
Man who opened fire outside a Michigan church had attended services there with his mom, pastor says
Brian Anthony Browning's mother attended the CrossPointe Community Church in Wayne in spurts but was not a regular member, Pastor Bobby Kelly said. She was not there Sunday, said Kelly, who recalled meeting her son late last year.
'He first came when his mother invited him, and I met him,' Kelly said. 'He seemed to really have some thoughts that were not threatening or anything like that, but he definitely had some thoughts as far as hearing from God.'
Children from the church's vacation Bible school were leading Sunday's worship and were just finishing up their last song when the congregation heard gunfire outside. Kelly, who was about to start his sermon, initially thought the noise was a jackhammer or a problem with the sound system.
'The third time is when we knew something was going on, because it was very close, and then one of our security team members came into the sanctuary doors from the lobby and told everyone to get out,' he said.
A livestream video shows people carrying children or directing them to get down and move away.
'C'mon, everybody to the back,' a woman calls out. The woman, who was initially crouching between two rows of seats, stands and waves an arm. 'Please, everyone come to the back!'
People, some of them ducking their heads, rush out as others can be heard yelling 'Go!' and 'Come on!'
A loud crack is heard and people cry out. Those remaining run and walk quickly out of sight.
Browning, 31, did not have any previous contacts with local police or a criminal history but may have been suffering a mental health crisis, the Wayne Police Department said in a news release.
Kelly said a church member arriving late to the service spotted Browning driving recklessly and called out to him as he exited his car wearing a tactical vest and carrying a rifle and a handgun. The church member struck Browning with his pickup truck.
'He is a hero,' Kelly said of the parishioner. 'I think that was the Lord leading him to do that. He hit this individual with his car, drove right on the grass because he was shooting at the building at the time. And that certainly helped the team to be able to respond.'
The man began firing as he approached the church, striking one person in the leg. At least two staff members shot him, Police Chief Ryan Strong said. About 150 people were inside the church at the time.
'We are grateful for the heroic actions of the church's staff members, who undoubtedly saved many lives and prevented a large-scale mass shooting,' the chief said at a news conference Sunday night.
One member of the security team was shot in the leg and was listed in stable condition at a hospital after undergoing surgery, the news release said. No one else was hurt.
Wayne is a city of about 17,000 people located about 25 miles west of Detroit. Police executing a search warrant at Browning's home in Romulus, about 5 miles south of Wayne, found additional rifles, several more handguns and a large amount of ammunition, the news release said.
Browning's mother did not respond to a Facebook message sent Sunday by The Associated Press.
Worshipper Wendy Bodin said she heard a loud 'boom' and when she looked outside, she saw a man sprawled out on the grass in front of the church. 'I thought he got hit or crashed his car or was hurt,' Bodin told WXYZ-TV. 'And another lady saw and pointed to me and said, 'Oh my, call 911!''
Kelly, who has been pastor for about 10 years, had intended to preach about God's 'hand of deliverance' and His ability to save and protect. In drawing up the church calendar, he originally planned to have two outdoor services in June but months ago decided to only do one, on Father's Day.
'We weren't outside yesterday when we would have been,' he said. 'We were definitely protected by the hand of God, there is no question about it.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Yahoo
32 minutes ago
- Yahoo
Suspect in multiple Daytona stabbings shot dead after charging law enforcement, Volusia sheriff says
A suspect in multiple stabbings in Daytona Beach was shot dead by responding police and deputies on Saturday night, according to a press release from the Volusia County Sheriff's Office. Law enforcement were responding to the stabbing report around 9:30 p.m. in the 1400 block of Derbyshire Road, found two people with stab wounds outside a home and learned the suspect was inside the residence, the release said. They also learned another person could be in the house. 'Deputies and police formed a team to enter the house and rescue any additional victims,' the release stated. 'As the team moved through the house, the suspect suddenly charged out of a bedroom door, screaming with a large knife raised above his head.' Police and deputies opened fire and the suspect was shot multiple times. He was pronounced dead on the scene. Responding agencies including the sheriff's office as well as Daytona Beach, Ormond Beach and Holly Hill police departments. No injuries were reported among law enforcement. The two stabbing victims, a 16-year-old boy and 39-year-old man, were transported to an area hospital where they were listed in stable condition, the release stated. The Florida Department of Law Enforcement is investigating the shooting. Deputies involved were placed on administrative leave. It's the second shooting by Central Florida law enforcement over the weekend after Orange County deputies shot and injured a suspect who was fleeing them on foot and had a gun, according to law enforcement.


