
BREAKING NEWS Brother of late NFL star and US Army Ranger Pat Tillman arrested in California for 'driving into post office'
Richard Tillman was booked Sunday and is being held without bail, according to the Santa Clara jail website. However, no specific charge is listed.
NBC Bay Area is reporting that Richard, the brother of Pat, is accused of driving his car into a local post office while live streaming the entire collision.
MORE TO FOLLOW...

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Independent
18 minutes ago
- The Independent
Sentencing hearing set for ex-Kentucky officer convicted in Breonna Taylor raid
A federal judge prepared Monday afternoon to sentence an ex-Kentucky police officer convicted of using excessive force during the deadly Breonna Taylor raid, days after the U.S. Justice Department recommended he receive no prison time in the Black woman's fatal shooting. Brett Hankison fired his weapon the night of the March 2020 botched drug raid. His shots didn't hit or injure anyone, though they flew through Taylor's walls into a neighboring apartment. The 26-year-old's death, along with the May 2020 police killing of George Floyd in Minneapolis, sparked racial injustice protests nationwide that year. Though the sentence could amount to several years, if U.S. District Judge Grady Jennings heeds the Justice Department's request, it would mean none of the Louisville police officers involved in the raid would face prison time. Last week, the U.S. Justice Department recommended no prison time for Hankison, an abrupt about-face by federal prosecutors that has angered critics after the department spent years prosecuting the former detective. The Justice Department, which has changed leadership under President Donald Trump since Hankison's conviction, said in a sentencing memo last week that "there is no need for a prison sentence to protect the public' from Hankison. Federal prosecutors suggested time already served, which amounts to one day, and three years of supervised probation. Prosecutors at his previous federal trials aggressively pursued a conviction against Hankison, 49, arguing that he blindly fired 10 shots into Taylor's windows without identifying a target. Taylor was shot in her hallway by two other officers after her boyfriend fired from inside the apartment, striking an officer in the leg. Neither of the other officers was charged in state or federal court after prosecutors deemed they were justified in returning fire into the apartment. Louisville police used a drug warrant to enter the apartment, but found no drugs or cash inside. A separate jury deadlocked on federal charges against Hankison in 2023, and he was acquitted on state charges of wanton endangerment in 2022. In their recent sentencing memo, federal prosecutors wrote that though Hankison's 'response in these fraught circumstances was unreasonable given the benefit of hindsight, that unreasonable response did not kill or wound Breonna Taylor, her boyfriend, her neighbors, defendant's fellow officers, or anyone else.' Civil rights attorney Ben Crump, who helped Taylor's family secure a $12 million wrongful death settlement against the city of Louisville, has called the Justice Department recommendation 'an insult to the life of Breonna Taylor and a blatant betrayal of the jury's decision' and said in a social media statement that it "sends the unmistakable message that white officers can violate the civil rights of Black Americans with near-total impunity.' A U.S. Probation Office presentencing report said Hankison should face a range of 135 to 168 months imprisonment on the excessive force conviction, according to the memo. But federal prosecutors said multiple factors — including that Hankison's two other trials ended with no convictions — should greatly reduce the potential punishment. The memorandum was submitted by Harmeet Dhillon, chief of the Justice Department's Civil Rights Division and a Trump political appointee who in May moved to cancel settlements with Louisville and Minneapolis that had called for overhauling their police departments. In the Taylor case, three other ex-Louisville police officers have been charged with crafting a falsified warrant, but have not gone to trial. None were at the scene when Taylor was shot.


The Sun
18 minutes ago
- The Sun
Brutal street brawl erupts after women try to claim parking spot by standing in the way of driver – who's in the wrong?
A BRUTAL street brawl erupted after two women tried to claim a parking spot by standing in the way of a driver. The viral video taken in Queens, New York, has reignited a debate on whether it's ever right to claim a public space using an item - or your body. 5 5 5 Mom and daughter duo Andreea Dumitru, 45, and Sabrina Starman, 21, launched a heinous attack on driver Jada McPherson as she tried to park into a Ridgewood street. But the pair were allegedly "guarding" the space - with their bodies. An unidentified man also joined in on the horror brawl, fighting McPherson, but fled the area before cops arrived, authorities said. After McPherson attempted to find another spot on the block at 18-28 Putnam Ave, she return to tell the mom and daughter that they couldn't guard parking spots, she told The NY Post previously. It was then the unknown man was said to have gone "ballistic" while Dumitru and Starman hurled racist language at McPherson. Shocking footage shows McPherson expressing her outrage at the empty space being reserved, before Dumitru and Starman approach her. It is at this point the mom and daughter duo slam her to the ground and pull her hair as the unknown neighbour joins in on the vile chaos. Starman and Dumitru were arrested and charged with first-degree assault and second-degree harassment, cops said. They have since apologised for the horrific fight after they received online death threats. McPherson doesn't accept their sorry's though, she told the Post, as she believes "the apologies are only because of how much outreach the video is getting and I don't think the apology is wholesome". Moment huge fight breaks out at Benidorm swimming pool in front of shocked tourists She added: "I don't think it's from their hearts, like deep down. "But I just hope they could see or see what they did wrong and kind of get a better understanding of how to operate or act in certain situations from this situation." The incident has divided people online on whether it's right to guard a space. One Ridgewood resident told the newspaper: "Honestly, if you have a friend that you know is literally coming around the corner in like a minute? "Yeah, what's the problem with that? But standing there longer than five minutes - absolutely not." "But that's just how New Yorkers are, territorial. I understand why, but it's not something I'd ever consider doing." But another argued they wouldn't be worth putting your safety at risk for a space. They said: "I personally wouldn't get into a fight over it [...] because of how people drive here, I would not put my body on the line in front of cars. "I'd be scared to stand in the street to save a spot. Because of how people drive here, I wouldn't put my body on the line." 5 5


