Archive

Category Archives for "Features"

50 Safest Colleges in America

When you go away to college or, better yet, send your child away for an advanced education, you want the peace of mind knowing that they are safe.  To that end, we’ve compiled a list of the 50 Safest Colleges in America.   The data to create this list was obtained from the U.S. Department of Education, Office of Postsecondary Education, who keep statistics on campus crime.  Criteria for making this list were public and private 4-year universities in the U.S., with an enrollment of at least 5,000 students. Primarily online institutions were not included and most recent data available was for calendar years 2011-2013.

#1 Touro College

1263071345_684e61e00f_z

Established in 1970, this independent university of over 19,000 students in New York City, NY was named after Jewish leaders Judah and Isaac Touro.  The school offers a variety of undergraduate and graduate programs, and there were no on-campus crimes reported for Touro College.

#2 Northwest Florida State College

10299869784_0008a93590_z

With over 14,000 undergraduates enrolled, this state college in Niceville, FL is part of the Florida College System.  The 264-acre campus in the Ft. Walton Beach area of Florida’s Panhandle provides a variety of undergraduate degrees, and there were no on-campus crime incidents here.

#3 New York Institute of Technology

6150915974_b13c100db8_z

A private research university founded in 1955, NYIT is located in New York City, NY and its main Old Westbury campus encompasses over 1,000 acres.  With over 12,000 students, there were no on-campus crime incidents reported at NYIT.

#4 Bellevue University

16249525075_0125ab5fb8_z

Bellevue University is a private, non-profit university located in Bellevue, NE.  With an enrollment of over 10,000, the university has been operating since 1966 and is the 4th largest private college in Nebraska.  There were no on-campus crimes reported here.

#5 Saint Joseph’s College

13917982483_377c98b98e_z

Established in 1916, this private liberal arts college offers degrees at the undergraduate and graduate level in more than 25 areas.  Recognized repeatedly as among  “America’s Best Colleges” by U.S. News and World Report, the Brooklyn campus of over 5,000 students has no on-campus crimes reported.

#6 Hawaii Pacific University

5286375628_362bb3fc6e_z

Located in Honolulu, HI, this private co-ed university of over 7,000 students was established in 1965.  There was just one on-campus burglary reported during the study period.

#7 Franklin University

390459509_63e9e5dc54_z

A private university in Columbus, OH, Franklin University was originally founded in 1902 through a sponsorship by the Columbus YMCA.  Now with almost 8,000 students enrolled in its undergraduate and graduate programs, its main campus had just one burglary reported during the study period.

#8 Governors State University

16855345874_a12096c2fd_z

Governors State University is a public university located in University Park, Ill, south of Chicago.  GSU was founded in 1969 and, as of 2014, went from just an upper-level university to one that offers undergraduate through doctorate level degrees. There was only one on-campus crime reported involving a vehicle.

#9 Saint Johns River State College

7032640217_2e058323cd_z

St. Johns River State College is a member of the Florida College System and is located in Palatka, FL, on the state’s northeast coast.  The college has over 7,000 enrolled students and  is an accredited arts school.  There were just two on-campus crimes listed during the reporting period at this school.

#10 Colorado Christian University

19968857229_1c28a7e246_z

Colorado Christian University (CCU) is a private, interdenominational Christian liberal arts university of just over 5,000 students.  Located in Lakewood, CO, the school was founded in 1914 at the Denver Bible Institute and offers 45 degree programs at the undergraduate and graduate level.  There were only two on-campus incidents during the reporting period.

#11 Wilmington University

Located in historic New Castle, Delaware, this private non-profit university has an enrollment of over 20,000 students.  Many degree programs are offered in its seven colleges at the undergraduate and graduate level.  There were just three on-campus crimes reported at this school.

#12 Regent University

4291106876_4c6c959ef4_z

A private Christian university located in Virginia Beach, VA, Regent University was founded by Pat Robertson in 1977.  The university offers over 70 courses of study, including a School of Law and a School of Divinity.  There were three on-campus crimes reported at this university.

#13 University of Houston-Downtown

2932910224_2e7f691a94_z

UHD is a four-year state university in Houston, TX that is the second largest university in the Houston area.  The 14,000 students at UHD attend a 20 acre downtown campus, and UHD has been ranked by U.S. News and World Report as No. 7 among top public universities.  Four on-campus crimes were reported at UHD during the reporting period.

#14 CUNY Brooklyn College

8109855100_5110d7f3c3_z

With over 16,000 students, the senior college of the City University of New York in Brooklyn has been ranked multiple times by The Princeton Review as a top college for value.   This liberal arts college has five on-campus crimes reported during the period covered.

#15 University of Wisconsin-La Crosse

5279169264_a8a9624f0f_z

A member of the University System of Wisconsin, UW-La Crosse was founded in 1909 and offers over 100 degree programs in its five schools.  The school as over 10,00 students enrolled and had five on-campus crimes to report.

#16 Metropolitan State University

3200384765_407ee091ce_z

Also known as Metro State, this public university located in the Twin Cities of Minnesota has over 11,000 students enrolled.  There are over 70 degree programs at several academic levels. The school had six on-campus crimes reported.

#17 Indiana University-Southeast

6322088246_f83f1cccaa_z

Located in New Albany, Indiana, the Indiana University Southeast is a part of the Indiana University system and is located in the Louisville, KY metropolitan area.  There are over 55 degree programs at this school of 6,800 enrolled students.  Six on-campus crimes were reported at this school.

#18 University of Michigan-Dearborn

3812437828_5b98297fac_z

One of two satellite campuses of the University of Michigan, UM-Dearborn has over 9,000 students and offers over 100 degree programs.  In 2014, UM-D was ranked the 36th best university in the Midwest by U.S. News.  There were seven on-campus crimes reported here during the reporting period.

#19 College of Central Florida

8065916455_cc90331658_z

Located in Ocala, FL, this public state college is a member of the Florida College System and offers bachelor’s degrees in several areas.  With over 18,000 students enrolled, there were seven on-campus crimes reported here.

#20 University of California-Merced

6108254360_de7073e374_z

The tenth and newest of the University of California campuses, UC Merced, is located in Central California.  The campus owns over 7,000 acres of land and has a current enrollment of over 6,000 students pursuing a choice of 21 majors.  There were seven on-campus crimes reported here.

#21 Farmingdale State College

8200632357_8e6e924525_z

Located on Long Island in East Farmingdale, NY, Farmingdale State College is part of the SUNY system and is a public college of the State University of New York. With over 8,000 enrolled students, the schools offers 29 baccalaureate degrees, and there were just eight on-campus reported at this school.

 

#22 CUNY New York City College of Technology

11357100253_63115edcaf_z

Located in downtown Brooklyn’s City Triangle, City Tech has over 17,000 students enrolled in its 66 baccalaureate programs.  This public college had nine on-campus incidents reported.

#23 The New School

438188176_c32f2c2189_z

The New School is a private, non-profit progressive university located in Greenwich Village, New York City.   With over 9,000 students enrolled, the school has a rich history in its open and intellectual teaching environment.  The New School had just nine on-campus crimes reported.

#24 Duquesne University

14298157593_79dc709ed2_z

Duquesne University is private Catholic university located in Pittsburgh, PA.  Founded in 1878, the school now has over 10,000 students in its graduate and undergraduate programs.  There were just nine on-campus incidents reported here.

#25 Biola University

9702047427_0d2d5da63b_z

Originally founded in 1908 as the Bible Institute of Los Angeles, Biola University is a private, evangelical Christian, liberal arts school in southern California.  With just over 6,000 enrolled students, this university in La Mirada, CA had nine on-campus crimes reported.

#26 CUNY Bernard M Baruch College

4504468642_395164f007_z

The Baruch College of the City University of New York system is located in the Gramercy Park section of Manhattan in New York City.  With over 17,000 enrolled students, the school offers undergraduate, masters, and Ph.D. programs.  There were ten on-campus crimes reported here during the reporting period.

#27 Savannah College of Art and Design

5850118932_9e260aabd2_z

Located in Savannah, GA this private, non-profit university was founded in 1978 and has over 11,000 students enrolled in its eight schools. The school is ranked Number 1 for Interior Design by DesignIntelligence, and there were ten on-campus crimes reported at SCAD.

#28 New Jersey City University

15651765127_7d1255e0d9_z

A public university, NJCU is located in Jersey City, NJ and serves over 9,000 enrolled students in its three colleges, offering more than 65 degree programs.  Considered a liberal arts school, NJCU had eleven crimes reported on-campus.

#29 Lewis University

5330227280_94908369f0_z

A private Roman Catholic and Lasallian university located in Romeoville, Ill., Lewis University brings more than 80 undergraduate and 22 graduate programs to its 6,800 enrolled students.  There were eleven on-campus crimes reported here.

#30 Worcester Polytechnic Institute

7383434576_bc86475b52_z

A private research university, WPI is located in Worcester, Mass and is an applied sciences and technical arts school.  Founded in 1865, WPI was one of the United States’ first engineering and technology universities.  Just eleven on-campus crimes were reported here.

#31 University of Maryland-Baltimore

8040809501_c2b7343396_z

Founded in 1807, UMB is the original campus of the University System of Maryland has some of the oldest professional schools of dentistry, law, pharmacy, social work and nursing in the nation.  With over 6,000 enrolled students, there were eleven on-campus crimes reported here.

#32 Truman State University

9422059569_cf3356ac08_z

Located in Kirksville, Missouri Truman State University is a public liberal arts and sciences university with an enrollment of over 6,000 students.  The school offers 48 undergraduate and 9 graduate programs, and there eleven crimes reported on-campus.

#33 Colorado School of Mines

8347972436_11dfe85592_z

Located in Golden, CO, CSM a public teaching and research university devoted to engineering and applied sciences.  With an enrollment of 5,600 students, CSM was ranked 75th in U.S. News and World Report’s “Best National Universities” ranking. There were eleven on-campus crimes reported here.

#34 Indiana Wesleyan University

22103728189_12644727c7_z

Headquartered in Marion, Indiana, IWU is a private, evangelical Christian liberal arts university that is affiliated with the Wesleyan Church denomination. The largest private university in Indiana, there are over 15,000 students enrolled here and twelve on-campus crimes were reported at IWU.

#35 Michigan Technological University

3280698280_be6daea610_z

Also referred to as MTU or Michigan Tech, this is a public research university located in Houghton, Michigan.  Rated among the “Best in the Midwest” by The Princeton Review, there are over 7,000 students enrolled here, and just twelve on-campus crimes were reported.

#36 Worcester State University

4773052907_4a152448c0_z

Since 2010, this liberal arts and sciences school in Worcester, Mass has been a part of the state university system.   Now with an enrollment of over 6,000 students in its graduate and undergraduate programs, the school continues to grow and reported just twelve crimes on-campus.

#37 Chicago State University

21343704591_e028d80ee1_z

Located in Chicago, Ill., this state university was founded in 1867 and has an enrollment of over 7,000 students.  Its five colleges offer over 60 degree programs, and there were twelve crimes on-campus reported here.

#38 Missouri Baptist University

15975740372_c296f69847_z

Located in western St. Louis County in Creve Coeur, Missouri, Missouri Baptist University is a private evangelical university with an enrollment of just over 5,000 students.  Undergraduate and graduate degrees are offered in eight areas, and there were twelve on-campus crimes reported during the reporting period.

#39 University of Wisconsin-Stevens Point

8481296716_ab184fddee_z

This public university in Steven Point, Wisconsin is part of the University of Wisconsin system and has an enrollment of over 9,000 students.  The school offers baccalaureate and master’s degrees in several areas and reported thirteen on-campus crimes.

#40 Indiana University-Northwest

461999916_e3b7915828_z

IU Northwest is located in Gary, Indiana and is a regional university campus in the Indiana University system.  Established in 1963, the school has over 6,300 enrolled students and reported thirteen crimes on-campus.

#41 College of Staten Island CUNY

6560390369_cd22eab4d9_z

With over 14,000, CSI is a four-year senior college in the City University of New York System, located on Staten Island, NY.   The school offers bachelor’s and master’s degrees in liberal arts and sciences, and there were just fourteen on-campus crimes reported here.

#42 Winona State University

9097838582_5dfb2b7a1c_z

The oldest member of the Minnesota State Colleges and Universities System, WSU is a public university located in Winona, Minnesota.  With an enrollment of over 9,000 students, the school offers over 80 programs of study.  There were fourteen on-campus crimes reported at WSU.

#43 University of the Incarnate Word

10858079976_fe4795bb17_z

A private co-ed Catholic university located in San Antonio, TX, UIW was founded in 1881 and sits on a 154-acre campus.   There are over 9,900 students enrolled in this school that offers baccalaureate, masters, and doctoral degrees.  There were fourteen crimes reported on-campus at UIW.

#44 Suffolk University

4148847938_986a44052b_z

A private, non-sectarian university located in downtown Boston, Mass. Suffolk University has an enrollment of over 10,000 students, and some of its MBA programs are ranked among the top in the country.  Suffolk University had fourteen on-campus crimes during the reporting period.

#45 Dixie State University

13952335033_19132b31d0_z

A public university located in St. George, Utah, DSU has over 8.500 enrolled students and offers more than 150 academic programs.   There were just fourteen on-campus crimes reported at DSU.

#46 Northern Kentucky University

15667388569_6b4eb096ae_z

Located in Highland Heights, KY, just seven miles southeast of Cincinnati, NKU is a public, co-ed university that is primarily a liberal arts school.  With an enrollment of over 15,000 students, there were just fifteen on-campus crimes reported at NKU.

#47 The Richard Stockton College of New Jersey

3673038913_4f9478bfa6_z

A public university in the New Jersey state system, Stockton University is located in Galloway Township, New Jersey and has an enrollment of over 8,500 students.  Stockton University had fifteen on-campus crime incidents during the reporting period.

#48 Adelphi University

2791619089_6b777d4da3_z

Located in Garden City, New York, Adelphi University is a private, nonsectarian university that is the oldest higher education institute on Long Island. With over 7,800 enrolled students, the school was ranked #153 among National Universities by U.S. News and World Report.  There were fifteen crimes reported on-campus at Adelphi University.

#49 University of Arkansas-Fort Smith

2235879684_2563065599_z

Also known as UAFS, this is a public university located in Fort Smith, Arkansas that is part of the University of Arkansas System.  UAFS is the fifth largest university in the state, with over 7,500 enrolled students and had fifteen on-campus crimes reported.

#50 University of New England

2098593519_d372302b8f_z

Located in Biddeford, Maine, UNE is an independent, non-profit university that was founded in 1831 and has over 8,000 enrolled students. UNE has the only medical school in the state of Maine and there were just fifteen crimes reported on campus here.

 

 

INFOGRAPHIC: HOW GOOGLE, FACEBOOK and APPLE TRACK EVERYTHING ABOUT YOU

EMBED THIS INFOGRAPHIC ON YOUR SITE

(use this code to ensure proper source attribution)

35 Heinous Craigslist Crimes

Photo courtesy of espensorvik on Flickr

Photo courtesy of espensorvik on Flickr

The information age comes with countless advantages, streamlining communication and allowing people to connect instantaneously.  In the past, several contacts and coordination were often required to get people on the same page, but today mobile phones and computer technology link us at all times. In business, deals can be conducted in real-time and global economics benefit from our ability to stay connected in so many different ways.  But the access created by so many forms of communication also crosses privacy boundaries, and sometimes compromises our ability to insulate ourselves from undesirable elements. Social networking, for example, puts people at risk when managed improperly. That’s why when you try and hire someone, you should use EmploymentBackgroundCheck.com  And local advertising sites like Craigslist literally open the door for strangers to come into our lives.  Safe practices aside, Craigslist crimes are real threats – just ask the unsuspecting victims.

1. The Mentor Murders

Most teens look up to respected elders, admiring them for their accomplishments and abilities, but this twisted plot brought a grown man and his protégé together for all the wrong reasons.  Brogan Rafferty was impressionable enough to participate in a crime spree hatched on Craigslist,  participating willingly in the affair.  Along with his mentor, Richard Beasley, Rafferty placed ads on Craigslist seeking laborers to work on a fictitious Ohio ranch.  Instead of employment, respondents were murdered and robbed.  The duo successful snuffed-out three job-seekers, attempting to kill a fourth man who escaped.  The men were arrested after he went to the police with the outrageous story.  Despite claiming he was coerced, Brogan Rafferty was sentenced to life in prison, the maximum penalty for his crime.  He was a minor at the time of the killings, so the death penalty was not on the table.  Richard Beasley, the demented mentor, was not as lucky.  He was sentenced to death in April, 2013 for the Craigslist murders.

