Muhlenberg County man sentenced to 5 years for child exploitation offense
HENDERSON, Ky. (WEHT) – Court officials say a Muhlenberg County man was sentenced on June 10 to five years in federal prison for distribution of child pornography.
According to court documents, James Matthew Rosenkranz, 41, was sentenced to five years in federal prison, followed by 10 years of supervised release, for one count of distribution of child pornography. There is no parole in the federal system. The case was investigated by the FBI Owensboro Resident Office.
Father of child that died after gunshot incident allegedly doesn't make court appearance
Officials say this case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. For more information about internet safety education, please visit this website.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
2 hours ago
- Forbes
DOJ Delays Tower Dumps Appeal As Digital Privacy Battle Intensifies
Cellular communications tower for mobile phone and video data transmission The Department of Justice , or DOJ, has requested more time to decide whether to appeal a landmark federal court ruling that found "tower dumps"—a widely used law enforcement surveillance method—unconstitutional. This delay highlights the growing conflict between police surveillance tactics and the courts' increasing scrutiny of digital privacy, as reported by Court Watch News The Mississippi Ruling That Sparked a National Debate In February 2025, U.S. Magistrate Judge Andrew Harris of the Southern District of Mississippi became the first federal judge to declare the use of tower dumps unconstitutional. The case stemmed from an FBI investigation into a violent gang suspected of a series of shootings and car thefts. Over fourteen months, federal agents sought four sealed search warrants to collect data from cellular towers at nine locations. Judge Harris denied the FBI's requests multiple times, even after the DOJ submitted clarifications and participated in a conference call to address his concerns. Harris wrote, "The Government is essentially asking the Court to allow it access to an entire haystack because it may contain a needle... The Fourth Amendment does not permit law enforcement to rummage through troves of data and themselves determine the existence of probable cause to support the seizure of that data." What Are Tower Dumps? Tower dumps are a powerful investigative tool. When a tower dump is requested, cellular carriers provide records of every device that connected to specific cell towers during a designated period. This data includes phone numbers, unique device identifiers, connection dates and times, duration of connections and the types of communications transmitted. The scale of these data collections can be enormous. In the "High Country Bandits" case from 2010, FBI agents investigating rural bank robberies obtained over 150,000 registered cell phone numbers from just four tower dumps. Only two of those numbers belonged to the actual suspects. In a more recent Massachusetts case, law enforcement obtained tower dump data covering tens of thousands of unique phone numbers to investigate a series of armed robberies. Legal Landscape: A Patchwork of Precedents The Mississippi ruling followed a significant decision by the Fifth Circuit Court of Appeals in August 2024, which found geofence warrants unconstitutional. Geofence warrants require companies like Google to provide location data for all devices in a specific area, casting a wide net to identify potential suspects. The Fifth Circuit's decision in United States v. Smith established that mass data collection techniques, which sweep up information about thousands of innocent people, are incompatible with the Fourth Amendment. Judge Harris's ruling extended this logic to tower dumps. Telecoms and the Scale of Surveillance Telecommunications companies, which process these massive data requests, have largely remained silent in the public debate. Internal documents and court filings reveal that major carriers have different data retention policies. AT&T retains call records, cell site, and tower dump data for seven years, while T-Mobile keeps similar information for only two years. The FBI's Cellular Analysis Survey Team, or CAST, supports thousands of investigations annually using tower dump analysis, with sophisticated tools for analyzing the vast datasets provided by telecoms. Privacy Advocates Sound the Alarm Privacy advocates argue that tower dumps represent a fundamental threat to constitutional protections. The American Civil Liberties Union and Electronic Frontier Foundation have warned that these surveillance techniques could be used to identify people at home in a neighborhood, protestors at a political rally, or congregants at a place of worship. Legal scholars emphasize that tower dumps amount to mass surveillance and allow police to obtain highly personal information about thousands of people unconnected to the offense under investigation. The DOJ's Legal Dilemma The DOJ's repeated requests for extensions highlight the stakes involved. After initially indicating in March that prosecutors would seek to "reverse or vacate" the Mississippi ruling, the DOJ's latest motion omits such language and simply requests more time to 'determine next steps'. This hesitation is notable, especially since tower dumps continue to be used by law enforcement agencies nationwide during the appeals process, including in high-profile investigations such as arson attacks against Tesla vehicles. The Prompt: Get the week's biggest AI news on the buzziest companies and boldest breakthroughs, in your Subscribed! You're Subscribed! What Comes Next? Legal experts predict that the conflicting circuit court decisions on digital surveillance warrants will likely force the Supreme Court to weigh in. The Court's 2018 decision in Carpenter v. United States, which required warrants for long-term cell phone location tracking, has already begun to reshape digital privacy law. The outcome of the current legal battle will have significant implications for both law enforcement capabilities and individual privacy rights. The Bigger Picture: Surveillance in the Digital Age The tower dumps controversy is part of a broader reckoning with law enforcement's digital surveillance capabilities. Beyond geofence warrants and tower dumps, agencies use other mass data collection techniques, such as reverse keyword searches and social media monitoring. These tools have become increasingly sophisticated and widespread. The FBI's training materials show that cellular analysis now supports investigations ranging from terrorism cases to routine criminal matters. What began as an emergency measure in rare cases has become a standard investigative tool used thousands of times each year. Internationally, other countries have taken a more restrictive approach. Canadian courts, for example, require warrants based on reasonable and probable grounds and mandate that tower dumps be conducted in ways that minimize privacy intrusions for subscribers. As the DOJ continues to deliberate, the legal and technological landscape is still evolving. The current patchwork of conflicting decisions creates uncertainty for law enforcement agencies and privacy advocates alike. The resolution of this issue will likely require clear guidance from higher courts about the constitutional limits of mass digital surveillance. Until then, the tension between effective law enforcement and privacy protections will continue to play out in courtrooms across the country, with far-reaching implications for the future of digital privacy in America.


