Fox Point day care child abuse charges; 2 sisters charged
Two women are facing multiple child abuse charges during their time working at the Nurturing Nook in Fox Point.
Warrants are out for their arrests for a total of 16 felony counts of child abuse.
Fox Point police said the Nurturing Nook has been cooperative with the investigation.
FOX POINT, Wis. - Two women are facing multiple child abuse charges while working at a day care center.
What we know
The accused are 25-year-old sisters Jakya Chandler and Jilnya Chandler(not pictured).
Warrants are out for their arrests for a total of 16 felony counts of child abuse, including:
Physical abuse of a child (reckless causation of bodily harm) - PTAC, as a party to a crime, sexual assault of a child/physical abuse of a child by a child care provider
Physical abuse of a child, repeated acts causing bodily harm - PTAC, as a party to a crime, sexual assault of a child/physical abuse of a child by a child care provider
The backstory
A 21-page criminal complaint says they started work at the Nurturing Nook in Fox Point in September 2024.
SIGN UP TODAY: Get daily headlines, breaking news emails from FOX6 News
It all started with one child and police say they learned there were many more victims. Investigators say the abuse happened in what's called the Teddies Classroom.
Many of the children were around 1-and-a-half years old.
Parents took their 1-year-old to the hospital, finding bruises on his neck, back, armpit, thigh and forehead. It led the Fox Point Police Department to review surveillance at the day care.
Prosecutors say footage revealed the two Milwaukee women abused at least eight children between mid-September and early-November.
FREE DOWNLOAD: Get breaking news alerts in the FOX LOCAL Mobile app for iOS or Android
The criminal complaint states they pinched some of the children's ears, pulled their arms, hit and kicked them. They also allegedly called the kids "ugly" and "disgusting" and told them to "shut up" when they cried for their mothers.
Parents reported changes in their children crying at drop-off and waking up and screaming in the middle of the night.
When Fox Point police interviewed one of the women, they said she denied hurting or yelling at the children.
Fox Point police said the Nurturing Nook has been cooperative with the investigation. Investigators did not observe any other instances of abuse occurring outside the two suspects identified.
What they're saying
"We just became aware of the additional charges filed against two former employees. We appreciate law enforcement for their work on this case and we will continue to cooperate fully with them on this matter. The actions by the two former staff members do not align with Nurturing Nook's standards of care and commitment to child safety. Any additional questions regarding the investigation should be directed to local authorities."
The Source
Information in this report is from the Fox Point Police Department, Milwaukee County District Attorney's Office and Wisconsin Circuit Court.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Tom's Guide
20 hours ago
- Tom's Guide
Catwatchful child monitoring app is actually spyware that leaked user data online — how to stay safe
Catwatchful is an app that claims to be a 'child monitoring app' but is, in actuality, a spyware app that acts invisibly on phones to send a victim's data back to a dashboard viewable by the person who downloaded it. Also called 'stalkerware' this app experienced a data breach via a security flaw that exposed both the email addresses and passwords of thousands of customers – and the phone data of thousands of victims. Security researcher Eric Daigle reported in a blog post that a vulnerability revealed the spyware app's full database of email addresses and plaintext passwords for more than 62,000 customers and phone data from 26,000 victims. Additionally, as reported by TechCrunch, the administrator of the Catwatchful operator was also exposed in the breach. The compromised devices were from (in order of victim numbers) Mexico, Colombia, India, Peru and Argentina among others. The Catwatchful app uploads a victim's phone contents to a dashboard, which is viewable by the person who secretly installed the app, which includes a concerning amount of data such as photos, messages, access to front and rear cameras, microphone access and real time location data. This presents an obvious security risk to the victim – stalkerware and spyware apps are non-consensual surveillance apps that are frequently used against domestic and romantic partners in ways that violate laws which is exactly why these types of apps are banned and need to be downloaded by someone who has direct physical access to the phone. Catwatchful is not the first spyware app to suffer a data breach; according to TechCrunch, it's at least the fifth this year – a clear indication that consumer grade spyware offerings are spreading more widely even though what they are offering is 'shoddy codding and security failings that expose both paying customers and unsuspecting victims to data breaches.' Get instant access to breaking news, the hottest reviews, great deals and helpful tips. According to Daigle, the Catwatchful API was unauthenticated which is what allowed anyone on the open internet to interact with the user database without a login; the whole database of email addresses and passwords were exposed. While the API was briefly taken down, it was then back up