2. Forced Prostitution

College students are always looking for some extra cash, but Tamla Hutchins would not willingly prostitute herself to get it.  Instead, she was lured into forced Craigslist prostitution by a nefarious would-be pimping duo named Carlton Simons and Shenett Reevey.  According to the casework, the pair promised the student an opportunity to meet famous stars like P-Diddy and the rapper Lil John.  Instead, she was forced to prostitute herself using Craigslist ads.  The 2007 crime brought the victim from her home in North Carolina to Queens New York where the plot unfolded.  For his role, Carlton Simmons was sentenced to six years in prison.

3. Donna Jou Disappearance

Some Craigslist crimes go unsolved, partly because of the nature of the site.  Often, one-on-one meetings are arranged on Craigslist, which is never a good idea.  In the case of Ms. Jou, a man has already confessed to involuntary manslaughter and served a portion of the 5-year term he received for the crime.  According to John Steven Burgess, Donna Jou responded to his Craigslist ad and joined him for cocaine and heroin before dying at his home.  When he woke to find her dead, he panicked and threw her body into the ocean.  The truth of the account is suspect, and Burgess has already been released after serving a few years in prison.  In fact, Burgess has since been arrested after again using Craigslist to lure women to his home.

4. Katherine Ann Olson Murder

Responding to a Craigslist ad for a babysitter put Katherine Olson in touch with Amy, a mother needing childcare from 10:30 – 5:00.  The details were set before Ms. Olson reported to work at a split-level home in Savage.  Once there, she was coaxed into an upper area of the home and murdered in cold blood.  Michael Anderson, her killer, was a 19 year old man with poor social skills.  He killed Ms. Olson with a .357 caliber handgun, before dragging her body down the stairs and tying her up. The motive for the killing is largely unknown, though Anderson received the mandatory life without parole sentence.

5. Philip Markoff Craigslist Killer

The highly publicized saga of the Craigslist Killer involved charges stemming from the death of Julissa Brisman, as well as two additional assaults carried out on women responding to Craigslist ads.  The case drew scrutiny for the unlikely perpetrator, who was a pre-med student and seemingly normal chap.  As it turns out, Mr. Markoff had a dark side, displaying sexual deviance and other hidden irregularities.  But perversion is not thought to be the primary motives for the assaults.  Rather, Mr. Markoff appears to have been in dire straights financially, afraid to reveal the situation to his fiancé.  Markoff took his own life in 2010, while serving a life sentence in prison.

6. Raped Maid

Michael Delgado called a maid he found on Craigslist to clean his home, but evidence pointed to a different motive for bringing her in.  According to the 42-year old maid that came to his home, Delgado was little more than an opportunistic Craigslist rapist.  Once there, she claims to have been raped for over an hour, leading to false imprisonment, assault and rape charges against Delgado.  Tried at the end of 2012, Mr. Delgado’s jury ended in deadlock, failing to convict or acquit him on the six felony charges he faced.  He will be retried on at least some of the charges.

7. Baby For Sale

Paul Marquez probably looked over the ‘for sale’ section for quite awhile before trying to sell a baby on Craigslist.  The internet swap meet does not maintain a section for human trafficking.  Mr. Marquez posted the ad out of irritation with his newfound girlfriend who mothered the child.  According to the complaint, he asked $100 for the infant because it was “on his nerves”.  The Craigslist ad was flagged and removed, but the perseverant Marquez reposted the offer.  A responder was given the actual mother’s phone number, who then called police to report Marquez.  several charges were levied, including child endangerment.

Photo by izzymunchted on Flickr

Photo by izzymunchted on Flickr

8. Wine Snob Beating

Seeking the finer things in life is to be admired, but pursuing high-end wine from a discount Craigslist posting carried unanticipated risks for one wine aficionado.  When Quy Duc Nguyen showed up to purchase a handful of rare bottles, he got more than he bargained for.  Traveling all the way from coast to coast, his arrival was tainted by a beating and robbery that left him with sour grapes.

9. Phone Home Shooting

Jonathan Clements used Craigslist to advertise his need for a new mobile phone.  When he set up a meeting with Alexander Lyons, he expected a routine $95 transaction the men agreed upon.  Following safe protocols, the meeting was arranged for a public gas station where safety would not be an issue for the men.  Lyons pretended to be lost though, and instead was directed to Mr. Clements location, his Aunt’s house.  Mr. Lyons was prepared for violence, and soon shot the unsuspecting buyer with a semi-automatic handgun.  Mr. Clements died at the hospital a short time later.  A life sentence was handed-down to Lyons, and the accomplice who furnished the weapon was also charged with murder.

10. Dao Xiong Auto Ad Killer

Craigslist is widely used for selling cars and motorcycles, so meet-ups are scheduled frequently.  St Paul native Youa Ty Lor used the listing service to advertise his Nissan for sale.  Unfortunately, a car thief was trolling the wires looking for victims.  Mr. Lor agreed to meet Dao Xiong for a test drive, but Xiong reportedly never intended to buy the vehicle.  He claims to have been interested only in stealing it, but his plans went awry when Mr. Lor was killed with a forty caliber semi-auto handgun.  The murder weapon and telephone records  quickly tied Xiong to the crime, leading to his arrest and conviction for the killing.  He was sentenced to life in prison without the possibility of parole.

11.  John Katehis S&M Killer

When George Weber placed an ad on Craigslist, he was seeking a partner for a sex-related meet-up.  The respondent, who later agreed to a sexual encounter for $60, was a twisted Satanist and S&M fetishist.  He had a particular preoccupation with knives, which he eventually used to stab Mr. Weber to death.  More than 50 stab wounds were present on his body and neck, inflicted by the sixteen year-old killer.  Katehis was charged with second-degree murder, as an adult.

12.  Long Island Killer

Answering ads for sex is the standard approach for this Craigslist criminal, known as the Long Island Serial Killer. The unidentified perpetrator is though to be responsible for as many as 15 murders in the GilGo Beach area.  Over the course of several years, 10 bodies have been recovered from the area, each linked to the killer.  While theories abound, it is certain the killer preys on prostitutes and women advertising sex on Craigslist.

13.  Boat Buyer Assault

Ronald Kroll used Craigslist for its intended function, placing an ad to sell his boat.  After communicating with an interested buyer, Darin Leutbecker, by phone, a test-drive was arranged and the men met at the boat.  The 37 year-old Kroll fought back after Leutbecker pulled a gun on him, resulting in shots fired.  The men struggled in the boat, before falling into the water, where Kroll eventually remained as his boat was stolen.  Kroll was able to inflict some damage of his own, stabbing his attacker with a pocket knife before he fled.

14. Diamond Deal Killers

James Sanders had a diamond ring to sell, so he placed an ad on Craigslist.  When four individuals responded for a meeting, Sanders directed them to his home.  The Edgewood, WA man was told the ring was to be a Mother’s Day gift, but once inside his home, the group held Sanders and his family captive.  As he struggled to protect his children, he was shot dead by the attackers.  All four criminals were captured and tried, including 24 year-old Clabon Berniard who received a life sentence.

15.  Auto Sale Kidnapping

Selling his BMW was all Alexander Filatov had in mind when he placed an ad on Craigslist.  Travis Landry, who responded to the posting had different ideas for Filatov, including a 400+ mile trip in his own trunk.  After meeting at Landry’s location, Filatov agreed to a test drive, and the men conducted what appeared to be a legitimate transaction.  After accepting payment, Filatov opened the trunk for Landry, who asked to see it.  With threats of violence, Landry forced him into the trunk of the BMW, before taking-off on a 450 mile drive.  Filatov was not harmed, and his help led police to Landry who was later captured and tried.

16.  Work Shirt Robbery

Craigslist does not discriminate among criminals, so it is not surprising that the site aids robberies too.  A particularly clever criminal posted an ad for day laborers, instructing them exactly how to dress for the job.  Ten men reported to the designated location, dressed as instructed.  As they waited for their job assignments, another man emerged in the same outfit.  He sprayed an armored guard with an irritant and ran off with a bag of money.  The men served as distractions, as the perpetrator jumped into the nearby river.  Despite the creative approach, Anthony Curcio was arrested and tried for the robbery.

17.  Ellis T. Jones Craigslist Crimes

Ellis Jones played football at San Jose State, where his coach said he was not a disciplinary concern.  A different story unfolded as Jones was linked to a robbery plot involving Craigslist.  The man used classified ads to lure multiple victims to his location, before Tasing them or threatening them with a gun.  The motive was robbery, which did not end well for Jones who was eventually removed from the football team and brought-up on 13 charges of Craigslist wrongdoing.

18.  Killer: Alejandro Hernandez Rivera

Prostitution advertising is not limited to women on Craigslist.  Alejandro Rivera was a male prostitute advertising regularly online, when he met sixty-six year-old Theodore Neff in 2008.  The retired bank employee was a collector of rare flutes, which Rivera targeted to steal.  in the end, Rivera strangled Neff to death, before setting his house on fire and taking off with his expensive instruments.  Attempting to sell the flutes back to their maker, rivera exposed himself and was arrested for the murder.

19.  Baby Killer

After posting an ad on Craigslist for baby clothes, Korena Roberts met Heather Snively.  the two became fast friends, sharing what was thought to be mutual pregnancies.  The grisly case took a terrible turn when Roberts, who was not pregnant at all, carried out her unseemly plot.  the woman killed her friend, beating her to beat with a police baton, before removing the unborn baby from her womb.  Both victims died, for which Roberts received a sentence of life in prison with no chance of parole.  During the investigation, it was revealed that Roberts had attempted the scheme previously without success.

20.  Weyrick Murder

Sarah Weyrick was in dire straits financially, so she placed an ad on Craigslist to make some money.  her ad was found in the casual encounters section by a 31 year-old man with grisly intentions.  Some time after meeting with Phillip E. Bolden, Weyrick’s body was discovered in a burned-out vehicle.  She had been stabbed to death, with multiple knife wounds to her neck.  The car she was placed in was set ablaze to conceal the evidence, but the killer was eventually caught.

21.  Len Dykstra Craigslist Sex Crimes

Former professional baseball player Len Dykstra has previously been convicted of grand theft auto, resulting from a scam wherein he bought cars with fake paperwork.  The sports star turned criminal has had other run-ins with the law too, including a Craigslist crime spree involving sexual misconduct.  Dykstra admitted to his crimes, which are essentially the same in each instance.  He would call-in Craigslist advertisers for help around his home, only to inform them that the “help” included massaging him.  Several women came forward, including one claiming he held her at knifepoint, forcing her to rub him. Dyksta served his sentence for the Craigslist crimes concurrently with his auto theft stint, released in the summer of 2013.

22.  iPhone Robbery

When a buyer responded to a Craigslist ad offering a box of iPhones for sale, he got more than he bargained for.  According to the complaint, the Seattle man was instructed to meet the seller at a business location where he said he worked.  Once there, the buyer got into a car driven by the seller’s associate to complete the deal.  Given a box said to contain the phones, he set about getting the 10K in cash out of his trunk.  Instead of closing the sale, the seller pulled a gun and demanded the money.  The box the man was given contained only scraps of metal and trash.

23. Sister Act

Two Raleigh, North Carolina sisters hatched a robbery plot using Craigslist as their trap.  The offer was straightforward – two smartphones for $1100, according to the ad the girls placed.  When a Raleigh man showed up to close the deal, things got a little out of hand.  Instead of the smartphones, Sherida Quanette Bullock and Acqua Bullock produced a handgun, demanding the cash from the would-be buyer, Ibrahima Diouf.  When the man fled instead of giving up the money, the sisters unleashed a hail of bullets in his direction.  The Bullocks were each charged with robbery, as was a third woman, Sherie Brooks, who was eventually tied to the crime.

24.  Minister Goes Above and Beyond

Hiring a minister to conduct your wedding ceremony shouldn’t put you at risk, but apparently when Craigslist is used to find a pastor, anything can happen.  After officiating at their wedding, one Portland minister made-off with the couples’ wedding gifts.  Since the pair were remodeling, a majority of their gifts came as Home Depot gift cards.  The pastor was easy to locate by tracing the numbers on the cards, which led police to security videos showing the man redeeming them.

25.  Girlfriend Revenge

Breaking up is hard to do, but getting even was all that mattered for one Craigslist poster who used the site to seek revenge on his ex.  The depraved plan was to post an ad on Craigslist seeking a rape encounter, directing respondents to his ex-girlfriend’s home.  Unbelievably, he posted the ad and within a week a man broke-in to the girls home and raped her.  The former boyfriend, Jebidiah Stipe, communicated with the rapist even after the ad had been taken down, providing the woman’s home address and additional details about her “fantasy”.  Stipe was arrested, as well as the attacker Ty McDowell.

26.  Stripper Strike

Hiring strippers for bachelor parties is a tradition to some, but for two would-be strippers it was a one-sided affair.  A Huntington Beach man, doing his diligence as the best man, hired two women from a Craigslist ad to strip at a party for the groom.  Instead, the ladies collected their $500 fee and then bolted without stripping at all.  When the men tried to stop them, they were pepper sprayed and punched in the face.  The women escaped with the cash.

27.  House for Sale

The deal of the century presented itself to two Oregon women who had a chance to buy a luxury home for pennies on the dollar.  The deal they found on Craigslist appeared too good to be true, but the pair, Elizabeth Dorscht and Chandler Cook forked over the down payment anyway.  Not surprisingly, the house turned out not to be for sale, and the Craigslist poster disappeared with their money.  Lynne Sisto eventually pled guilty to orchestrating the creative scheme.

28.  Transgender Assault

Edward Terry Wallace responded to a Craigslist ad placed by three transgender ladies who identified themselves as such in the post.  The Chula Vista man reported to the trio’s home and proceeded to rape and beat them.  He used a stun gun to control them and robbed each of their cash, before sodomizing at least one of them.  For his crimes, Mr. Wallace received a 12 year sentence for sexual battery and robbery of the three.

29.  Sex Trafficking Trio

Selling sex is illegal in most places, but prostituting kids is in a whole different class of bad judgment.  Nonetheless, three enterprising Craigslist users managed to launch a child prostitution ring on the site.  Surprisingly, one of the perpetrators was a woman named Jessica King.  Along with her co-conspirators, Jordan Arnold and Christopher Black, King posted pictures of girls in lingerie on Craigslist.  The photos lured johns who hired the young girls for sex.  All three pled guilty to coercion and enticement of a juvenile into prostitution.  Sentences for each defendant were around five years apiece.

30.  Rape My Wife, Please

The bonds of holy matrimony didn’t stop an Idaho man from posting ads on Craigslist seeking men to rape his wife.  The twisted approach included communicating with the men who responded, eventually steering more than one of them to her home.  When one man tried to assault her, the wife grabbed her gun, discharging the weapon.  Police responding to the gunfire were brought up to speed about the depraved plot.  The husband admitted to his crime and faced the music in a courtroom.

31.  No Sex, No Money

A Texas man has been acquitted of killing a woman he met on Craigslist.  the man responded to an ad for sex, arranging to pay the woman $150 for the act.  He lived up to his part of the bargain, but she took the money without performing her end of the deal.  As the two argued over the cash, the woman, Lenora Fargo was shot to death.  In  a bizarre legal twist, the act was ruled self-defense because the shooter, Ezekiel Gilbert, was trying to recover stolen property at the time the shots were fired.

32.  Steven Lewis Kills iPhone Buyer

Lots of Craigslist crimes involve electronics deals gone bad, including the tragic shooting of Mr. Aung Thu Bo.  Responding to an ad for an iPhone for sale, Bo and his girlfriend met innocently with Steven Lewis.  But Lewis is a convicted felon who ended up taking the unsuspecting Bo’s life.  Despite trying to cooperate with the thief, Aung Thu Bo was shot dead in cold blood.  Lewis eventually confessed to the crime, claiming the gun went off accidentally.

Photo by jason lander group on Flickr

Photo by jason lander group on Flickr

33. Marine Shot Over Necklace

Lt. Col Karl Trenker stood-in for his fiancée who had posted a Craigslist ad to sell a gold necklace.  Trenker went to meet a potential buyer in her place, but ran into some trouble.  Despite meeting in an open area, the two men posing as buyers decided to steal the necklace and take-off.  As he pursued them on foot, Trenker was shot multiple times by one of the men.  Jeff Steele fired on Trenker as he chased him, striking him at least three times.  Using his military training, the 48 year old Marine plugged the wounds with his fingers, possibly saving his own life.

