Once the video was suspended, a viewer could only see 2 still photos. (As described above) However, these photos did not contain the elements of a sexual assault. The victim identified herself and SP l Hock as being the subjects in the photos. There were approximately 100 people who viewed the video (252 total who viewed the site) and approximately 188 comments were posted on the site. One of the comments was as follows: “At first we thought that the girl was ( ) but it might be ( ).It's hard to tell one dumb blond slut from another” “We could cite paragraphs of laws be violated by eating and exposing some girl's pussy while she was apparently passed out drunk--but why bother? It's well established that John Hock can sexually assault …show more content…
She was passed out drunk; she was not conscious: As a matter of law, she could not have given her consent. Sticky Drama did screen-record proof of the assault, but we're trying really really hard to be good sponsor-friendly little faggots, and so we're not going to show …show more content…
Willis/Jr. Paralegal/compliance manager of GoDeddy.com providing me with the account holder information for the registrant of the website stickydrama.com. I took this information to Detective Oldenburg of the phoenix Police Department Computer Forensics Unit, for review. Detective Oldenburg reviewed the information and noted that the name of the web hosting provider was not listed in the subpoena response and therefore was not able to determine where the website was hosted. Detective Oldenburg advised me that web hosting provider could be determined by running certain utilities and checking records from publicly available websites. Detective Oldenburg used the website samspade.org to locate of IP address stickydrama.com which he found to be 174.133.41.146. Detective Oldenburg, using a built in Windows DOS command, ran the “tracert” command to this IP address. This command displays a list of all the servers that a client computer connects through to reach the ultimate host of the website. The results indicated that the last server that was connected to in the route to stickydrama.com was pol.cax03.hstntxl.theplanet.cole (20. 223.21.101). From this information, Detective Oldenburg determined that the web hosting provider that host of stickydrama.com is “The Planet” (theplsnet.com). I am requesting this warrant be issued in order for this investigator to collect any evidence, such as video of the crime, or information which may help
Agent Sutehall queried a publicly available database, which revealed IP address Test belonged to Internet Service Provider (ISP) Comcast Communications and geo-located to Kirkland, Washington. Agent Sutehall turned the investigation over to me, due to the crime potentially being in the City of Kirkland.
It is said that the boy had grabbed her by the shirt, tugged her forward, and stuck his tongue in her mouth; that is why he has been charged for second degree assault. Based on that, it seemed to be a little more than just an innocent “stolen kiss” like
In the Article “Former Vanderbilt football player gets 17 years in rape case” by Alex Medeiros, CNN. Brandon Vandenburg the accused, took an unconscious woman who he was dating into a dorm room along with three other football players and gang raped the unconscious woman. The rape took place on the Nashville campus in June of 2013. The jury who were assigned to the case charged Vandenburg with five counts of aggravated rape, two counts of aggravated sexual battery, and one count of unlawful photography.
In To Kill a Mockingbird, Harper Lee explores the consequences of a societal structure founded on bigotry, racism, prejudice, and the hunger for power. Lee employs a variety of literary techniques to portray the consequences of Maycomb’s errant societal structure or even social hierarchy. Thus, Lee uses 1930s Maycomb to critique and evaluate the flaws in her own 1960s America. A particular incident which is central to Lee’s underlying message is the trial of Tom Robinson. Robinson’s trial serves to reveal the institutionalisation of racism and bigotry, as well as the insatiable thirst for power created by the social hierarchy.
This website created by a part-time student in Arizona and a former mortgage broker in New Jersey. Shadowcrew had hundreds of members across the United States, Europe, and Asia. He was arrested in New Jersey in 2003 while working as an administrator for this website (Verini, 2010). After his arrest, rather than sent a hacker to prison, the Secret Service of US offers him $75000 a year for his services as an informant. He agreed to become an informant.