Forbes
8 hours ago
- Forbes
FBI Warning Issued As 2FA Bypass Attacks Surge — Get Prepared
The FBI issues Scattered Spider attack warning. Update, June 29, 2025: This story, originally published on June 28, has been updated with expert comment from cybersecurity professionals regarding the Scattered Spider threat group referenced in the latest FBI 2fa-bypass attack warning. When the Federal Bureau of Investigation issues a cybersecurity alert, you would be well advised to pay attention and take action. Whether that's involving malicious SMS messages, AI-powered phishing attacks, or, as I recently reported, the skyrocketing number of ransomware threats. And ransomware is the subject of this latest, critical, warning from the FBI. This time involving the Scattered Spider threat group which has made headlines after taking responsibility for multiple retail sector attacks including that against Marks & Spencer in the U.K. which is estimated to have cost the high street chain at least $600 million. Now the group is targeting the airline industry, the FBI has warned, both directly and through the entire supply chain. Here's what you need to know. FBI Confirms Scattered Spider Attacks Targeting Transportation A June 26 report from ransomware analysts at Halcyon warned that there were 'indications that Scattered Spider is also now targeting the Food, Manufacturing, and Transportation (particularly Aviation) sectors in the US.' This has now been confirmed by the FBI which provided a statement to me by email that said: 'The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector.' The statement, also posted to X, fomrerly known as Twitter, continued to confirm that the ransomware group is using the same methods during this surge of attacks into new sectors, namely 'social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.' Specifically, Scattered Spider looks to bypass mutli-factor authentication, commonly referred to as MFA or 2FA, by using various methods to get those help desks to 'add unauthorized MFA devices to compromised accounts.' Scattered Spider has been on the FBI radar for a number of years, with a joint cybersecurity advisory alongside the Cybersecurity and Infrastructure Security Agency published in 2023 in response to what it described as 'activity by Scattered Spider threat actors against the commercial facilities sectors and subsectors.' The FBI told me that it is currently actively working with aviation and industry partners 'to address this activity and assist victims,' and urged anyone who thinks their organization may have been targeted to contact their local FBI office. In the meantime, beware of anyone asking for unauthorized 2FA devices to be added to accounts and follow established security processes and procedures to the letter, no matter what the person making the request may say. FBI Warned Of Aviation Attacks, But Insurance Sector Also Now Being Targeted By Scattered Spider Although the latest FBI warning focused on current attack threats targeting the transportation, and specifically aviation, sector and its supply chain, Scattered Spider has also expanded to include the insurance industry in its crosshairs. "Google Threat Intelligence Group is now aware of multiple intrusions in the US which bear all the hallmarks of Scattered Spider activity,' John Hultquist, the chief analyst with the Google Threat Intelligence Group, has said, 'we are now seeing incidents in the insurance industry.' Jon Abbott, CEO at ThreatAware, prudently advised that while 'the rising tide of attacks on US insurers' is a serious threat that should not be underestimated, it also represents 'a warning for other industries to stay vigilant.' Although the Scattered Spider group has historically leaned towards targeting one industry sector at a time, there is a danger that, as aviation is now in the spotlight, other organizations take their eye off the remaining peril in front of them. With one common denominator between many attacks being the exploitation of the supply chain, with such compromise enabling lateral movement onto bigger fish, this is evidence that businesses that might not consider themselves in the aviation, insurance or retail sectors are still at risk. Richard Orange, a vice president at Abnormal AI, reiterates what the FBI has said. 'This group relies on social engineering rather than technical exploits,' Orange said, 'and bypasses traditional security controls by manipulating people, such as posing as IT staff or trusted partners.' This can often appear like an isolated incident or breach, but Scattered Spider will move laterally, Orange concluded, 'harvesting credentials to deceive other departments, customers, and partners.'


Fox News
8 hours ago
- Fox News
2 arrested at LA home linked to Iranian 'human smuggling hub': CBP
Federal officials arrested two people on Friday at a Los Angeles house tied to a suspected Iranian human smuggling network said to have been "repeatedly used to harbor illegal entrants linked to terrorism." Customs and Border Protection (CBP) announced the arrests in an X post on Friday, saying that the operation was part of a broader national security effort involving multiple federal agencies. "CBP executed a federal search warrant today at a human smuggling hub in Los Angeles tied to national security threats," the agency said. "Two individuals were arrested during the operation, which was led by CBP's Special Response Team with support from Border Patrol tactical units and Air and Marine Operations." The detentions follow the arrests of seven Iranian nationals at the same location earlier last week, CBP said, adding that the suspects were on the FBI Terror Watchlist and connected to an Iranian human trafficking hub. "The location has been repeatedly used to harbor illegal entrants linked to terrorism," CBP said. Officials did not identify the two suspects taken into custody at the home on Friday. "Under @POTUS, CBP is taking aggressive action to shut down smuggling networks and remove national security threats before they can do harm," the agency said. CBP did not immediately respond to a request for more information from Fox News Digital.