Fox News
an hour ago
- Fox News
Social Security Administration phishing scam targets retirees
Phishing emails and messages are among the most dangerous cybersecurity threats. One of the most common and harmful examples is the Social Security Administration phishing scam, which targets unsuspecting individuals with alarming and deceptive messages. Even the biggest data breaches and financial frauds in history started with someone receiving a phishing email. They are highly effective because of two things — urgency and impersonation. You'll often see phishing emails or messages asking you to take immediate action. They create urgency to make you panic and click the link, which can install malware on your device. Scammers build this urgency through impersonation, pretending to be government agencies and threatening you with things like pending taxes, traffic violation tickets and more. I recently received an email from Charles, who almost fell victim to one of these phishing emails, which is a classic example of a Social Security Administration phishing scam, claiming his Social Security number had been suspended due to its association with money-laundering activities. It's a classic phishing email, one that either wants to steal your money or infect your computer and steal your personal data. These kinds of scams are very common, and if you're not careful, they can easily fool you. Let's discuss how this Social Security Administration phishing scam works and how you can stay safe. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my In the email received, the scammers used alarming language to create fear and urgency. It begins with an alarming accusation that your Social Security number is under investigation for links to serious crimes like drug trafficking and money laundering. Here's a portion of the message: "We are conducting an ongoing inquiry into your Social Security Number and identity due to suspected links to drug trafficking. A series of international wire transfers to accounts on the Federal Trade Commission's restricted list has been flagged. There have been reports of suspicious activities associated with your Social Security Number in Texas and New Mexico. We would like to inform you that this document contains sensitive information and should be managed carefully. The document presented here is an official communication from the Social Security Administration, authorized by the Texas Attorney General. The Texas Court has directed the suspension of your Social Security Number due to its association with money laundering activities involving your bank accounts." At first glance, the email looks official enough to cause real panic. It name-drops major authorities like the Social Security Administration (SSA), the Texas Attorney General and the Federal Trade Commission to make the threat sound credible. By tying your SSN to federal crimes, the scammers are not just suggesting you might be in trouble. They imply serious legal consequences, even the possibility of arrest. This is urgency weaponized. The goal is to make you act before you think, pushing you to click a link or download a document out of fear. In that moment of panic, a person might forget the basic rules of cybersecurity. Another psychological trick the scammers use is overwhelming the reader with details. They mention multiple states such as Texas and New Mexico, wire transfers and restricted lists, all to create the impression that the situation is deeply serious and far beyond an individual's control. When people feel overwhelmed, they are more likely to submit to someone who seems to have authority and offers a quick way to "resolve" the problem, usually by clicking a link or downloading a file. While phishing emails are designed to look convincing, there are always subtle but important signs that give them away. This email did not address the recipient by name. Instead, it used broad terms like "Recipient" or launched directly into accusations without a personal salutation. Legitimate government communications almost always use your full legal name and reference specific case numbers or account details. Agencies like the SSA do not suspend Social Security numbers based on a single incident, and they certainly do not send serious notices through unsecured emails. Threatening suspension due to vague, unverified "activity" is a tactic meant to bypass logical thinking and trigger fear. Although the email tries to sound formal, the phrasing is clumsy and inconsistent. Sentences like "The Texas Court has