
Kyrie Irving Donates $50K For Tamir Rice Youth Center
Source: David Berding / Getty
NBA star and activist Kyrie Irving has donated $50,000 to a fundraiser launched to support the creation of a youth center honoring the legacy of Tamir Rice.
Nearly a decade after 12-year-old Tamir Rice was killed by Cleveland police, his name continues to echo, not as a headline but rather a call to action. This week, NBA star point guard Kyrie Irving answered that call with a powerful donation of $50,000 to the Tamir Rice Foundation, bringing a grassroots fundraiser to over $85,000, a huge step closer to its $110,000 goal.
The campaign, launched on June 9 by Tamir's mother, Samaria Rice, was created to honor what would have been Tamir's 23rd birthday. The GoFundMe campaign was designed to help further develop a building she purchased in Cleveland as a space for youth enrichment, asking donors to give $23 in honor of the 23 years her son would have lived had he not been gunned down by police.
'I miss my son so much each and every day,' Samaria wrote on the fundraiser page. 'As our family approaches Tamir's 23rd birthday, I'm asking for 23 dollars for 23 years without him. I purchased a building in the city of Cleveland to give back to our inner-city youth with art and cultural developments.'
Tamir Rice was just 12 years old when he was tragically shot and killed by Cleveland police officer Timothy Loehmann while playing in a park with a toy gun in 2014. The killing sparked national outrage and became a heartbreaking symbol of police brutality against Black children.
Now, a little over a decade later, Samaria Rice is working to turn that pain into purpose through the Tamir Rice Foundation. Source: Andrew Burton / Getty
'I have already invested into this beautiful historical building with [all your] support,' Rice continued. 'The help you all already have given Tamir's legacy we are forever appreciative. We now have a new team to help us follow this through. I'm almost finished. I will not let my community down or anyone who believes in the vision. Trust me—you will see the results.'
Irving's donation, made on June 25, is the largest received to date, but it's not unusual for Irving, who's been putting his money where his mouth is for years. From standing in solidarity with Eric Garner's family by wearing an 'I Can't Breathe' shirt back in 2014, to supporting Indigenous communities, HBCUs, and social justice movements, giving back is who he is.
Kyrie Irving's latest act of generosity follows news that the New Jersey-bred point guard opted out of his previous deal and is expected to sign a three-year, $119 million contract extension with the Dallas Mavericks, a team he helped lead to the NBA Finals last season before falling to the Boston Celtics. The new deal will keep the point guard in Dallas for an additional three years when he can activate a player option for the 2027-28 season, according to sources. Irving is currently nursing an ACL injury suffered during the last NBA season.
Kyrie may be sidelined with an ACL injury, but clearly, the work hasn't stopped. And neither has Samaria Rice.
With just under $25,000 left to raise, this campaign is more than a fundraiser; it's a community call to action to honor Tamir by building something for the next generation that lasts, and thanks to Kyrie Irving, that vision is one step closer to becoming real. Source: Cleveland Police Department / Cleveland Police Department
SEE ALSO:
10 Years Later: Remembering Tamir Rice
Remembering Tamir Rice On His Birthday
SEE ALSO
Kyrie Irving Donates $50K For Tamir Rice Youth Center was originally published on newsone.com
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
35 minutes ago
- Yahoo
DOJ announces arrest, indictments in North Korean IT worker scheme
(Reuters) -The U.S. Department of Justice and FBI on Monday announced an arrest and indictments targeting North Korea's so-called 'IT worker' program, where North Koreans obtain remote IT-related positions at more than 100 U.S. companies, and use that access to steal money and information from a host of companies around the world. The North Korean workers used compromised identities of more than 80 U.S. citizens to obtain remote jobs at more than 100 U.S. companies and caused more than $3 million in legal fees, remediation and other costs, according to the DOJ. The North Koreans also allegedly stole at least $900,000 worth of cryptocurrency from one Georgia-based company with their access, along with employer data and source code, including International Traffic in Arms Regulations (ITAR) data, from a California-based defense contractor, the DOJ said. Monday's announcement included one arrest, two indictments, searches of more than two dozen U.S. locations hosting multiple laptops used by remote North Korean workers, and the seizure of financial accounts and websites used by the participants as part of the alleged scheme, according to a DOJ statement. The Permanent Mission of North Korea to the United Nations did not immediately respond to a request for comment. Zhenxing 'Danny' Wang and Kejia Wang, both U.S. citizens, were indicted as part of the operation, according to the DOJ. Zhenxing Wang was arrested in New Jersey, while Kejia Wang remains free, a DOJ spokesperson said in an email. An attorney for Zhenxing Wang could not be immediately located. The two men, along with four other unnamed U.S. 'facilitators,' assisted the North Koreans by procuring and operating laptops used by the overseas workers, created financial accounts to receive money earned by the workers to be sent back to North Korea, and created shell companies to make the workers appear more authentic, according to the DOJ, earning nearly $700,000 from the scheme for themselves. Federal prosecutors also indicted four Chinese nationals and two Taiwanese nationals for alleged roles in the operation.
