
Who is SinCity-MannyWise? A look at the charges in the fatal shooting of Finny Da Legend and his wife
'It is believed that the suspect and the victims knew each other and had previously engaged in conflict over social media prior to the shooting,' police said in a statement. 'At this time, we believe this to be an isolated incident.'
Finny Da Legend and Bubbly were reportedly declared dead at the scene.
SinCity-MannyWise is a popular YouTuber known for his bold, Vegas-centric content. He would often stream from the Strip, casinos, and high-energy local events, and some of his videos were known to be unfiltered. He streamed confrontational content and called out other streamers on his channel, building a cult-like following within a short time.
According to ABC News, the shooting took place following an online argument. SinCity-MannyWise said in a livestream that he was "out here searching for my baby.' He added, "I went through every casino there is. I've heard there's one of my biggest fans here in town."
In the aftermath of the shooting, SinCity-MannyWise's channel was terminated for violating YouTube's community guidelines. However, Finny Da Legend's channel remains online.
According to a release by the Las Vegas Metropolitan Police Department circulating on X, SinCity-MannyWise was arrested for double homicide at the Las Vegas Bellagio Fountains. He turned himself in at Henderson Police Station and was booked for two counts of 'Open Murder with a Deadly Weapon.' He will be booked into the Clark County Detention Center.
While one video recorded the shooting, another appeared to show injured people lying on the sidewalk. The encounter was broadcast by Finny Da Legend himself.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Indian Express
4 hours ago
- Indian Express
BBA student, passport agent among trio who bought cryptocurrency with funds siphoned in Cyber fraud
THE CYBER Crime Police Station of the Pimpri Chinchwad police have arrested three persons including a BBA student and a passport agent who had withdrawn cash from the funds that were siphoned from the victims of a cyber crime and later used it to purchase Tether (USDT) cryptocurrency to be sent to the international handlers. The Cyber Crime police station of Pimpri Chinchwad were investigating a share trading scam in which a man who was lured using a YouTube advertisement had lost Rs 56 lakh. The victim was made to believe that he had earned a profit of Rs 5.15 crores after he was manipulated into making several transactions through a fraudulent phone based application. In the initial phase of the probe the Pimpri Chinchwad police's Cyber investigators zeroed in on one specific bank account registered in Pune in the name of Balaji Enterprises. A team from the Cyber police station identified the man as Shivam Balkrushna Sanvatsarkar (34), a resident of Erandwane in Pune, who worked as a film producer. He was subsequently placed under arrest. In the subsequent phase of the probe, investigators found out that some funds from the victim had landed in an account of a public sector bank, in the name of a real estate entity. The money was further withdrawn as cash. Police zeroed in on the suspects who were operating the account and had withdrawn the cash. Over the last week, the police arrested the three suspects including Sahil Anwar Sayyed (22), a BBA student, Bhupendra Avatar Singh (34), a passport agent and Sarfaraz Rafique Sayyed (29), automobile repair ship owner. Further probe revealed that the bank account which these suspects operated had been flagged in at least seven Cyber crimes and had seen transactions of Rs 12 lakh. After their arrest, the trio were remanded to police custody. Further investigation is on.


Hindustan Times
7 hours ago
- Hindustan Times
Espionage case: Jyoti Malhotra's custody extended by 7 days
A Hisar court on Monday extended by seven days the judicial custody of YouTuber Jyoti Malhotra, who is under investigation for alleged espionage for Pakistan. Her advocate Kumar Mukesh said she was produced before the court via videoconferencing. Her appearance on August 25 would be in-person when she will be provided with a 2,500-page chargesheet that was submitted by the special investigation team (SIT) of the Hisar police on August 14, he said. YouTuber Jyoti Malhotra 'Thereafter, we will review the chargesheet to ascertain if it contains any evidence,' he added. Travel blogger Jyoti, 33, a resident of Hisar, was arrested on May 16 for allegedly sharing sensitive information with Pakistani operatives. According to police officials, she had been allegedly sharing sensitive information to Pakistani operatives and she was in regular touch with them. 'Initially, she created digital content. Later, during her visit to Pakistan, she came in contact with Pakistani handlers. The enemy intelligence operatives developed her like an asset. Jyoti had links with ISI operatives Nasir Dhillon, Hasan Ali, Shakir and Ehsan-ur-Rahim Danish Ali, an officer at the Pakistani high commission in Delhi,' said a senior police officer, requesting anonymity. As per the chargesheet, Jyoti had visited various places, including Pahalgam in J&K, three months before the terror attack. She travelled to Pakistan thrice, once to China and other countries like Bangladesh and Indonesia. Earlier, Hisar superintendent of police (SP) Shashank Kumar Sawan had said that Jyoti did not have direct access to any information related to the military or defence operations that she could have shared, but she was in touch with Pakistan's officials. 'They were developing her as an asset. She was in touch with other YouTube influencers. They were also in touch with PIOs (public information officers). She used to go to Pakistan, like on sponsored trips. She was in Pakistan before the Pahalgam attack. An investigation is on to establish linkages, if there are any. We are also investigating as we have leads that other people were also involved with her,' the SP had said. The SP said that the YouTuber had visited the Pakistani embassy and uploaded a video in March last year. 'Pakistan is not a normal country for us. Attending several events with them and remaining in touch with Danish and others during the conflict period endangers the unity and sovereignty of the country,' the SP said.

