Groundbreaking held for Cass County law enforcement memorial
The memorial will give people of Cass County a way to honor the lives of three deputies: James Holmes (January 22, 1866), James Copeland (January 22, 1866), and Kevin Mayse (June 13, 1995), who lost their lives in the line of duty.
Man convicted of killing Wyandotte County deputies sentenced
The project will give employees and members of the public a chance to purchase bricks honoring their loved ones who have served at the Cass County Sheriff's Office.
Donors will also be able to show their support for the memorial. The cost of the bricks will be used to help maintain this memorial project.
The Cass County Sheriff's Office Honor Guard is taking the lead in the project, along with the Sheriff's Auxiliary.
Download the FOX4 News app on iPhone and Android
'This memorial will be a great representation of how important our fallen deputies are to the Cass County Sheriff's Office. It will remind everyone who passes through here each day that these deputies made the ultimate sacrifice to Keep Cass County Safe,' Weber said.
.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
6 hours ago
- Forbes
FBI Warning To 10 Million Android Users — Disconnect Your Devices Now
Discconnect now, FBI warns 10 million Android users. Update, July 26, 2025: This story, originally published on July 25, has been updated with a statement from the researchers which initially disclosed and disrupted the BadBox 2.0 operation that the FBI and Google are tackling head-on. In March, I reported that one of the largest botnets of its kind ever detected had impacted over a million Android devices. That massive attack was known as BadBox, but it has now been eclipsed by BadBox 2.0, with at least 10 million Android devices infected. Google has taken action to protect users as best it can, as well as launching legal action against the attackers, and the FBI has urged impacted users to disconnect their devices from the internet. Here's what you need to know. The FBI, Google And Others Warn Of Android BadBox 2.0 Attacks The FBI cybersecurity alert, I-060525-PSA, could not have been clearer: ongoing attacks are targeting everything from streaming devices, digital picture frames, third-party aftermarket automobile infotainment systems and other assorted home smart devices. The devices, all low-cost and uncertified, mostly originating in China, allow attackers to access your home network and beyond by, the FBI warned, 'configuring the product with malicious software prior to the user's purchase.' It has also been noted, however, that mandatory 'software updates' during the installation process can also install a malicious backdoor. Point Wild's Threat Intelligence Lat61 Team reverse-engineered the BadBox 2 infection chain and, as a result, uncovered new indicators of compromise that have been shared with global Computer Emergency Response Teams, as well as law enforcement. 'This Android-based malware is pre-installed in the firmware of low-cost IoT devices, smart TVs, TV boxes, tablets, before they even leave the factory,' Kiran Gaikwad from the LAT61 team said, 'It silently turns them into residential proxy nodes for criminal operations like click fraud, credential stuffing, and covert command and control (C2) routing.' Google, meanwhile, confirmed in a July 17 statement that it had 'filed a lawsuit in New York federal court against the botnet's perpetrators.' Google also said that it has 'updated Google Play Protect, Android's built-in malware and unwanted software protection, to automatically block BadBox-associated apps.' Human Security Behind Initial BadBox 2.0 Disclosure And Disruption Human Security, whose Satori Threat Intelligence and Research Team originally both disclosed and disrupted the BadBox 2.0 threat campaign, said at the time that researchers believed 'several threat actor groups participated in BadBox 2.0, each contributing to parts of the underlying infrastructure or the fraud modules that monetize the infected devices, including programmatic ad fraud, click fraud, proxyjacking, and creating and operating a botnet across 222 countries and territories.' If nothing else, that provides some context to the scale of this campaign. Now, Stu Solomon, the Human Security CEO, has issued the following statement: 'We applaud Google's decisive action against the cybercriminals behind the BadBox 2.0 botnet our team uncovered. This takedown marks a significant step forward in the ongoing battle to secure the internet from sophisticated fraud operations that hijack devices, steal money, and exploit consumers without their knowledge. Human's mission is to protect the integrity of the digital ecosystem by disrupting cybercrime at scale, and this effort exemplifies the power of collective defense. We're proud to have been deeply involved in this operation, working in close partnership with Google, TrendMicro, and the Shadowserver Foundation. Their collaboration has been invaluable in helping us expose and dismantle this threat.' FBI Recommendations And Mitigations — Disconnect Your Devices Now The FBI has recommended that Android users should be on the lookout for a number of potential clues that your Chinese-manufactured smart device could be infected with BadBox 2.0 malware. When it comes to mitigation, the advice is straightforward: users should 'consider disconnecting suspicious devices from their networks,' the FBI said.