34.  Tiara Pool Murder

Tiara Pool’s killer responded to her Craigslist ad, prompting a meeting between the two.  They left the public meeting place to return to Pool’s apartment, where she was brutally murdered.  Her killer, David Sparre was 19 years old at the time of the crime, stabbing Poll more than 80 times.  The deranged Sparre was sentenced to death for the crime.  In a twisted jailhouse letter, Sparre told his ex-girlfriend that he would like to kill again.

35.  Daniel Cook ATV Killing

Daniel Cook and his girlfriend were interested in looking at an all-terrain vehicle offered for sale on Craigslist, so they traveled to Philadelphia to meet with the seller.  After separating Cook from his girlfriend and another traveling companion, Thomas Coffee robbed and killed him.  According to the girl, they were waiting for Cook to rejoin them when two gunshots rang-out.  The 23 year-old Willow Grove man was eventually arrested and charged with murder for posing as a Craigslist seller and taking Cook’s life.

 

 

15 Most Outrageous Bank Robberies of All Time

Clever thieves find all kinds of ways to get their hands on bank reserves, donning outrageous disguises and crafting elaborate strategies.   Throughout history, particularly brazen criminals have logged spectacular thieving efforts across the globe.  Success rates vary, but crime generally does not pay.  Public interest in robberies is directly related to the entertainment value provided by the crooks.  Interesting approaches, high paydays, and outright successes are embraced by observers, who root for creative criminals that beat the system.  Robin Hood effect aside, robbing banks is hard work – just ask the would-be gangsters on our list of outrageous bank robberies.

Photo by Ell Brown on Flickr

Photo by Ell Brown on Flickr

1. Knightsbridge Security Deposit Robbery

Spectacular robberies are especially captivating when criminals heist huge sums of money or large amounts of valuable goods.  The $98 million taken in this 1987 robbery ranks it among the top dollar-amounts ever stolen.  To pull-off the heist, mastermind Valerio Viccei and an associate entered the security deposit facility pretending they wanted to rent a security box.  Once guards and security personnel were vulnerable, the men overpowered them and took control of the bank.  After putting up a closed sign and letting-in their helpers, the men proceeded to clean out the safety deposit boxes.

The strongarm robbers did not get away with their crime.  Viccei was arrested and jailed, but due to laws in Italy where he was imprisoned, he led most of his life with lots of liberties.  He died under suspicious circumstances as police were sure his next plot was underway.  Like many criminals, Viccei led a high-profile life of luxury, which led to his downfall.  Before committing the Knightsbridge robbery in England, he was already wanted for dozens of bank robberies in his native Italy. Interestingly, Viccei befriended one of the law enforcement officers responsible for his arrest, frequently corresponding with him while incarcerated.

2. Dunbar Armored Robbery

Armored trucks ferry countless sums of money between banks and financial institutions.  In 1997, an employee of the Dunbar Armored Company decided to make a play for one of the largest cash heists in U.S. history.  The mastermind behind the crime, Allen Pace, was an inspector for the company who used his time there to plan a robbery.

With the help of five friends and passkeys required to access the facility, Pace took control of the depot on a busy cash night.  The men simply overpowered each driver as they came in with trucks full of cash, transferring the take to their own rented truck. Iin the end, the men loaded-up nearly $19 million dollars before high-tailing it.  the men managed to elude capture for years, making efforts to conceal their wealth.  A group of clues eventually led to one of the members of the crew, which started the whole case unraveling.  The men were eventually sentenced to terms ranging from seven to twenty-four years.  Most of the money was never recovered, including some that was burned to avoid being traced through sequentially numbered bills.

3. Brink’s – MAT Warehouse

One of the most notorious heists ever committed, the Brink’s-MAT robbery targeted the company’s bank facility at Heathrow Airport.  The conspirators got a little more than they bargained for, intending to steal a few million in cash.  Upon arrival, the six-man crew was greeted by nearly $30 million dollars worth of gold bullion, diamonds and cash.

The job was an inside effort, in part, aided by the cooperation of security guard Anthony Black.  The man is also responsible for the downfall of the group, as he was the one to turn over his fellow conspirators.  Once inside, the men disabled the remaining guards by dousing them in gasoline and threatening to set them ablaze if they failed to cooperate.  The crooks made off with 3 and one-half tons of gold, most of which has never been recovered.  Of the six original thieves, only two were ever sentenced for the crime, and the restitution for the entire amount stolen – nearly $28 million, was placed on a single perpetrator Micky McAvoy. Survivors associated with the crime are said to be cursed by it.

4. Dog Day Afternoon

Al Pacino portrayed a memorable bank robber in Hollywood’s Dog Day Afternoon, a depiction similar to a real life bank hold-up.  In August, 1972 two men, John Wojtowicz and Salvatore Naturile, undertook an infamous bank robbery plot that didn’t end well for the pair.  The poorly planned heist was a crime of passion, executed without basic precautions.  For example, the men were not disguised, leaving them vulnerable to identification later.  To make matters worse, they made no effort to conceal their fingerprints.

The men were homosexual, adding a further layer of notoriety to the crime, which actually drew gay rights activists to the crime scene.  the bumbling robbers spent too long looting the bank, so the police were able to resond and surround them.  The ensuing hostage stand-off provides the subject matter for the movie, in which Wojtowicz negotiates for help escaping. The poorly executed crime was too nerve-racking for the eighteen year-old Naturile, who was eventually shot dead by the police.  For his role in the crime, John Wojtowicz received a prison sentence totaling more then 27 years. Wojtowicz served 6 years of his sentence.  Although the film takes liberties with the story, most of the events depicted are true.  Some of the money given to Wojtowicz for his story was used by his partner to get sex reassignment surgery.

5. Northern Bank Robbery

This cash robbery stands as one of the largest takes in Ireland’s history.  There have been money-laundering arrests associated with the crime, but it remains unsolved in large part.  There is speculation that the IRA was involved in the heist, but all factions of the organization have denied involvement.

The Donegal Square headquarters of the Northern Bank was robbed in December of 2004, giving up nearly thirty-million pounds sterling to the thieves. First, the gang of criminals gained entry into the homes of two prominent bank officials.  Holding their family members hostage, the men were forced to participate in the robbery.  The timing of the robbery, before Christmas, gave the criminals access to a cash storage facility loaded with currency bound for the holiday shopping season. With the help of the terrified bank staffers, the gang was able to make off with millions worth of bank notes.  Since the robbery, bits and pieces of the haul have been recovered, and some individuals have been charged with attempting to launder proceeds from the robbery, but the investigation continues to this day.

6. Cheddington Mail Van Raid (Great Train Robbery) of 1963

An English train robbery intercepting a Royal Mail coach yielded a sizable pay day for the brazen gang behind the robbery.  As much as 2.6 million pounds was seized as the men took-over control of the train.  The coach was travelling between Glasgow and London, when the men engineered the track signals to facilitate their crime.  One of the men on the crew was an experienced train robber, so the men had his abilities to guide them.  After boarding the train and disabling the conductor with blows to the head, the men were able to gain control.

Bruce Reynolds, one of the group’s core members, along with 15 other men, concocted the robbery scheme including several of the gang’s central figures.  After gaining control, the men unhitched the cars they did not need and proceeded up the track to their waiting getaway truck.  Two tons of mail bags were loaded into the truck before the crew departed to a hideout seventeen miles away.  The crew divied up the take and hurriedly left their safe house as the area heated-up with police.  Their downfall ensued when a member of the gang failed to do his part by burning down the hideaway.  Using clues left at the hideout, investigators eventually caught up with a dozen conspirators, some of whom were given jail sentences of 30 years each.

Photo by colin.brown on Flickr

Photo by colin.brown on Flickr

7. Dar El Salaam Bank

This modern-day heist came amid turmoil in the Middle East, allowing guards at a Baghdad bank to walk away with a staggering sum of money.  In 2007 a group of insiders worked together to orchestrate one of the richest heists in history, bilking an Iraq bank out of an estimated $282 million in United States currency.

There are still mysteries surrounding the crime, which left the private banking facility reeling after several prison guards banded together to pull off the heist. The guards, who slept nights at the bank, disappeared along with the money, singling them out as suspects immediately.  The guards wre arrested quickly, and most of the money was recovered.  The incident is reminiscent of a move pulled by Sadaam Hussein in 2003, when he used his son to withdraw nearly one billion dollars from the bank before his collapse.  Most of the money was later found in the walls of the despot’s palace, but hundreds of millions have yet to be recovered.  While it is more of a “fleecing” than a traditional robbery, Hussein’s approach was no less criminal than that of the guards at the private Baghdad bank.

8. Cornerstone Bank Waco, Texas

Some bank robberies involve huge sums of money and cleverly devised plots, requiring intricate coordination between multiple participants.  Others are less complicated.  While giant paydays are the stuff of bank robbing legend, it is not only the dollars attached which make robberies outrageous.  Sometimes the motive, the amateurish crime itself, or the ridiculous follow-up create the true spectacle surrounding a crime.  In the Waco case of the Cornerstone bank, it is the antics of the unskilled criminal which propel the bank robbery into the outrageous category.

Hannah Sabata, a troubled 19 year old girl, had a beef with the government for taking away her child and charging her with neglect.  She also had mounting debt with no means to pay-up.  Hannah’s solution was not a summer job, but instead an impromptu bank robbery.  The young lady first stole a car to use for her getaway, before appearing at the bank to demand money.  With threats of violence, she convinced the teller to hand over the loot, which she successfully fled with.  Full of herself, and proud of the effort, she promptly logged on to her YouTube account to brag about her exploits.  So specific were her amateur videos that she showed the key to the car she stole and the stack of money taken from the bank.  Not only did she talk about the crimes, but she reinforced her guilt by writing about them for the world to see.

9. Bank of France Robbery in Toulon

The suspected mastermind behind this high-profile French robbery committed suicide in prison this year.  Marc Armando, sentenced to 18 years for his role in the famed heist, was incarcerated awaiting trial for a drug trafficking charge when his body was found hanging in his cell.  It is thought that Mr. Armando provided the coordination behind the 1992 Bank of France robbery known as the heist of the century.

To carry out the plot, a group of about 10 conspirators kidnapped a family member of a guard working at the bank.  With threat of harm to his loved one, and a back-up cache of explosives strapped to his body, the guard cooperated with the gang of thieves.  The crooks made away with around $30 million dollars, most of which was never recovered.  Some of the gang members were never prosecuted for their crimes, but a bulk of the gang was held accountable in court.  Within a couple months, authorities had rounded up a majority of the gang’s members, but only about 10% of the money they stole has been recovered to date.

10. Banco Central in Fortaleza, Brazil

In terms of values stolen during high-dollar bank robberies, this one lands in the Guiness Book of World Records for a “pure” bank heist.  Sure, Saddam Hussein fleeced his own bank for a cool billion, but that wasn’t a genuine effort like the Brazilian affair.  In 2006, a group of criminals numbering in the dozens banded together for the creative Brazilian bank robbery.  The gang posed as landscapers working in a nearby building, before digging a tunnel underground to their intended target.  The 250 foot passageway took them to the base of the bank, which they bored-into over the course of a weekend. In the end, the group took off with an estimated $70 million worth of stolen funds.

The gang was successful in removing what amounted to three tons of currency, and eluding police for a time.  To date, 28 members of the gang have been held accountable for their crimes, including Antonio Reginaldo de Araujo, considered to be the criminal mastermind behind the robbery.  Some of the conspirators already convicted are serving sentences as long as fifty-three years.  Despite rounding up a good share of the gang, only about 10-percent of the stolen money has ever been recovered.

11. Sentry Armored Car Courier Company

One of the largest cash robberies in United States history, the crime was against an armored transport company, but the take was money from banks.  Bounty valued at more than $11 million dollars was taken from the bank truck facility with the help of an insider.  One of the guards on duty the night of the crimes assisted the thieves, pretending he was the victim of an attack and robbery committed by three men.  The conspirators were exposed due to various money-trails left in their wake.  According to the gang, seven-million in cash was split between four robbers, resulting in money laundering concerns for the group.  After attempting to conceal some of the booty in Greece, and other amounts in Switzerland, some of the crooks U.S. holdings were exposed, leading to their arrests.

The guard on duty was found handcuffed to a pipe, complete with a detailed account of how he ended up there.  Unfortunately for the inside man, security records indicated that a garage door had been accessed by the guard.  His story unraveled when details of his account did not match facility records. To date, only about $1.5 million worth of the stolen cash has been recovered.

12. Seafirst Bank Robbery

This high-dollar heist became well known for the staggering take, but also for a quirky characteristic shared by the thieves.  When the two men robbed the Seafirst Bank in Lakewood, Washington they were commiting the richest bank robbery in history (at the time).  But they also wore trenchcoats, which immediately assigned the iconic feature to the case, forever known as the “trench coat robbery“.

Despite the novelty of the attire, real guns were used and the men behind the coats were not casual about their profession.  Ray Bowman and William Kirkpatrick were professional bank robbers, suspected in at least two dozen other robberies in Washington State.  At Seafirst, the duo walked away with nearly $5 million dollars and a place in the record books.  Unfortunately for the pair, they would trip themselves up with less than professional behavior.  Kirkpatrick was pulled over for speeding, yielding all kinds of clues during a search of his car.  In addition to fake documents and crime tools, Kirkpatrick carried close to $2 million dollars with him.  His counterpart, Bowman, didn’t fare much better, failing to pay his storage locker bill on time.  The owner of the locker opened it up, alerting the police to a cache of weapons found inside.  It was not long before Bowman was in custody too.

Photo by matteson.norman on Flickr

Photo by matteson.norman on Flickr

13. First Interstate Bank Bellevue, Washington

This bank was one of many robbed by a prolific couple doing business on the West Coast in the late eighties and early nineties.  John Madison and Carolyn Marie Williams carried out more than fifty armed robberies across California, Washington and Texas before being prosecuted for the First Interstate heist.  The couple used a precise M.O. each time they robbed, with Carolyn driving the getaway car and John brandishing a gun inside.  In fact, his calling card was to discharge a round from the gun into the bank ceiling, showing robbery victims he meant business.  His quirky habit earned him the nickname “Shootist” from police officers.

Both of the Williams’ pleaded guilty to their crimes and Johnny Madison received sentences totaling 92 years for the crimes he could be prosecuted for.  His own record-keeping helped police outline the eight year string of successful robberies committed by the Williams’.  By the time he was brought down in 1994, his running total was approaching one-million dollars.

14. Loomis Fargo Bank Robbery

In October of 1997 an enterprising employee of the Loomis Fargo Company put a robbery attempt in motion that would yield a $17 million dollar payday.  The mastermind was David Ghannt, a supersisor at the regional vault of the Loomis Fargo Company.  The robbery represents the largest cash heist on U.S. soil, but the bid was unsuccessful.

Eight people were eventually indicted as direct conspirators, as well as sixteen others identified as playing peripheral roles in the scheme.  Ghannt was suspected for his role in the crime almost from the beginning, as he went missing to Mexico shortly after the robbery.  His co-conspirators spent lavishly once he was out of the country, drawing suspicion and getting everyone noticed by the feds.  Nicknamed the “hillbilly heist” because of the participants’ lack of savvy, the crime was a highly popular late night comedy target. Despite the high-profile spending of the gang members, around 95% of the total take was eventually recovered or accounted for.

15. Geezer Bandit Hold-Ups

There is no way of knowing exactly what lies beneath the disguise of this bank robber associated with at least 16 crimes across California.  Is an elderly man, as it appears, really committing the brazen robberies?  Or is it the work of a clever master of disguises concealing his youthful identity in an effort to misguide investigators?  Whatever the case, the circumstances surrounding the robberies provide entertainment value as well as serious concern for victimized banks.

Many of the Geezer’s targets have been Bank of America locations, but his patterns are not exclusive to any particular company.  His approach is the same everywhere though.  He enters each bank with a satchel or briefcase, from which he extracts a note for the teller, which describes his or her imminent death if cooperation is not forthcoming.  His total estimated take has not been revealed, but the growing tally is assumed to be significant given the number of successful crimes he has pulled off.  During one robbery, he was seen to be fleeter of foot than most elderly subjects, supporting the theory that it is a younger person in disguise.  His or her popularity is explained by the unique nature of the effort, but there are twenty-thousand additional reasons for the public to pay attention to this story.  Information leading to the Geezer’s capture is worth $20,000 to the FBI.

