logo
Texts, web search tie Zanesville woman to Christmas murder of father-in-law

Texts, web search tie Zanesville woman to Christmas murder of father-in-law

Yahoo01-03-2025
COLUMBUS, Ohio (WCMH) – A Muskingum County woman could spend the rest of her life in prison after pleading guilty to killing her father-in-law on Christmas Day.
According to the Muskingum County Prosecutor's Office, Brittany Cole of Zanesville pleaded guilty to the murder and abuse of corpse of her father-in-law, David Cole Sr., who was found in a shed behind a home on Somers Street in Zanesville.
On Jan. 8, Zanesville police received a 911 call reporting a body behind the Cole residence, and officers found Cole Sr.'s body wrapped in a tarp and plastic mattress cover.
Fort Rapids waterpark may finally be sold after legal hurdle cleared
Initially an autopsy revealed that Cole Sr. died of natural causes related to heart disease or Parkinson's, but further investigation determined Brittany Cole's role in the cause of the death.
Detectives collected digital evidence, texts between Brittany Cole and her husband, David Cole Jr., prompting a more intensive investigation. Nearly three weeks after Cole Sr.'s death, Brittany Cole confessed to killing him during an interview on Jan. 13.
The prosecutor's office said that Brittany Cole gave Cole Sr. multiple Tylenol No. 3 with codeine tablets and a 'significant' amount of ZzzQuil on Dec. 24. When Cole Sr. complained of pain at 11 p.m. that night, she gave him additional doses of both medications, knowing it would be fatal.
Brittany Cole said she discovered Cole Sr. was dead on Christmas morning and instructed family members to say he had moved to Cincinnati. She told police the family then went on vacation to Orlando, Florida, returning on Jan. 1, leaving Cole Sr.'s body in the bedroom.
One week later, Cole Jr. and his son found Cole Sr. in the bedroom. Texts between Cole Jr. and Brittany Cole revealed plans to conceal and move the decomposing body. Evidence of an Amazon order for a mattress cover was discovered by detectives.
Additionally, Social Security payments in the amount of $2,300 per month were deposited into a Park National Bank account, managed by Cole Jr. After Cole Sr.'s death, the couple continued to deposit the funds, with Cole Jr. sending Brittany Cole her $200 in December and January via CashApp for the water bill, while using the remaining funds for household items.
Evidence collected also included camera footage of Cole Jr. finding the body, text messages about the smell and disposal plans, as well as a Google search by Brittany Cole entitled, 'when someone dies how long does it take for the body to start smelling.'
On Wednesday, Brittany Cole was sentenced to life in prison with the possibility of parole after 16 years.
Cole Jr., 44, was arrested on Feb. 20 and charged with two counts of tampering with evidence, processing criminal tools, abuse of a corpse, obstructing official business and endangering children. He has yet to face a judge in Muskingum County Court of Common Pleas.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

'That's a First:' Police Officer Pulls Over Man. Then She Asks if He Has IDs in Other States
'That's a First:' Police Officer Pulls Over Man. Then She Asks if He Has IDs in Other States

Motor 1

time12 hours ago

  • Motor 1

'That's a First:' Police Officer Pulls Over Man. Then She Asks if He Has IDs in Other States