again. Google is apparently investigating the Firebase involvement but has added protections that enable Google Play Protect to alert users when it detects Catwatchful spyware or its installer on a user's phone. Catwatchful claims it cannot be uninstalled, however, there are still things that can be done. First, as with any spyware or stalkerware, have a safety plan in place. Disabling this type of software can potentially alert the person who installed it in the first place, so always protect yourself first. If you're looking for additional resources, you might want to contact the Coalition Against Stalkerware. Android users who suspect they have Catwatchful installed can dial 543210 on their device's keypad and hit call. If its installed, it should appear on the screen - this code is a backdoor feature to regain access to the settings once the app has been hidden but it also shows if the app is installed, so if you use it you may also ping the person who installed it. Next steps: Make sure Google Play Protect is enabled, and check the permissions sections of your phone. If you don't recognize the apps that have permissions that should be a clear warning sign, particularly accessibility services. Check your Android device's app list and remove anything you didn't approve or don't recognize. Also make sure you have a lock screen enabled and protect your accounts using two-factor authentication whenever possible to prevent anyone from accessing them easily. For added security, the best Android antivirus apps can help provide you with additional protection like a VPN and identity theft protection. Spyware and stalkerware are very real threats that need to be taken extra seriously as they typically aren't installed on your phone by hackers but by someone you know. This breach is certainly concerning for those affected by it but it also serves as a wakeup call and a reminder of the threat posed by these types of apps.
Yahoo
20 hours ago
- Yahoo
KCK suspect arrested, charged after man found dead in parking lot
KANSAS CITY, Kan. — A 31-year-old man has been arrested and charged after another man was found dead in a Kansas City, Kansas, parking lot this week. Jamahal Fountain was arrested Monday afternoon, according to the Kansas City, Kansas Police Department (KCKPD). He has been charged by the Wyandotte County District Attorney with second-degree murder. 'Ted Lasso' to film in Blue Springs this summer According to KCKPD, officers near Nebraska Avenue and North 7th Street Trafficway in downtown KCK on Monday morning. When police arrived, they confirmed that Nabors suffered some sort of head trauma. He was pronounced dead at the scene. What led up to the incident is currently unclear. Both the suspect and victim were homeless, according to police. Fountain is being held in the Wyandotte County Jail on a $300,000 bond. Download the FOX4 News app on iPhone and Android KCKPD said the incident is still under investigation and has been classified as a homicide. Anyone with information is asked to contact the TIPS Hotline at (816) 474-8477. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.


TechCrunch
2 days ago
- TechCrunch
Data breach reveals Catwatchful ‘stalkerware' is spying on thousands of phones
A security vulnerability in a stealthy Android spyware operation called Catwatchful has exposed thousands of its customers, including its administrator. The bug, which was discovered by security researcher Eric Daigle, spilled the spyware app's full database of email addresses and plaintext passwords that Catwatchful customers use to access the data stolen from the phones of their victims. Catwatchful is spyware masquerading as a child monitoring app that claims to be 'invisible and cannot be detected,' all the while uploading the victim's phone's private contents to a dashboard viewable by the person who planted the app. The stolen data includes the victims' photos, messages, and real-time location data. The app can also remotely tap into the live ambient audio from the phone's microphone and access both front and rear phone cameras. Spyware apps like Catwatchful are banned from the app stores and rely on being downloaded and planted by someone with physical access to a person's phone. As such, these apps are commonly referred to as 'stalkerware' (or spouseware) for their propensity to facilitate non-consensual surveillance of spouses and romantic partners, which is illegal. Catwatchful is the latest example in a growing list of stalkerware operations that have been hacked, breached, or otherwise exposed the data they obtain, and is at least the fifth spyware operation this year to have experienced a data spill. The incident shows that consumer-grade spyware continues to proliferate, despite being prone to shoddy coding and security failings that expose both paying customers and unsuspecting victims to data breaches. According to a copy of the database from early June, which TechCrunch has seen, Catwatchful had email addresses and passwords on more than 62,000 customers and the phone data from 26,000 victims' devices. Most of the compromised devices were located in Mexico, Colombia, India, Peru, Argentina, Ecuador, and Bolivia (in order of the number of victims). Some of the records date back to 2018, the data shows. The Catwatchful database also revealed the identity of the spyware operation's administrator, Omar Soca Charcov, a developer based in Uruguay. Charcov opened our emails, but did not respond to our requests