MSHP investigating shooting involving KCPD officers near 16th, Jefferson
Cpl. Justin Ewing with MSHP said the incident started just before 5:50 p.m. when the driver of vehicle drove off during a traffic stop.
Woman charged with murder, man arrested in connection to KC sports reporter death
Ewing said the suspect had ran from police agencies in both Missouri and Kansas.
A KCPD helicopter followed the suspect vehicle and communicated with officers on the ground who then located the vehicle in the area of W. 16th Street and Jefferson Street, near I-670 and I-35.
As officers attempted to make contact, the suspect driver pulled into a private parking lot. Two officers got out of their vehicle and began giving commands to the suspect.
The suspect then drove in the direction of the officers and struck a KCPD vehicle. An officer inside fired shots, striking the suspect.
Ewing said the suspect was taken into custody and taken to the hospital with serious and life-threatening injuries. He is currently reported to be in stable condition.
Download the FOX4 News app on iPhone and Android
No officers were injured in the incident.
MSHP's Division of Drug and Crime Control is continuing to investigate.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


TechCrunch
a day ago
- TechCrunch
Data breach reveals Catwatchful ‘stalkerware' is spying on thousands of phones
A security vulnerability in a stealthy Android spyware operation called Catwatchful has exposed thousands of its customers, including its administrator. The bug, which was discovered by security researcher Eric Daigle, spilled the spyware app's full database of email addresses and plaintext passwords that Catwatchful customers use to access the data stolen from the phones of their victims. Catwatchful is spyware masquerading as a child monitoring app that claims to be 'invisible and cannot be detected,' all the while uploading the victim's phone's private contents to a dashboard viewable by the person who planted the app. The stolen data includes the victims' photos, messages, and real-time location data. The app can also remotely tap into the live ambient audio from the phone's microphone and access both front and rear phone cameras. Spyware apps like Catwatchful are banned from the app stores and rely on being downloaded and planted by someone with physical access to a person's phone. As such, these apps are commonly referred to as 'stalkerware' (or spouseware) for their propensity to facilitate non-consensual surveillance of spouses and romantic partners, which is illegal. Catwatchful is the latest example in a growing list of stalkerware operations that have been hacked, breached, or otherwise exposed the data they obtain, and is at least the fifth spyware operation this year to have experienced a data spill. The incident shows that consumer-grade spyware continues to proliferate, despite being prone to shoddy coding and security failings that expose both paying customers and unsuspecting victims to data breaches. According to a copy of the database from early June, which TechCrunch has seen, Catwatchful had email addresses and passwords on more than 62,000 customers and the phone data from 26,000 victims' devices. Most of the compromised devices were located in Mexico, Colombia, India, Peru, Argentina, Ecuador, and Bolivia (in order of the number of victims). Some of the records date back to 2018, the data shows. The Catwatchful database also revealed the identity of the spyware operation's administrator, Omar Soca Charcov, a developer based in Uruguay. Charcov opened our emails, but did not respond to our requests for comment sent in both English and Spanish. TechCrunch asked if he was aware of the Catwatchful data breach, and if he plans to disclose the incident to its customers. Without any clear indication that Charcov will disclose the incident, TechCrunch provided a copy of the Catwatchful database to data breach notification service Have I Been Pwned. Catwatchful hosting spyware data on Google's servers Daigle, a security researcher in Canada who has previously investigated stalkerware abuses, detailed his findings in a blog post. According to Daigle, Catwatchful uses a custom-made API, which every one of the planted Android apps relies on to communicate with and send data to Catwatchful's servers. The spyware also uses Google's Firebase, a web and mobile development platform, to host and store the victim's stolen phone data, including their photos and ambient audio recordings. Daigle told TechCrunch that the API was unauthenticated, allowing anyone on the internet to interact with the Catwatchful user database without needing a login, which exposed the entire Catwatchful database of customer email addresses and passwords. When contacted by TechCrunch, the web company hosting the Catwatchful API suspended the spyware developer's account, briefly blocking the spyware from operating, but the API returned later on HostGator. A spokesperson for HostGator, Kristen Andrews, did not respond to requests for comment regarding the company hosting the spyware's operations. TechCrunch confirmed that Catwatchful uses Firebase by downloading and installing the Catwatchful spyware on a virtualized Android device, which allows us to run the spyware in an isolated sandbox without giving it any real-world data, like our location. We examined the network traffic flowing in and out of the device, which showed data from the phone uploading to a specific Firebase instance used by Catwatchful to host the victim's stolen data. After TechCrunch provided Google with copies of the Catwatchful malware, Google said it added new protections for Google Play Protect, a security tool that scans Android phones for malicious apps, like spyware. Now, Google Play Protect will alert users when it detects the Catwatchful spyware or its installer on a user's phone. TechCrunch also provided Google with details of the Firebase instance involved in storing data for the Catwatchful operation. Asked whether the stalkerware operation violates Firebase's terms of service, Google told TechCrunch on June 25 that it was investigating but would not immediately commit to taking down the operation. 