
Clinton Township man pleads no contest to impersonating a first responder
Jason Edward Barnes, 48, of Clinton Township, will be sentenced Aug. 19. He pleaded no contest Friday to the following charges with a habitual offender-second offense notice.
Possession of firearms by a prohibited person, a five-year felony.
Ammunition possession by a prohibited person, a five-year felony.
Unlawful use of a fire emblem, a 93-day misdemeanor.
Three counts of impersonating a firefighter/emergency medical service, each a two-year felony.
The investigation started Oct. 19, 2023, as a Clinton Township police officer was at a location where a homicide occurred. Barnes is accused of representing himself as a first responder, offering assistance to the officer.
"That event led to further investigation into Barnes. It is alleged that on other occasions, Barnes would impersonate Firefighter/EMS personnel at active crime scenes," the report said.
The resulting charges came out of three separate incidents.
"Impersonating a first responder, whether it be law enforcement, fire, or EMS, is a serious offense that undermines public trust and puts our community at risk. These roles carry tremendous responsibility and authority. Abusing that trust for personal gain or deception cannot be tolerated," Macomb County Prosecutor Peter J. Lucido said in a statement.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Washington Post
27 minutes ago
- Washington Post
What we know about the New York City shooting so far
Four people were killed, including a New York City police officer, and one seriously injured when a gunman opened fire inside a high-rise office building in Midtown Manhattan on Monday evening. The gunman then fatally shot himself in the chest, New York City Police Commissioner Jessica S. Tisch said at a news conference Monday night. Speaking to reporters, Mayor Eric Adams called the incident 'despicable' and an 'act of evil.'


Forbes
27 minutes ago
- Forbes
FBI Warns iPhone And Android Users—Do Not Share These Texts
Do not make this mistake on your phone. Republished on July 29 with new text attack warnings for smartphones users. The FBI warns that 'malicious actors' continue to send fraudulent texts and voice messages to 'gain access to personal accounts.' Do not reply to messages unless you recognize the sender's number. But there's more you must do to safeguard accounts. America is under attack from a malicious texting industry sending out billions of messages. Whether undelivered packages, unpaid tolls and DMV fines or Amazon refunds, the objective is to steal your data, your money, even your identity. But sometimes even legitimate texts can be dangerous. We're talking two-factor authentication (2FA), which the bureau says you should set up 'on any account that allows it,' and should 'never disable.' But most 2FA codes are delivered by text. And the problem with texts is that you can send them on to others. Never do that, the FBI warns — regardless of who's asking. 'Actors may use social engineering techniques to convince you to disclose a 2FA code,' the bureau says in an advisory reshared this week. Doing so lets attackers 'compromise and take over accounts.' Even if the request comes from someone you know, 'never provide a two-factor code to anyone over email, SMS/MMS or encrypted messaging.' ESET's Jake Moore warns the same. 'Scammers often trick people into revealing them to bypass security checks and take control so even if someone claims to be from your bank, trusted company or even a family member, keep OTPs to yourself.' This all sounds very basic. But if an attacker hijacks one of your friend's messaging accounts, they can pretend to be your friend and ask you to send a code, telling you their phone is not working. The scam is remarkably effective. While you should never share OTP text messages, you can better protect yourself if you stop using them altogether. Use an authenticator app, or better still use a passkey. This links your account to your physical device, making it impossible to steal and use a code. Shifting from SMS to authenticator apps or passkeys is critical now SMS interception and bypass is more common. Per Cybersecurity News, 'criminal enterprises no longer require extensive technical expertise to deploy advanced mobile threats, as ready-to-use malware kits are now available for subscription fees as low as $300 per month.' Banks in Australia and UAE are already calling time on SMS 2FA codes, and you should now do the same. But if you are using those codes, it's even more critical that you never share them, regardless of who is who's asking and the reason they're giving. While SMS persists, Cybersecurity News warns of a 'fundamental shift toward industrialized cybercrime, where specialized providers handle technical complexities while criminal customers focus solely on victim targeting and monetization strategies.' This isn't new. Per one warning from 2021, while 'figures suggest users who enabled 2FA ended up blocking about 99.9% of automated attacks, as with any good cybersecurity solution, attackers can quickly come up with ways to circumvent it. They can bypass 2FA through the one-time codes sent as an SMS to a user's smartphone.'


Bloomberg
27 minutes ago
- Bloomberg
Timeline of NYC Shooting, According to Police Probe
New York City Mayor Eric Adams and Police Commissioner Jessica Tisch reveal details about the shooting, including how the suspected gunman attacked a building in Manhattan. (Source: Bloomberg)