Private Detective: Lexington Police Searching for Bank Robber

Lexington Police are searching for the suspect of a bank robbery Friday morning.

Authorities say that Chase Bank on Nichols Park was robbed around 9:30 a.m. The suspect implied he had a weapon during the robbery.

http://liarcatchers.com/contact.php

Investigators are looking for a black male in his 30’s wearing a maroon colored shirt, gray hat and is six feet tall weighing 230 pounds.

An employee at the bank who is pregnant was checked by medical personnel.

No other injuries have been reported.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Lexington Police Searching for Bank Robber

Private Detective: Lexington Shooting Victim Faces Drug Charges

Lexington police say they’ve charged the victim in a shooting earlier this week.

Officers say somebody shot John Armstrong, 21, in the leg in the parking lot of the Dairy Queen on Virginia Avenue around 9 p.m. Monday. Armstrong managed to get to a nearby gas station for help.

http://liarcatchers.com/contact.php

Police say they continue to search for the shooter, but gathered enough evidence to charge Armstrong, along with Jessie Stewart, 21, with felony drug trafficking.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Lexington Shooting Victim Faces Drug Charges

Private Detective: Danville Police Seeking Help Finding Counterfeit Money Suspects

Danville Police need the public’s help finding some people who are passing counterfeit money.

Authorities say multiple law enforcement agencies in Kentucky and surrounding states are looking for two potential suspects who are allegedly passing counterfeit hundred dollar bills. Officials in both Kentucky and Indiana say they are investigating the phony money.

http://liarcatchers.com/contact.php

Police say the suspects usually purchase an item under $20 and get change for the counterfeit $100 bill.

Officials say the suspects could be traveling in a rental car.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Danville Police Seeking Help Finding Counterfeit Money Suspects

Accident Reconstruction Fatal Crash in Floyd County

A crash resulting in at least one fatality happened Thursday morning in Floyd County.

http://liarcatchers.com/accident_reconstruction.html

The accident was around 11:45 a.m. in Boldman, near the Pike-Floyd County line and involved two cars. A re-constructionist was called to the scene.

The name of the person who died has not yet been released.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Accident Reconstruction Fatal Crash in Floyd County

Private Detective: 74 Year Old Man Arrested For Charges of Sexual Abuse

The Harrodsburg Police Department has arrested Rufus Owen Edwards Sr., 74, for one count of an Unlawful Transaction with a Minor and two counts of first-degree Sexual Abuse.

Edwards has been lodged at the Boyle County Detention Center.

http://liarcatchers.com/contact.php

There is an ongoing investigation in Somerset, KY.

Police believe there may be other victims related to crimes occurring since the early 90’s, maybe even before.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: 74 Year Old Man Arrested For Charges of Sexual Abuse

Private Detective: Internet of Things Poses Opportunities For Cyber Crime

The Internet of Things (IoT) refers to any object or device which connects to the Internet to automatically send and/or receive data.

As more businesses and homeowners use web-connected devices to enhance company efficiency or lifestyle conveniences, their connection to the Internet also increases the target space for malicious cyber actors. Similar to other computing devices, like computers or Smartphones, IoT devices also pose security risks to consumers. The FBI is warning companies and the general public to be aware of IoT vulnerabilities cyber criminals could exploit, and offers some tips on mitigating those cyber threats.

http://liarcatchers.com/contact.php

What are some IoT devices?

  • Automated devices which remotely or automatically adjust lighting or HVAC
  • Security systems, such as security alarms or Wi-Fi cameras, including video monitors used in nursery and daycare settings
  • Medical devices, such as wireless heart monitors or insulin dispensers
  • Thermostats
  • Wearables, such as fitness devices
  • Lighting modules which activate or deactivate lights
  • Smart appliances, such as smart refrigerators and TVs
  • Office equipment, such as printers
  • Entertainment devices to control music or television from a mobile device
  • Fuel monitoring systems

How do IoT devices connect?

IoT devices connect through computer networks to exchange data with the operator, businesses, manufacturers, and other connected devices, mainly without requiring human interaction.

What are the IoT Risks?