'All apps using Firebase products must abide by our terms of service and policies. We are investigating this particular issue, and if we find that an app is in violation, appropriate action will be taken. Android users that attempt to install these apps are protected by Google Play Protect,' said Ed Fernandez, a spokesperson for Google. As of publication, Catwatchful remains hosted on Firebase. Opsec mistake exposes spyware administrator Like many spyware operations, Catwatchful does not publicly list its owner or disclose who runs the operation. It's not uncommon for stalkerware and spyware operators to hide their real identities, given the legal and reputational risks associated with facilitating illegal surveillance. But an operational security mishap in the dataset exposed Charcov as the operation's administrator. A review of the Catwatchful database lists Charcov as the first record in one of the files in the dataset. (In past spyware-related data breaches, some operators have been identified by early records in the database, as oftentimes the developers are testing the spyware product on their own devices.) The dataset included Charcov's full name, phone number, and the web address of the specific Firebase instance where Catwatchful's database is stored on Google's servers. Charcov's personal email address, found in the dataset, is the same email that he lists on his LinkedIn page, which has since been set to private. Charcov also configured his Catwatchful administrator's email address as the password recovery address on his personal email account in the event he gets locked out, which directly links Charcov to the Catwatchful operation. How to remove Catwatchful spyware While Catwatchful claims it 'cannot be uninstalled,' there are ways to detect and remove the app from an affected device. Before you start, it's important to have a safety plan in place, as disabling spyware can alert the person who planted it. The Coalition Against Stalkerware does important work in this space and has resources to help victims and survivors. Android users can detect Catwatchful, even if it is hidden from view, by dialing 543210 into your Android phone app's keypad and then hitting the call button. If Catwatchful is installed, the app should appear on your screen. This code is a built-in backdoor feature that allows whoever planted the app to regain access to the settings once the app is hidden. This code can also be used by anyone to see if the app is installed. Image Credits:TechCrunch Image Credits:TechCrunch As for removing the app, TechCrunch has a general how-to guide for removing Android spyware that can help you identify and remove common types of phone stalkerware, and then enable the various settings you need to secure your Android device. — If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware has resources if you think your phone has been compromised by spyware.

Engadget
a day ago
- Engadget
ICEBlock climbs to the top of the App Store charts after officials slam it
US government officials have condemned ICEBlock and CNN's recent coverage of it, leading to more people hearing about its existence and downloading it from the App Store. Now the application, which allows users to add a pin on a map to show where ICE agents have recently been spotted, has climbed to the to the top of Apple's App Store charts. It's currently the number one free social networking app in the US and the third most downloaded free app overall. CNN's piece talked about how the app's developer, Joshua Aaron, launched it in early April after seeing the Trump administration crack down on immigration. When the piece went live, Aaron said the app had 20,000 users, many of whom live in Los Angeles, where ICE has been raiding neighborhoods. In addition to letting users pin ICE agent locations on a map, the app also gives them a way to add notes, such as what the agents are wearing or what car they're driving. Any user within a five mile radius of the sighting will get an alert. But White House press secretary Karoline Leavitt suggested that the CNN piece was "an incitement of further violence against... ICE officers" when asked to respond to the report on the podium. She said that there's been a 500 percent increase against ICE agents who are just "trying to do their jobs and remove public safety threats from... communities." ICE acting Director Todd M. Lyons also issued a statement, saying that the app paints a target on federal law enforcement officers' backs. " CNN is willfully endangering the lives of officers who put their lives on the line every day and enabling dangerous criminal aliens to evade US law," he continued. "Is this simply reckless 'journalism' or overt activism?" Meanwhile, US Homeland Security Secretary Kristi Noem and US Attorney General Pam Bondi both said the government is going after Aaron. "He's giving a message to criminals where our federal officers are," Bondi said. "...we are looking at it, we are looking at him, and he better watch out, because that's not a protected speech. That is threatening the lives of our law enforcement officers throughout this country."' Aaron told CNN that ICEBlock doesn't collect personal data, such as device IDs and IP addresses, which TechCrunch has confirmed in a test. The app is only available on iOS, because it would have to collect information on Android that could put people at risk. If you buy something through a link in this article, we may earn commission.


