Three dangerous desperados are on the lamb

The entire staff of the Graveyard Shift took a field trip yesterday. We boarded a big bus and drove over four hours to the offices of newspaper giant, The Bottomfeeder Gazette. We wanted to see how their hardworking news reporters come up with those gritty stories they crank out each day. We wanted to tag along when they hit the streets, conducting interviews and digging up the dirt. We wanted to learn how they’re able to garner all that juicy, gossipy stuff they print each day.

Well, I was shocked. We didn’t leave the building. Not even for lunch. They had gluten-free kale chips and bottled water brought in by a man-bun guy dressed in skinny jeans and a Grateful Dead t-shirt.

So here’s how this media group came up with their news stories du jour. I was shocked. We all sat around a large empty room, on the floor with our backs against the wall. There were fourteen of us in all. Five in our crew and nine Bottomfeeder reporters. Oh, and the editor. So fifteen.

The editor started the ball rolling by asking for story ideas. Someone said, “The sheriff is up for reelection.”

The editor paused to ponder the thought. We all sat there in silence, watching his face undergo several transformations, moves to help him think, I surmised. First he wrinkled his forehead, raising his bushy brows until they nearly touched in the middle. Next, he scratched his chin using a single index finger. And then he said, “I like it. Let’s run with it. Who wants to go first? Headline?”

Another man-bun guy, this one with a permanent five-o’clock shadow and a lazy eye, set up a large white board and stood at its side with a green marker in his hand. A young woman raised a hand, the one holding a Starbucks coffee cup with the name “Celine” penned in a delicate “Sharpie” script. Beneath the name was written (in the same hand) “Likethesinger.” I’m guessing the clerk assumed the young woman’s full name was Celine Likethesinger.

Anyway, the editor called on Celine (like the singer) who promptly said, “I remember when the sheriff was the crossing guard at my elementary school. He’s a sweet man.” So bun guy reached over to the white board and wrote:

Crossing Guard/likes children, a lot

Someone to my right shouted, “I went to school with his kids.”

Man Bun put his marker to board once again.

Has kids

Another voce from the room, “He’s a member of my dad’s golf club.”

Plays golf … with campaign contributors?

“I heard he doesn’t let his kids go to parties.’

Questionable parenting skills

“I once saw him in pursuit of a robber.”

Reckless driver/Speeds through town/Dangerous

“I saw him go inside the liquor store with one of his campaign posters.”

Frequents liquor stores while on the job

“He arrested a large number of drug dealers.”

Has been seen in the company of major drug dealers

“I wonder what kind of pistol he carries?”

Supported by NRA 

“One of his kids has special needs and is home schooled.”

Doesn’t believe in sending kids to public schools

“His oldest daughter once wrote a book report on Helter Skelter, the story about that Manson creep.”

Follower of Charles Manson/indoctrinates his kids into Manson cult

So this went on for the better part of an hour and this, the way I believe most stories today make it to the papers and in online news sources these days, was the result:

Local Sheriff Seeks Reelection Bid Amidst Cloud of Allegations 

Longtime sheriff, Gi. Meabrake, has announced his bid to seek another term of office. He faces tough opposition this year, especially in light of the inflammatory accusations facing him. A hearing is scheduled for next Tuesday at the county conference center, where Sheriff Meabrake will answer to the charges of child endangerment, drinking on duty, supporting a known convicted murderer, abuse of authority, and reckless driving/endangering the wellbeing of citizens. It has been reported that child services are filing the necessary paperwork to remove the Meabrake children from the home. Officials within the agency say removing the children is for their safety.

Protestors are scheduled to march to the sheriff’s office on Tuesday. They’re demanding that Sheriff Meabrake announce who he supported in the presidential election. They also want free parking, free access to all police equipment, no firearms for deputies, two get out of jail free cards, and the promise that no one will be arrested for the next two years, for anything.

*Disclaimer – News staff has not verified any of these allegations, but we believe it is good journalism to put this out there to give the public the opportunity to decide whether or not they want to believe it.

Sure, this article is dumb. Totally dumb. For the life of me, though, I can’t image that much of today’s news stories derive from a better source(s) than my fictional one above. Do reporters actually interview people? Do they research topics? If so, where and how do they do this? Why is it that facts are no longer important?

I used to read the news, a lot. Now, when online, I simply scroll past most headlines and images, skipping the political rants (from all sides) and ludicrous promises of juicy news about Hillary’s pantsuits that were made by starving child slaves in 3rd world countries, who, by the way, are the offspring of Bill Clinton. I also pass by those fake tales accusing Trump of planting Tribbles on the Enterprise, and about him appointing little Barron as Secretary of State.