Yahoo
4 hours ago
- Yahoo
North Korean operatives and American accomplices accused in massive fraud that infiltrated the Fortune 500 and stole millions
Authorities announced a new crackdown on a sprawling international fraud ring involving North Korean IT workers, naming more than a dozen defendants in two new indictments, including New Jersey man Zhenxing 'Danny' Wang. The indictment claims the scheme allegedly generated more than $5 million in illicit earnings and hundreds of thousands in fees for the U.S. conspirators. In a second indictment, four North Korean nationals have been charged with executing a sophisticated operation that generated nearly $1 million in stolen crypto. All told, law enforcement searched 29 suspected laptop farms across 16 states and seized 29 financial accounts allegedly used to launder money and digital assets. The Justice Department on Monday announced a significant crackdown on the North Korean IT workers fraud scheme, with two new indictments naming more than a dozen alleged conspirators accused of stealing millions from at least 100 companies in the past four years. According to the first major indictment from the District of Massachusetts, a crew of North Korean IT workers allegedly partnered with co-conspirators in New York, New Jersey, California, and overseas to steal the identities of more than 80 U.S. people, get remote jobs at more than 100 companies—many in the Fortune 500—and steal at least $5 million. According to the second indictment, a four-person team of North Korean IT workers allegedly traveled to the United Arab Emirates where they used stolen identities to pose as remote IT workers, get jobs at American companies for themselves and unnamed co-conspirators, and then systematically steal digital currency to fund North Korea's nuclear-weapons programs, authorities claimed in the five-count federal charging document. The indictments lay out in detail the way the IT worker scheme has leveled up from merely relying on fake and fabricated identities, to a complex web of American-led front companies. The front companies are founded by paid accomplices and make it appear as though the IT workers are affiliated with legitimate U.S. businesses. The front runners conceal the North Korean IT workers behind stolen American identities, and offer them U.S. addresses to take shipment of laptops sent out by companies for remote software jobs. The stolen revenue generated in the fraud scheme is allegedly transferred to North Korean leadership to help fund the authoritarian regime's weapons of mass destruction and ballistic-missile programs. 'North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,' Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division said in a statement. 'North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea's authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.' The authoritarian leadership of the Democratic People's Republic of Korea (DPRK) has deployed thousands of trained IT workers around the world to trick companies into hiring them for remote IT jobs, authorities said Monday. Once hired, the IT workers are tasked with making money and gathering intelligence to aid in cyber heists. Known colloquially as the 'North Korean IT worker scheme,' hundreds of Fortune 500 and smaller tech companies have been battling back a tsunami of fake would-be job seekers who are actually trained North Korean IT workers. The UN has estimated the scheme generates between $200 million to $600 million per year, not including the amount of crypto allegedly stolen in heists using intelligence gathered by the North Korean IT workers, which is in the billions. According to the indictment, New Jersey man Zhenxing 'Danny' Wang founded a software development company called Independent Lab as a front company in the scheme. Through Independent Lab, companies shipped laptops to Wang addressed to what the companies thought were hired IT workers, but in reality were people who had their identities stolen. Wang allegedly hosted the laptops at his home, known as a 'laptop farm,' and installed remote-access software so the North Korean workers could access them from overseas locations. Wang also took in money paid as compensation from the U.S. companies and allegedly transferred it to accounts controlled by the overseas conspirators. The indictment states multiple defendants and accomplices acted using front companies, including other unnamed conspirators in New York and California, plus an active-duty member of the U.S. military. The accomplices allegedly hosted laptop farms in their homes in exchange for hundreds of thousands of dollars in fees, authorities claimed. The fronts allegedly defrauded at least four major companies, causing each one at least $100,000 in damages and lost wages. One accomplice alleged to be Kejia