A TikTok user said a routine traffic stop turned into a disturbing and surreal experience involving a request for his Social Security number—and an alleged ICE flag despite him being a U.S. citizen. TikTok user Jacob (@jac0gfitness) detailed the 'Crazy fun experience' in a viral video posted on June 22. In the video, Jacob explains he was driving when he saw a police car make an abrupt U-turn and turn on its flashing lights. At first, everything went fairly normally for a traffic stop. Jacob parked in a bank parking lot and greeted the officer, who told him she was stopping him for an expired inspection sticker. He gave her his ID and waited as she went back to her cruiser and checked it. Routine Traffic Stop Takes a U-Turn Then things took a turn. After a few minutes, Jacob says the officer returned and asked if he has any IDs in any other states. He confirmed that he did and listed the other states where he's had an ID issued. 'I'm like, it must be a clerical issue or something,' he says. That is, until the officer returns and asks him for his Social Security number. 'She's like, 'OK, can I get your Social Security number?'' he recalls. 'I've never had them ask for my Social Security number at any traffic stop, ever.' A few minutes later, the officer returned and gave Jacob some startling news. 'She's like, 'Yeah, I'm not pulling you up in any of our systems in any state you said you had a license in,'' Jacob says. 'She's like, 'I had to call my sergeant.'' The sergeant arrived on the scene shortly thereafter and asked Jacob the same series of questions. He says he ended up being held for about 20 minutes before the sergeant told him it was 'squared away' and he was good to go. Jacob Has ICE to Thank For This? Jacob couldn't believe that's how the interaction was going to end. 'Basically, you guys told me you have no idea who I am or what I am, yet I gave you my license,' he says. 'You asked for my Social Security number. That's never happened before.' Jacob says, '[The sergeant is] like, 'Well, in all honesty, you can thank ICE for this one.' I was like, 'What?' He's like, 'You know, your name.' Because I have a Hispanic last name, I'm flagged in ICE? He's like, 'Well, you're not just flagged; you're kind of removed from everything.'' He continues, 'So I almost got arrested because of a system with ICE flagging a U.S.-born citizen, who spent my entire life in this country since the day I was born, and yet I got flagged. And the kicker is, my last name isn't even Mexican—it's Spanish.' Jacob says the officer said it might keep happening. 'I've been profiled. Good times. Stay ICE-y,' he says to conclude the video. It remains unclear why Jacob's license didn't appear in the state systems. He suggested it may have been a clerical error. Additionally, it's unclear what the sergeant meant by Jacob being 'removed from everything,' as law enforcement databases aren't typically cleared. Motor1 couldn't independently verify the officer's comments. Can Police Ask for Your Social Security Number at a Traffic Stop? The crackdown on immigrants by the Trump administration via ICE is a major topic of conversation in the US, as stories like Jacob's flood social media. Immigrants' rights groups advise drivers against answering questions about their immigration status or country of origin. If the police start to act more aggressively than they would at a normal traffic stop, take advantage of your right to remain silent and ask for a lawyer. Brooklyn lawyer Ronald Cook discussed a similar situation on a legal advice message board last year. In the post , the person seeking advice said they were pulled over due to a bad inspection sticker, and the police asked for their Social Security number. The lawyer said that while it's not common for local police to ask for your Social Security number during a routine traffic stop, it's not necessarily prohibited by law. Cook wrote, 'While police officers can ask for your SSN during a traffic stop, it is not a common practice for minor offenses, and you have the right to question and understand the necessity of such a request. Always ensure your interactions with law enforcement are conducted in a manner that protects your personal information and legal rights.' Motor1 reached out to Jacob via TikTok comment and direct message for comment. Now Trending 'Works Every Time:' Woman Gets Pulled Over by a Cop. Then She Turns on Country Music 'It's an Added-In Feature, I Swear:' What Is the 'Toyota Camry Dent' and Why Is It Everywhere? Get the best news, reviews, columns, and more delivered straight to your inbox, daily. back Sign up For more information, read our Privacy Policy and Terms of Use . Share this Story Facebook X LinkedIn Flipboard Reddit WhatsApp E-Mail Got a tip for us? Email: tips@ Join the conversation ( )

Revealed: Chilling step-by-step account of Bryan Kohberger's blood-lust murders of 4 Idaho students
Revealed: Chilling step-by-step account of Bryan Kohberger's blood-lust murders of 4 Idaho students

New York Post

time14 hours ago

  • New York Post

Revealed: Chilling step-by-step account of Bryan Kohberger's blood-lust murders of 4 Idaho students