New York Post
2 days ago
- New York Post
Aspiring Thai model viciously beaten at NYC subway station by ex-con out on bail as she pleads with him to stop: prosecutors
An aspiring Thai model was viciously beaten and robbed at a Brooklyn subway station by an ex-con out on bail, according to prosecutors — as video shows her pleading with him to stop, Zine Raksasutee, 26, was on the stairs at the Chauncey Street station in Bushwick June 22 when Lewis Doctor, 54, allegedly grabbed her by the throat and shoved her against a wall — then unloaded a flurry of punches, according to a criminal complaint obtained by The Post. Doctor then knocked the victim to the ground and kept beating her while wearing a ring on one of his fingers, leaving her with a split lip and cuts to her face, the complaint alleges. Advertisement 3 The assault left her bloodied. Courtesy of Eric Parnes Law He allegedly ran off with Raksasutee's iPhone, AirPods, handbag, debit card, hard drive and other items all valued at about $1,400, according to the complaint. The suspect was arrested three days later, but Raksasutee was left traumatized by the attack, the victim said. Advertisement 'I am grateful to be alive and to be surrounded by people who are helping me heal. I hope speaking out will help keep others safe,' she said in a statement through her attorney. 'This can happen to anyone if nothing is done.' Raksasutee can be heard pleading with attacker as she struggled on the ground in a video she captured on her phone and that was obtained by The Post. 'Please, please,' she begged the suspect. Advertisement Photos obtained by The Post show Raksasutee with a cut on her chin and blood streaming down her part of her neck and chest. 3 The aspiring model says she is lucky to be alive. Courtesy of Eric Parnes Law The attack is disturbingly similar to an attack of another aspiring Thai model who was brutalized and robbed on a Manhattan subway platform in 2021. The 23-year-old victim back then was punched in the face and placed in a headlock before her purse was ripped away from her at the Herald Square station almost four years ago. Advertisement 'How many times must people be forced to relive the same nightmare before decisive action replaces empty words? How many more statements like this must be issued and when will we stop making excuses for the perpetrators?' the victim's lawyer, Eric Parnes, said in a statement. 'Our client suffered this cowardly, unprovoked attack while doing what millions do every day — simply trying to get home.' Parnes said Raksasutee came to the United States from Thailand a year and a half ago and is currently a student studying English while preparing a modeling portfolio. 3 The victim came to the US from Thailand more than a year ago. Courtesy of Eric Parnes Law Doctor was indicted Monday on first-degree assault, first degree robbery, fourth-degree grand larceny, criminal possession of stolen property and a slew of related charges, according to the complaint. He faces up to 25 years in prison if convicted of assault in the first degree. He was previously cut loose on $5,000 bail in January 2024 after he was arrested and charged with robbing a victim with a BB gun, the Brooklyn District Attorney Eric Gonzalez's office said. Prosecutors unsuccessfully requested $50,000 bail in that case, according to the DA's office. Advertisement This time around, the suspect is being held in custody after prosecutors were granted their request of $50,000 bail in the most recent case, according to prosecutors. Doctor served a state prison sentence between 1998 and 2022 on robbery charges, according to state records.