Deficient security capabilities and difficulties for patching vulnerabilities in these devices, as well as a lack of consumer security awareness, provide cyber actors with opportunities to exploit these devices. Criminals can use these opportunities to remotely facilitate attacks on other systems, send malicious and spam e-mails, steal personal information, or interfere with physical safety. The main IoT risks include:

  • An exploitation of the Universal Plug and Play protocol (UPnP) to gain access to many IoT devices. The UPnP describes the process when a device remotely connects and communicates on a network automatically without authentication. UPnP is designed to self-configure when attached to an IP address, making it vulnerable to exploitation. Cyber actors can change the configuration, and run commands on the devices, potentially enabling the devices to harvest sensitive information or conduct attacks against homes and businesses, or engage in digital eavesdropping;
  • An exploitation of default passwords to send malicious and spam e-mails, or steal personally identifiable or credit card information;
  • Compromising the IoT device to cause physical harm;
  • Overloading the devices to render the device inoperable;
  • Interfering with business transactions.

What an IoT Risk Might Look Like to You?

Unsecured or weakly secured devices provide opportunities for cyber criminals to intrude upon private networks and gain access to other devices and information attached to these networks. Devices with default passwords or open Wi-Fi connections are an easy target for cyber actors to exploit.

Examples of such incidents:

  • Cyber criminals can take advantage of security oversights or gaps in the configuration of closed circuit television, such as security cameras used by private businesses or built-in cameras on baby monitors used in homes and day care centers. Many devices have default passwords cyber actors are aware of and others broadcast their location to the Internet. Systems not properly secured can be located and breached by actors who wish to stream live feed on the Internet for anyone to see. Any default passwords should be changed as soon as possible, and the wireless network should have a strong password and firewall.
  • Criminals can exploit unsecured wireless connections for automated devices, such as security systems, garage doors, thermostats, and lighting. The exploits allow criminals to obtain administrative privileges on the automated device. Once the criminals have obtained the owner’s privileges, the criminal can access the home or business network and collect personal information or remotely monitor the owner’s habits and network traffic. If the owner did not change the default password or create a strong password, a cyber criminal could easily exploit these devices to open doors, turn off security systems, record audio and video, and gain access to sensitive data.
  • E-mail spam attacks are not only sent from laptops, desktop computers, or mobile devices. Criminals are also using home-networking routers, connected multi-media centers, televisions, and appliances with wireless network connections as vectors for malicious e-mail. Devices affected are usually vulnerable because the factory default password is still in use or the wireless network is not secured.
  • Criminals can also gain access to unprotected devices used in home health care, such as those used to collect and transmit personal monitoring data or time-dispense medicines. Once criminals have breached such devices, they have access to any personal or medical information stored on the devices and can possibly change the coding controlling the dispensing of medicines or health data collection. These devices may be at risk if they are capable of long-range connectivity.
  • Criminals can also attack business-critical devices connected to the Internet such as the monitoring systems on gas pumps. Using this connection, the criminals could cause the pump to register incorrect levels, creating either a false gas shortage or allowing a refueling vehicle to dangerously overfill the tanks, creating a fire hazard, or interrupt the connection to the point of sale system allowing fuel to be dispensed without registering a monetary transaction.

Consumer Protection and Defense Recommendations

  • Isolate IoT devices on their own protected networks;
  • Disable UPnP on routers;
  • Consider whether IoT devices are ideal for their intended purpose;
  • Purchase IoT devices from manufacturers with a track record of providing secure devices;
  • When available, update IoT devices with security patches;
  • Consumers should be aware of the capabilities of the devices and appliances installed in their homes and businesses. If a device comes with a default password or an open Wi-Fi connection, consumers should change the password and only allow it operate on a home network with a secured Wi-Fi router;
  • Use current best practices when connecting IoT devices to wireless networks, and when connecting remotely to an IoT device;
  • Patients should be informed about the capabilities of any medical devices prescribed for at-home use. If the device is capable of remote operation or transmission of data, it could be a target for a malicious actor;
  • Ensure all default passwords are changed to strong passwords. Do not use the default password determined by the device manufacturer. Many default passwords can be easily located on the Internet. Do not use common words and simple phrases or passwords containing easily obtainable personal information, such as important dates or names of children or pets. If the device does not allow the capability to change the access password, ensure the device providing wireless Internet service has a strong password and uses strong encryption.
  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Internet of Things Poses Opportunities For Cyber Crime