Hindustan Times
9 hours ago
- Hindustan Times
Gangs are using increasingly sophisticated kit to steal cars
IMAGINE MEETING a seasoned British car thief in 2013. They would probably have cut a sorry figure. Every year of their career, the grind had got harder. The tools of their trade, such as a coat hanger or 'slim jim' (a flat metal strip) for bypassing locks and strippers for manipulating ignition wires, had, slowly but surely, been rendered obsolete, thanks to improved security technology. Business had dried up. Not any more. The recent boom in car theft offers a window into an ever-shifting battleground. On one side are manufacturers, who make and sell products. On the other are thieves, who try to nick them. As the technology for providing security, and defeating it, has become better, and cheaper, the battle has speeded up. Modern cars are sometimes called 'computers on wheels'. That brought benefits but also vulnerabilities that carmakers were slow to grasp. The first was 'relay attacks', which became popular in Britain in 2016 after manufacturers introduced keyless ignition. A thief stands on a street and uses a device to 'bounce' the electronic signal from a house to the car. Manufacturers have designed that out in newer models. Now thieves are more likely to get in by plugging a device directly into one of the car's electronic components, which tricks the car into thinking it is being contacted by a smart key. Adam Gibson, a police officer at Felixstowe port, points to several cars he has recovered that have been broken into using this technique: one via the tail-light, another via a component next to the bonnet latch. The kit for this can be easily bought online. Videos on YouTube even explain how to use it. Most thefts are carried out by organised criminal groups, which will invest as much as £20,000 ($27,000) on a single piece of equipment. A police force says that, when it confiscated such a device, it bought only a quiet couple of weeks. One challenge for manufacturers is the speed of criminal innovation. The timeline for designing and making cars is long; once criminal groups have found an entry point, they might have years of easy business. Another is cost. At the top end of the market, companies invest heavily in fixing vulnerabilities, partly because they worry that a rash of thefts will hurt their brand. For mid-market cars, price competition is fiercer, and drivers are less likely to blame the manufacturer if their car is stolen. Criminals have similarly had to adapt their techniques when it comes to phones. The introduction of biometric locking and face identification made it harder for thieves to get into locked phones, rendering them less valuable. The response was a surge in 'snatch thefts', whereby thieves yank an unlocked phone from someone's hand, and then disable tracking before the victim can report it lost. Manufacturers have, in turn, developed motion-based theft-detection measures (a phone will lock in response to a jarring movement) and stolen-device protection (it requires a passcode when moved to an unfamiliar location). Yet the security of any system depends on humans. Many phone users do not turn on such features. Criminals have become adept at phishing for the personal information needed to unlock a phone. If all else fails, a locked phone can always be sold on for parts. Manufacturers are often accused of dragging their feet. MPs have argued, for example, that Apple could easily undermine the business model of phone-snatchers by introducing a 'kill switch', but it won't because of 'strong commercial incentives'. That oversimplifies things. Manufacturers design security around passwords and locks, and already allow users to remotely 'kill' their phone when it is locked. Introducing a kill switch for a phone that appears to have been legitimately transferred to a new user would create a host of new problems. A second-hand seller could, for example, try to extort money from a buyer by threatening to kill a phone post-sale. Manufacturers would struggle to design an infallible process for distinguishing thefts from legal sales. A fairer conclusion is that—because its costs are socialised, via higher insurance premiums—theft is often a problem that no one has a strong incentive to fix.