Boston Globe
20 hours ago
- Boston Globe
Judge rejects request to suppress Google search information from Cohasset man who allegedly killed, dismembered wife
Walshe pleaded not guilty to charges of murder, disinterring a body, and lying to investigators in connection with the Jan. 1, 2023 slaying of his wife, On New Year's Eve 2022, the couple hosted Ana Walshe's former employer at their house, who left around 1:30 a.m., officials have said. Advertisement The guest told investigators he had dinner with the couple and they shared champagne and wine, according to an affidavit. Brian and Ana Walshe were in a good mood and everyone enjoyed themselves, the guest said. By 4:50 a.m., authorities allege, Ana Walshe, 39, was dead, and the disturbing Google searches started. They included 'how to embalm a body,' '10 ways to dispose of a dead body if you really need to,' 'how to stop a body from decomposing,' and 'how long before a body starts to smell.' They were made between 4:55 a.m. and 5:47 a.m. on New Year's Day, prosecutors said. In court papers last month, Walshe's lawyers said he and his prior counsel, Tracy Miner, had reached an agreement on Jan. 6, 2023, allowing authorities to conduct 'a limited search' of Walshe's iPhone and his son's iPad. Advertisement Walshe's consent was necessary at the time because State Police hadn't obtained a warrant for the devices. Walshe's lawyers said the agreement covered 'all communications' between Dec. 25, 2022, and Jan. 6, 2023, the date the electronics were turned over. The sole exception was for communications between Walshe and his lawyer, the filing said. According to the memo, State Police began a forensic search of the devices on the night of Jan. 6, 2023, and continued into the early hours of Jan. 7. An investigator who conducted the work alerted colleagues on the evening of Jan. 7 to the Internet searches in question, which were later referenced in an affidavit for a search warrant, records show. But before a warrant was issued, the filing said, 'police willingly and knowingly violated the agreement by exceeding the agreed-upon scope by downloading and searching the entire content of' Walshe's phone, his son's laptop, and a third laptop with a cracked screen that he turned over. Prosecutors in court papers last month had urged a denial of Walshe's supression motion, arguing that 'discovery of the internet searches and location data from the iPhone and iPad was certain as a practical matter.' Over several days, prosecutors allege, Walshe dismembered his wife's body in the basement and discarded her clothes and other evidence in a dumpster at a liquor store near his mother's home in Swampscott. He also allegedly disposed her remains in dumpsters at apartment complexes in Abington and Brockton. Police also allegedly found blood in the basement of the couple's home. Advertisement Seven days after Ana Walshe's disappearance, police searched the dumpster near the home of Brian Walshe's mother. Inside, they found a COVID vaccination card for Ana Walshe, a Hermes watch, and clothing Ana Walshe was known to wear, according to prosecutors. Forensic testing showed her DNA on items found in the dumpster, prosecutors said. While Brian Walshe failed in his bid to get the Google searches suppressed, he did succeed in getting additional evidence tossed. On Friday, Freniere granted Walshe's request to suppress evidence gleaned from separate search warrants related to a 'GPS install on a 2013 Volkswagen Beetle' with Mass. plates, as well as 'Verizon Records of Cell Phone Number 617-939-8646 insofar it authorized ... location data obtained for December 30, 2022 and December 31, 2022,' records show. Walshe is currently held without bail, and his trial is scheduled to begin in October, records show. Travis Andersen can be reached at


Forbes
a day ago
- Forbes
FBI Warning To 10 Million Android Users — Disconnect From Internet Now
Discconnect now, FBI warns 10 million Android users. In March, I reported that one of the largest botnets of its kind ever detected had impacted over a million Android devices. That massive attack was known as BadBox, but it has now been eclipsed by BadBox 2.0, with at least 10 million Android devices infected. Google has taken action to protect users as best it can, as well as launching legal action against the attackers, and the FBI has urged impacted users to disconnect their devices from the internet. Here's what you need to know. The FBI, Google And Others Warn Of Android BadBox 2.0 Attacks The FBI cybersecurity alert, I-060525-PSA, could not have been clearer: ongoing attacks are targeting everything from streaming devices, digital picture frames, third-party aftermarket automobile infotainment systems and other assorted home smart devices. The devices, all low-cost and uncertified, mostly originating in China, allow attackers to access your home network and beyond by, the FBI warned, 'configuring the product with malicious software prior to the user's purchase.' It has also been noted, however, that mandatory 'software updates' during the installation process can also install a malicious backdoor. Point Wild's Threat Intelligence Lat61 Team reverse-engineered the BadBox 2 infection chain and, as a result, uncovered new indicators of compromise that have been shared with global Computer Emergency Response Teams, as well as law enforcement. 'This Android-based malware is pre-installed in the firmware of low-cost IoT devices, smart TVs, TV boxes, tablets, before they even leave the factory,' Kiran Gaikwad from the LAT61 team said, 'It silently turns them into residential proxy nodes for criminal operations like click fraud, credential stuffing, and covert command and control (C2) routing.' Google, meanwhile, confirmed in a July 17 statement that it had 'filed a lawsuit in New York federal court against the botnet's perpetrators.' Google also said that it has 'updated Google Play Protect, Android's built-in malware and unwanted software protection, to automatically block BadBox-associated apps.' FBI Recommendations And Mitigations — Disconnect Devices From The Internet Now The FBI has recommended that Android users should be on the lookout for a number of potential clues that your Chinese-manufactured smart device could be infected with BadBox 2.0 malware. When it comes to mitigation, the advice is straightforward: users should 'consider disconnecting suspicious devices from their networks,' the FBI said.