Private Detective: Winchester Woman Charged With Wanton Endangerment

Cassaundra Haney, a Winchester woman accused of placing her baby in a plastic bag, has been charged with, and pled guilty to, first-degree wanton endangerment in Clark County. Haney will have a formal sentencing on October 15, at 11 a.m.

http://liarcatchers.com/contact.php

Haney said that she did not know she was pregnant and gave birth in the toilet. After leaving the baby in the toilet for 15 minutes, she decided to put the baby in the bag.

Authorities said Haney intended to dispose of the child in a trash can.

The jury recommended Haney be sentenced with four years.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Winchester Woman Charged With Wanton Endangerment

Private Detective: Richmond Police Now Say Woman Falsified Report of Attack

Richmond police now say a woman who said she was attacked while walking down the street Wednesday made the story up.

Police responded to a home on North Madison Avenue after a man found a young woman cut and bleeding on the sidewalk. The woman told police two men tired to abduct and rape her.

http://liarcatchers.com/contact.php

Police now say the woman cut herself.

EMS took the woman to UK Hospital where she was treated and released. She then returned to Louisville. Police arrested her there and charged her with making a false report.

Officials have not released the woman’s name.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Private Detective: Richmond Police Now Say Woman Falsified Report of Attack

Wrongful Death Motorcycle Club Member Found Guilty of Murder

The Bowling Green Daily News has reported that William Robert “Bobby” Rigdon has been found guilty of murder.

A Warren County jury sentenced Rigdon to 38 years in prison for the murder of Wendell Gleason Pyles, 50, of Columbia. The 30-year-old was convicted of shooting and killing Pyles at his workplace, the Tarter Gate Co. in Casey County, on Sept. 26, 2012.

The jury deliberated for two and a half hours before the verdict, following a seven-day trial.

http://liarcatchers.com/wrongful_death.html

There was a theory, by prosecutors Shawna Virgin Kincer and Jeffery Prather, that Rigdon, a member of the Frankfort chapter of the Iron Horsemen Motorcycle Club, had shot Plyes, a former member, because of an order to do so from the Iron Horsemen chapter president David Salyers, to show his commitment to the club.

There were witnesses who testified that Salyers advanced Pyles money to buy a motorcycle and Pyles never repaid him.

Pyles was found near his truck at his worksite. He had been shot three times, with one shot in the back of his head. Detectives found a cigarette butt on the ground near Pyles’ truck, with Rigdon’s DNA.

There was also surveillance footage from Crockett Trail General Store, in Liberty, showing Rigdon and Salyers paying for items inside the store, within an hour of the 911 call that brought police to Pyles’ workplace.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Wrongful Death Motorcycle Club Member Found Guilty of Murder

Missing Person Dorothy Troutfree of Thurston County, WA

The Thurston County Sheriff’s Office has issued a missing person alert for 40-year-old Dorothy L. “Dottie” Troutfree.

Troutfree was last seen Aug. 28 wearing blue denim capris and a light blue shirt. She is described as a white female, 5 feet 4 inches and 180 lbs., with brown or possibly reddish hair and hazel eyes. She has pierced ears.

http://liarcatchers.com/missing_persons_investigations.html

Troutfree has a Facebook page, but no posts have been made since Aug. 15. On Aug. 16, she was involved in a domestic dispute.

It is believed she could be in Thurston, Pierce or Grays Harbor counties.

If you have seen Troutfree or have any information regarding her whereabouts, contact Detective F.M. Frawley at the Thurston County Sheriff’s Office at 360-786-5599 or call 911.

Dorothy “Dottie” Troutfree. Missing Thurston County woman.
  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS
  • LinkedIn
Posted in Private Investigator Lexington | Comments Off on Missing Person Dorothy Troutfree of Thurston County, WA