5

10 Most Heinous Serial Killers of all Time

Throughout history, serial killers have made lasting impressions not only for the numbers of people they victimize, but also for the gruesome ways they operate.  Diabolical killers each leave their own unique signatures on the crimes they commit.  And when multiple victims surface, their notoriety grows.    Our unquenchable thirst for details about heinous criminals keeps the media scrambling for ways to showcase sensational crimes, spawning made-for-TV movies and documentaries about the world’s infamous killers.  As a result, serial killers live in infamy, as household names associated with some of humanity’s darkest moments.  These examples stand-out among history’s most depraved serial killers, landing them among our top ten.

Photo courtesy of Wikimedia Commons

Photo courtesy of Wikimedia Commons

1. Jeffrey Dahmer

Dahmer’s own end only added to the bizarre circumstances surrounding his case.  He was eventually beaten to death in prison, fulfilling the death wish he had expressed multiple times while incarcerated.  But the tale of his gruesome exploits started years earlier when he was exposed for a lengthy crime spree.  Dahmer’s case had all the hallmarks of a twisted serial murder plot, complete with cannibalism and necrophilia.  The contrast between the seemingly normal public life Dahmer lived, and the unspeakable acts occurring behind closed doors made the case all the more unusual.  In the end, being beaten to death in a prison bathroom was a fate many thought Dahmer had coming.

Details of Dahmer’s crimes continued to emerge for months after initially coming to light in the early 1990’s.  Dahmer, it turns out, had been trolling for victims at homosexual nightclubs, successfully luring them to his small urban apartment with promises of sex and drugs.  Once there, Dahmer engaged in various perversions including killing, dismembering and sometimes eating parts his victims.  By drugging his victims and killing them, Dahmer sought to possess them somehow, even freezing body parts to revisit later.  Drums of acid and other heinous instruments of horror were removed from his apartment in the days following Dahmer’s arrest, cementing his place as one of history’s most evil villians.  Jeffrey Dahmer Files explores the life of the killer in a quasi-documentary format.

Photo courtesy of The Orchid Club on Flickr

Photo courtesy of The Orchid Club on Flickr

2. John Wayne Gacy

The façade presented by serial killers leaves the public aghast at the nature in which pure evil moves through society.  Neighbors, friends, and local characters go from beloved to bedeviled when their unspeakable acts are revealed.  John Wayne Gacy was a well-liked local figure, so it was particularly disturbing when the series of murders he committed came to light.

Gacy was a visible public figure, even donning the costume of “Pogo the Clown” to participate in magic shows for children.  He ran a string of Kentucky Fried Chicken restaurants, and was popular enough to consider a run for mayor in his hometown.  But Gacy had perverse appetites which slowly came to light.  He was a sexual deviant, pursuing wife-swapping and prostitution, as well as sex with young men.  To feed his depravity, Gacy eventually kidnapped and murdered more than 30 men and boys, torturing and killing them after sex.  Over the course of many years, he buried the bodies below and around his home, leaving a trail of evidence for prosecutors.  Gacy was tried and put to death for his heinous killing spree and psycho-sexual exploits. Recently revealed tapes contain never before heard Gacy commentary.

Photo Courtesy of Florida State Archives

Photo Courtesy of Florida State Archives

3. Ted Bundy

The heinous nature of their crimes does not always indicate slow-minded killers.  In-fact, serial killers like Ted Bundy are usually of above average intelligence, sometimes by a significant measure.  Unfortunately, using I.Q. for evil, rather then good, often leads to prolonged killing sprees among criminals clever enough not to get caught right away.  Ted Bundy, born Theodore Robert Cowell, stands as one of the most prolific killers in history, eluding capture long enough to end the lives of at least 30 victims.  The true number of Bundy’s victims remains unknown and probably exceeds the specific killings he confessed to.

Like John Wayne Gacy, Bundy was a sexual deviant who eventually succumbed to his perverse desires, kidnapping and killing a string of women and girls throughout the 1970’s.  He was an attractive, charismatic individual who presented himself with a cast or crutches to lure women to his aid.  He’s kill them with blows to the head, and admitted to keeping parts of their bodies and having sex with their corpses.  He moved around in Washington, Utah and Oregon focusing on college campuses as sources for young female victims.  His trials were bizarre, and Bundy successfully escaped during one, by acting as his own lawyer and running from the unsecured law library.  Ted Bundy earned multiple death sentences for his serial killing spree, eventually being put to death by lethal injection, without taking responsibility for many killings believed to be his doing. There is strong support for findings indicating Bundy killed more than 100 people.

Photos courtesy of freeinfosociety.com

Photos courtesy of freeinfosociety.com

4. Edward Gein

Time tempers the impact of heinous crimes, but serial killers live long in infamy.  Ed Gein committed his twisted acts in the 1950’s, but remains the subject of fascination today.  In part, the gruesome nature of his crimes have served to keep them in the public eye.  Like his sick Wisconsin counterpart Dahmer, Gein was cannibal and necrophile haunted by bizarre obsessions.   In the end. exposing his seven year killing spree would bring some of history’s most depraved acts to light.

Gein’s obsessions included female anatomy, Nazi experiments on people, and an overwhelming desire to change his sex from male to female.  He initially robbed graves to support his bizarre desires, but his crimes eventually escalated into the murders of women and girls.  Clippings about the disappearances were found on his farm at the time of his arrest, along with a partially dismembered body.  As the investigation continued, unspeakable items were uncovered at Gein’s home.  Human body parts were utilized as household items, including skull-bowls and upholstery made of human skin.  A human heart was found in a pot on the stove.  Gein was institutionalized for the rest of his life, where doctors tried to uncover explanations for his psychotic, murderous behavior.

Phot courtesy of Florida Department of Corrections

Phot courtesy of Florida Department of Corrections

5. Aileen Wuornos

Serial killers are typically men, but the disturbing practice extends to the fairer sex as well.  Because of the violence and physical strength required to subdue victims, men are better equipped to commit serial crimes than women are, but Aileen Wournos provides a fascinating study into the twisted mind of a female serial killer.

Wuornos emerged from a troubled childhood with emotional scars and a young history of promiscuity.  At 14, she was sent to a home to give birth to a child, which was adopted.  She was a petty criminal early on, engaging in theft forgery and prostitution, while moving through a series of failed relationships.  In 1989, when bodies started appearing under suspicious circumstances, it foreshadowed the unfolding tale of a female killer on a spree.  Wuornos killed at least 7 men, using firearms to carry out her crimes.  She was eventually put to death and was portrayed by Charlize Theron in a Hollywood movie about her murderous spree.

Photo courtesy of Wikimedia Commons

Photo courtesy of Wikimedia Commons

6. Gary Ridgway

DNA advances changed outcomes for many modern day serial killers.  Linking criminals to victims using advanced DNA technologies provides the smoking gun responsible for bringing down some of history’s most notorious villians.  But the technologies have not been court-worthy for all that long.  Gary Ridgway was linked to his early-80’s crimes well before he was definitively tied to them with DNA evidence in 2001.  Ridgway had been killing since 1982 when he strangled a sixteen year-old victim to death.

Ridway’s death toll is disputed, but he pleaded guilty to 48 counts of murder.  It is widely believed he killed as many as 60 women in Washington State.  His killing spree was so prolific he cannot remember all his victims.  Most were young, many prostitutes that were picked up along Route 99.  To avoid the death penalty, Ridgway took police to four graves of his victims and confessed to many other murders.  He was sentenced to life in prison in 2003.  In his own twisted mind Ridgway thought he was performing a valuable service, ridding the streets of vile prostitutes.  His victims were commonly in their teens and early twenties.  He is known colloquially as The Green River Killer, for dumping remains near the site.

AP Photo

AP Photo

7. Donald Harvey

Serial killers satisfy unique perversions as they kill.  For some, it is a sexual gratification tied to misplaced feelings of affection and desire.  Others are obsessed with the human body, killing as a way to explore it in sadistic ways.  And killers have their own methods to their madness – some using guns to kill victims, while others engage in more personal slaying practices.  Donald Harvey is a notorious 1970’s killer that claimed is victims from a position of trust – as a nurse’s aid.

Using his access to patients to satisfy his sickness, Harvey poisoned hospital patients with cyanide and arsenic.  He eventually confessed to more than 70 murders, occurring before 1978.  An anonymous tip and police search of his home led to his arrest and convictions.  It is said that Mr. Harvey also infected patients, before nursing them back to health.

Photo courtesy of Texas Department of Corrections

Photo courtesy of Texas Department of Corrections

8. Henry Lee Lucas

Lucas and an accomplice carried out untold murders – ranging in the hundreds by many accounts. Their motivation appears to have been primarily justified as “thrill killings” conducted simply for the adrenaline rush.  Eventually convicted of 10 murders, Lucas avoided the death penalty when his sentence was commuted.  The decision to spare his life relates to doubts about the conviction that was to end it.  The killer was convicted in 1984 for the rape and murder of a victim clad only in orange socks.  The “Orange Socks” verdict was called into question by eveidence showing Lucas may have been in another location when the crimes were committed.

The prolific killer started close to home, claiming his own mother as his first murder victim.  His claims of self-defense were rejected, and he was sentenced to 20-40 years in jail.  After serving ten years of his sentence, Lucas was released.  There is no real way of knowing how many people Lucas actually killed, he was well-known for exaggerating his claims, and at various times confessed to murders numbering in the thousands.  Plausible victims stand in the hundreds, but Lucas’ death in 2001 took his secrets to the grave.

Public Photo

Public Photo

9. Charles Manson

No list of infamous serial killers is complete without references to the crimes of Charles Manson.  The famed leader of a remote hippy cult is responsible for some of the most high-profile killings in world history.  Manson was the leader of a commune, enlisting followers to do his dirty-work.  The sensational nature of the group’s murders and the antics of the ensuing trials stayed in the public spotlight for years.

Manson was a failed musician with enough charisma and intelligence to dupe followers into thinking he was the second coming.  Two famous crime scenes provide the Hollywood backdrops for atrocious acts of violence committed there.  Manson followers, both men and women, participated in gruesome murders at the home of Sharon Tate, an actress and husband of film director Roman Polanski.  She was pregnant at the time of her death, which resulted from multiple stab wounds.  Several people died there, and at the home of Leno and Rosemary LaBianca who aslo fell victim to the Manson “family” killing spree.  Cryptic clues scrawled in blood of victims were left behind at the crime scenes, which were horrific.  Manson was eventually linked to the crimes.  During his trial followers conducted organized demonstrations and his co-defendents mutilated themselves in shows of support for Manson.

Public Photo

Public Photo

10. Dean Corll

Known as the Candy Man in his home neighborhood, due to his family’s candy business, Corll was in fact a brutal serial killer.  In the early seventies, Dean Corll raped and killed at least two-dozen young men and boys.  The “Houston Mass Murders“, as his crimes came to be known, were carried out with the help of accomplices in the Houston area.  In fact, Corll’s involvement in the crimes did not come to light until he was shot by one of his co-conspirators.

Corll, an Army veteran, had a predilection for sex with young boys, who he raped and killed with the help of accomplices.  A steady-stream of victims were furnished by Corll’s associates, who also sometimes participated in the attacks.  During a falling-out, Corll was shot to death by one of these associates.  After his death, the magnitude of Corll’s crimes started to unfold.  He had sadistically abducted, raped, tortured and killed dozens of boys under the age of 18.  As his accomplices identified victims and led police to bodies, the heinous nature of this serial killer was exposed.

Moms: 10 Must-See Ways to Keep Your Kids Safe on Facebook

Social media advances open channels of communications that impact people’s lives in positive ways, but there are also risks associated with connecting in this way.  Savvy users know the ins and outs of the system, but children are not always prepared to defend themselves against web-based threats.  For concerned parents, following strict safety protocols provides the best assurance against harmful consequences for younger family members.

Photo by karindalziel on Flickr

Photo by karindalziel on Flickr

Facebook is a relatively open forum, allowing users to post personal information about themselves.  If the proper controls are not used effectively, sensitive information can fall into the wrong hands.  Young children are especially vulnerable, but even teens familiar with the platform take missteps along the way. To limit their exposure to unnecessary risks, follow these basic guidelines for keeping kids safe on Facebook.

1. Protect Passwords

Passwords play a vital role in internet security, so attention should be paid to this Facebook feature.  First, passwords should be selected sensibly, rather than falling into the standard patterns of using pets’ names and birthdays for safety codes.  Instead, mix up your signals with words that don’t point to you, and include both upper and lower case characters in the passwords you select.  Special characters like dollar signs and ampersands strengthen security too, adding additional layers of complexity to password choices.  Passwords should be changed periodically  to hedge against familiarity that lets your guard down.  Parents must specifically retain their children’s Facebook passwords, helping kids manage their safety.

As you work with your children on Facebook, stick to the same password principles you apply to other online security situations.  The object of your password selection is to do the most you can to discourage intruders, frustrating them into leaving your child’s account alone.  Computer programs used by online attackers sometimes cycle through hundreds of password combinations every second, attempting to decipher your code.  Never use your own name, or a combination of your first, last or middle name as a password.  It is simply too easy to link information like your name to your password.  Always use combinations of letters and numerals in your child’s password, making it harder to crack.  longer is better too, creating statistical advantages for each character you add to your password.

2. Monitor Facebook Activities

Nobody wants to overstep their boundaries enforcing children’s internet usage, but monitoring kids’ online behavior is the only way to insulate them from Facebook opportunists.  Parents in-tune with photographs posted by their kids have censorship abilities that can head-off problems before they happen.  And monitoring interactions with other users provides assurances that kids are not running with the wrong Facebook crowds. Free monitoring tools are available online, and for parents wishing to distance themselves from the effort, professional monitoring services do the job for hire.

It is important for parents’ to remember that kids have no expectation of privacy online, especially concerning social networking and sites like Facebook.  Your duty to protect your kids at all costs is relieved by the virtual nature of online platforms where your kids participate.  Check-in on your child’s Facebook usage from work if you have to, but don’t give them a pass for their online hobbies.  Friends of your children are also good resources for keeping an eye on your own kids.  Check friends’ accounts periodically to see what they are sharing about your children.

3. Censor Yourself

The easiest way to avoid problems with Facebook is to filter what you share via the site.  Despite its personal nature, connecting friends and family in intimate ways, Facebook is a public clearinghouse for information – viewed by hundreds of thousands of users daily.  Actively limiting what you make available to Facebook users is the only way to maintain control of sensitive photos and information.  Children share too much anyway, even during face to face interactions, so extra care must be taken to censor them online.  And teens with the world by the tail sometimes need to be reminded of the permanence of the internet, and the need for self-censorship.

Facebook users are advised to post only things they’d happily share with just about anyone.  Assuming that posts will be respected and taken at face value is the wrong approach.  Facebook users preying on children thrive on bits of information they can use to get their way.  Showing their vulnerabilities online opens the door for predators waiting to take advantage of your children’s trusting natures.

4. Learn and Use Facebook Safety Features

Facebook’s efforts to protect you online are less effective when users are in the dark.  To get the most from them, learn your options for security, so that you are an active proponent for your child’s online safety.  When in doubt, change settings to “only friends”, limiting access for unapproved visitors.  And always think of Facebook as an evolving resource, staying on top of security changes as the develop.  Features like Active Sessions and Login Approvals add extra layers of security to Facebook, protecting children from unauthorized access.  Features like Facebook’s one-time password may not seem child-centric, but every effort to bolster your online security protects them too.  The disposable passwords are designed for instances when you don’t want to sign in using your real information.  When using public computers or accessing Facebook from handheld devices, App Passwords are another option for protecting your Facebook sign-in information.

Trusted Contacts are maintained by Facebook users to ensure there is a safe contact available at all times.  Designated users are assigned Trusted Contact status at your own discretion, for help when you are unable to access your Facebook account.  Simply contact them when you forget your password or login information, and they can provide them for you.

5. Know What Others are Posting About Your Child

Facebook photos and other details about your children’s lives don’t always come from the horses mouth.  Friends and classmates are often guilty of handling these items loosely, leaving undesirable links to your child on the World Wide Web.  In cases where others post the wrong message about your kids, it might be necessary to have them remove the photos or sensitive information.  While it is easy to limit your own sharing, monitoring others output can be more difficult.  Make sure your children are well-versed on what is and isn’t appropriate for friends to share online.

Photo by wetwebnetwork on Flickr

Photo by wetwebnetwork on Flickr

Losing control of your online identity can happen quickly, especially for children, whose social lives are much more micro-managed than most adults. Unfortunately for some, things start unraveling before there is time to set up damage control.  “An ounce of prevention is worth a pound of cure” could not be more true than itb is on Facebook.  That compromising photo, or ill-advised Facebook post are no threat at all, provided they do not exist.  Trusting immature intuitions is not a sound strategy for parents – even the most well-behaved kids fall prey to moments of poor judgment.  The key is to equip them with the tools for knowing when an innocent friendly exchange might be a mistake that follows them forever online.

