Missing Person Thomas Douglas Wright in Catoosa County, GA

Authorities in Catoosa County and his family need your help locating 23-year-old Thomas “Tommy” Douglas Wright.

Authorities say he was last seen Sunday, September 11th in the area of Ken Lane in Ringgold.

http://liarcatchers.com/missing_persons_investigations.html

He is believed to be riding his red & white 2009 Kawasaki street/dirt bike bearing a Tennessee license number 81ZS64.

He’s 5′ 3″ tall, weighs 135 pounds and has brown hair.

If you have information about Thomas Wright, contact the Catoosa County Sheriff’s Office at 706-935-2424 or the Catoosa County 911 Center at (706) 935-2323.

Thomas Douglas Wright 1.jpg

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Leave a comment

Missing Person Daylyn Amarelmel Cambara of Lexington Park, MD

The St. Mary’s County Sheriff’s Office, Criminal Investigations Division, is searching for Darlyn Amarelmel Cambara, age 17, of Lexington Park, Maryland, who was last seen in the area of Pleasant Drive in Lexington Park on Aug. 6, 2016.

http://liarcatchers.com/missing_persons_investigations.html

Cambara was last seen wearing brown shorts, a white tank top, and brown flip flops. She has a scar on the left side of her neck. Cambria is 5’0”, 140 lbs, with brown hair and brown eyes and is known to frequent the Great Mills and Lexington Park areas.

Anyone with information on her whereabouts is asked to call Detective Scott Ruest at 301-475-4200, ext. *2297

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Leave a comment

Missing Person North Salem, Oregon Teen Missing Since Tuesday

A North Salem High School freshman has been missing since Tuesday and was last seen boarding a Cherriots bus on Wednesday.

James Greeninger, 14, was last seen by his mother while leaving for North Salem High School on Tuesday, where he is a freshman.

On Wednesday, Greeninger was seen boarding a Cherriots bus on South Commercial with an unidentified man who looked to be in his 50s and wearing a cap, said his mother, Jude Laitinen.

“If someone tries to approach him, he might get scared and bolt,” Laitinen said. “When he’s scared he runs. But when he runs, he hasn’t run where he didn’t run it off and come home.”

http://liarcatchers.com/missing_persons_investigations.html

Greeninger has a cognitive disorder, and Laitinen said he might have been afraid or overwhelmed with the transition to high school.

In middle school, Greeninger was in a 12-person life skills program, where he received one-on-one instructional assistance. Now as a freshman, he takes eight classes a day in larger classes and only receives half-time one-on-one sessions.

“This is day two and this is different,” Greeninger said. “Something is wrong.”

Laitinen first called her son’s cellphone Tuesday afternoon 30times, but believed it to be dead. She then filed a report with Salem police around 6 p.m.

She believes he also has an iPad with him, which he uses for education purposes, but said it might be dead as well.

Greeninger is described as being 5-feet-6-inches and 95 pounds. He has brown eyes, brown hair and was last seen wearing a black zip-up athletic hoodie, medium wash jeans, old grey Adidas and a khaki backpack.

To visit the post Laitinen shared on Facebook, visit: https://www.facebook.com/jude.laitinen/posts/1336371976382258?pnref=story

If you have any information, contact Salem Police Department at 503-588-6123

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Leave a comment

Wrongful Death Mother Pleads Not Guilty in Daughter’s Death As Child Laid to Rest

The Russell County woman accused of the death of her daughter after allegedly driving under the influence of methamphetamine was arraigned on a murder charge Thursday morning.

Her arraignment occurred in the hours just before her daughter’s funeral. Warriner pleaded not guilty via video monitor as she stood next to her attorney.

She quickly ran to the back of the room sobbing after entering her plea.

The crash happened Saturday on KY 379. According to sheriff’s officials, Jessica Warriner pulled into the path of an oncoming pickup. The truck struck Warriner’s vehicle.

Three-year-old Chloe Fortenberry, Warriner’s daughter, was a passenger in Warriner’s car.

http://liarcatchers.com/wrongful_death.html

The occupant of the truck and Fortenberry were taken to the hospital. Fortenberry died early Sunday morning.

Warriner was taken to the hospital and released. She was arrested and charged with murder.

The occupant of the truck was treated and released.

A GoFundMe page has been set up to help pay for Chloe’s funeral expenses. Click here to donate.

Chloe’s funeral will be held Thursday at the Wilson Funeral Home at 2:00 p.m.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Wrongful Death Mother Pleads Not Guilty in Daughter’s Death As Child Laid to Rest

Private Detective: Body Found in South Fork River

An investigation is underway after a body was found in a car pulled from Big South Fork River in McCreary County.

Wednesday afternoon, a couple of fishermen found a car in the water.

There was a body in that car.

http://liarcatchers.com/contact.php

The McCreary County Coroner told LEX 18 that the person found in the river had been there for 5-6 months, maybe longer and is likely a man.

The coroner sent the body to Frankfort for an autopsy.