Bryan Kohberger's first two victims were sleeping when he stole into the off-campus house in Moscow, Idaho around 4 a.m. Nov. 13, 2022. Best friends Maddy Mogen and Kaylee Goncalves were in bed together as he butchered them with a Ka-Bar knife he had bought months earlier on Amazon, prosecutors revealed Wednesday. Prosecuting Attorney Bill Thompson choked up as he summarized the details that a weeks-long trial would have revealed about the cold-blooded and ruthless blood-lust murders that Kohberger admitted to on Wednesday. Advertisement His guilty plea — which has divided the victims' families, including the Mogens and the Goncalveses — means Thompson's run-down of the evidence may be the best picture the world ever gets of what happened inside that home near the University of Idaho campus. Thompson suggested that Kohberger may have been plotting the senseless quadruple homicide for nearly six months. 'He killed — intentionally, willfully, deliberately, with premeditation, and with malice and forethought — Maddy Mogen, Kaylee Goncalves, Ethan Chapin, and Xana Kernodle,' prosecutor Thompson told a Boise courtroom Wednesday before Kohberger, 30, formally submitted his guilty plea. 6 Bryan Kohberger, 30, pleaded guilty for four counts of first degree homicide in a Boise courtroom Wednesday. AP Advertisement Kohberger's deal means he'll be safe from execution by firing squad — on the table if he were found guilty at a trial which was scheduled for August — but he will spend his life in prison serving four consecutive life terms without the possibility of parole. The shocking confession comes as the prosecution amassed piles of damning evidence that pointed directly at Kohberger, which Thompson laid out in bare detail ahead of the plea Wednesday. It all started in March 2022, when Kohberger was living at his parents' Pennsylvania home and logged onto to buy a military-grade Ka Bar knife and sheath — the same blade he would go on to hack his victims to death with eight months later. Advertisement He then moved to Pullman, Washington — located minutes from the Moscow, Idaho, murder site — in June to pursue a PhD in criminology at Washington State University. By early July, six months before the murders, Kohberger's phone began pinging off the cell tower that served the house — but only during odd hours of the night. 6 The University of Idaho victims (clockwise from bottom left): Kaylee Goncalves, 21, Madison Mogen, 21, Ethan Chapin, 20, and Xana Kernodle, 20. Between July and the night of the November murders, Kohberger's phone pinged off that tower 23 times between the hours of 10 p.m. and 4 a.m., prosecutors said, adding that there was no evidence he ever had any direct contact with his victims during that time. Advertisement But on the day of the killing Kohberger's phone was powered off in Pullman around 2 a.m. before being turned back in the Moscow area just before 5 a.m. — disappearing from the cellular grid at the exact time he was hacking his victims to death. During that blackout window he drove his White Hyundai from his Pullman apartment and parked it behind the victims' Moscow house, prosecutors said. Evidence like security footage clearly showed the vehicle. Wearing a dark face mask he slipped into the home using the kitchen's sliding door around 4 a.m. He then climbed to the home's third floor where he used his seven-inch Ka Bar blade to butcher Mogen and Goncalves — both 21-year-old college seniors — as they slept alongside each other. There he left the knife's sheath. It had his DNA on it, which would later ensure his downfall. 6 Prosecutor Bill Thompson nearly broke down in tears as he read the names of Kohberger's victims in court. August Frank/Tribune Kohberger then stole out of the room when he encountered 20-year-old Kernodle on the stairs. She had been awake after picking up a food delivery, and he cut her down and left her dying where she stood. 'Her room was not on the third floor, it was on the second floor,' Thompson said, his voice shaking. 'He encountered Xana, and he ended up killing her, also with a large knife.' Kohberger then moved into her bedroom where her boyfriend — 20-year-old Chapin — was sleeping, and butchered him. Advertisement 'We will not represent that he intended to commit all of the murders that he did that night, but we know that that is what resulted,' Thompson said. 6 Kohberger dodged the death penalty with his guilty plea, but will spend his life in prison no possibility of parole. AP As Kohberger was leaving the house one of the two housemates who were left alive and untouched peered into a hallway and saw a man with 'bushy eyebrows' exiting the home. From there a neighbor's security footage showed Kohberger's car peeling out of the neighborhood, and cell records indicate he was back home in Pullman around 5:30 a.m. He then drove back to his victims' home around 9 a.m., cell records show, but by 9:30 a.m. he was back home and taking a bizarre photo of himself flashing a thumbs up in his apartment bathroom. Advertisement From there, he began desperately trying to cover his tracks. Over the next days he took a trip to Lewiston, Idaho — a town prosecutors noted was filled with rivers and fast-moving water. They believe that's where he dumped the murder weapon, which was never found. He also began searching online for another knife and sheath, and tried in vain to delete his purchase history on Amazon. He also changed his car's registration from Pennsylvania to Idaho in an apparent attempt to throw investigators off his trail, Thompson said. Advertisement Then he carried on with his life. 'Mr. Kohberger proceeded to finish his semester of studies at Washington State University and return to Pennsylvanian for the holidays,' Thompson said. 6 Kohberger parked his car outside of the Moscow, Idaho, home during the murders, and was seen peeling out after. Kevin C. Downs for NY Post But in the weeks following, investigators began to identify him as a suspect. Advertisement After searching his parents' trash, were able to pull DNA off a Q-Tip that tests proved was was related to the DNA was found on the sheath left by Mogen's bloodied body. Kohberger was arrested soon after, and the full scope of his attempts to hide his crimes became apparent as they began to search his home and belongings. 'Spartan would be a kind characterization, there was virtually nothing there,' Thompson said of Kohberger's Pullman apartment. And his car had been 'pretty much disassembled internally,' Thompson added, characterizing it as being scrubbed absurdly clean. 6 AP 'I think we can all look to our own cars. Those compartments in the doors where you try to keep them clean where you put stuff? There's always some degree of crud in there – they were spotless,' Thompson said. 'Defendant's car had been meticulously cleaned inside.' Prosecutors said evidence indicated Kohberger had even called on his criminology studies to cover up the crime, explaining he had recently written a paper on crime scene analysis. 'That was part of the defendant's plan in covering up this. The defendant has studied crime. In fact, he did a detailed paper on crime scene processing when he was working on his pre-doctorate degree,' Thompson said. 'He had that knowledge and skill,' he added. Despite the laundry list of evidence, it still remains unclear why Kohberger carried out the killings — and his guilty plea means the world may never know as has no legal obligation to provide a motive. His sentencing is set for July 23. Kohberger will have an opportunity to speak after listening to victim impact statements, though it is unclear if he will say anything.