6. Don’t Friend People You Don’t Know

Managing who you are linked to on Facebook sets the tone for your online identity.  Don’t automatically friend Facebook users just because they want to link to you.  Instead, actively screen your children’s friends so that they are precisely the folks your kids are online to connect with.  Fake profiles are used to run Facebook scams, phishing for information and creating spam opportunities.  Don’t allow opportunistic criminals to prey on your children’s accounts under the guise of friendship.  The same goes for tagging people in photos and using other facebook options.  These features are designed with adults in mind, and are not designed as random clicks for kids.  As an adult representative, it is your duty to keep your children up to speed about Facebook features, so they are used properly and don’t call unwanted attention toward your kids.  And stay abreast of changes, like a recent Facebook addition allowing hashtagged posts to become clickable.   As features change, past posts and future ettiquette do too.

7. Protect Personal Information

There is really no reason to post sensitive information in your Facebook profile.  Phone numbers, residential addresses and private information should not be visible to the public.  Putting these bits of data out there for all to see creates easy access for internet scammers.  Even birthdays should be guarded, released only to those you know and trust.  While the social element of a happy birthday may seem innocent enough, date of birth is a prized piece of personal information for identity thieves and others using Facebook to mine data.  Further protection is added by guarding email addresses and running up to date anti-virus programs on your child’s computer.

There is no limit to the creativity employed by thieves and other internet scammers preying on children.  Consider your child’s identity to be a big puzzle, with bits of personal information representing its individual pieces. Your job then, is simple:  Keep the pieces out of the hands of the bad guys.  Each vital statistic helps predators create the mosaic they’d like to use to gain something from your kids, so even the most innocuous details should be coveted by parents.

8. Guard Your Child’s Location

Revealing too much about your location and the activities you are engaged in can be problematic online.  When you check-in on Facebook, it is not necessary to identify where you are, or more importantly – where you aren’t.  Much has been made about location-oriented social sharing apps, and for good reason.  Outlining your vacation itinerary on Facebook, for example, is a bad idea.  When schedules are shared thieves know you are not home, so your house automatically becomes more attractive as a target.

Emphasize the importance of location anonymity to your under-aged Facebook users, encouraging them to use other modes of communication to share certain information.  Facebook users targeting children like to see location posts from minors, because they often contain indications that parents will not be present. Opportunists’ sophisticated efforts to get into kids’ inner circles are greatly assisted by notifications that combine locations with activities, such as “Hey world, we are in Dan’s basement playing online while his parents cruise the harbor until 11:00 o’clock.”

9. Reinforce Good Judgment

Even though Facebook employs added security features for teen accounts, there are still ways for kids to get in over their heads.  Parents and kids need to work together to stay safe online, rather than as adversaries.  Taking into account the prominent roles computers play in modern teens’ lives, it becomes clear that a strong-handed approach might not be your best bet.  Keep communication lines open, learning from your children as you go.  Judgment calls successfully navigated by kids should be rewarded and reinforced, providing incentives for future conservative Facebook behavior.

There is a good chance your own kids know more about Facebook than you do, so you are in it together.  While this might be okay with you, it is natural for kids to push-back at certain ages.  As you and your family embrace new technology, don’t forget that it is uncharted grounds for everyone aboard.  Discover the best ways to incorporate advances into your lives together, so that everyone is on the same page.  If your child has different ideas about the ways he or she would like to proceed online, help them get what they want from the experience, without compromising their safety.

10. Create Your Own Facebook Page

Familiarity breeds security online, so parents should participate on Facebook to better understand it.  Friend your own kids, especially younger ones, and have discussions about online boundaries.  The fine line parents are sometimes required to walk extends online, making sure kids know you are there, while respecting their space too. Having a page also lets you lead by example.  Your posts are available at all times, for your own kids and others to use as guidelines for proper Facebook etiquette.

What you choose to do with your Facebook account is up to you, but more than one parent signing-up to monitor children have become avid users of the site, finding benefits they may not have anticipated.  Whatever you do, make sure your Facebook presence doesn’t hang over your kids like a scarecrow looming in the garden.  While there are plenty of risks to be found online, Facebook and other social sites are primarily conceived to provide enjoyment for users, which is diminished by over-bearing parents.  And don’t lose sight of the adult nature of Facebook, which is not technically designed for participation by users under the age of 13.

 

Hiding Your eMail: 172 Ways to Keep Everything You Do Online, Secure

Realistically, anyone with access to data dumps from fiber-optic lines belonging to American telecom carriers will eventually be able to read your communications. However, it’s entirely possible to make it much more difficult for anyone to be able to pinpoint and decipher your movements online. When you can hide a message so that no one even suspects it exists, that is most secure, and if you can use a less traveled path of connection it also helps hide your tracks.Some people have figured out smart ways to stay invisible, but connected.

But if you’re like most of us and still using the public telecom system for browsing and e-mail, you’ll want to try out many of these 172 privacy tools to anonymize your web presence, encrypt your data, and erase your tracks.

  1. SSL – Secure Sockets Layer (SSL) protocol is a layer of software that operates between HTTP (internet protocol) and TCP (protocol for moving internet data from point to point), and it preserves security in internet transmissions by using RSA encryption.
    SSL

    Socket wrench, universal joint and sockets. Courtesy of Kae, 9 December 2008

  2. NoScript – NoScript is an extension for Mozilla-based browsers that uses a whitelist to decide which sites can use plugins like JavaScript, Java, and Flash. It also lets you control cross-site scripting and clickjacking.
  3. HTTPS Everywhere – HTTPS Everywhere is an extension that works with either Firefox or Chrome, and the “S” means your HTTP connection has been secured by encrypting data that passes between your computer and other network locations.
  4. CyberGhost – CyberGhost advertises itself as a free utility permitting anonymous web surfing, and it also encrypts all your transmissions, which is perfect protection for any public location.
  5. LastPass – LastPass is a secure password manager that gives you one master password to access its interface. LastPass will then use your stored credentials to log you into any other site you request.
  6. LongURL – LongURL is a web interface that expands short URLs so you can see where a link is taking you. It supports a number of formats like TinyURL and bit.ly.
  7. Trusteer Rapport – Trusteer Rapport’s endpoint security software performs ongoing data collection to power its behavioral algorithms in order to block phishing attacks and installations of Man-in-the-Browser malware.
  8. Two-step verification – Two-factor or two-step authentication adds security to your login by requiring two pieces of virtual identification from you. Google’s version asks for a password plus an on-the-spot phone code.
  9. VirusTotal – VirusTotal is a free online utility that lets you scan dubious-looking files (maximum size is 64 MB) and URLs. VirusTotal records scan results and makes that dataset available for searches.
  10. Tor – Tor keeps your browsing anonymous by using onion routing, a network of virtual tunnels which screens your location and activity within the network to make sure no one eavesdropping on the network knows who’s communicating.
    Tor

    Barbus tor or Tor tor (Hamilton, 1822) from the Bhavani river. Courtesy of Henry Sullivan Thomas, The Rod in India, 1897

  11. Duckduckgo – Duckduckgo is a search engine that keeps your searches private by refusing to collect or share any information about you and what you search for on the web.
  12. StartPage – StartPage is another private search engine that functions as a go-between, removing any data on you from your web queries before sending them to Google and relaying Google’s answers back to you.
  13. Smart Referer – A Firefox add-on called Smart Referer lets your browse anonymously by removing any information about where you came from when you use a link to move from one site to another.
  14. Bitdefender QuickScan – Bitdefender QuickScan is an online virus scanner to detect any malware currently running on your device. Don’t ever permit this kind of scan from an unknown agent, but you can trust Bitdefender.
  15. HTTPS – HTTPS is a secure network communication protocol that adds HTTP programming, for hypertext capability, to SSL/TLS programming, for security. Security includes encryption and certificates used to identify the sender and receiver of transmitted data.
  16. Sophos Virus Removal Tool – Sophos Virus Removal Tool is a free download that looks for viruses, spyware, rootkits, and the Conficker worm. It checks not only files but also both user and kernel memory .
  17. Microsoft Safety Scanner – There’s no charge to download the Microsoft Safety Scanner, and its 10-day expiration date means it’s intended for one-time use, to address a specific infection.
  18. VPN – A VPN, or virtual private network, provides private communications between computers using the public telecom system. This is achieved using tunneling, and it’s a cheap substitute for a secure private line.
  19. Dropbox – Dropbox is a free cloud service with security features (SSL and AES-256 bit encryption) that lets you save and share files. When you save a file on Dropbox, Dropbox in turn saves that file on all your devices.
    Dropbox

    VR pillar box in George Street, Oxford, England. Courtesy of Motacilla, 11 October 2011

  20. FTPS – FTPS (secure FTP) is a new version of the old FTP (file transfer protocol), updated to add security. It’s a file transfer utility that moves data over an encrypted channel.
  21. TLS – TLS (transport layer security) is a secure communications protocol intended to supplant the older SSL, using symmetric cryptography for privacy and an MAC data integrity check.
  22. CuteFTP – CuteFTP is an FTP program that consolidates all older versions, including Pro, and offers a new mobile service called TappIn that gives you instant secure FTP connections among all devices on your network.
  23. ShareFile – ShareFile is a Citrix product, a top-end secure file transfer package with a high file size limit (10 GB). Data storage meets SSAE 16 guidelines.
  24. Core FTP LE – There’s no cost to download Core FTP LE, a file transfer utility that lets you choose among five different security protocols. It has no nags, ads, or registration.
  25. IronKey(tm) – IronKey(tm) secure flash drives have a Cryptochip feature to ensure drive encryption and password requirement. Certified to meet Federal Information Processing Standards (FIPS) 140-2 Level 3 standard.
  26. Keystroke Interference – Keystroke Interference thwarts keylogging software, which records your keystrokes, by adding random characters to all your input. It includes AI to learn and camouflage your personal style of typing.
  27. HouseCall – HouseCall from Trend Micro is a free online scanner that targets viruses, Trojans, worms, harmful browser plugins, and malware. Now has added ability to specify files and folders.
  28. Check Point GO – When you plug in a Check Point GO secure flash drive, it creates a protected environment so you can work from someone else’s PC without risking your data. Includes VPN client.
  29. Linux – Linux the operating system boasts two strong security advantages. Different levels of access shield sensitive data, and varied distribution details mean one virus design can’t affect all Linux users simutaneously.
  30. Wontok SafeCentral – Wontok SafeCentral is a packaged solution for businesses that ensures safety by preventing applications from interacting with anything other than Trusted Security Extensions, thus foiling malware.
  31. SecureAnywhere(tm) Complete – SecureAnywhere(tm) Complete gives you continual anti-virus protection for all types of devices, including browser warnings. It even protects you while you’re signed into Facebook and Twitter.
  32. Firesheep – Firesheep is an extension for Firefox that shows users which of their HTTP connections (e.g. to Facebook or Twitter) inadvertently reveal their account information. In public wireless tests, Firesheep listed all insecure accounts of users in the vicinity.
  33. HTML Purifier – HTML Purifier is a HTML filter library that uses a whitelist to block cross-site scripting (XSS). It’s a handy open-source tool for anyone who has to produce secure HTML pages.
    HTML Purifier

    Tata Swach is a low-cost water purifier that works on the principles of nanotechnology. Courtesy of Globalfunky, 27 May 2010

  34. Proxy server – Proxy servers are the core of anonymization on the web. Any direct communication between your computer and another network location may compromise your data, but if you communicate only with a proxy that proxy will relay your requests to the outside world and bring the responses back to you.
  35. Windows Defender – Windows Defender was originally designed to combat spyware, but has been expanded in scope to cover all malware. Your PC may not have shipped with Defender turned on, so make sure to check its status.
  36. Spybot – Search & Destroy(r) – Spybot – Search & Destroy(r) is a perennial classic in spyware detection, and even though it’s added anti-virus protection it’s still free. Use the Immunize function to strengthen your browsing defenses.
  37. MailWasher – MailWasher blocks spam and the viruses it can contain by letting you preview e-mail safely. You can examine what’s on your remote e-mail server and download only the mail you know to be no threat, deleting the rest.
  38. Active Spam Killer – Active Spam Killer (ASK) is for Unix and Linux installations. It filters out spam by sending a confirmation request when it receives e-mail from an unknown source, then whitelists the senders that reply.
  39. McAfee SpamKiller 4.0 – McAfee SpamKiller 4.0 is a standalone spam filter that lets you filter and review e-mail that’s on your remote server before you download it, so you don’t have to risk bringing questionable mail onto your own computer.
  40. Wireshark – Wireshark is a network security tool that allows you to analyze your network traffic by capturing and displaying packets of data in a comprehensible format as they pass through your network.
  41. Snort – Snort detects and prevents network intrusions. It’s free, it’s open source, and it can be used as a packet analyzer, packet logger, and threat defense system.
  42. SpiderOak – SpiderOak secure cloud storage provides an online home for data stored on all kinds of devices. It’s instantly accessible, completely private, and includes synchronization for file-sharing.
  43. TrueCrypt – TrueCrypt provides free disk encryption software for Windows, Mac, and Linux. You can encrypt any of the following: virtual disk, partition, flash drive, or OS partition.
  44. Cain & Abel – The best way to determine password strength is to test it using a password cracker, and Cain & Abel provides that service for any Microsoft OS.
  45. John the Ripper – John the Ripper was designed as a fast password cracker targeted at identifying weak Unix passwords, but you can also use it to test passwords for other operating systems like Windows and DOS.
    John the Ripper

    Image: A Suspicious Character, collection: Illustrated London News, With the Vigilance Committee in the East End, October 13, 1888. Courtesy of Illustrated London News, artist unknown, uploaded by Jack1956

  46. fgdump – fgdump is an updated version of an old favorite password tester called pwdump, and it specializes in Windows-resident NTLM and LanMan passwords. Requires administrator access.
  47. KeyScrambler – KeyScrambler’s different versions support anti-keylogging measures in between 32 and 200 browsers, depending on how much you pay. Premium also protects your keystrokes in cloud services Dropbox, Google Drive, and Sky Drive.
  48. Tcpdump and libpcap – Tcpdump and libpcap together form a perennially loved and used network traffic analysis package, in which tcpdump captures packets as a command line utility and libpcap is a complementary C/C++ library for that traffic capture.
  49. Kismet – If you need a program that performs packet analysis for wireless networks, try Kismet– it can detect other networks and tell you whether anyone’s breaking into your network.
  50. OpenSSH – If you ever experiment with building your own internet communications system rather than using a third-party browser and e-mail application, you’ll need a basic encryption tool like OpenSSH to shield all your data traffic.
  51. PuTTY – PuTTY is a perfect example of a simple internet transmission program that goes through telnet and uses SSH for security. What PuTTY does– open a secure channel through which your computer can access another directly– is how the peer-to-peer internet used to work, and the privacy advantage is obvious.
  52. SSH – SSH, or Secure Shell protocol, provides guidelines for secure and private login and exchange of information over the insecure public telecom system. It replaces the old telnet protocol.
  53. Ettercap – Ettercap lets you stress-test your own network by launching man-in-the-middle attacks in which it intercepts and alters communications. Don’t miss the countermeasures section to help you use what Ettercap teaches you.
  54. IP identifiers ping, dig, and traceroute – Any time you need to know the identity of an IP making unsolicited contact with your computer, remember these three basic tools that can help you track down the offender: ping, dig, and traceroute.
  55. Paros – Not sure whether one of your web applications has been secured? Test it with Paros, a Java-based proxy that reveals vulnerabilities to frequently used attacks like cross-site scripting.
    Paros

    The Paros seafront in Greece. Courtesy of Dimorsitanos, August 2009, cropped by Beyond My Ken 20 September 2010