The car is in Frankfort too.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Body Found in South Fork River

Private Detective: Ransomware Victims Urged to Report Infection to Federal Law Enforcement

The FBI urges victims to report ransomware incidents to federal law enforcement to help us gain a more comprehensive view of the current threat and its impact on U.S. victims.

What Is Ransomware?

Ransomware is a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified ransom is paid. Ransomware is typically installed when a user clicks on a malicious link, opens a file in an e-mail that installs the malware, or through drive-by downloads (which does not require user-initiation) from a compromised Web site.

Why We Need Your Help

New ransomware variants are emerging regularly. Cyber security companies reported that in the first several months of 2016, global ransomware infections were at an all-time high. Within the first weeks of its release, one particular ransomware variant compromised an estimated 100,000 computers a day.

Ransomware infections impact individual users and businesses regardless of size or industry by causing service disruptions, financial loss, and in some cases, permanent loss of valuable data. While ransomware infection statistics are often highlighted in the media and by computer security companies, it has been challenging for the FBI to ascertain the true number of ransomware victims as many infections go unreported to law enforcement.

http://liarcatchers.com/contact.php

Victims may not report to law enforcement for a number of reasons, including concerns over not knowing where and to whom to report; not feeling their loss warrants law enforcement attention; concerns over privacy, business reputation, or regulatory data breach reporting requirements; or embarrassment. Additionally, those who resolve the issue internally either by paying the ransom or by restoring their files from back-ups may not feel a need to contact law enforcement.

The FBI is urging victims to report ransomware incidents regardless of the outcome. Victim reporting provides law enforcement with a greater understanding of the threat, provides justification for ransomware investigations, and contributes relevant information to ongoing ransomware cases. Knowing more about victims and their experiences with ransomware will help the FBI to determine who is behind the attacks and how they are identifying or targeting victims.

Threats to Users

All ransomware variants pose a threat to individual users and businesses. Recent variants have targeted and compromised vulnerable business servers (rather than individual users) to identify and target hosts, thereby multiplying the number of potential infected servers and devices on a network. Actors engaging in this targeting strategy are also charging ransoms based on the number of host (or servers) infected. Additionally, recent victims who have been infected with these types of ransomware variants have not been provided the decryption keys for all their files after paying the ransom, and some have been extorted for even more money after payment.

This recent technique of targeting host servers and systems could translate into victims paying more to get their decryption keys, a prolonged recovery time, and the possibility that victims will not obtain full decryption of their files.

What to Report to Law Enforcement

The FBI is requesting victims reach out to their local FBI office and/or file a complaint with the Internet Crime Complaint Center, at www.IC3.gov, with the following ransomware infection details (as applicable):

  1. Date of Infection
  2. Ransomware Variant (identified on the ransom page or by the encrypted file extension)
  3. Victim Company Information (industry type, business size, etc.)
  4. How the Infection Occurred (link in e-mail, browsing the Internet, etc.)
  5. Requested Ransom Amount
  6. Actor’s Bitcoin Wallet Address (may be listed on the ransom page)
  7. Ransom Amount Paid (if any)
  8. Overall Losses Associated with a Ransomware Infection (including the ransom amount)
  9. Victim Impact Statement

The Ransom

The FBI does not support paying a ransom to the adversary. Paying a ransom does not guarantee the victim will regain access to their data; in fact, some individuals or organizations are never provided with decryption keys after paying a ransom. Paying a ransom emboldens the adversary to target other victims for profit, and could provide incentive for other criminals to engage in similar illicit activities for financial gain. While the FBI does not support paying a ransom, it recognizes executives, when faced with inoperability issues, will evaluate all options to protect their shareholders, employees, and customers.

Defense

The FBI recommends users consider implementing the following prevention and continuity measures to lessen the risk of a successful ransomware attack.

  • Regularly back up data and verify the integrity of those backups. Backups are critical in ransomware incidents; if you are infected, backups may be the best way to recover your critical data.
  • Secure your backups. Ensure backups are not connected to the computers and networks they are backing up. Examples might include securing backups in the cloud or physically storing them offline. It should be noted, some instances of ransomware have the capability to lock cloud-based backups when systems continuously back up in real-time, also known as persistent synchronization.
  • Scrutinize links contained in e-mails and do not open attachments included in unsolicited e-mails.
  • Only download software – especially free software – from sites you know and trust. When possible, verify the integrity of the software through a digital signature prior to execution.
  • Ensure application patches for the operating system, software, and firmware are up to date, including Adobe Flash, Java, Web browsers, etc.
  • Ensure anti-virus and anti-malware solutions are set to automatically update and regular scans are conducted.
  • Disable macro scripts from files transmitted via e-mail. Consider using Office Viewer software to open Microsoft Office files transmitted via e-mail instead of full Office Suite applications.
  • Implement software restrictions or other controls to prevent the execution of programs in common ransomware locations, such as temporary folders supporting popular Internet browsers, or compression/decompression programs, including those located in the AppData/LocalAppData folder.

