logo
Police say suspect taken into custody after standoff in Edwardsville

Police say suspect taken into custody after standoff in Edwardsville

Yahooa day ago

KANSAS CITY, Mo. — The Edwardsville Police Department says a suspect is in custody following a standoff Tuesday night.
Multiple law enforcement agencies were involved in the standoff with a wanted person.
According to the Edwardsville Police Department, just before 7 p.m., multiple agencies attempted to arrest the suspect in the 100 block of Beach Street.
Edwardsville police said officers encountered the suspect barricade himself within his home.
During the standoff, police restricted the area for the safety of residents and law enforcement personnel.
Police reported just after 8:30 p.m. that the suspect was taken into custody without further incident and that the scene was cleared.
Download the FOX4 News app on iPhone and Android
The police department said further information will be released as the investigation continues.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Second Italian journalist targeted with Paragon spyware, watchdog group says
Second Italian journalist targeted with Paragon spyware, watchdog group says

Yahoo

time22 minutes ago

  • Yahoo

Second Italian journalist targeted with Paragon spyware, watchdog group says

By Raphael Satter LONDON (Reuters) -A second Italian journalist was recently targeted by software made by U.S.-owned surveillance company Paragon, internet watchdog group Citizen Lab said, raising new questions about a surveillance scandal that has already led Prime Minister Giorgia Meloni's government and Paragon to part ways. Citizen Lab said in a report on Thursday that Italian investigative journalist Ciro Pellegrino's iPhone showed evidence of having been targeted by Paragon's sophisticated spy software. Pellegrino works at the online newspaper Fanpage, whose editor-in-chief Francesco Cancellato earlier disclosed that he was one of scores of users who received January alerts from WhatsApp that they had been targeted using Paragon's technology. Fanpage has published a stream of critical coverage of Meloni's government, notably an exposé tying her party's youth wing to neo-Nazi activity, and the allegation that Fanpage's journalists, among others, were put under surveillance has stirred controversy in Italy. On Monday, the government and Paragon announced that they were no longer working together, offering conflicting explanations about who fired whom. Paragon referred questions back to an earlier statement it provided to the Israeli publication Haaretz in which it said it had offered Italian officials a way to check whether its systems had been used against Cancellato, but that Italian authorities had rebuffed the offer. Italian officials did not return a message seeking comment on the Citizen Lab report. In a text exchange with Reuters, Pellegrino said the discovery that he had been targeted with spyware was "horrible." The Naples-based journalist said his phone was "the black box of my life, which contains everything from personal and health data to journalistic sources." Although an Italian parliamentary panel reported on Monday that the country's spy services had deployed Paragon's tools to intercept the communications of migrant sea rescue activists in the context of law enforcement work, the panel said it had found no evidence that the tools were used by Italian intelligence to go after Fanpage's Cancellato. The discovery of Paragon spyware on the phone of one of Cancellato's colleagues adds to questions about the panel's thoroughness, said Natalia Krapiva, a senior lawyer with Access Now, a human rights group that works with spyware victims. "It sheds serious doubt on the adequacy of the investigation," she said. The Italian parliamentary panel, which has reserved the right to conduct further investigations around the matter, did not respond to a message seeking comment. In its report, Citizen Lab also said that an unnamed European journalist was hacked with Paragon's spyware. The lab, which is based out of the University of Toronto, offered no other details and declined to answer questions about the journalist's identity or the circumstances of their targeting.

John Butler Jr. trial proceeds with more witness testimonies
John Butler Jr. trial proceeds with more witness testimonies

Yahoo

timean hour ago

  • Yahoo

John Butler Jr. trial proceeds with more witness testimonies

WICHITA FALLS (KFDX/KJTL) — Testimony will continue Thursday, June 12, at the Wilbarger County Courthouse in the trial of John Butler Jr. Butler is accused of multiple child sex crimes between 2016 and 2020. On Wednesday, June 11, testimony began with the 46th District Attorney, Jon Whitsitt, and Wilbarger County Attorney, Staley Heatly, who called several witnesses, including the alleged victim's mother. According to her testimony, in around 2023, her daughter made an outcry through Facebook Messenger that Butler had been sexually assaulting her since her childhood. More witnesses are expected to take the stand before the defense has an opportunity to present its case to the 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

FBI Confirms iPhone And Android Warning—Delete These New Texts
FBI Confirms iPhone And Android Warning—Delete These New Texts

Forbes

time2 hours ago

  • Forbes

FBI Confirms iPhone And Android Warning—Delete These New Texts

FBI confirms new DMV text attacks AFP via Getty Images Attacks on iPhone and Android users surged more than 700% this month, with malicious texts targeting multiple cities and states. Following alerts from police forces across the country, the FBI has now confirmed the latest warning and stepped in. This threat comes directly from China, and you need to delete all these texts immediately. As I reported earlier this week, the infamous unpaid toll texts that have plagued American smartphone users for more than a year 'have seen a significant decline recently. But the DMV texts that have replaced them are 'more threatening.' That's the warning from Guardio, whose researchers have been tracking these attacks for months. Its team 'spotted a 773% surge in DMV scam texts during the first week of June,' which shows no signs of slowing. 'These scam texts lead to phishing websites designed to steal people's credit card information and make unauthorized charges.' DMV text surge Guardio Now the FBI has confirmed it is investigating the DMV scam. According to FBI Tennessee's Supervisory Special Agent David Palmer, the unpaid toll cybercriminals have 'pivoted to the DMV scam.' Confirming the gangs operate from overseas, Palmer warns these texts can 'put malware on your phone, which then can go in and steal information from your device, or collect your payment information.' Palmer warns smartphone users 'if you don't know who [a text] is from, don't click the link.' Those links use domains crafted to trick users into thinking they're legitimate. As Guardio explains, 'scammers generate a new domain for almost every DMV text. The format is usually the name of a state followed by a generic domain. Sometimes they include '.gov' as part of the URL to make the website appear legitimate.' DMV Texts Guardio There will be millions of these texts sent out over the coming weeks and months. As Resecurity warns, 'just one threat actor can send "up to 2,000,000 smishing messages daily,' which means targeting 'up to 60,000,000 victims per month, or 720,000,000 per year, enough to target every person in the U.S. at least twice every year.' Just as with undelivered packages and unpaid tolls, the FBI's advice is to 'delete any smishing texts received.' You don't want the dangerous links left on your phone, even though many are only active for a few hours before they're detected and blocked. The new DMV attacks go beyond the late payment lure with the toll texts, these cite a non-specific traffic offense and threaten suspensions of driving licenses and vehicle registrations. They create a sense of panic and urgency to push users to engage. Don't. Every one of these texts is a scam. If you have any doubts, contact your DMV using public channels. You can report the text. But you must delete it

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store