  56. Fake AP – If your wireless network has suffered unauthorized activity, or has shown up on a public detection map without your consent, you can camouflage your location by erecting a screen of short-lived access points with Fake AP. For defense purposes only, please.
  57. Google Hacking for Penetration Testers – Google Hacking for Penetration Testers: This remarkable paper on revealing your system’s vulnerabilities by using Google queries will show you how easily an attacker can view website pages you thought were securely hidden.
  58. Procmail Sanitizer – Procmail Sanitizer is a behavioral e-mail security tool. Instead of checking for viruses, it lets you choose a set of rules such as “attachments cannot access the registry or execute code” limiting what your e-mail and its attachments are permitted to do on your system.
  59. Sender Policy Framework and Sender ID – Sender Policy Framework (SPF) and Sender ID are similar methods of validating IP addresses permitted to send mail from your domain name, used as authentication that distinguish between legitimate mail generated by you and spam.
  60. Tails – Tails is a portable OS that lives on a DVD or flash drive. It includes a number of built-in applications like a browser and an e-mail client, and it’s designed so you can use any computer to surf anonymously.
  61. S/MIME – Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol secures your e-mail by laying out rules on how to encrypt mail, ensure message integrity, and authenticate senders using digital signatures.
  62. SonicWALL(tm) – SonicWALL(tm) Email Security is a strong, scalable business package by Dell that includes controls for each end user mail account, so you can tailor user permissions individually.
  63. Barracuda Email Security Service – Barracuda Email Security Service (BESS) offers secure cloud e-mail to businesses that want to host their own e-mail but pay a third party to provide spam filtering and malware protection.
  64. Norton AntiVirus – Norton AntiVirus is a gray eminence in the world of paid malware protection, and while its 2014 product is double the price of the original, the software is still reliable.
  65. Enigmail – Enigmail is a plugin for Thunderbird and Seamonkey that adds OpenPGP protection to your e-mail by way of both encryption and digital signature authentication. Requires the free GNU Privacy Guard.
  66. Cloud Security Readiness Tool – Microsoft’s Cloud Security Readiness Tool requires you to answer a set of questions about your current IT setup to generate a report in response, aimed at exploring how moving to the cloud can help secure your business data.
    Cloud Security Readiness Tool

    Clouds. Courtesy of Santhosh kumar, 23 June 2012

  67. Trend Micro SecureCloud 1.1 – Trend Micro SecureCloud 1.1, for users of Trend Micro’s Beta Portal, provides encryption for your cloud storage. Service includes your choice of AES encryption type.
  68. CipherCloud for Google Gmail – CipherCloud protects your all business data traveling through Gmail by providing a secure reverse-proxy interface and a mail transfer agent that adds encryption for inbound mail.
  69. Porticor Virtual Private Data – Porticor Virtual Private Data is a cloud system that uses encryption to guarantee data security that will meet regulatory requirements for safeguarding sensitive customer informtion.
  70. CloudPassage Halo – CloudPassage Halo offers secured cloud storage geared at businesses that must comply with regulatory requirements for protecting their data. Halo lets you automate your security policy while adjusting the parameters of your storage at will.
  71. The Bat! – The Bat! comes in several flavors and offers e-mail encryption plus secure authentication. SecureBat! is now The Bat! Professional, and its addition of hardware tokens produces very strong security.
  72. The Anonymizer – As you gathered from the “legacy content” notice, the original Anonymizer was one of the first anonymous surfing services appealing specifically to users who objected to being tracked. You can pay for today’s Anonymizer, or treasure the memory.
  73. Proxymate – If you’ve always wanted to access websites that are forbidden to U.S. surfers, try a proxy based in another country. You can gamble on British sites by routing your traffic through Proxymate.
  74. Onion routing – Onion routing, like so much of web technology, originated with the U.S. military as a DARPA project. It was devised as a means of hiding location information, and that’s the same function it performs today in anonymous surfing.
  75. HidemyAss with PPTP – HideMyAss is an anonymous surfing service that employs Point-to-Point Tunneling Protocol (PPTP) to give you an encrypted VPN connection, and supplies clear instructions on how to set up a PPTP connection with a dialer.
  76. Guardster – Guardster has several different proxy products aimed at privacy, including a free online proxy service and two subscription services, an encrypted SSL proxy and a secure SSH tunnel proxy using the SOCKS, or Socket Secure, protocol.
  77. iPhantom – The iPhantom proxy service keeps you anonymous during your contact with other web locations, and for further privacy does not store any of the identifying information describing your contact with the iPhantom server.
  78. IP Hider – AllAnonymity’s IP Hider inserts a proxy server to relay your web requests, meaning the IP visible to marketing trackers belongs to that proxy rather than your computer.
  79. AVG – AVG Free is one of the anti-virus programs that offered enough quality to break the grip of paid services like Norton. Those companies used to sell AV software with free updates, and when they converted to a package-plus-subscription model they inadvertently sparked the boom in AV freeware.
  80. avast! Free Antivirus – avast! Free Antivirus is a justly favored product, delivering sturdy detection and removal at no cost for a full quarter of a century. Happy Birthday, avast! Many people team avast! with AVG because what little one might miss, the other usually catches.
    avast! Free Antivirus

    Capture of the Pirate, Blackbeard, 1718 depicting the battle between Blackbeard the Pirate and Lieutenant Maynard in Ocracoke Bay. Courtesy of http://www.neatorama.com/2007/10/22/pirate-lore-7-myths-and-trrrrruths-about-pirates/,
    by American painter Jean Leon Gerome Ferris, 1920

  81. Panda Cloud Antivirus – Panda Cloud Antivirus protects your stored data from viruses and spyware. It uses behavioral analysis to recognize and stop new malware and includes community firewall protection.
  82. Malwarebytes Anti-Malware Free – Malwarebytes Anti-Malware Free specializes in removing all kinds of malware, but is particularly effective against worms, trojans, rootkits, rogues, dialers, and spyware. You can automate updates and scanning.
  83. Ad-Aware Free Antivirus+ – Ad-Aware Free Antivirus+ adds anti-virus capability to its classic spyware defenses. It now prevents malware from being written to disk in an inadvertent download, and runs unknown executables in a safe sandbox environment.
  84. Comodo Antivirus – Comodo Antivirus offers a free edition that keeps viruses and other malware of all your devices. It employs cloud-based scanning to find questionable hidden files.
  85. Comodo SSL Certificates – Comodo SSL Certificates are your way of guaranteeing your web customers safe contact with your site, using SSL to shield customers’ personal financial information. Comodo has been in the SSL certificate business since 1998 and provides good client support.
  86. Emsisoft Emergency Kit – If you have ever been confronted with an infected PC and encountered difficulty controlling its behavior, you’ll welcome the Emsisoft Emergency Kit. It downloads onto a flash drive, and you can plug in the drive to scan your PC for viruses.
  87. Avira Free Antivirus – Avira Free Antivirus provides not only broad-spectrum malware protection but also adds two extra features by way of a toolbar to block tracking in your browser and rate the security levels of sites you visit.
  88. Rohos Mini Drive – Rohos Mini Drive lets you password-protect your flash storage with a hidden, encrypted partition. The Portable option lets you use a similar secret partition on any PC.
  89. Kryptelite – Kryptelite is freeware that provides basic encryption and decryption ability, and if you upgrade to other Kryptel products you can get more advanced features like encrypted backups and scripted encryption.
  90. Pismo File Mount Audit Package – Pismo File Mount Audit Package lets you mount several file types as virtual folders, including encrypted, password-protected private folders which let you conceal data on your drive.
  91. Free File Camouflage – Free File Camouflage is a steganography tool that lets you hide your messages inside a .jpeg image file. The goal of steganography is not only to encrypt but to let your messages escape notice altogether.
    Free File Camouflage

    Mgr Patrick Le Gal, évêque aux Armées françaises. Courtesy of Mangouste35, 06/08/2008

  92. Ad-Aware is no longer safe as of testing September 9, 2013 – Hearts all round the world broke when Lavasoft, producer of once beloved antispyware stalwart Ad-Aware, inserted unwanted toolbars and even a browser hijack into free Ad-Aware downloads. You can avoid lengthy and painful removals by avoiding Ad-Aware altogether.
  93. CTI Text Encryption – CTI Text Encryption is a free text encryption tool with support for multiple languages, including those read from right to left. Recommended for creating strong passwords.
  94. AxCrypt – AxCrypt is an open source file encryption project designed for Windows, and it includes the following capabilities: password protection, encryption in the right-click menu, double-click to work with encrypted files, and automatic re-encryption after editing.
  95. Anti Tracks Free Edition – Anti Tracks Free Edition removes all traces of your computer activities from your hard drive, including browsing history, temporary files, installation logs, and other telltale signs of your passage.
  96. ToolWiz Bsafe – ToolWiz BSafe offers file encryption with simple features that produce advanced results. Its ability to mount an encrypted folder as a virtual drive is described as “opening the safe,” because the only time that hidden data is accessible is while you’re working on it.
  97. BCTextEncoder – BCTextEncoder presents its free e-mail encryption program as a way to avoid the embarrassment of sending an e-mail to the wrong recipient. Uses public key and password-dependent encryption.
  98. Anonymize.Net – Anonymize.Net provides anonymous web browsing using a VPN (virtual private network), with one offshore proxy in Panama and a continental proxy in Canada. Use their handy WHOIS page to see your own IP revealed, and then check the difference when you view the page by proxy.
  99. the Cloak – the Cloak functions as an online proxy service, and has published a clear and helpful explanation of how a proxy can help you refrain from displaying your private information to web trackers.
  100. Internet Anonym – Steganos has a line of anonymity/privacy products, perhaps the best of which is Internet Anonym. Internet Anonym protects your IP even when you have to use public WiFi , letting you choose details of false information displayed by your browser.
  101. Idzap – IDzap offers three ways to protect your privacy on the internet. You can choose IDzap Free Anonymous Browsing Service, you can pay for a fully featured version called IDsecure Anonymous Browsing Service, and you can add encrypted e-mail with IDseal Secure Email Service.
  102. CryptoHeaven – CryptoHeaven provides a suite of secure encrypted e-mail services, encrypting not only the messages themselves but also the hosting and online storage features. CryptoHeaven’s goal is leaving no weak points in its data security.
    CryptoHeaven

    The Great Last Judgement, Peter Paul Rubens. Courtesy of L’Alte Pinakothek di Monaco

  103. Snoopblocker – Snoopblocker is a free online web proxy service that lets you enter a URL and browse anonymously, with several encryption options neatly arranged in checkboxes.
  104. Z1 SecureMail Gateway – Z1 SecureMail Gateway is billed as a “virtual mail room” that handles all encryption, decryption, and digital signature authentication for your e-mail. You can tailor individual security policies by using the console.
  105. Hushmail – Hushmail is an encrypted e-mail service based in Canada, it promises not to display any third party ads, and it gives you a free trial period. The Personal option is expensive, but service is reliable.
  106. Lawdex Secure Document Exchange – Lawdex Secure Document Exchange (SDX) is designed for businesses that need to keep client records in strict confidence, particularly law firms, medical practices, and financial services companies.
  107. Mutemail – Mutemail bases its secure e-mail service offshore, and if you already use a secure client (Mutemail specifies Secure Bat! and Thunderbird as examples), you can use that program through Mutemail’s SSL interface.
  108. NeoMailbox – NeoMailbox, hosted in Switzerland, offers secure e-mail plus anonymous browsing with IP concealment, SSL connections, and even disposable e-mail addresses if you prefer to communicate with that level of anonymity.
  109. ShareMeNot – Whenever you see embedded buttons from companies like Facebook or Google, those companies are tracking you. ShareMeNot disables the tracking until you deliberately click one of the buttons in order to share.
  110. Greasemonkey – Greasemonkey is unquestionably the most helpful of the Firefox extensions because it lets you add scripts to Firefox to achieve any goal you like, including user security and anonymity. It will also accept .js files that you create.
  111. Don’t Facebook – Don’t Facebook, EVER, if you wish to keep your private information out of the public eye. That being said, if you must Facebook at least keep up with your privacy settings, and to do that you have to stay apprised of the latest policy updates.
  112. Ghostery – Ghostery is not only effective in blocking web trackers, it’s a lot of fun to use. You will be shocked at the number of active trackers you find, and you’ll enjoy killing them off. Firefox addon.
    Ghostery

    Edwd Kelly, a Magician. in the Act of invoking the Spirit of a Deceased Person. Courtesy of fromoldbooks.org, taken from Astrology, A New and Complete Illustration of the Occult Sciences by Ebenezer Sibly, M.D. F.R.H.S., Embellished with Curious Copper-Plates, London, 1806. Engraved by Ames of Bristol, original drawing by Sibly.

  113. DoNotTrackMe – DoNotTrackPlus has grown up to be DoNotTrackMe, but it still gives you a free and simple way to block more than 600 online trackers from following you around the web. Firefox addon.
  114. TrashMail.net – TrashMail.net creates junk e-mail addresses that forward mail to you, then terminate automatically after catching a certain amount of mail. You can sign up with insecure sites without risking your preferred address. Firefox addon.
  115. Ultimate Privacy – Ultimate Privacy offers a complete privacy and anonymity service that lets you perform all your online tasks safely. Includes browsing by proxy, disposable e-mail addresses, and PC eraser. In business since 1997.
  116. SpamAvert – SpamAvert offers an interesting disposable e-mail service online. You choose a word to serve as a one-time junk mail address, then come to SpamAvert to pick up your mail.
  117. Adblock Plus – Adblock Plus was born in 2006 as a free Firefox addon, and it’s been blocking annoying ads all over the world ever since. You choose which ads to block based on filter lists.
  118. CsFire – CsFire guards against cross-site scripting, whether the problem is a Cross-Site Request Forgery attack or simply an attempt to track your browsing habits. Firefox addon, now available for Chrome.
  119. SmartScreen Filter – SmartScreen Filter uses blacklists of phishing sites, malware sites, and malicious files to vet your browsing and downloads, displaying warnings when appropriate. Built into Internet Explorer 8 and above.
  120. PrivacyChoice – PrivacyChoice helps you stay private on the web with free online scanning for your website or app. Software offerings include Privacyfix to manage your privacy settings on sites like Facebook and Google.
  121. Boss Key – Boss Key is a child’s trick that might save your job by letting you hide that browser or game with a simple keystroke, including cutting the sound and changing screen resolution if necessary.
  122. Certificate Patrol – Certificate Patrol is a Firefox addon that inspects certificates and certificate hierarchies to make sure a site is safe to visit. Inspections are also performed for individual parts of each page.
  123. Telex – Telex is the old communications system that uses automated teleprinters (think Western Union in the mid-20th century). Today, web customers in censorship zones use secret Telex requests hidden in HTTPS connections to escape the zone and surf freely.
    Telex

    Telex machine T100 manufactured by Siemens. A sign inside said ‘T.grpl.82, T100; nüral F5230.’ Courtesy of Flominator, 11 February 2005

  124. Long URL Please – Long URL Please expands short links within a page while truncating the new long link to keep the page formatted properly. You can set options for how you’d like your links to change, and Long URL Please works with most types of short links. Firefox addon.
  125. Disconnect – Disconnect is a tracking blocker that actively keeps up with new trackers as they are added. There’s a small toolbar button showing overall status and a dropdown to give you more detail.
  126. ScriptNo – ScriptNo is a Chrome extension that tells you about scripts that have been, or could be, blocked on every page. Uses whitelists and blacklists to help you set preferences.
  127. Ccleaner – Ccleaner from Piriform cleans up your Windows system, making it harder to track you online with cookies and sweeping out temporary files, download history, and Autocomplete settings.
  128. HOSTS file – A Windows HOSTS file is a list of host names that match to IP addresses, and a specially edited HOSTS file can make your browser skip downloads of web flotsam like cookies and banner ads. You can download such a file from MVPS HOSTS.
  129. Pidgin – Another secure messaging client that uses OTR is Pidgin, which is free and open source. You can use the Pidgin interface to manage your other IM applications.
  130. Don’t Google – Don’t Google, EVER, because Google has no respect whatsoever for your web privacy, and makes no bones about invading it in order to monetize your personal data. A quote from Google’s recent court filing: “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Ouch!
  131. Gibberbot – Gibberbot uses existing messaging applications like Google Chat and Facebook Chat to offer an unlimited free communication option that’s encrypted using the OTR (Off-The-Record) standard.
  132. GnuPG – GnuPG, or GNU Privacy Guard, is the Gnu project’s version of OpenPGP, as laid out in the 2007 specifications called RFC 4880. It’s a command line tool you can insert in code for your other applications.
    GnuPG

    Gnu. Photo taken at Kliprivier Nature Reserve, Johannesburg. Courtesy of derekkeats, Flickr: IMG_4955_facebook, 9 May 2009

