logo
Man shot Idaho firefighters who had asked him to move his vehicle, killing 2, sheriff says

Man shot Idaho firefighters who had asked him to move his vehicle, killing 2, sheriff says

The Hindu16 hours ago
A man who set a wildfire and then fatally shot two firefighters and wounded another in northern Idaho was a 20-year-old transient who attacked the first responders after they asked him to move his vehicle, a sheriff said Monday (June 30, 2025).
Kootenai County Sheriff Bob Norris offered new details about the Sunday ambush at Canfield Mountain just north of Coeur d'Alene, a popular recreation area. He said Wess Roley was living out of his vehicle, had once aspired to be a firefighter and had only a handful of minor contacts with area police.
'We have not been able to find a manifesto,' the sheriff said, adding a motive was still unknown.
Mr. Norris said families of the victims are 'in shock — absolutely. They're in shock and they're still processing it.'
Roley had set a fire using flint, and the firefighters who rushed to the scene instead found themselves in an unexpected shootout. They took cover behind fire trucks, but two died and a third was wounded during a barrage of gunfire over several hours.
Roley later killed himself, Mr. Norris said.
'We know that he was a transient here,' the sheriff said. 'We know he lived here for the better part of 2024. But as far as when he got here, why he was here, why he chose this place — I don't know.'
Two helicopters converged on the area Sunday, armed with snipers ready to take out the suspect if needed, while the FBI used his cellphone data to track him and the sheriff ordered residents to shelter in place. They eventually found Roley dead in the mountains, his firearm beside him.
Roley's grandfather, Dale Roley, told KXLY-TV that his grandson was an avid hiker who worked for a tree company and was interested in forestry.
Outpouring of support for the victims was swift in Coeur d'Alene, a city of 55,000 residents near the border with Washington.
Hours after the ambush, people gathered along Interstate 90 holding American flags to pay their respects as the two fallen firefighters' bodies were taken to the medical examiner's office in Spokane, Washington, about 35 miles (56 kilometres) from Coeur d'Alene.
Gov. Brad Little on Monday ordered U.S. and Idaho state flags to be lowered to half-staff to honor the firefighters until the day after their memorial service.
'All our public safety officers, especially our firefighters, bravely confront danger on a daily basis but we have never seen a heinous act of violence like this on our firefighters before,' he said in a statement. 'This is not Idaho. This indescribable loss is felt deeply by all those in the firefighting community and beyond.'
The Idaho House Republican Leadership said in a statement: 'We are horrified by the murder of two firefighters in Coeur d'Alene, and shocked by such a vicious attack on our first responders. We are praying for them, the injured, their families and their colleagues.'
Though the shelter-in-place order was lifted, the sheriff's office cautioned residents to be prepared because the fire was still burning. Firefighters were still battling the blaze Monday, a task made difficult because it was burning in steep terrain, which limited the use of heavy equipment, the Idaho Department of Lands said in a news release. It had burned about 26 acres (10.5 hectares).
Fire is always a concern for the region, said Bruce Deming, whose property abuts the trail system. When he noticed smoke on the ridge Sunday afternoon, he wondered why no firefighting helicopters were responding.
When a friend texted to tell him about the shooting, he realized why he wasn't seeing aircraft: 'Because they're concerned about being shot at,' he said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

US cracks down on North Korean-backed fraud ring that netted millions in crypto and cash
US cracks down on North Korean-backed fraud ring that netted millions in crypto and cash

Time of India

timean hour ago

  • Time of India

US cracks down on North Korean-backed fraud ring that netted millions in crypto and cash