1422549994zjh2fUnfortunately, skipping all the roiling, boiling, ranting, raving, hate, lies, and totally fake news, I find that I’m missing out on a lot of the wonderful accomplishments of my friends. But, it is what it is. I’m weary of the hate and of the backstabbing and name-calling, and, well of it all.

What started this little fake news rant of my own? A news story this morning, from a major media source, about … basically nothing.

It’s just one of those days. I’ll get over it.

For now, I’m off to the dentist. Wish me luck.

 

background: #bd081c no-repeat scroll 3px 50% / 14px 14px; position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; top: 1990px; left: 20px;”>Save

Crime Scene Science Infographic
Source: eLocalLawyers.com

*Please note that the above information is basic. Also, I did not have a hand in preparing the infographic. And, remember that not all police departments have dedicated CSI units.

murder is no joke

Country roads.

Dark, tree-lined tunnels.

Speed.

Telephone poles,

and mailboxes.

Blurred shapes,

passing quickly.

Handcuffs swing from spotlight handle.

Metal against metal.

Tap, tap, tap.

Winding curves.

Driver training.

Hit the apexes.

Feed the wheel.

Don’t cross your hands.

Is it hands at ten and two,

or three and nine?

Eyes darting from ditch to ditch,

watching for deer.

Moon back-lights trees.

Tall, gnarled fingers,

disappearing into a black sky.

Blue strobe lights transform fog into winking, blinking azure cotton candy.

“Are we close?”

“No, not yet. We was a long ways in the country.”

A pause.

“Maybe three more miles.”

Radio lights blink in sequence.

Dispatcher speaking in monotone.

“Stolen car on interstate. Disturbance in West End. Shoplifter at convenience store, Third and Bellview.”

More blinking.

“There. Right there.

The body’s in the woods to your left.

Drug him across the ditch right there.

See where the weeds are knocked down?”

Entourage stops.

Guns drawn.

Flashlights.

Walking.

Don’t disturb scene.

Gun belt leather creaking.

Keys jingle.

Twigs snap.

“Where’s the body?”

Shrug.

“Thought it was here.”

Humidity high.

Sweating.

Vests, like dense clay,

around torso.

Hours pass.

Spider webs.

Cadaver dogs,

noses to ground.

Mosquitoes.

Hundreds of mosquitoes.

Sun sends night home for the day.

Pushes through tree canopies,

like translucent yellow wands.

“I found it!”

Man … no, a boy.

Lying in leaves and pine needles.

Eyes closed,

mouth open.

Hands bound in back.

Gray duct tape.

Insects in and out,

of nose and mouth.

Scurrying to and from,

like cars traveling the 101.

Flies,

everywhere.

Sickening.

Cameras.

Measuring.

Gathering.

Bullet casings.

Execution.

Gansta wannabes.

Interrogation.

“Didn’t know gun was loaded.

Took it from Dad’s nightstand.

It was a joke.

Honest.

A joke.

We just wanted to scare him.”

Teenagers.

One dead.

Four in prison.

Life sentences.

A joke.

Just a joke …

position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; top: 36px; left: 20px;”>Save

Friday's Heroes - Remembering the fallen officers

trooper-landon-e-weaver_pennslvania_state_policeTrooper Landon E. Weaver, 23

Pennsylvania State Police

December 30, 2016 – Trooper Landon Weaver was shot and killed after responding to investigate a protective order violation. He is survived by his wife.

background: #bd081c no-repeat scroll 3px 50% / 14px 14px; position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; top: 36px; left: 20px;”>Save

file8391291072758

Hugh Killdme let the spoonful of peas and carrots rest on his tongue. He closed his eyes, savoring the combined taste of his two favorite vegetables. In his mind, he pictured the green and orange delicacies as they danced and rolled in boiling hot water. He saw tendrils of wispy pea-carrot flavored steam shimmying and twisting their way from the blue porcelain Rachael Ray pot to the gleaming stainless steel hood above the range.

Hugh shifted his thoughts to the basement freezer. He’d ordered the Super-Duper Chill-Zero model from Acme (Wile E. Coyote isn’t the only character in the world who knows where to shop for a good deal).

The day after Acme’s number one best-selling frost-making machine arrived, he’d packed it to the brim with bags of frozen peas and carrots. Bought every single package within a twenty-mile radius.

Thinking about the plentiful stockpile of veggies caused his meaty lips to split into a lopsided grin. Thirty seconds later he was graveyard dead.