Daily Mail
18 minutes ago
- Daily Mail
Amazon issues warning to 200M customers over Prime scam
Amazon says scammers are tricking Prime users into giving up their passwords and payment details pretending to be Amazon itself, and they are getting better at it. The company alerted users after a sharp increase in fake emails and phone calls targeting its 200 million customers in July, just after their Prime Day sales event. Amazon sent an email warning customers that scammers are posing as the company and claiming their Prime membership will be renewed at a higher price unless they cancel it immediately. Once users click on the 'cancel' link in the email, it will lead them to a fake Amazon login page, where users hand over their passwords without realizing it. With these stolen credentials, scammers can access the real accounts and make purchases using any credit cards saved in the victim's information. Amazon also said that the fraudsters were calling people and claimed someone had just ordered an iPhone on their account, then asking for login credentials to 'fix the error.' According to Amazon's blog, one user said: 'I got a random call from someone who claimed I bought something on Amazon that I had not, and they wanted my account information to verify this was an error.' Amazon said it has already taken down more than 55,000 phishing websites and 12,000 scam phone numbers this year alone, but warns that criminals are constantly changing tactics. These scams intensified ahead of Amazon's Prime Day sales event from July 8 to July 11, and have continued since then, targeting membership renewals with the latest scam. Experts warned that scammers are pulling information from the dark web , including Prime users' real names or addresses, to make the fake emails look legitimate. Malwarebytes, a cybersecurity company, reported that the fake domains used in the attacks include the site which looks almost identical to the real Amazon login page. Amazon said no one is immune to these scams and there is no shame in being targeted, but knowing what to look for can make all the difference. 'We have recently noticed an increase in customers reporting fake emails about Amazon Prime membership subscriptions,' the company wrote in an urgent email warning to customers. In the message , Amazon shared six tips to help users protect themselves and outlined steps to take if they think they have been targeted. Specifically, the email urged customers not to click any links, warning that scammers use these fake sites to steal login details and banking information. For hackers, these phony pages allow them to monitor everything the victim types in and save it, without the Prime user ever knowing they weren't typing on a legitimate Amazon website. Amazon also advised customers to check their Prime membership under the 'Prime' menu by opening the Amazon app or by visiting the website directly. The new email warning recommended monitoring bank statements for questionable charges if any suspicious links were clicked, and to report strange messages to To protect against scams, Amazon said always access its site through the official app or by visiting on a web browser. They reminded customers to verify if a message is real by checking the Message Center under 'Your Account,' where legitimate Amazon messages appear. Amazon also recommended enabling two-step verification, a setting that adds an extra layer of protection when logging in to your account, typically by sending an access code to the legitimate user's phone or email. You can turn it on by going to the Login & Security settings in your Amazon account, or by visiting on a web browser. The company said it will never ask for payments over the phone, by email, or on third-party sites. Scammers often create a false sense of urgency to rush victims, claiming accounts are in danger or money is owed. Another warning sign is being asked to buy a gift card in order to make a payment. Amazon said it will never ask for gift card payments, and any demand for them is a scam. They cautioned against calling numbers sent in texts, emails, or found through online searches, and said it never asks customers to download software to connect with support. The company has been working with the Better Business Bureau to help people check for scams by offering a Scam Tracker tool. This tool lets users search and report scam messages by email, phone number, or website link. Amazon also says it has thousands of people working full time around the world to protect its platform. That includes fraud investigators, software engineers, and machine learning scientists. The company encouraged shoppers to stick to the official Amazon app or website when looking for deals, buying items, or checking order history. Amazon found an 80 percent spike during Prime Day 2024 in a specific impersonation scam in the US, where fraudsters pretended there was a problem with a customer's account to trick them into sharing personal information. In November, the company found that 94 percent of global impersonation scams came through email, text messages, or phone calls. Two-thirds of those scams focused on fake account issues.