who was last seen alive leaving a bar with British troops near their training camp. Her body was later found in a septic tank. Wanjiru's family has campaigned for years for the suspected perpetrator, a serving British soldier at the time, to be charged. In April, U.K Defense Secretary John Healey met with Wanjiru's relatives in Kenya and vowed to 'help the family secure the justice they deserve.' The British Army has launched an inquiry into allegations of unacceptable behavior by U.K. personnel in Kenya. The Ministry of Defense said in a statement that all British personnel in the country 'have clear direction about how to behave, on and off duty, must complete mandatory training and attend compulsory briefings on conduct. We will have zero tolerance for unacceptable behavior.'

35 minutes ago
Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'
WASHINGTON -- WASHINGTON (AP) — Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' U.S. authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real time and able to read text messages,' said Rep. Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. U.S. intelligence officials have said China poses a significant, persistent threat to U.S. economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' U.S. Rep. John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. "We just can't share things willy-nilly.'
Yahoo
2 hours ago
- Yahoo
British ‘service person' arrested in Kenya over rape allegation
A UK 'service person' has been accused of rape near a British Army training camp in Kenya where a soldier is alleged to have murderer a woman, it has been reported. The alleged rape happened last month close to the British Army Training Unit Kenya (Batuk), near the town Nanyuki, and the man was arrested after a group of soldiers visited a bar in the area, the BBC reports. It comes after the body of 21-year-old Agnes Wanjiru, who was allegedly murdered by a British soldier, was found in a septic tank at a Kenyan hotel, close to a British Army base, two months after she disappeared in March 2012. On Sunday, a Ministry of Defence spokesman said: 'We can confirm the arrest of a service person in Kenya. 'As the matter is the subject of an ongoing investigation by the Defence Serious Crime Command, we will not comment further.' The rape allegations come after Defence Secretary John Healey met Ms Wanjiru's family in April. They said they had been subject to 'too many empty promises' regarding investigations into her death and that they were 'grateful' for the visit. According to the Sunday Times, a soldier had allegedly confessed to Ms Wanjiru's killing and another soldier reported it to senior officers at the time – but no action was taken. In a report in 2021, the newspaper said a soldier accused of the murder had been named by his comrades. In April, Mr Healey said the Government would continue to help Ms Wanjiru's family 'secure the justice they deserve', and stressed his 'determination to see a resolution to the still unresolved case'. The Army has launched a service inquiry (SI) into allegations of unacceptable behaviour by UK service personnel in Kenya violating sexual exploitation and abuse (SEA) policy which was introduced in July 2022. It is believed the aim is to understand the nature of allegations made regarding sexual exploitation and abuse, which includes Army culture and possible contact with sex workers. The SI can make recommendations to ensure that SEA policy is being complied with by UK personnel in Kenya. A MoD spokesman said: 'The Defence Secretary recently visited Kenya to highlight our bilateral partnership and the important role of the British military presence – and personnel – in Kenya. He also clearly set out the high standards of behaviour we expect of our all our personnel. 'All soldiers who visit or train at Batuk have clear direction about how to behave, on and off duty, must complete mandatory training and attend compulsory briefings on conduct. We will have zero tolerance for unacceptable behaviour. 'To ensure the highest possible standards, the Army has launched a comprehensive service inquiry into allegations of unacceptable behaviour by UK Service Personnel in Kenya which would violate MoD and Army policy.'