Additional considerations for businesses include the following:

  • Focus on awareness and training. Because end users are often targeted, employees should be made aware of the threat of ransomware, how it is delivered, and trained on information security principles and techniques.
  • Patch all endpoint device operating systems, software, and firmware as vulnerabilities are discovered. This precaution can be made easier through a centralized patch management system.
  • Manage the use of privileged accounts by implementing the principle of least privilege. No users should be assigned administrative access unless absolutely needed. Those with a need for administrator accounts should only use them when necessary; they should operate with standard user accounts at all other times.
  • Configure access controls with least privilege in mind. If a user only needs to read specific files, he or she should not have write access to those files, directories, or shares.
  • Use virtualized environments to execute operating system environments or specific programs.
  • Categorize data based on organizational value, and implement physical/logical separation of networks and data for different organizational units. For example, sensitive research or business data should not reside on the same server and/or network segment as an organization’s e-mail environment.
  • Require user interaction for end user applications communicating with Web sites uncategorized by the network proxy or firewall. Examples include requiring users to type in information or enter a password when the system communicates with an uncategorized Web site.
  • Implement application whitelisting. Only allow systems to execute programs known and permitted by security policy.
  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Ransomware Victims Urged to Report Infection to Federal Law Enforcement

Accident Reconstruction: Woman Arrested After Elizabethtown Crash

A woman was arrested in Elizabethtown Wednesday after a three-vehicle injury collision.

KSP says the crash happened on East Dixie Highway. An investigation indicates that Ricky Allen, 42, was driving a 1996 Honda north on East Dixie Highway.

Allen was stopped in a turning lane on East Dixie Highway and was attempted to turn into Five Star Food Mart.

Regina Salter, 28, of Big Clifty, was driving a 2007 Kia and failed to see Allen stopped in the turn lane. Her vehicle hit the rear of Allen’s before crossing into oncoming traffic. When Salter crossed the center line she hit a Mazda that was traveling south head on. The Mazda was driven by Retina Simmons, 47.

http://liarcatchers.com/accident_reconstruction.html

Salter, Simmons, and Salter’s passenger Richard Ramsey, 35, were all transported to Hardin Memorial Hospital with non-life-threatening injuries.

Salter, Allen, and Simmons were wearing seat belts, according to KSP.

Salter was arrested and charged with Operating a Motor Vehicle Under the Influence of Drug/Alcohol Aggravating Circumstances, No Registration and No insurance and was lodged in the Hardin County Detention Center.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Accident Reconstruction: Woman Arrested After Elizabethtown Crash

Private Detective: Police Release Sketch After Attempted Sexual Assault Near UK

Lexington police believe that a man who tried to sexually assault a woman near UK’s campus last month is connected to other assaults in the area.

They have released a sketch of the man, described by the victim as a white man in his late 20’s to early 40’s, between 5’9’’ to 6’0’’ tall, with a stocky build, dark hair, and dark facial hair.

On August 26 in the area of Arlington Avenue and Grosvenor Avenue, the subject attempted to sexually assault a woman around 12:30 a.m..

Police say that two witnesses were able to chase the suspect off.

http://liarcatchers.com/contact.php

These circumstances around the incident appear similar to other unsolved cases over the past several years, according to police. In each instance, a female victim was walking alone and approached by an unknown man and then sexually assaulted during the overnight hours in neighborhoods near UK’s campus.

Investigators are working to identify the suspect as well as the two witnesses who assisted the victim in the most recent incident.

Anyone with information about this case is asked to contact police at (859) 258-3600. Anonymous tips, including photos and videos, can be submitted by texting LEXPD plus the tip to CRIMES (274637). Information can also be sent anonymously through Bluegrass Crime Stoppers at (859) 253-2020 or www.bluegrasscrimestoppers.com.

 Police released a sketch of the man wanted in connection with an attempted sexual assault near UK's campus.
  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Police Release Sketch After Attempted Sexual Assault Near UK

Arson Investigation In Metcalfe Co.

Arson investigators are looking into a fire that happened in Metcalfe County on Tuesday.

Kentucky State Police say they received a call in reference to a structure fire around 9:20 p.m. on Tuesday. The Scott’s City Limits Building was destroyed.

http://liarcatchers.com/arson_investigation.html

It took seven fire departments and 51 personnel from the area to assist with the fire.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Arson Investigation In Metcalfe Co.

Wrongful Death Third Person Arrested in Connection With Shooting Near Lexington Inn

A third person has been arrested in connection with a murder on Buena Vista Road.

Alonzo K. Ragland, 28, was charged with Murder and Robbery 1st.

On Friday, Destiny A. Huff, 22, of Nicholasville was charged with Murder and Robbery 1st and a warrant was obtained for 28-year-old Daniel J. Glasscock for the same charges.

http://liarcatchers.com/wrongful_death.html

Investigators say that Huff and Glasscock were involved in a narcotics transaction with the victim, Victor Villagomez-Duarte, at the Microtel Inn on

September 5, when Villagomez-Duarte was shot.

The 24-year-old died at the hospital on September 7 due to his injury.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Wrongful Death Third Person Arrested in Connection With Shooting Near Lexington Inn