  133. GSMK CryptoPhone 500 – The GSMK CryptoPhone 500 gives you strong encryption plus full source code access so you can verify your level of protection. Includes voice encryption and secure messaging.
  134. Speak Freely – Speak Freely is a VoIP program for Windows, meaning you can use it to call another PC and have a voice conversation over any network that uses TCP/IP. Special instructions for encryption are available.
  135. Zfone – Zfone is a VoIP program that lets you use the internet to make encrypted phone calls. It uses the new ZRTP protocol produced by the same engineer who designed PGP.
  136. Mil Shield – Mil Shield not only erases but also shreds your computer’s history files, removing not only browsing history and Autocomplete information but also index.dat files and Flash cookies.
  137. Private Eye – Private Eye is a handy utility that lets you see and edit what’s in your protected storage area, which holds data about what you’ve been doing on your computer (including browsing).
  138. Sookasa – Sookasa is an encryption program that works with Dropbox, creating its own folder in your Dropbox directory and automatically encrypting any files placed therein. Designed for businesses who want to remain data-compliant in the cloud.
  139. PC-Encrypt – PC-Encrypt has several encryption products. A-Lock encrypts e-mails, PC-Encrypt encrypts your files and folders, and a utility called PC-Docmail even sends encrypted files directly from your desktop to recipients.
  140. Mixmaster – The Mixmaster remailer protocol involves sending packets of equal size in rearranged order to make them less traceable, which explains the name. Mixmaster protects against packet analysis and provides anonymity.
    Mixmaster

    This is a hand-held electric beater (also known as a hand-held electric mixer). Courtesy of Donovan Govan, taken using a Canon PowerShot G3, 24 April 2005

  141. Pretty Good Privacy – Pretty Good Privacy (PGP) is an an email encryption program originally distributed by MIT, and when it was released in 1991 it spread around the world, enraging the American government. Today PGP is the guiding principle of most secure e-mail communication.
  142. PirateBrowser – PirateBrowser bundles the Tor client with a proxy-enhanced version of Firefox and adds some special configuration to produce a means of eluding the web censors in those countries so afflicted.
  143. PGPdisk – PGPdisk is a utility that creates encrypted disk partitions, and it is now distributed as part of PGPfreeware 6.0.2i. Later versions beginning with PGPdisk 6.5 can only be found in paid programs, but the plan is to keep older PGPdisk free.
  144. Symantec Drive Encryption – Symantec Drive Encryption provides full disk encryption that includes the following types of files: user, swap, system, and hidden. Works on not only computers but also removable media.
  145. Check Point Full Disk Encryption Software Blade – Check Point Full Disk Encryption Software Blade (yes, it’s a long name) protects everything on your hard drive, including personal data, OS files, and temporary files.
  146. Neo’s SafeKeys – Neo’s SafeKeys lets you use a virtual keyboard displayed on your monitor to input sensitive data like personal information and passwords. That means there’s no way to record your keystrokes, because no keystrokes are used.
  147. SecureDoc – SecureDoc makes sure your data stays secure with full disk encryption, multi-factor authentication instead of single passwords, encryption of removable media, and basic file and folder encryption.
  148. File Shredder – File Shredder is a free application that thwarts software designed to retrieve deleted files from Windows computers by overwriting the deleted files several times, making it impossible to recover them.
  149. AbsoluteShield Track Eraser – AbsoluteShield Track Eraser is a comprehensive data removal system capable of erasing all of these: browser cache, history, cookies, typed URLs, autocomplete information, and saved passwords.
  150. Burn 2.5 – Burn 2.5 overwrites deleted Mac files using the same overwriting process recommended for shredding Windows files. Burn is a free utility and recommended for use with encryption software Enigma.
  151. E3 Security Kit – E3 Security Kit is the privacy subset of the Windows tool package Extreme Power Tools (XPT). It’s built around the ShredPerfect+ utility, described as a long, dull, highly effective process that’s guaranteed to destroy your files completely.
  152. Eraser – Eraser is a free application that not only overwrites individual files but also ensures any extra copies are removed by erasing any free space on the disk.
    Eraser

    Standard pink erasers, made by Sanford. Courtesy of Evan-Amos, 09-28-98

  153. Evidence Neutralizer – Evidence Neutralizer cleans traces of your activities off your PC, making it difficult to follow you by using temporary files, Autocomplete information, browsing history, and even index.dat files.
  154. SDelete – SDelete is a data overwriting tool written by a Microsoft employee that you can download at no charge and use anywhere you’d normally use a command-line utility.
  155. Privacy History Eraser – Privacy History Eraser removes all your internet history, including sites you visit, recently used files, downloads, cookies, and temporary files. It looks for items left behind by Windows programs like Internet Explorer and Windows Media Player.
  156. Pwgen – Pwgen, or Password Generator, creates random, secure passwords that are deliberately easy for you to memorize, because you can pronounce them. The utility was written by a Linux open source coder.
  157. AutonomyCentral – AutonomyCentral is an e-mail client secured with both RSA public key and 256 AES encryption, and it works with the privacy-oriented Vaultlet Mail application. You can send and receive messages from your flash drive.
  158. Random Password Generator – Random Password Generator is an online utility that produces a nonsense word you can pronounce which ends with a number. There’s also a version for iPhone and iPod.
  159. Sectéra(r) vIPer(tm) Universal Secure Phone – If you’re looking for extra strength in phone security, the Sectéra(r) vIPer(tm) Universal Secure Phone by General Dynamics can provide privacy that’s suited to classified information. The phone is recommended for government use.
  160. ZoneAlarm Free Firewall – ZoneAlarm Free Firewall gives you unobtrusive protection against hackers and malware at no cost, and it’s designed to work well with other antivirus programs. Includes privacy toolbar.
    ZoneAlarm Free Firewall

    Wheelock MT-24-LSM fire alarm horn. Photographed by Ben Schumin on November 23, 2002. Courtesy of Ben Schumin, edited by ZooFari, edit April 17, 09

  161. Tonga Remailer – The Cypherpunks are encryption-oriented privacy strategists, and one of their efforts is the Tonga Remailer. The Tonga Remailer is based in the country of Tonga, and it’s an anonymous remailer that uses the classic Mixmaster protocol.
  162. Firewall Free – Comodo’s Firewall Free gives you basic firewall protection, including anti-virus capability, warnings about particular files, and automatic updates if desired. There’s also a free version of a similar Mobile and Tablet Security program for your other devices.
  163. CNET is no longer a trustworthy download source – There’s bad news from the free download front: CNET is no longer a trustworthy download source. It’s developed a bad habit of forcing unwanted utilities like junk toolbars and adware on downloaders, and its use should be avoided.
  164. Online Armor – Online Armor Free gives you basic firewall protection at no cost, including spyware defenses, browser safety, and meaningful messages. Added features include HOSTS file checking, control over start-up programs, and keylogger blocking.
  165. AntiLogger Free – Zemana AntiLogger Free instantly encrypts all your keystrokes so keyloggers are presented with unreadable, secured data. It works for every application you use rather than just your browser.
  166. SpyShelter Personal Free – SpyShelter Personal Free baffles keyloggers while protecting your system and defeating capture of any data from your screen or clipboard. There’s also a paid Premium option.
  167. MyPrivateLine – MyPrivateLine provides disposable phone numbers that you can give out to anyone without worrying about revealing your identity or location. The disposable number forwards to one of your real numbers.
    MyPrivateLine

    Western Electric Company Princess phones. Green one is rotary dial, has hardwired handset cord, and dated November, 1973. Yellow one is Touch Tone dial, has a modular handset cord, and dated June, 1984. Courtesy of User:KansasCity, 15:30 24 February 2006

  168. KeePass – KeePass is a password manager, free and open source, that lets you keep all your passwords in a single database secured with a master key file.
  169. 1Password – The 1Password generator not only creates strong passwords for you but also stores them securely, recalling them into your browser at your command. Available for Windows, Mac, iOS, and Android.
  170. Encrypting File System – Did you know Windows has its own file encryption utility? It’s called Encrypting File System (EFS), and unfortunately it’s available only in Professional, Ultimate, and Enterprise editions. It exists in the file right-click menu’s Properties, and it’s very easy to use.
  171. Vormetric Data Security Manager – Vormetric Data Security Manager is a piece of hardware that manages security for your server installations of Vormetric Encryption Expert Agents. It generates and distributes keys, and it can also provide encryption.
  172. Vasco Online Application Security – Vasco describes itself as “the authentication company,” and its active and passive authentication services will secure your online applications that handle sensitive financial and health-related data.

50 Best Law Enforcement Blogs of 2013

Crime news fills newspapers and dominates nightly news broadcasts, but these are not the only sources of relevant police information.  Too often, the perspective of enforcement officers is left by the wayside, as sensational crime stories focus on perpetrators and victims.  But police have a lot to offer beyond cleaning up other people’s messes.  In fact, many individual officers and some law enforcement agencies maintain blogs that keep interested readers informed about criminal justice, and offer recommendations for improving personal safety.  The following examples highlight a few of the interesting police blogs found on the World Wide Web.

  1. Think Different – Kristen Ziman is a Commander with the Aurora, IL Police Department, in charge of the Patrol Division.  She operates this blog as a personal outlet for some of her thoughts about criminal justice.  She carries credentials to back her police credibility, including a Criminal Justice Degree and a Master’s Degree in Criminal Justice Management.  She has participated in numerous other training programs as well, and is a graduate of the prestigious FBI Academy.  Her work leading to her current position as Commander included stints with several divisions within the force.  The articles presented on her blog offer insight into criminal behavior, attempting to teach readers how to remain safe and avoid becoming victims.
  2. The Police Perspective – The introduction of this is blog is immediately engaging, comparing the positions of police officers to those of hated minorities.  The notion is used to illustrate that men and women in blue are somehow easier to judge harshly than regular citizens.  It is an interesting hypothesis that the blog’s author, Joel Shults, supports with first hand evidence.  He attributes the phenomenon to several societal conditions including, media coverage, power envy and the actions of hate groups targeting cops. Shults posts infrequently, but the thought-proving entries are worthwhile for the unusual perspective they provide.
    Photo by Tobyotter on Flickr

    Photo by Tobyotter on Flickr

  3. Second City Cop – As should be immediately apparent, this blog is maintained by a Chicago Police Officer.  At least it was, before he retired, so now it is a former police officer pulling the strings to inform readers about police issues in the Windy City.  The content is general commentary, but slanted toward Chicago happenings.  The author provides insight into problems facing the Chicago Police Department, devoting an entire section of the blog to his take on the Chicago force.  A recent article, for example, lambasts an attempt to cut the department budget by 10% next year.
  4. The Enforcer’s Notebook – The author of this blog voluntarily gives up his right to remain silent, instead offering musings about police work.  Stories convey the details unfolding at real police calls, each seasoned with the blogger’s first-hand police perspective.  They are presented sporadically, with no rhyme or reason, but the officer behind the content manages to post monthly or so.  The Enforcer is unapologetic about the content found on his site, inviting readers to get lost if they don’t like it.
  5. Officer “Smith”:  Thought From Behind the Badge – Officer Smith is a seasoned police enforcement agent with more than thirteen years on the job.  “Smith” is an alias, and he is known to work somewhere in California.  Aside from these tidbits, readers must simply take the content of his blog at face value.  Articles focus on issues arising during the course of service, ranging from ways the officer has helped civilians in the past, to notifications about laws on the California books that readers might not be familiar with.
  6. Officer Resource – This unique compendium of articles is different than many police blogs, which offer information about cases or policies.  This site is maintained for the officers themselves, by police enforcement officials who know where cops are coming from.  Secure forums provide places for law enforcement professionals to exchange information with other cops, where only officers are allowed to participate.  There is also a case law reference section provided for police officers visiting the site, so they can consult legal precedent for information about their own active cases.  Officer safety is another key concern of the blog administrators who are devoted to promoting true blue causes.  Investigation tools are also furnished to help officers clear cases, especially rookies seeking guidance from experienced officers.  The site serves as a conduit for public engagement where officers interact with citizens in positive ways.
  7. SGT Says – Run by a volunteer reserve police officer, this collection of articles shares stories taken from 35 years of police experience in public and private law enforcement.  Entries discuss shootings, riots, protests and real life accounts of what happens on police calls.  Common enforcement weapons are also discussed, including Tasers, batons, shotguns and handguns.  Discussions are frank and to the point, covering news stories and other social conditions through the eyes of an experienced law enforcement agent.  Practical information is also present, like a recent series of posts dealing with disaster preparedness.
  8. Motor Cop Blog – Motorcycle officers are a unique breed, bringing their two-wheeled perspective to this blog administered by a California motor officer.  Topics are drawn from the news, including recent analysis of the Zimmerman case and other high-profile criminal justice events.  The site advocates for law officers and looks at current events through the lens of working police officers.  Motor Cop also responds to questions from readers of the blog in a regular feature entitled “Ask MC”.  A recent response helped a reader understand Miranda rights and the role they play in criminal justice.
  9. A Police Wife – Spouses of law enforcement officers are represented here, benefitting from the targeted information presented at A Police Wife.  Blog entries follow news articles, commenting about those which impact wives of police officers.  Human interest posts, like a recent call for police patches to replace some lost by a child, provide lighter topics for readers.  Interested visitors to the site are invited to complete online polls and to participate in research studies.  Posts are somewhat sporadic, but there are also links to other blogs which update more frequently.
  10. Cop Thoughts – Provocative posts to this blog stimulate readers to look at everyday situations through the eyes of a police officer, fostering better civilian understanding of what law enforcement officers face every day on the job.  Pointed entries are directed at the public. Presented in conversational ways that inform readers about laws and the differences between police officers and regular citizens, the thoughts are not filtered or toned-down.  Sarcasm and irony are used by the officer/blogger to drive home points about how citizens can make the jobs of cops easier.  While the tone is not for everyone, some readers will experience “light bulb moments” as they read the content provided.
  11. Written on Her Heart – Maintained by the spouse of a police officer, articles presented here touch on a variety of issues impacting police wives.  The site is divided into several categories, many of which do not relate to police work.  The section called Police Wife collects all the posts dealing with issues overcome by law enforcement families.  Advice helps readers tackle common practical matters that impact police, like what to do with the kids when dad has to work overtime for a developing case, and how to communicate with your police officer husband.
  12. Discover Policing – Helping match law enforcement candidates with employment opportunities for officers is a prominent objective of this blog.  Weekly job posting are included as regular posts, enabling visitors to peruse nationwide job openings for law enforcement personnel.  In addition to job openings, articles presented on the site furnish in-depth looks at criminal justice, including a recent entry that followed a school resource officer as he performed daily duties associated with his liaison role.  Education and what it takes to land a good job as a cop are also discussed in recent posts, asking the question: “Do you need a criminal justice degree”?
    Photo by Robert Thivierge on Flickr