The instant Hugh’s face crashed into his dinner plate, sending airborne little green pellets and perfectly cut squares of orange, his wife of thirty years scurried toward the basement to unplug the freezer, muttering along the way about never again cooking another pea or carrot as long as she was able to draw a breath. For that she was thankful. She was also thankful that the poison had worked so quickly. Not because her husband hadn’t suffered long, though. Instead, she had plans to play Bingo at the Presbyterian church over on Save-a-Soul Drive, and to have her husband flopping around on the kitchen floor for hours on end would have absolutely ruined her evening. Probably would’ve ruined the shine on her brand new linoleum too. Her mother always said things have a way of working out. She, too, went quickly … bless her heart.

Questions about poisons. I get them all the time, and the number one question that most often pops up is, “What’s the best poison a wife could use on her husband that would act quickly and be difficult for police to detect?” So lets dissect this one, but strictly for use in works of fiction.

First of all, police officers won’t be the folks who detect the poison. That’s the job of the medical examiner and/or laboratory scientists. Next, to detect a specific poison the medical examiner would have to request testing for the substance/toxin/chemical/etc.

A tox screen is not a one-stop-shop and does not detect most poisons. This is where the police can be a big help to the M.E. and lab technicians and scientists. For example, a savvy detective may notice a bottle labeled “Husband Killer” on the kitchen table next to the head of the deceased. If so, he/she would collect the bottle as evidence and report his/her discovery to the M.E., who would then order testing for the potentially deadly concoction.

20170104_120741

Another huge clue that sharp detectives should pounce on would be the fact that the widow works as a scientist for a bio-pharmaceutical company. And that’s sort of what happened in the case of Tianle Li, the Chinese woman who was convicted of murdering her husband, Xiaoye Wang. Her weapon of choice—thallium.

Thallium, a metal that’s used in electronic switches and some medical devices, was once used as a major component in insecticides and rat poisons. It’s basically odorless and tasteless. And it is well known as the “poisoner’s poison” because it is so difficult to detect in the human body. Thallium use as a pesticide was banned in the U.S. in the early 70’s.

Biotech and pharmaceutical companies are permitted to conduct research using dangerous chemicals, toxins, poisons, extracts, etc. That’s how Tianli Li obtained the thallium she used to murder her husband. As a chemist for Bristol-Myers Squibb, Li ordered thallium to research its effect on humans.

After receiving doses of thallium (how Li introduced the thallium into her husband’s body is not clear) Wang became ill with flu-like symptoms and checked himself into a local hospital, where he lapsed into a coma and died two weeks later.

Had it not been for a quick thinking nurse who’d read about a thallium poisoning case in China, Li would have gotten away with murder…the “perfect murder,” using the “poisoner’s poison” as her instrument of death. The nurse alerted officials who then conducted tests and indeed found thallium in Wang’s body.

So there you have it, my writer friends—two very important bits of information for possible use in your work (writing, that is). One: thallium is the poisoner’s poison because it is difficult to detect. Two: people who work in biotech and pharmaceutical research are able to purchase just about anything in the name of “science.”

By the way, it takes a while for most poisons to get the job done. Having your character go as quickly as Hugh Killdme is, well, fictional. Thallium, like many poisons, is slow acting, and to die from poisoning by it is a slow and painful death.

Josh Moulin

If I were to ask you to install an exterior door in your child’s bedroom and told you that this door could not have any locks, alarms, or other security, how would you react?  Most people would be uncomfortable with an unlocked door anywhere in their house and especially in their child’s room.  How could a parent properly protect their child if strangers on the outside could walk right in?  How would parents get alerted if someone had entered the child’s bedroom?  This scenario might seem crazy or even rise to the level of negligence.  The risks to the child could be anywhere from a simple burglary to physical assault, sexual assault, kidnap, and even murder and could extend beyond the child to any other occupants of the house.

Internet Safety for Children

The thought of this is disturbing and it is hard to imagine any parent would be this careless.  Unfortunately though, there are homes in nearly every neighborhood in our country with unlocked and unmonitored doors.  These doors are not your traditional doors though, these are virtual doors disguised as computers, tablets, smartphones, smart TVs, and a host of other gadgets referred to as the Internet of Things (IoT).

Most parents teach their children common safety messages to keep them safe: look both ways before you cross the street, don’t go anywhere with a stranger, don’t touch the stove because it could be hot, etc.  But what do many parents teach their kids about Facebook, Snapchat, Kik, instant messaging, texting, or web surfing?  In my experience as a career technologist and former law enforcement investigator of cybercrime, parents rarely have this kind of dialog with their kids.  Stranger abductions of children are incredibly rare (less than 1% of all kidnappings), yet parents spend a great deal of time talking about stranger-danger with their kids and completely miss the much bigger and more common risk of online predators.