The US government announced a big crackdown on an international fraud ring linked to North Korea, involving North Korean IT workers and other conspirators. More than a dozen people were named in two new indictments, including a man from New Jersey called Zhenxing 'Danny' Wang. The fraud ring made over $5 million illegally and took hundreds of thousands in fees from US conspirators. Four North Korean nationals were charged for stealing nearly $1 million in cryptocurrency in a separate indictment, as per reports. Authorities searched 29 'laptop farms', places where laptops were used for the scam, in 16 US states and seized 29 financial accounts used to launder money and crypto. The scheme involved stealing identities of over 80 Americans and getting fake remote jobs at more than 100 companies, including many big Fortune 500 firms, as per the report by Fortune. North Korean IT workers traveled to the United Arab Emirates, used stolen IDs to pose as remote workers, got jobs at American companies, and stole digital currency to help fund North Korea's nuclear weapons program. The fraud evolved from using fake IDs to creating American front companies that helped hide the North Korean workers' true identity and made the scheme look real. These front companies received laptops sent by US companies for remote workers. The laptops were hosted at 'laptop farms' to let North Korean workers access them remotely, as per the report by Fortune. Live Events The stolen money was sent to North Korea's leadership to support their weapons and missile programs. FBI Assistant Director Roman Rozhavsky said North Korea uses fraud and identity theft to fund its weapons programs, but the FBI is working hard to stop them. Thousands of trained North Korean IT workers are spread worldwide, tricking companies into hiring them remotely to steal money and gather intelligence. The UN estimates this scheme earns North Korea between $200 million and $600 million yearly, not counting crypto theft which could be billions, as mentioned by Fortune report. Fake companies, real damage US Attorney Theodore Hertzberg said these charges warn the public about dangers from state-sponsored cybercriminals and urged companies to carefully check remote workers. Hertzberg advised companies to hire Americans and verify employees thoroughly, preferably in person, especially in the virtual currency space. Zhenxing 'Danny' Wang founded a fake software company called Independent Lab. Laptops were sent to him at his home where he installed remote software for North Korean workers overseas to use. Wang collected payment from US companies and sent the money to overseas conspirators. ALSO READ: Lady Gaga a no-show at Jeff Bezos wedding after reported clash over multi-million dollar fee Other accomplices included people in New York, California, and even an active-duty US military member, hosting laptop farms for money. The fraud caused at least four big companies to lose $100,000 or more each. The fraud also involved a California defense contractor from which sensitive military tech documents were stolen, as per the Fortune report. The fraud affected companies in many states across the US, including California, Massachusetts, New York, New Jersey, Florida, Georgia, and more. Security expert Michael Barnhart said the arrests show North Korean IT workers don't just steal money but can also harm national security by accessing trusted company networks. Barnhart warned companies to rethink hiring processes to avoid such threats. Assistant Attorney General John Eisenberg said the Justice Department will keep fighting these cyber-enabled networks to stop North Korea's illicit programs. The second indictment described four North Korean IT workers who used fake IDs to get jobs at US companies in Atlanta and stole nearly $1 million in crypto, according to the report by Fortune. Stolen crypto and cover-up tricks They laundered the stolen crypto to hide its origin before sending it to North Korea. One worker, Kim Kwang Jim, used a fake Portuguese ID to get hired and then stole millions of crypto tokens by changing the company's smart contract code. Kim tried to excuse the theft by blaming a 'github refactor' but was accused via Telegram messages by the company founder. Another worker, Jong Pong Ju, used the fake name 'Bryan Cho' to get hired and stole crypto worth about $175,000. Jong helped hire another fake employee called 'Peter Xiao,' who was really another defendant, as stated by Fortune report. Jong sent a video using a fake Malaysian driver's license to prove his fake identity to the company and gained more access. After stealing crypto, Jong said he 'accidentally dropped the private key' in a public file on Github, as a cover story. The stolen crypto was laundered using a crypto mixer called Tornado Cash, which hides the money's trail. Kang Tae Bok, another defendant, opened accounts with fake IDs to receive the mixed crypto funds. The FBI will soon release a new 'Wanted' poster for these defendants. Tornado Cash and Wang did not respond to requests for comments, as per the Fortune report. US Attorney Hertzberg said the case shows the danger North Korea poses by using fake remote workers and that the US will prosecute anyone stealing from American companies. FAQs Q1. How did North Korean hackers steal millions from US companies? They used fake identities and front companies to get remote jobs and stole money and cryptocurrency. Q2. What is the US doing to stop North Korean fraud schemes? The US government is arresting suspects, shutting down fake companies, and warning businesses to check remote workers carefully. Economic Times WhatsApp channel )

Who is ‘Robert'? Iran-linked hackers threaten to leak emails stolen from Trump aides, ex-porn star Stormy Daniels
Who is ‘Robert'? Iran-linked hackers threaten to leak emails stolen from Trump aides, ex-porn star Stormy Daniels

Hindustan Times

timean hour ago

  • Hindustan Times

Who is ‘Robert'? Iran-linked hackers threaten to leak emails stolen from Trump aides, ex-porn star Stormy Daniels

Hackers with ties to Iran have warned to release additional emails stolen from President Donald Trump's inner circle, including White House chief of staff Susie Wiles and Roger Stone, after releasing a previous batch to the media before the US presidential election in 2024. Donald Trump and Stormy Daniels The Cybersecurity and Infrastructure Security Agency took to X to describe the threats, which were first reported by Reuters, as a 'calculated smear campaign'. This comes as the Trump administration issued a report, warning that 'Iranian Cyber Actors' might target American companies and 'operators of critical infrastructure.' Three days back, Ayatollah Ali Khamenei, the Supreme Leader, asserted that US and Israeli attacks on Iran's nuclear facilities did not seriously harm the country's nuclear facilities, prompting Trump to announce he was stopping plans to possibly reduce sanctions on Iran. Who is Robert and what we know about Iran-linked hackers group In online chats on Sunday and Monday, hackers using the alias 'Robert' informed Reuters they had approximately 100 gigabytes of emails featuring Wiles, Stone, ex-porn star Stormy Daniels, Trump attorney Lindsey Halligan, and others. While they did not reveal the specifics of the content, they mentioned the possibility of selling the emails. In an indictment filed last September against three Iranians in the case of the 2024 Trump cyberattack, the Justice Department claimed that Iran's Islamic Revolutionary Guard Corps manage the hacking campaign 'Robert'. Also Read: Who is Dany De Andrade? World's hottest cop from Florida goes viral as she issues stern warning ahead of Fourth of July Here's what Cybersecurity and Infrastructure Security Agency said Meanwhile, CISA spokesperson Marci McCarthy reacted to Reuters report, stating that a "hostile foreign adversary" was 'threatening to illegally exploit purportedly stolen and unverified material in an effort to distract, discredit and divide.' According to McCarthy, the 'so-called cyber 'attack' is nothing more than digital propaganda and the targets are no coincidence' and its goal is to 'damage President Trump and discredit honorable public servants' who have distinguished themselves in the US. 'These criminals will be found and will be brought to justice,' he added. Meanwhile, US Attorney General Pam Bondi denounced the hacking as 'an unconscionable cyber-attack'. FBI Director Kash Patel said that anyone linked to any breach of national security would be thoroughly examined and executed to the greatest extent of the law, according to the White House and FBI. Is Iran a bigger threat than Russia to US? Iran emerged as a bigger threat during the 2024 presidential campaign than Russia, which is well-known for its potent propaganda operations and 2016 cyberattacks of significant US political parties, according to Sam Sabin of Axios. Microsoft discovered a number of Iranian entities that operated vigorous phishing and disinformation activities aimed at influencing the results of the 2024 US presidential election. Before the 12-day conflict between Israel and Iran, which ended with a ceasefire mediated by Trump following the U.S. military intervention, the hackers told Reuters they had no plans to launch any additional cyberattacks. 'I am retired, man,' the hackers claimed in May.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store