directed the suspension of your Social Security Number" are vague and improperly structured for an official legal notification. Scammers are constantly improving their tactics, but by following these steps, you can protect your Social Security information and outsmart even the most convincing phishing attempts. Scammers love to make things sound urgent, like claiming your Social Security number is about to be suspended or that you're suddenly under investigation for something serious. It's all about creating panic so you'll act before you think. Remember, real government agencies don't send scary emails demanding immediate action, threaten you with arrest or ask for payment in gift cards or wire transfers. If you get a message that feels rushed, alarming or just "off," hit pause. Take a breath, double-check the facts, and never click a link or respond until you're absolutely sure it's legit. Good cybersecurity habits start at the device level. Make sure you have strong antivirus software installed on your phone, tablet and computer. This tool can help catch phishing links, block suspicious downloads and even warn you if you accidentally visit a dangerous website. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Scammers do not get your email address and phone number by accident. Your information could have been leaked through a past data breach, sold by shady data brokers, or even scraped from public profiles online. Also, limit how much personal information you share publicly. If you can, consider using a personal data removal service that helps remove your data from people search sites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Get a free scan to find out if your personal information is already out on the web: One smart way to limit scam exposure is by compartmentalizing your digital life. Use one email address for banking and sensitive accounts, another for shopping or subscriptions and a different one for newsletters or social media. That way, if one email is compromised, scammers cannot easily link it to your entire identity. An email alias address is also a great way for you to stop receiving constant spam mail by simply deleting the email alias address. See my review of the best secure and private email services at Staying safe is not just about avoiding that one phishing email. It is about noticing if something goes wrong afterward. Set up free credit monitoring if available, keep an eye on your Social Security statement through the SSA website and check your bank statements closely. Early detection of fraud can make a huge difference in limiting damage. Even if your login credentials are stolen, MFA adds a powerful extra layer of security. With MFA, logging in requires a second code sent to your phone or generated by an app. Set up MFA on your email, bank and social media accounts to make it much harder for scammers to take over your accounts, even if they have your password. A password manager can generate and securely store strong, unique passwords for all your accounts. This makes it much harder for scammers to access your accounts, even if one password gets leaked. Get more details about my best expert-reviewed Password Managers of 2025 at Cybercriminals exploit outdated software to install malware or steal your data. Turn on automatic updates for your operating system, browsers and apps. This ensures you always have the latest security patches, making it much harder for scammers to compromise your devices. If you're worried about identity theft, a credit freeze can prevent scammers from opening new accounts in your name, even if they have your Social Security number. Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Reporting suspicious emails helps authorities track and shut down scams. If you receive a phishing message: Most email providers also have a "Report phishing" or "Mark as spam" button. Use it to help others stay safe. Phishing scams are getting more sophisticated, but the psychology behind them remains the same: scare you into acting without thinking. Whether it's a fake Social Security suspension or a bogus bank alert, the goal is always to get your personal information or your money or access to your devices. The best defense is staying informed, thinking critically and never letting urgency override caution. Have you or someone you know ever received a suspicious message like the ones described here? How did you handle it? Let us know by writing us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my Copyright 2025 All rights reserved.


