logo
Man accused of hurling explosive in front of Central Berks patrol vehicle

Man accused of hurling explosive in front of Central Berks patrol vehicle

Yahoo25-03-2025

A Mount Penn man faces several charges after Central Berks Regional police said he threw an explosive device in the street just ahead of a marked patrol vehicle.
Joseph R. Crochunis Jr., 37, of the 2600 block of Perkiomen Avenue was committed to Berks County Prison in lieu of $25,000 bail after arraignment Saturday before District Judge Priscilla Campos in Reading Central Court.
He faces charges of weapons of mass destruction, propulsion of missiles onto a roadway, reckless endangerment and disorderly conduct.
According to court records:
Officer Nicholas Phillips was driving west on Perkiomen Avenue near 26th Street about 11:30 p.m. Friday after receiving a complaint about fireworks in that area of the borough.
Shortly after turning left onto 26th he observed a lit object being thrown toward the front of his patrol unit. The object came within about 10 feet of the vehicle, and when it hit the ground made a very loud explosion.
Phillips stopped abruptly, fearing the projectile would hit or go under his vehicle.
The officer thought the explosion sounded like a gunshot. He spotted three males on a rear porch that was illuminated by his headlights.
One of the males went into the home. He made contact with a man, later identified as Crochunis, who remained on the porch.
Crochunis became argumentative, stating he did not know what the officer was talking about, that he did nothing wrong and was on his own property.
As the officer continued his investigation, Crochunis reportedly said, 'Fine it was me, I did it.'
With that, he and the other males went inside the house.
Phillips collected the fragments of the explosive from the street and secured them as evidence.
After clearing the call, Phillips and Sgt. Wayne Levey went to a nearby parking lot to confer. They observed aerial fireworks launched from the backyard of the same residence where they encountered Crochunis moments earlier.
They went to investigate. Levey saw Crochunis kneeling behind a fence on the property next to several spent fireworks casings.
Crochunis again became argumentative. He was detained until Phillips completed his investigation, then released to return to his residence under an order to stop setting off fireworks.
Phillips contacted the Reading Police Bomb Squad. A technician confirmed the debris was from an M-device explosive, a cardboard tube that typically contains 10 grams of flash powder.
M-100s, along with M-80s and cherry bombs, are classified as display-grade fireworks, which are illegal for consumers to possess or use in Pennsylvania.
Crochunis is no stranger to law enforcement in Berks County, according to online court records.
In 2007, he served 56 days to 23 months in the county jail after pleading guilty to propulsion of missiles in Muhlenberg Township. He was also given five years' probation.
In 2022, he was given a 30-month to five-year sentence after pleading guilty to drug trafficking in Ruscombmanor Township.
The same year, he was sentenced to six to 12 months for fleeing police and driving under a suspended license in Lower Heidelberg Township in 2021.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Five common mistakes that let criminals hack your online accounts
Five common mistakes that let criminals hack your online accounts