Amazon Prime Day Security Warning — 120,000 Fake Amazon Websites Found
Amazon Prime Day Security Warning — 120,000 Fake Amazon Websites Found

Forbes

timea day ago

  • Forbes

Amazon Prime Day Security Warning — 120,000 Fake Amazon Websites Found

Beware fake Amazon sites this Prime day. As millions of online shoppers eagerly await the start of Amazon Prime Day, now less than a week away, with sales scheduled to begin on July 8, security researchers have dropped a warning bombshell: the discovery of 120,000 fake Amazon websites waiting to trap users and steal their money. Comprised mostly of phishing, but also malware, threats, the domains in question have been created by cybercriminals seeking to benefit from the high media profile of Prime Day and the anticipated flood of consumers eager to grab a bargain. How do we know that's the aim? These domains were all created within the last two months in the run-up to Amazon Prime Day, a massive magnet for hackers around the globe. Here's what Amazon is doing to protect you and what you can do to protect yourself. The Amazon Prime Day Threat Everyone and their auntie Ethel knows that cybercriminals will follow the money trail, and follow the crowd that leads them there. Attacks against Gmail users are evidence of this, as access to a Google account opens the doors to a world of data and financial riches. The crowd will be heading to the annual phenomenon that is Amazon Prime Day between July 8 and July 11. I have already warned that scammers and hackers would already be making their nefarious plans, off the back of an 80% increase in attacks between 2023 and 2024. Now, security researchers at NordVPN have uncovered thousands of new fake Amazon websites. Using data accumulated through NordVPN's Threat Protection Pro platform, Vilius Kardelis from Nord Security confirmed that 'cybercriminals have set up over 120,000 malware, phishing, and scam websites impersonating Amazon in the last two months.' The security researchers have seen 92,000 phishing sites with an Amazon name, with 21,000 fake Amazon websites attempting to install malware. 11,000 sites selling fake goods were also blocked. I have approached Amazon for a statement. "Scammers know that shoppers' excitement and urgency around limited-time deals make them more susceptible to clicking on malicious links or sharing personal information without proper verification,' Marijus Briedis, chief technology officer at NordVPN, said. 'People should maintain good cyber hygiene even when looking for the best deals.' Amazon Prime Day Scams Protection Advice I was recently targeted ahead of Amazon Prime Day by scammers trying to get my Amazon login credentials, an incident that started and ended with a phone call. Dear reader, I was rather rude and then hung up. 'Impersonation scams via phone calls,' an Amazon spokesperson told me, 'more than doubled during Prime Day.' This shows that it's not just fake websites that you need to worry about. The good news is that Amazon has you covered. Here's how, according to an Amazon spokesperson: You can find out more about how Amazon protects customers from scams and the best way to report an incident here. 'Always shop directly through Amazon's official website to protect yourself from Amazon Prime Day scams,' Marijus Briedis said, adding that 'fundamentals of cybersecurity can sometimes be forgotten during major online shopping events.' For example, not clicking on links in unsolicited emails, even if they are branded to appear to come from Amazon itself. 'When in doubt, log into your Amazon account or contact customer support through official channels to verify suspicious communications,' Breidis concluded.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store