for comment sent in both English and Spanish. TechCrunch asked if he was aware of the Catwatchful data breach, and if he plans to disclose the incident to its customers. Without any clear indication that Charcov will disclose the incident, TechCrunch provided a copy of the Catwatchful database to data breach notification service Have I Been Pwned. Catwatchful hosting spyware data on Google's servers Daigle, a security researcher in Canada who has previously investigated stalkerware abuses, detailed his findings in a blog post. According to Daigle, Catwatchful uses a custom-made API, which every one of the planted Android apps relies on to communicate with and send data to Catwatchful's servers. The spyware also uses Google's Firebase, a web and mobile development platform, to host and store the victim's stolen phone data, including their photos and ambient audio recordings. Daigle told TechCrunch that the API was unauthenticated, allowing anyone on the internet to interact with the Catwatchful user database without needing a login, which exposed the entire Catwatchful database of customer email addresses and passwords. When contacted by TechCrunch, the web company hosting the Catwatchful API suspended the spyware developer's account, briefly blocking the spyware from operating, but the API returned later on HostGator. A spokesperson for HostGator, Kristen Andrews, did not respond to requests for comment regarding the company hosting the spyware's operations. TechCrunch confirmed that Catwatchful uses Firebase by downloading and installing the Catwatchful spyware on a virtualized Android device, which allows us to run the spyware in an isolated sandbox without giving it any real-world data, like our location. We examined the network traffic flowing in and out of the device, which showed data from the phone uploading to a specific Firebase instance used by Catwatchful to host the victim's stolen data. After TechCrunch provided Google with copies of the Catwatchful malware, Google said it added new protections for Google Play Protect, a security tool that scans Android phones for malicious apps, like spyware. Now, Google Play Protect will alert users when it detects the Catwatchful spyware or its installer on a user's phone. TechCrunch also provided Google with details of the Firebase instance involved in storing data for the Catwatchful operation. Asked whether the stalkerware operation violates Firebase's terms of service, Google told TechCrunch on June 25 that it was investigating but would not immediately commit to taking down the operation. 'All apps using Firebase products must abide by our terms of service and policies. We are investigating this particular issue, and if we find that an app is in violation, appropriate action will be taken. Android users that attempt to install these apps are protected by Google Play Protect,' said Ed Fernandez, a spokesperson for Google. As of publication, Catwatchful remains hosted on Firebase. Opsec mistake exposes spyware administrator Like many spyware operations, Catwatchful does not publicly list its owner or disclose who runs the operation. It's not uncommon for stalkerware and spyware operators to hide their real identities, given the legal and reputational risks associated with facilitating illegal surveillance. But an operational security mishap in the dataset exposed Charcov as the operation's administrator. A review of the Catwatchful database lists Charcov as the first record in one of the files in the dataset. (In past spyware-related data breaches, some operators have been identified by early records in the database, as oftentimes the developers are testing the spyware product on their own devices.) The dataset included Charcov's full name, phone number, and the web address of the specific Firebase instance where Catwatchful's database is stored on Google's servers. Charcov's personal email address, found in the dataset, is the same email that he lists on his LinkedIn page, which has since been set to private. Charcov also configured his Catwatchful administrator's email address as the password recovery address on his personal email account in the event he gets locked out, which directly links Charcov to the Catwatchful operation. How to remove Catwatchful spyware While Catwatchful claims it 'cannot be uninstalled,' there are ways to detect and remove the app from an affected device. Before you start, it's important to have a safety plan in place, as disabling spyware can alert the person who planted it. The Coalition Against Stalkerware does important work in this space and has resources to help victims and survivors. Android users can detect Catwatchful, even if it is hidden from view, by dialing 543210 into your Android phone app's keypad and then hitting the call button. If Catwatchful is installed, the app should appear on your screen. This code is a built-in backdoor feature that allows whoever planted the app to regain access to the settings once the app is hidden. This code can also be used by anyone to see if the app is installed. Image Credits:TechCrunch Image Credits:TechCrunch As for removing the app, TechCrunch has a general how-to guide for removing Android spyware that can help you identify and remove common types of phone stalkerware, and then enable the various settings you need to secure your Android device. — If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware has resources if you think your phone has been compromised by spyware.