Wang, allegedly knew the workers were acting on behalf of North Korea. In addition to Danny Wang, the government charged eight other defendants and claimed the fraud included a California-based defense contractor, from which an overseas actor allegedly stole sensitive documents related to U.S. military technology. Other companies impacted in the fraud scheme are located in California, Massachusetts, New York, New Jersey, Florida, New Mexico, Georgia, Maryland, North Carolina, Illinois, Ohio, South Carolina, Michigan, Texas, Indiana, Arkansas, Missouri, Tennessee, Minnesota, Rhode Island, Wisconsin, Oregon, Pennsylvania, Washington, Utah, Colorado, and the District of Columbia. Michael 'Barni' Barnhart, principal risk investigator at security firm DTEX, said the arrests announced this week serve as a reminder that the threats from DPRK IT workers extend beyond just generating revenue. 'Once inside, they can conduct malicious activity from within trusted networks, posing serious risks to national security and companies worldwide,' Barnhart told Fortune in a statement. 'DPRK actors are increasingly utilizing front companies and trusted third parties to slip past traditional hiring safeguards, including observed instances of those in sensitive sectors like government and the defense industrial base.' Barnhart suggests the arrests underscore the notion that companies have to look beyond the typical applicant portals and reassess their entire talent pipelines given the way the DPRK IT worker threat has adapted. 'These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime's illicit programs, including its weapons programs,' Assistant Attorney General for the Department's National Security Division John A. Eisenberg said in a statement. 'The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.' The second indictment outlines how the four-man delegation used a mix of stolen identities and aliases to get two North Korean IT workers developer jobs at an Atlanta, Georgia research and development tech firm, and at a separate virtual token company. Together, the duo stole crypto valued at nearly $1 million, the U.S. Attorney's Office for the Northern District of Georgia alleged in an indictment handed down last week. The two IT workers then brought in others to help them allegedly launder the currency so they could disguise its origins before sending the money home to North Korean leadership. As alleged in the second indictment, the scheme in this case began in October 2019 when four trained North Korean IT workers traveled to the United Arab Emirates using North Korean documents and set themselves up as a team. The crew methodically leveraged stolen identities blended with their own photos to pass muster as legitimate employees and gain access to sensitive information at the companies. The goal, according to the indictment, was to earn enough trust to get access to the virtual currencies the companies controlled so they could transfer them to the DPRK government, led by authoritarian dictator Kim Jong Un. Once up and running, in December 2020 defendant Kim Kwang Jim allegedly gave an unnamed company a fake Portuguese ID that included a photo of Kim with the victim's actual birthdate and government identification number. Kim allegedly used the stolen identity as an alias to get work developing source code at an unnamed U.S. company based in Atlanta. The indictment only names the stolen ID victim as 'P.S.' and does not name any company that allegedly hired a North Korean IT worker. In March 2022, Kim allegedly modified the source code at the company where he had been hired. His changes altered the code for two smart contracts the company owned and controlled that lived on the Ethereum and Polygon blockchains. Kim triggered rule changes dictating when currency could be withdrawn from the company-controlled funding pools. Then on March 29 and March 30, 2022, Kim allegedly took 4 million Elixir tokens, 229,051 Matic tokens, and 110,846 Start. All told, the virtual currencies were worth about $740,000 at the time of the theft, according to the indictment. Kim allegedly transferred the currency to another currency address he controlled. Authorities say Kim offered up a dog-ate-my-homework rationale to the founder to try to explain the currency transfer: 'hi bro, really sorry – these weird txs started happening after i refactored my github.' On March 30, the company founder sent a message on Telegram to Kim accusing him of stealing the virtual currency from the company's funding pools. Kim, using the Telegram account set up with the P.S. stolen identity, wrote back, 'How many times do I need to tell you??? I didn't do it!!! It's not me!!!' Another alleged incident outlined in the indictment began in May 2021. Authorities say defendant Jong Pong Ju allegedly used the alias 'Bryan Cho' to