Yahoo

time2 hours ago

  • Yahoo

Five common mistakes that let criminals hack your online accounts

Attacks on British retailers like Marks & Spencer have highlighted how mistakes can let cybercriminals into online accounts with devastating consequences. M&S announced on Tuesday it had finally reopened its website weeks after a cyberattack in April that the company blamed on 'human error' and it said it would cost around £300m. The government's cybersecurity breaches survey, published earlier this year, found 43% of businesses had suffered a security breach in the last 12 months. But even for ordinary people, it's still very possible to make mistakes that can lead to criminals gaining access to your account - and then using your details for identity theft or stealing money. Research by the Global Anti-Scam Alliance found that 10% of Brits had lost money to scams or identity theft in 2023. Yahoo News spoke to security expert Truman Kain, a security researcher at cybersecurity firm Huntress, about the common mistakes people make - including one which almost all of us have never even thought about. In security questions on online accounts such as banking, people often put their real mother's maiden name or the name of a first pet. But this is a mistake, Kain explains - and instead you should make up a fake name, because hackers can potentially use a security question to reset accounts and gain access, and such information is often easy to find out. Kain said: 'Security questions are a relic. When used as originally intended, they aren't security, they're trivia that hackers already know. "Think of it this way: if you had to, could you answer your friend's security questions? Yes? Well, so could a hacker. Attackers can typically guess or find your answers to common security questions on your social media or elsewhere online. 'This is how accounts can get taken over even if you do have a strong password. So, treat security questions like passwords… lie! Generate and save fake answers to security questions with a password manager. Never assume that your real answers to security questions are private.' Browsers such as Chrome commonly offer the option to save passwords, which can be highly convenient for users - but using this is a mistake. So are other common ways of storing passwords like notes apps, Word documents or spreadsheets, says Kain. 'Lots of people store passwords in places they shouldn't: these are a problem, because they can all be quickly scraped by malware or someone with access to your device," Kain says. For example, if your PC gets a virus, it can be easy for criminals to find passwords stored in this way. Instead, Kain advises, you should use a separate password manager app on your PC or smartphone, and generate strong passwords using the app. Kain said: 'If you care about your accounts, use a dedicated password manager. It's the simplest way to keep your accounts secure. Storing passwords anywhere else is like locking your front door and then leaving the key under the doormat. Reusing passwords offers an easy way to log in, for example, when forced to create a password to order on a pub's menu. But if you use one password across a lot of accounts, it's only a matter of time before it leaks online, says Kain, due to the frequency of data breaches. Kain said: 'By reusing passwords, you're basically playing Russian roulette. A breach at some random site, at any point in the future, can hand attackers the keys to your most important accounts. 'They'll turn right around and plug those credentials into every major service they can think of… and if you reused, they're in.' Kain said: 'Today's phishing attacks aren't poorly worded emails. They're polished, look just like the real thing and sometimes even come from real providers like DocuSign or Canva.' To deal with such attacks, it's best to be ultra-cautious around links in emails, particularly when they relate to banking or anything similar. Instead of following the email, use your banking app or navigate to your bank's website - or if you're really worried, call. Kain said: "Today, fake login pages are pixel-perfect and often use legitimate-looking domains. All it takes is one moment of distraction or misplaced trust, and your credentials or sensitive information are compromised. 'Attackers love evoking senses of fear or urgency because those emotions often cause you to act without thinking. So, always take a minute to stop and think: is this legit? Just because a site looks real doesn't mean it is. Check the URL before entering credentials and navigate to sites directly instead of clicking links in emails or text messages.' Multi-factor authentication (MFA) bolsters passwords by insisting on a second check (often via text or through a dedicated app) to prove people are who they say they are. This means that if a criminal finds your password in an online data breach, they still cannot access your account. Kain said: 'MFA is one of the most effective defences you have against account takeovers. However, it's often ignored because 'it's annoying', or put off with 'I'll do it later'. 'The reality is that passwords get breached. Phishing works. MFA adds a backstop that makes it much harder for attackers to get in when they inevitably get a hold of your credentials. App-based MFA is ideal, but any form of MFA is better than none.'

What we know as M&S reopens website after major cyber attack
What we know as M&S reopens website after major cyber attack

Yahoo

time15 hours ago

  • Yahoo

What we know as M&S reopens website after major cyber attack

Marks & Spencer has reopened its website to customers after it was forced to halt internet orders in April following a damaging cyber attack. The retail giant said shoppers are now able to buy a selection of its best-selling fashion ranges and new products for home delivery to England, Scotland and Wales. In a statement published on social media, M&S managing director of clothing, home and beauty John Lyttle said: 'More of our fashion, home and beauty products will be added every day, and we will resume deliveries to Northern Ireland and Click and Collect in the coming weeks. 'Thank you sincerely for your support and for shopping with us.' On 25 April, after the Easter weekend, M&S reported that it had become the victim of a cyber attack and suspended its online orders. Initially, the incident affected the contactless payment and click and collect orders, before M&S paused online orders through its app and website. The cyber attack even led to empty shelves in some M&S stores, as the company said there were "pockets of limited availability" in some of its shops. M&S revealed last month that the hack was caused by 'human error', and would cost it around £300 million. Chief executive Stuart Machin said on reporting annual figures in May that hackers gained access to the company's IT systems through a third party. He said at the time: 'We didn't leave the door open, this wasn't anything to do with under-investment. Everyone is vulnerable. For us, we were unlucky on this particular day through some human error.' M&S also revealed that some personal data had been stolen. It said: "As part of our proactive management of the incident, we have taken steps to protect our systems and engaged leading cyber security experts. We have also reported the incident to relevant government authorities and law enforcement, who we continue to work closely with. According to M&S, the data taken could include customers' names, date of birth, phone numbers, home addresses, email addresses and online order history. However, it said the breach did not include card payment details or account passwords. M&S said: "Importantly, the data does not include useable payment or card details, which we do not hold on our systems, and it does not include any account passwords. There is no evidence that this data has been shared." The firm would not say how many customers were affected by the attack, but that it is writing to everyone they have an email for. M&S had 9.4 million active online customers in the year to 30 March, according to its last full-year results. Following the breach, anyone with an M&S account were prompted to change their password after they logged in to the app or online. M&S said: "We have said to customers that there is no need to take any action. For extra peace of mind, they will be prompted to reset their password the next time they visit or log onto their M&S account and we have shared information on how to stay safe online." The hackers behind the M&S attack used the DragonForce cybercrime service, whose malicious software and website is available on the darknet to carry out attacks and what's sometimes called "double extortion". This means they steal a copy of their victims' data and also scramble it to make it unusable. The double extortion occurs when they then effectively ask for a ransom for both unscrambling the stolen data and for also deleting their copy of it so they won't sell it online. DragonForce's darknet website does not currently have any entries about M&S, the BBC reported. It is not known who is using DragonForce to attack M&S – it was also reportedly used to target the Co-op and Harrods recently, but a group of hackers called Scattered Spider have been linked to the breach. At the beginning of this month, the Information Commissioner's Office said it was looking into the attack, as well as a similar major incident involving the Co-op. Luxury department store Harrods also confirmed this month it had been affected by an attempted hack and had temporarily restricted internet access across its sites as a precautionary measure. The National Crime Agency has said it is investigating the attacks individually but is 'mindful they may be linked'. Experts told Yahoo News UK that cyber attacks on supermarkets are unlikely to stop. 'This sort of thing is likely to happen more often," said Paul Bischoff, consumer privacy advocate at UK software company Comparitech. "Ransomware is a proven way for cybercriminals to make money, and until that's no longer true, we'll continue to see ransomware attacks." Cody Barrow, chief executive of software firm EclecticIQ, said: "It highlights an alarming trend: attackers are becoming increasingly opportunistic, exploiting weaknesses across complex, highly interconnected supply chains."