Picture 2

I cringe when I hear parents ask what kind of smartphone they should buy their tween, or I see kids walking to the local elementary school staring at their smart devices along the way.  In a recent study, it was found that 21% of kids in kindergarten to second grade have cell phones!  I completely understand the need for parents to contact their children, but does that really need to include a data plan and 12 megapixel camera?  Any of these Internet capable devices are a portal to the world and kids who do not yet understand the consequences of their actions can quickly make fatal errors.  The social impacts and long-term exposure to this technology aside, kids don’t need $800 smartphones to remain in contact or to use during an emergency.  Believe it or not, cell phone providers do still make basic phones especially for kids.

Child Predators Use the Internet

The risks associated with kids and technology are not born from my paranoia or hypothetical scenarios I have dreamt up over the years.  During my career I have seen firsthand the devastation brought to children and families from having an unlocked virtual door to a child’s bedroom.  In one such case, an adult man lured an autistic 14-year-old girl over the Internet.  This man used online gaming as his method of choice.  Over the course of a few weeks he established a rapport with her and kept her distracted with the game (World of Warcraft), while he asked seemingly innocuous questions spread over time to not be obvious.  Questions like what her parents did for work, what their schedules were, where she lived, and what school she went to were asked of her.  The suspect recorded these answers within the dossier he was building on this girl.  As the two communicated via voice chat in the game, she thought she had found a great friend.  What she did not realize was that this man had no interest in World of Warcraft or being her friend.  That realization became apparent the day he showed up at her front door when she was home alone.  This man arrived from out of state when he knew her parents would be at work and he kidnapped her.

When the police was notified of her kidnapping they began searching and luckily found the vehicle several hours later in a different state as it was traveling on the freeway.  I remember getting a phone call on a weekend about this case and was asked to assist the agency that stopped the suspect’s vehicle.  They had taken the male suspect into custody and the girl was safely with child welfare.  I conducted a forensic analysis of the suspect’s multiple computers he had in his truck as well as searched the truck itself.  In the back of this truck was rope, knives, sex toys, and a mattress.  I have always believed that if this man would not have been stopped, that young girl would have been raped, tortured, and killed.

In another case I investigated, an adult man was searching for young boys in chatrooms and other online venues.  He knew exactly the type of boys to target and could quickly establish rapports with them.  After having sexually explicit chats with these boys, he would ask them to send nude images of themselves to him.  If the boys refused, the suspect told them that he was a police officer and had already traced their Internet connection back to their physical address.  The suspect told them that if they did not send the pictures, he would show up to their home and tell their parents that they were homosexual. Out of fear of embarrassment, almost every boy was coerced into send the images to this man.  In many cases, he continued the blackmail and had young boys travel to his home where he would sexually abuse them.  He often would send money to these boys to facilitate getting them to his home.

These two examples drive home my point, but unfortunately I have many more stories; some of which have worse outcomes.  On so many occasions parents would tell me they had no idea that their kids were on the Internet, or that they couldn’t keep up with all the technology.  I argue that parents have a duty and obligation to protect their children from danger and simply saying they don’t understand technology does not suffice.  Parents either need to learn the technology or not allow their children to use it.  Before parents allow technology to be introduced to their child or home, they should understand what the device is capable of and how to secure it.

Internet Safety Precautions

If you are interested in protecting your own family or help someone else with their children, here are some high level suggestions that you can take:

  1. Limit Access: No computers, laptops, tablets, iPhones, smartphones, Xboxes, or other Internet capable devices are allowed in kids rooms, period.
  2. Have Oversight: Computers are located in a common area of the home that can easily be seen by adults at a moment’s notice.
  3. Least Privileged Access: Kids have a separate non-administrative account on computers so they cannot change settings or install software.
  4. Protect Passwords: Kids do not know parent’s passwords.  Change your passwords and PINs occasionally.
  5. Start the Dialog: Parents need to have real and frank conversations with their kids about Internet safety and what kind of sexual predators exist in the world. Most kids do not tell their parents when something makes them feel uncomfortable online because the kids are embarrassed, don’t want to get in trouble, or don’t think their parents will understand the technical pieces of what happened.  Parents must build trust and have these discussions often.
  6. Know Their “Friends”: If children are allowed on social media, parents should have full access to the profiles and ensure that any “friend” is someone they actually know in real life.  A 14-year-old probably doesn’t have 750 real friends.  It should not be thought of as a popularity contest.
  7. No Cameras Allowed: 22% of girls have posted nude images of themselves online or sent them to another person.  Having kids and cameras together is an exceptionally bad combination.  I have investigated cases of girls as young as 10 taking nude images of themselves and sending them to adult males.
  8. Use Parental Controls: Both Mac and PCs have excellent parental controls.  Lock down what websites kids can go to, what times they are allowed online, and who they can communicate with.  Make sure kids can’t sneak devices into their room at night, or go out to the family PC while everyone is asleep.
  9. Review their Browsing Habits: 90% of children ages 8-16 have viewed online pornography, the largest group of Internet pornography consumers are ages 12-17, and 70% of kids ages 7-18 have accidentally encountered pornography while searching for unrelated material.  Know what kids are looking for and looking at.  Examine Internet history on browsers to see where kids are going.  If Internet history is being deleted, ask why.  There are other ways to capture Internet history at the home router level too, which kids would should not have access to or be able to manipulate those logs.
  10. Use Internet Filtering Solutions: Implement technical controls both on the device (e.g., parental controls) but also on the home Internet connection.  OpenDNS is an awesome way to do this, see this blog post for more:  http://www.joshmoulin.com/protecting-your-family-against-inappropriate-internet-content/  This can prevent children from accidentally coming across inappropriate content and block intentional access to sites.
  11. Thing About All Sites: Think YouTube and Flickr are educational and should be OK for your kids to have access to?  Think again, these sites are full of nudity, sexual content, violence, and many other categories of inappropriate content.  If there are videos that your child needs access to, give them access to just the URL of that video in YouTube and block everything else.
  12. Internet Rules are for Everywhere: The rules established about appropriate Internet behavior must be for the Internet, not just within a home.  Many kids find themselves in trouble while at a friend’s house or somewhere outside of the home.  Make sure they understand the family acceptable use policy applies anywhere.
  13. Parents get Full Access: Frequently review their social media pages, posts, pictures, and sites.  Ensure there is nothing that could be considered cyberbullying or that a sexual predator could use to find out where the child goes to school, lives, or works.  Limit personal information such as birthdays and phone numbers and check the background of images and videos to make sure there are no hints that could lead a predator to the child.  Also consider Exif data in images that may lead someone directly to the front door (for more on this, see this blog post: http://www.joshmoulin.com/how-digital-pictures-and-videos-can-be-a-threat-to-privacy/)
  14. Understand the Technology: Ignorance is no longer a viable option.  There are many resources for parents to learn about technology and how to protect their child, some of which are provided in this post.  A simple Google search for protecting kids online would be a great start.
  15. Consider Internet Monitoring Software: There are software products on the market that are designed to covertly monitor kids’ activity online and provide reports.  These programs can be helpful and range from free software to paid commercial products.
  16. Ensure Profiles are set to Private: Utilize privacy settings on social media and make sure all privacy settings made available are enabled.

Picture3

While apps and websites may change names, the principles and mitigating controls are the same. If parents teach kids how to use technology responsibly, have frequent communication with their kids, and follow the steps outlined above, the virtual door can be closed.  Technology can be amazing and kids must know how to use it properly to be successful as they grow older and prepare for college and their careers.  By taking the time to implement what is suggested here and balancing the convenience of technology access with the security controls to make it safe, kids can have a healthy relationship with the Internet and devices.

 

~

Picture4Josh Moulin is the Chief Information Officer (CIO) for the Nevada National Security Site (NNSS), part of the U.S. Department of Energy/National Nuclear Security Administration’s nuclear weapons complex.  The NNSS is a 1360 square-mile remote and highly secure area outside of Las Vegas, NV that provides arms control, emergency response, counterterrorism, weapons testing, nuclear nonproliferation, nuclear stockpile stewardship, and special technology development among other national security significant missions.  Josh and his team of 140 IT and cybersecurity experts support and protect some of the nation’s most critical assets with classified and unclassified networks that span the country.  Josh has a Master’s Degree in Information Security and Assurance, holds multiple industry certifications, and has a Top Secret security clearance.  Prior to joining the NNSS in 2012, Josh spent 11 years in law enforcement with his last assignment as a police lieutenant and commander of a FBI cybercrime task force.  The views expressed here belong to Josh Moulin alone and do not necessarily reflect the views of his employer.

Website: https://JoshMoulin.com

LinkedIn: https://www.linkedin.com/in/joshmoulin

Twitter: https://twitter.com/joshmoulin

position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; top: 36px; left: 20px;”>Save