get a job at another unnamed company to provide IT services. After he was hired, Jong allegedly gained access to the company's virtual currency. Later that year, in October 2021, Jong allegedly used a Telegram account he had created using the 'Bryan Cho' alias to recommend to the company founder that 'Peter Xiao' would make a great developer. Authorities alleged Peter Xiao was actually another defendant, Chang Nam Il. The founder took Jong's recommendation and hired 'Peter Xiao' to work on front-end development. Chang, working as Peter Xiao, allegedly worked at the company from October 2021 until January 2022. In January 2022, the company founder asked for a video to verify the identity of 'Bryan Cho'—who was actually Jong, authorities allege—before giving Jong additional access to the company's crypto assets. On January 25, 2022, Jong allegedly used a Malaysian driver's license with the Bryan Cho alias to send a video to the founder over Telegram. The founder then allegedly gave Jong additional access. The following month, Jong took that access and allegedly stole virtual currency tokens valued at approximately 60 Ether (worth $175,680 at the time) by transferring it to another virtual currency address that Jong controlled. Jong then used the Bryan Cho Telegram account to message the company founder, 'I think I accidently (sic) dropped the private key into the .env sample file.' The founder then asked where the '.env file' was uploaded, and Jong—as Bryan Cho—told him, 'Github.' 'The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims' trust to steal hundreds of thousands of dollars,' U.S. Attorney Theodore S. Hertzberg said in a statement. 'This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.' That wasn't the end of it. From there, the North Korean IT workers allegedly needed to launder the stolen funds. Chang, Jong, Kim, and a fourth defendant Kang Tae Bok allegedly used additional aliases and a virtual currency mixer known as 'Tornado Cash' to launder the stolen assets. Tornado Cash is a crypto mixer that essentially blurs the trail of crypto transactions. Authorities allege Kang used the alias 'Wong Shao Onn' to open an account at an unnamed virtual currency exchange using a doctored Malaysian ID with his own photo. Similarly, Chang used a faked Malaysian ID to open an account using the alias 'Bong Chee Shen.' Jong, after he allegedly stole the 60 Ether, sent the currency to Tornado Cash for mixing, the indictment states. Kim allegedly sent his stolen tokens to Tornado Cash also. The mixed funds were then withdrawn into accounts controlled by Kang and Chang, using the Wong and Bong aliases. Tornado Cash did not respond to a request for comment. Attempts to reach Wang were unsuccessful. This story was originally featured on


Los Angeles Times
5 hours ago
- Los Angeles Times
Two brothers went missing three weeks ago. They were found dead along a California highway
Two brothers who went missing three weeks ago were found dead along a California highway last week, the victims of a traffic collision, according to authorities. On June 25 around 10:30 a.m., a California Department of Transportation employee found an overturned vehicle concealed in heavy brush in an embankment along State Route 166 near Old Sierra Madre Road, east of Santa Maria, according to a California Highway Patrol news release. CHP and emergency services responded to the scene and found a blue 1998 GMC Sierra 1/2-ton pickup truck, according to the release. Two adult men had died from the crash, authorities confirmed. The vehicle is linked to a missing person case by the San Luis Obispo County Sheriff's Office, the release states. CHP were deployed on June 18 along State Route 166 to find the missing people. 'We are deeply saddened to confirm that two individuals tragically lost their lives in a traffic crash. Our thoughts and heartfelt condolences are with their families and loved ones during this difficult time,' said CHP Acting Commander Sean Kelly in the release. The two men were 61-year-old James Fuller and his brother, Eric Fuller, 60, who left June 6 for a doctor's appointment in Santa Maria, according to SFGate. They were reported missing by friends. Fullers' friends and family confirmed that their loved ones were killed in the crash. 'For 21 long days we searched tirelessly. We hiked what we could, followed every lead, and even received a message from someone who said they saw the truck near a sharp turn,' according to a GoFundMe page. 'Still, without a pinpoint location, CHP was unable to search due to looking a few days prior with no luck. The wait, the helplessness, the pain — it's been devastating beyond words.' 'This is not the outcome any of us prayed for. Our hearts are broken. Rick and Eric were so deeply loved, and their loss leaves an unfillable space in our lives.'