University of Michigan severs ties with security company after personnel followed students
University of Michigan severs ties with security company after personnel followed students

Yahoo

time15 hours ago

  • Yahoo

University of Michigan severs ties with security company after personnel followed students

The Brief The University of Michigan says they have cut ties with private security companies, but many students are calling them out. U-M says no individual or group was or should ever be targeted for their beliefs or affiliations. Attorney Amir Makled said many students in the anti-Israel demonstrations on campus beg to differ. ANN ARBOR, Mich. (FOX 2) - The University of Michigan says they have severed ties with several private security companies hired to patrol high traffic areas on campus, but many students, including pro-Palestinian demonstrators, say their actions have amounted to surveillance. Now they are calling the university out. What they're saying U-M says no individual or group was or should ever be targeted for their beliefs or affiliations, but many of those students in last year's anti-Israel demonstrations on campus beg to differ. Attorney Amir Makled represented several Pro-Palestinian protesters at U-M, including some who say they were followed and harassed by undercover security teams whose contracts have now been terminated by the University. "I think that this is a continuation of what we're seeing nationally," said Makled. "They've spent nearly a million dollars going after students wrongfully monitoring them, recording them, and it's totally unjustified." The backstory University leadership has said private security was hired to report suspicious incidents in high-traffic areas, not to conduct surveillance, but tensions came to a head in 2024 during the anti-Israel demonstrations, including a large encampment that was eventually shut down by officials due to safety concerns. Seven demonstrators were faced with felony charges relating to the encampment, but those charges were dropped in May. "I think we saw some videos online of one of these private investigative employees acting as if they had some sort of a mental challenge or physical handicap in a way to not maybe raise suspicion that they are actually watching the targeted individual, but who knows what the irregularity was. Nonetheless, they should never have been used in the first place." The other side Michigan's Interim President talked about the issue in a letter to the community, saying in part: "…We recently learned that an employee of one of our security contractors has acted in ways that go against our values and directives. What happened was disturbing, unacceptable, and unethical, and we will not tolerate forward, we are terminating all contracts with external vendors to provide plainclothes security on campus…" City Shield, the Detroit company providing some of the contracted security, released a statement to FOX 2 following the contract terminations saying quote: "City Shield Security Services has a strong history of protecting people and property as a nationally leading provider. We are aware of recent reporting and are investigating the matter. We take all complaints seriously and investigate them rigorously, ensuring appropriate actions and professional standards. We respect the need for client and protection services confidentiality and as a standard industry practice do not discuss the details of those services or contract, which would obviously undermine the protection provided." Attorney Makled says it's good the private security has been dumped…but wants more change. "I think the university is going to be held accountable. They need to have some transparency," he said. "We need to have oversight over the spending of these universities and these independent investigations must happen against the university, not against the students."

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store