
Second man charged in robbery of couple at Glenview home
Greg Poulos and Angie Beltsos were heading home to Glenview after dinner in the city around 10 p.m. the night of Monday, April 21, and walking to their front porch, when a car pulled up. Police said three men ambushed them, pulled out guns, and demanded their belongings.
In video of the robbery posted on Nextdoor, three men can be seen pointing guns at the couple as they walk up to their front porch.
One of the robbers can be heard telling them "give me all that s***" before the man and woman toss their cell phones, keys, and her purse on the ground.
"You got it. You got it. Here, take it. Take it. Take everything. Take everything. Take everything. Take everything. Take everything. Here, you can have it. Honest to God, guys," Poulos told the robbers.
Beltsos said they handed over everything from her purse to their clothing. Video shows one man remove Poulos' jacket.
The robbers fled in a Jaguar sport-utility vehicle
On Monday, Chicago police and United States Marshals arrested a suspect — Amarion Ray Williams, 21, of south suburban Dolton.
Williams stands charged with armed robbery with a firearm.
Earlier this month, another suspect — Angelo Hatter, 26 — was also arrested.
contributed to this report.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Fast Company
8 minutes ago
- Fast Company
The real problem with ransomware isn't encryption—it's the data that walks out the door
When ransomware strikes, most organizations spring into action as if they're responding to a classic crime scene: Tape off the perimeter, start the restoration process, and try to regain access to what was lost. The assumption is that this is a temporary disruption, that once systems are decrypted and restored from backup, the business can move on. But that's the wrong script. Today, encryption is no longer the main event, it's just the distraction. The real damage comes from what's quietly exfiltrated before the ransom note even appears on your screen. Sensitive documents, financial data, proprietary designs, employee records, and customer PII all walk out the door while you're still patting yourself on the back for having a solid backup strategy. And the consequences? They don't end when the systems come back online. A DANGEROUS EVOLUTION IN RANSOMWARE The shift in ransomware tactics isn't theoretical, it's happening right now. Today's attacks are highly coordinated, patient, and financially motivated. Attackers no longer need to simply lock files and demand payment for a key. They're realizing that stealing data is far more profitable, and more painful for the victim. Encryption is reversible. You pay the ransom (or don't), restore the backups (if you can), and carry on. But data theft is permanent. Once it leaves your network, there's no clawing it back. It can be sold, leaked, or weaponized, sometimes all three. Even worse, these breaches aren't just about stolen data. They're about stolen trust. Public companies face shareholder scrutiny. Regulated industries face government fines. And everyone faces the wrath of their customers when private information is posted online. WHAT BACKUPS CAN'T PROTECT YOU FROM There's a common misconception in cybersecurity circles: As long as your backup and recovery processes are solid, you're protected. That might've been true a decade ago. But today, it's dangerously naïve. Backups don't stop reputational damage. They don't prevent lawsuits or limit your liability. They won't answer tough questions from regulators, and they certainly won't reassure customers whose personal data just showed up on a dark web forum. What often follows a modern ransomware attack is a period of long, painful discovery. Months may pass before you fully understand what data was taken—if you ever do. Was it encrypted or plaintext? Were customer records compromised? Were you in compliance with HIPAA, GDPR, or other data privacy laws? And perhaps most haunting of all: Could this have been prevented? If your security strategy treats data protection as an afterthought, these are the questions that will keep you up at night. In most boardrooms, ransomware is still talked about in terms of uptime and recovery. But here's the hard truth: Your mean time to recovery won't matter much when the damage is already done. No one's impressed that your servers are back online in 48 hours if, during that time, attackers walked away with terabytes of sensitive information. Regulators certainly won't be. Neither will your customers. This is where many organizations fall into a dangerous trap. They invest heavily in detection and recovery technologies, endpoint protection, backup appliances, and failover solutions, while leaving gaping holes in data governance and access control. They prepare for the encryption event, but not the silent theft that comes first. And make no mistake, attackers know it. They exploit those blind spots with chilling precision. IT'S TIME TO CHANGE THE CONVERSATION If you're only measuring success by how fast you can bounce back, you're missing the bigger picture. Cyber resilience isn't just about recovery, it's about containment, prevention, and visibility. It's about understanding that the real cost of an attack isn't server downtime. It's the legal fees, the customer churn, the fines, and the headlines. Organizations must start thinking in terms of data-first security. That means tightening controls on who can access sensitive files, and under what conditions. It means monitoring for unusual outbound data flows, not just scanning for known malware signatures. And perhaps most importantly, it means treating your data like the crown jewels it is, not just another asset. In this new paradigm, the most important question isn't, 'How fast can we recover?' but, 'Can we prove what was taken, and are we legally, ethically, and operationally prepared for what happens next?' THE STAKES ARE HIGHER THAN EVER The uncomfortable truth is that many companies will do everything 'right' and still get hit. But when the dust settles, your customers won't care how good your endpoint detection software was. They'll want to know why their names, addresses, and credit card numbers were posted online. They'll want to know why their trust in you was misplaced. That's why now is the time to re-evaluate your ransomware posture, not just from a technical lens, but from a business one. Who owns your data protection strategy? Is it siloed in IT, or is it an enterprise-wide priority? Do your vendors understand the sensitivity of the data they touch? Does your response plan include legal, PR, and compliance, not just tech recovery? In a world where ransomware has morphed into data extortion, encryption is just the bait. The real threat is what's already gone by the time you realize anything's wrong.


CBS News
10 minutes ago
- CBS News
Fire crews battle blaze at home in North Aurora, Illinois
A fire broke out at a home in west suburban Aurora early Thursday morning. Firefighters responded to the fire around 1 a.m. near Kelly Drive and Leonard Lane, where large balls of fire were seen shooting from the roof of the home. Most of the flames were shooting from the house's attached garage, causing it to cave in. It is unclear what caused the fire or if any injuries were reported. No further information was immediately available. CBS News Chicago will continue to update as information becomes available.


Fox News
40 minutes ago
- Fox News
Police chief reveals new details about Idaho quadruple murders
Retired NYPD inspector Paul Mauro joins 'Fox & Friends' to discuss new developments in the Idaho quadruple murder case, including allegations of a second murder weapon, the FBI's involvement in the investigation, and who may have leaked details.