    Photo by Robert Thivierge on Flickr

  13. From Cop to Mom and the Words in Between – Kathleen A. Ryan is a retired police officer turned mother whose interests now lie primarily in writing and publishing.  She does maintain updates related to police work, and her novels reflect police themes gleaned from years on the job.  Posts are arranged in categories, including a section covering police-related articles.  The topics in the police section vary, taking some themes from prevailing headlines, but also looking into historical criminal justice concerns.
  14. Improving Police – This former police chief’s lifelong motivation has been to improve police and departments.  His own story is one of a patrol officer rising through the ranks to become chief of police.  What makes this blogger’s story unusual is that it occurred in just seven short years.  David Couper is a published author, whose book deals with the same subject matter presented on his blog.  His historical accounts of policing look at the development of enforcement agencies over time, with particular attention paid to the many missed opportunities that provided inroads for improving police departments and officers.
  15. 10-8 Double A – This personal blog is topically diverse, dragging readers along through the random thoughts of the site’s administrator.  Content explores criminal justice issues and provides links that can be used to access deeper material about issues presented in blog articles.  The site contains links to product reviews conducted by the blog owner, offering evaluations of police equipment and firearms.  Other articles pay tribute to fallen officers, naming them individually to honor their service as peace officers. Personal posts on the site seem authentic, sharing the feelings associated with responding to various disturbing crime calls.
  16. The Boogie Man is my Friend – This entertaining blog follows the life of an atypical former police officer, offering looks behind the scenes, as well as providing information for staying safer.  The unique perspective comes from the fact that the blogger is a female police officer, who is also older than most female law enforcement bloggers.  Her no holds barred approach does not mince words, providing uncensored looks at police work and what comes after retirement from the force. Momma Fargo, as the blogger is known has moved on to other things, but her interests in police work and firearms handling has not waned.
  17. A Cop’s Watch – Going beyond local law enforcement issues, this blog also discusses world affairs and politics.  In addition to content of this nature, regular posts speak to the personal interests of the blogger maintaining the site.  Tributes to fallen officers and other features honoring the blue code are included too.  National security interests are explored in-depth, including period reports about hotspots like Lebanon and Syria.  Legal cases are evaluated locally alongside national features about United States sovereignty.  Regular posts outline inconsistencies within the criminal justice system, challenging readers to figure out why they exist.
  18. Amherst Police Blog – This blog is an example of those maintained by law enforcement agencies, rather than individual bloggers with things to say about cops.  The site is maintained by the Amherst Massachusetts police department.  Entries look at police issues beyond what happens on the beat, focusing on other department activities like fundraisers and public service events.  Training programs and other opportunities for citizens to interact with officers are included in blog entries, which are posted several times each month.  Anti-drunk-driving campaigns and neighborhood crime watch efforts furnish cooperative efforts for local residents and police, strengthening the community bond between officers and local civilians.
  19. Cops Alive – Cops helping cops is the fundamental theme of this informational resource aimed at law enforcement professionals.  Strategies for successful careers as public servants are outlined alongside information about issues commonly impacting men and women in blue.  For example, a recent post discusses post-traumatic stress disorder and refers officers to resources helping them cope with PTSD.  Additional topics are widespread, including advice about tools and equipment used by police.  Guest posts expand on related topics, adding even greater diversity to the content found on the site.  A special section of the site is dedicated specifically to police news stories taken from the headlines.
  20. Suburban Cop – Entries to this blog cover current events related to police work.  Posts are updated several times annually, providing recaps of news items related to fugitives, criminal justice and legal system outcomes.  The site is maintained by a suburban law enforcement professional who welcomes the change after serving on the New York City police Department for 8 years.  His opinions about security, police matters, and prepping for disaster are also colored by his time serving in the United States Army Infantry, which includes a combat tour in Afghanistan.  He also furnishes product reviews for certain tactical equipment used by police on the job.
  21. Suddenly Cop Wife – Following the events in the life of a law enforcement spouse, this blog contains posts on a range of topics.  The articles presented are mostly personal opinions of the author, rather than hard law enforcement news.  Current events impacting police, and their wives, are explored in entertaining posts peppered with humor.  There are some news items featured, especially those impacting local police, which are interspersed with personal posts detailing regular daily living in a police family.  For additional news coverage, headlines are featured in a clickable sidebar that opens into a special section dedicated to headlines.
  22. The Badge Guys – Dedicated to security issues, this blog carries regular contributions from several experienced security professionals.  School and campus security, as well as the debates surrounding campus carry laws and other educational security concerns are on the front burner here.  Facilities security and emergency preparedness are also discussed, with particular attention paid to crime trends in these areas.  The “guys” behind the blog are men and women with various credentials related to law enforcement.  Greg Stephens, for example, is an expert on workplace security and armed response laws.  Julie Adcock, another contributor, is a former Florida Sherriff’s Department employee bringing on-the-job experience to her blog entries.
  23. The Lollipop Tree – Maintained by a dispatcher responsible for more than one Massachusetts town, this blog has been active since 2007.  Bringing her on the job experience to the internet, posts are updated several times monthly, containing lots of photographs and human-interest-type content.  As an EMS dispatcher, the blogger is inherently familiar with many aspects of police work, but the blog entries she maintains are not what would be considered hard criminal justice news.  Instead, the content is lighter, containing vivid imagery.
  24. OCSD Newsroom Headlines – As a service to the general population and a resource for law enforcement professionals, the Orange County Sherriff’s Department maintains this blog.  The content is centered around local issues, particularly developments within the department.  As an interface between the agency and its public, visitors have access to several helpful features.  Recruiting announcements for new officers are posted on the site as well as support staff positions for hire within the department.  Updates about special police initiatives like a Labor Day Anti-Drunk Driving effort are included in regular posts.  Staff announcements, like a recent article about some retiring police dogs are also provided by contributors. The blog is highly active, receiving several posts daily, which are archived for ongoing access.
  25. The Restless Sleep – Giving readers a deep look at the New York Cold Case Squad, contributors’ areas of expertise fall across a range of criminal justice and law enforcement disciplines.  Participants like Vito Spano, former director of the Squad, provide first-hand insight into what it takes to solve cold cases.  Pathologists and crime scene investigators contribute forensic input, and several active officers and detectives bring perspectives from the beat.  Recent articles explore missing persons cases and discuss evidence gathering techniques for unsolved homicides.
    Photo by nereocystis on Flickr

    Photo by nereocystis on Flickr

  26. Homicide Watch DC – The narrow subject matter of this police blog centers on Washington D.C. murders.  Driven by community support, the blog attempts to follow every DC murder from the crime through the conviction of the perpetrators.  Court documents and the original news stories covering events provide source material for the entries, as well as input provided by friends and family members of victims.  Social media is also employed to link witnesses, investigators, and media representatives to paint comprehensive pictures of District of Columbia homicides.
  27. Waiving Miranda – Here, a sex crimes detective offers inside information in regularly updated posts, which contain details about cases he worked on.  The site is divided into distinct categories, allowing readers to hone in on topics of interest to them.  The blog host writes fiction too, so some of the articles posted are chapters taken from his work.  In the sections about interrogation and other police work, he chronicles the experiences he had working cases and interviewing suspects.  Waiving Miranda’s title refers to the authors desire to be truthful about his police work, even if the content becomes more difficult for civilians to read comfortably.  Additional reflections are placed in the police commentary section, for general observations and law enforcement information.
  28. Industry Insights – Found on officer.com this blog contains entries from several regular contributors tied to law enforcement.  Blog entries discuss myriad police issues, ranging from officer safety to criminal justice legislation.  Some entries are lighter than others, each providing insight into law enforcement vocations.  Training methods and standards for law enforcement personal provide topics for regular posts, which also encompass wider issues of national importance. The blog area is only one feature of the site, which includes additional resources and links for police officers.
  29. Women in Law Enforcement – Police magazine maintains this blog devoted to unique law enforcement issues facing women employed by law agencies.  Recommendations for female readers include ways to land positions on squads they want, as well as input on how to handle pregnancy when you are a cop. One of the site’s primary contributors, Lt. Lynn Doucette, is a patrol supervisor for a Maine law enforcement agency who previously worked as an undercover investigator for the state.  Patricia Teinart also contributes regularly.  She is currently employed as a patrol officer in Texas, but she has previously worked in juvenile gang units and narcotics task forces.
  30. The Thinking Policeman:  A Former Police Officer’s Blog – A retired inspector posts here approximately one-half dozen times each month.  Topics include all manner of police related content, including general criminal justice commentary and observations about the way police work is conducted.  The unique UK perspective carries universal police themes, but also enlightens readers about international investigations and newsworthy events.  A recent entry discusses crime and punishment outcomes related to charges of rape, stimulating reflection on the issue.
  31. Duke’s Police Blotter – Daily posts from Duke keep readers informed about criminal developments across the country.  The blog leads with a regular feature called officer down, which contains entries about individual officers wounded in the line of duty.  The site administrator also offers to help with good causes raising awareness for police officers, and invites readers to submit information about events.  News stories from publications like the Chicago Tribune are put under the microscope at Duke’s to help readers understand what is happening in major U.S. cities.  Entries concentrate on Illinois criminal justice, but this is not an exclusive blog for any particular region.  Public policy is analyzed, especially as it relates to police pensions and other law enforcement concerns.
  32. Crime File News – A former Chicago Police Officer maintains this blog, and several others, concerned with law enforcement issues and police work.  The blogger behind the content is a private investigator now, utilizing skills learned in his former role as a policeman.  Posts cover current events related to law enforcement, as well as wide-angle national political issues.  The blogger has strong viewpoints, which he expresses unapologetically, providing solid supporting facts and details.  Recent stories take issue with Obama administration policy, pointing to inconsistencies between what the Commander in Chief says and what he ultimately does.
  33. The Things Worth Believing In – Hosted by a police lieutenant, this blog presents opinions and reflections related to the job – but not always.  The author maintains a philosophical tone throughout most of the site’s content, keeping a certain distance between himself and the reader.  Self-defense and security provide themes for many articles contained on the site, some with instructional videos attached.  The site administrator, a former SWAT enforcement officer, evaluates tactical equipment, including firearms and accessories.  Practical training sequences are also provided, instructing viewers about proper gun handling techniques and strategic behavior.  One recent post advocates active training, rather than passive education, for mastering self-defense and personal safety techniques.
  34. Leo Affairs – Officers accused of wrongdoing or otherwise deprived of their rights need outlets to help them respond to charges.  This blog started in that capacity, providing a forum for preserving officers’ rights.  The site has grown, however, to include additional content for police officers, like a message board area where officers can seek and discuss information without fear of retribution.  The site contains information designed for officers with questions, including resources about internal affairs, policeman’s bill of rights, whistle-blower laws and public corruption.
  35. DeKalb Officers Speak – This site is for officers to express themselves about issues related to their employment as law enforcement officials in DeKalb County.  Families and friends of local cops are also invited to participate, providing a venue for their discussions about law enforcement life.  News stories are analyzed in the blog too, providing another side to stories that sometimes get manipulated by the press.  An interesting feature of the site is its “Crime Tracker”, which allows users to see first-hand where the local crimes are being committed.  The Tracker places icons at the site of each crime, making trends very easy to see.
  36. 24X7 – This North American police blog operates under a slightly different premise than others.  The author is a technology minded police official that understands many interactions with police are not positive ones for citizens.  Victims are distraught when they interact with cops, and other face-time with police officers is often garnered because an individual has committed a crime.  The author here is driven by the desire to create a forum of information for civilians to access on their own time, which helps them understand what police are up to as they perform their jobs.  Daily activities from the streets are shared in the blog’s section entitled “Shift Diaries”, providing a good starting point for interested readers seeking a snapshot of police work.
    Photo by Robert Thivierge on Flickr

    Photo by Robert Thivierge on Flickr

  37. Police Issues – Maintained by Julius Wachtel, Police Issues is designed as a resource for law enforcement professionals, but it also serves educators and students of criminal justice.  Wachtel, who contributes most of the original content present on the site, has nearly twenty five years on the job in various law enforcement roles.  He spent 23 years as an ATF agent and supervisor, before retiring in 1998.  His case work was primarily in the areas of gun trafficking and bombing investigations.  In addition to blogging about police issues, he is a criminal justice consultant and lecturer on the subject.  He is also a published author, penning a book about Stalin last year.
  38. The Police Law Blog – Maintained by lawyers, for police officers, this resource provides legal information for cops.  Featured articles report news headlines, which are analyzed for the ways they impact police. Other entries support rights for law enforcement professionals, offering case studies gleaned from the courts.  The blog is updated sporadically, but the dense legal information contained in each post is significant, despite being scarce.
  39. Official Blog of the International Association of Chiefs of Police – Rank and file officers are not the only law enforcement officials seeking to be heard on the World Wide Web.  Chiefs of Police have their voice too, provided in part by the official IACP blog.  Blog posts follow industry conferences and events, furnishing announcements about important happenings as well as reporting about what occurs at the meet-ups.  Another important facet of the organization is bringing law enforcement agencies together to work on issues jointly.  For example, recent posts highlight multi-jurisdictional efforts to curb the number of highway accidents on Interstate 80.
  40. Anaheim Police Department Blog – The lead story recently, about a gun buy-back program implemented by the Anaheim Department is typical of the content found here.  The program netted 100 guns for which police gave out $14,000 as incentives to participate.  Other special events and police directives are reported on the site, providing access for local citizens seeking updates.  Anaheim residents are encouraged to take active roles in their own safety, by utilizing three distinct police department programs.  Neighborhood Watch is a widespread effort to bring neighbors together against crime.  In addition to this service, the department operates a Citizen’s Police Academy and a Cops for Kids program.
  41. Social Media Beat – As social media becomes more prevalent in society, it impacts the way law enforcement officials do their jobs.  The phenomenon presents opportunities, like enhanced communication abilities and rapid outlets for disseminating information.  But new development within social media channels also present challenges for police, leading to device thefts and new ways for criminals to exploit technology.  This blog, maintained by the IACP Center for Social Media, keeps officers and citizens up to speed about social media’s role in public safety.  Recent blog headlines state the importance of transparency in law enforcement, which can be reinforced using social media.
  42. Milwaukee Police News – Brew city police developments are covered by this news blog, which has an appealing modern design.  The site is a direct initiative from the Department to keep Milwaukee area residents informed about criminal activity in the city.   “The Source” section isolates individual cases, providing status updates about police investigations, arrests and other crime fighting efforts.  The city’s Chief of Police is featured prominently on the site, which also includes a section dedicated to Milwaukee’s most wanted criminals.  Posts also call out officers responsible for acts of heroism while conducting themselves on the streets.
  43. South Bend Police Blog – This official blog of the South Bend Police Department is not as active as some other metropolitan blogs, but the information presented provides a valuable resource for local residents.  Practical lessons are featured in some posts, including a recent discussion about excessive speed and hydroplaning on wet roads.  Additional alerts inform citizens about ongoing crimes in the area.  One such computer hoax provided the topic for a recent article included on the site.  Timely postings about specific regulations and statutes give guidelines for special conditions like fireworks use and other seasonal concerns.  The blog also maintains an “ask a cop” feature, allowing users to pose specific questions to members of the force.  Responses are archived, creating an ongoing resource.
  44. Santa Cruz Police Department – The Santa Cruz Police Department blog shares developments about crimes and perpetrators, including crystal clear images of bad guys taken off the streets.  Reports of attempted crimes are also included, reinforcing the prowess of the department in heading crimes off before they actually occur.  The blog also honors former members of the force who pass away in retirement, remembering them with tribute articles and photos from their time with the force.  Follow-up posting show how cases are resolved, including initial court dispositions for arrested criminals.  Property is also accounted for, especially when it is successfully recovered for victims.
  45. Law Enforcement Corruption – When the good guys become bad guys, this blog stands at the ready to hold them accountable for their misdeeds. In fact, a prominent banner located at the top of the page provides a clickable link for reporting police corruption.  The macro view of police corruption is presented on the blog, with analysis of global corruption trends, but articles also zero-in on specific regional cases, like a recent lawsuit filed by a Newport Beach police officer ostracized on the job for reporting inappropriate conduct.  Corruption investigations are also followed, providing information about outcomes for corrupt police.
  46. Police-Led Intelligence – Coverage provided here is wide in scope, including national security intelligence information as well as articles about local policing efforts.  The content is deeper than the boots on the ground type blogs maintained by local officers, including analysis of advanced investigative techniques and intelligence gathering methods. The blog is maintained by Dave Henderson and Nick Selby.  Mr. Selby is a law technology expert well-versed in information security and other modern law enforcement areas.
  47. United States Park Police Press Room – The United States Park Police carry a proud tradition as one of the oldest law enforcement agencies in the U.S.   They are one of the only agencies with state and federal powers, operating primarily in Washington D.C., San Francisco and New York City.  Monthly posts to the official blog maintained by the agency recap department events, chronicling participation in special policing efforts.  Park police assigned to Washington D.C. play large roles in policing public monuments and area parks.  The Criminal Investigation Branch of the Park Police uses the blog to enlist public support solving cases, requesting information from potential witnesses and citizens with knowledge of crimes.
    Photo by cwwycoff1 on Flickr

    Photo by cwwycoff1 on Flickr

  48. Chief Brian Miller – Hammond, Indiana Police Chief Brian Miller maintains an active blog informing citizens about crime eradication efforts and other department developments.  Recent posts highlight multiple prostitution stings conducted by the department in recent months.  In some cases, female decoys lured potential customers into the waiting cuffs of Hammond cops, while other efforts were carried out using phony customers that were approached by working girls.  The detailed information presented by Chief Miller is bound to have an additional deterrent impact, listing each person arrested and including their photos on his blog.
  49. Arcadia Police Department News and Information Blog – The official blog of this California police department focuses on reporting developments surrounding the agency.  The blog is maintained by Tom LeVeque, who incorporates a number of helpful features into the resource.  Crime-mapping, for instance, visually illustrates exactly where crimes are occurring, providing detailed information for concerned local residents.  Notifications about road closures and construction projects also make their way into blog entries, furnishing alternate routes and project timelines.  Tips for staying safe are also provided, like common-sense warnings that open windows at ground level invite criminals in.  Breaking news is also posted to the blog, as developing crimes unfold.
  50. Police Brutality (and atrocity) Blog – This watchdog resource highlights cases in which police officers appear to act inappropriately toward suspects and others.  One recent article highlights the tragic death of a 95 year old man who police shot with a bean bag.  Accountability is a prevalent theme among blog posts here, reflecting the site organizers’ call for investigations of suspicious incidents involving death and injury to suspects.  As Taser use becomes more widespread, articles on the Brutality Blog involving Taser-related death are also growing in numbers.