Forbes
an hour ago
- Forbes
The Dishonest Job Search: 4 Must-Knows For Job Seekers And Managers
Learn how the Dishonest Job Search misleads both job seekers and hiring managers and what each side ... More must look for to prevent a colliding mismatch. Research shows that 40% of companies posted a fake job listing so far in 2025, and three in ten currently have active fake listings. If you're a job seeker, experts are warning you to keep an eye out for suspicious job descriptions. And they are advising both job seekers and hiring managers to be on the lookout for misleading information in the dishonest job search in today's market. The Dishonest Job Search According to Checkr, the 2025 job search process is more complex and challenging than ever. Job hunters are navigating a hiring landscape filled with uncertainty, frustration and a growing lack of trust in employers. And job seekers and employers are bending the rules to get ahead. New research known as the "Dishonest Job Search," surveyed over 2,000 job seekers and hiring managers and found both confusion and miscommunication in hiring. The national study exposes the silent strategies job seekers and hiring managers use that are shaping today's workplace. From misleading remote work promises to fake job postings, the data shows a workplace where bending the truth has become just part of doing business. The 'Dishonest Job Search" detected tactics that cross the line from strategy into dishonesty, damaging trust between job seekers and employers. Companies post exploratory job listings that they aren't planning to fill to gauge talent availability and build pipelines, while job seekers cast wider nets by applying for stretch roles and leveraging AI tools to compete in crowded markets. Fake job postings are fueling a lack of trust, and companies are posting them to alleviate employee workload concerns and to feign company growth. Hiring managers say fake job postings lead to boosted revenue, morale and productivity, and 70% of managers say they believe it's morally acceptable to post fake jobs. Fortunately, there are ways to recognize red flags that indicate suspicious job descriptions. Misleading remote work promises has become a major source of confusion and mixed messages in hiring. This mismatch shows up in advertising "remote-friendly" positions that require frequent office presence, describing "hybrid" arrangements that heavily favor in-office work or suggesting flexibility that disappears after hiring. The divide is further widened when job seekers want to know what a job pays before they apply, but most employers aren't telling them. The study reveals that 68% of job seekers want salary information disclosed upfront in job descriptions, but only 48% of hiring managers provide it at that stage. That 20-point gap between what job seekers want and what they get isn't an accident, according to the study. Many employers prefer to get candidates interested first, then talk about money later. The Dishonest Job Search shows that, despite the tug-of-war, both sides want the same thing: a hiring process based on honest information and real opportunities. They both want straightforward conversations and transparency but are stuck in gridlock over guessing games. The Three Agreements In The Dishonest Job Search 1. The three-day rule is one of several surprising areas where job seekers and hiring managers agree on expectations and strategies. Amid all the gamesmanship in hiring, job seekers and hiring managers have quietly settled on the same timeline: Three days has become the standard window—long enough to review details, discuss with family, or weigh other options, but quick enough to show genuine interest. It gives both sides what they need: candidates get time to make an informed decision, and employers get a reasonably prompt response that keeps their hiring process moving. 2. AI use in the job application process is the second unexpected agreement employees and employers have settled on: According to the study, job seekers polish their resumes with AI tools, then hiring managers run those same resumes through AI detectors. But rather than creating an arms race, both sides seem to view AI as just another tool—like spell check or grammar software—that helps put your best foot forward. 3. Job requirements is the third agreement where job seekers and hiring managers have reached the same conclusion: 4 Recommendations For The Dishonest Job Search A considerable number of job seekers (84%) suspect that companies routinely post "phantom job" openings, and the study's data shows they're right to be suspicious. A notable 78% of hiring managers say they have interviewed candidates for roles that were not immediately available. When job seekers encounter fake postings, they start questioning whether any opportunity is real. The 3-day rule give job seekers time to decide if a suspicious job offer is legitimate. If you're a job seeker, experts emphasize before you apply to a company that you research the organization's trajectory, market position and customer pain points. If there's time, research the organization's history and key milestones as well as when they've taken the time to test out their products and services firsthand. The Dishonest Job Search researchers give recommendations for hiring managers, job seekers and organizations to mitigate the confusion and discord in the hiring process. 1. Only post jobs you're actually planning to fill. 2. Include salary ranges in job descriptions from the start. 3. Be upfront about remote work policies from the first conversation. 4. Recognize that skills can be developed and give stretch candidates a chances. 1. Keep applying for stretch opportunities as 75% of hiring managers are open to this approach. 2. Use AI tools openly to enhance your presentation, employers won't hold it against you. 3. Ask direct questions about benefits, remote work and advancement opportunities. 4. Trust your gut when something doesn't add up. 1. Reward hiring managers for clear communication rather than just filled positions. 2. Train hiring teams on how to have straightforward conversations with candidates. 3. Hold people accountable for accurately representing roles and company culture. 4. Remember that misleading candidates during hiring often backfires later. The Dishonest Job Search researchers conclude that hiring will always involve some strategy and positioning. They add that the companies that do it best are the ones that build their approach on clear communication and realistic expectations rather than gimmicks or misleading information.