Upon arrival, I made contact with the White male defendant, Jerome Anthony Hunniford. The defendant was positively identified by his photo on D.A.V.I..D. Hunniford had a warrant out of Pasco County Florida for FTA-DWLSR W/ knowledge, warrant #113230RZXTWS. The warrant had full extradition in the State of Florida with a $1,013 bond.
The goal of this case study is to follow a packet capture file to investigate the fictitious character Ann Dercover. Examining the file will show how she uses network tunneling to cover her tracks, but more importantly, it will help develop skills that can be applied to network forensics. The challenge is to determine if the DNS traffic is truly suspicious, determine the purpose of the DNS traffic, recover all possible information on the local and remote systems involved, and the risk associated with the data leaking from the organization.
The government in the United States has three branches, which are executive, legislative and judicial. The United States of America declared the independence from Britain since 1976. Since success of revolution, the United States founded their first government in 1789 with following ideas: freedom, liberty, democracy. Until now, the United States have more than forty presidents indirectly elected by civilian citizens. Presidents will be reelected every four years. Changing in presidents will also change ideas about the role of government. Barry Goldwater, Lyndon Johnson, Ronald Reagan and Barack Obama these four renowned presidents demonstrated their different views on establishing government with four speeches in 1964, 1965, 1981 and
The Ashley Madison’s case is just one of many hacks that occur on the Internet. Companies such as Cisco, Yahoo, LinkedIn, University of California (Berkeley), Verizon Enterprise Solutions, and Snapchat are part of the long list of hacked industries. However, this hack was very noteworthy because it involved sex,
Three parties were attended that night by four football players, two of which were Mays and Richmond, along with a 16-year-old female, Jane Doe, who was acquainted with Mays. The first party was given by another 16-year-old girl whose parents were not home, with an estimated 50 or more teens in attendance, but when her older brother arrived, he broke up the party. According to witnesses, Jane Doe appeared to be intoxicated when she left. She had been drinking a large blend of liquors. The second party was held by a member of the football team and his mother eventually made anyone who was not spending the night leave. During this time, Jane Doe was seen vomiting several times. The third party, 10-15 minutes away, was also held by a team member. In route to the third party, witnesses say that Jane Doe who was not responsive was being recorded by cellphone as her breasts were exposed and she was digitally penetrated by Mays. According to the Ohio revised code “2907.01 …insertion, however slight, of any part of the body or any instrument, apparatus, or other object into the vaginal or anal opening of another…, (Law writer, 2008)” is rape. Once inside the third home Mays allegedly tried to orally rape Jane Doe. Mays and
Instead of going through the tedious investigative work, wasting your precious time and energy, you realized that you need help for looking up a long lost relative or perhaps you need to check out an employee or a tenant. All you need is a good reliable private investigator to help you.
Danielle Hunt was arrested for the abuse. She reportedly described multiple times that she hurt her son, telling police she had thrown the baby into a chair out of frustration, making the baby instantly fall asleep. Hunt also admitted to squeezing the boy's
Such violence may occur in all kinds of intimate relationships, including married couples, people who are dating, same-sex partners, couple with children […]” (CUNY Policy on Sexual Misconduct).
The FBI exploited Eric Eoin Marques, a US-born 28-year-old, using buffer overflow methods. Marques is accused of creating and engineering Freedom Hosting, the hidden website indicated to be responsible for facilitating child pornography on 550 servers throughout Europe. One FBI agent declared that Marques is undoubtedly 'the largest facilitator of child porn on the planet".5
It is believed that certain drugs have an impact on users that make them want to continue to use and try harder drugs. There is said to be an order to which people use drugs because of the gateway drug theory. People think that most adolescents usually start out with alcohol or tobacco which is then a gateway to trying illegal drugs, such as marijuana, that causes them to then try a harsher drug like heroin or cocaine. In the article, it states how many people agree that “in vulnerable individuals, particularly teenagers, some drugs are likely to be a way to future addiction because the drugs play such a role in the adolescent’s development” (Gateway 429). This article shows that people think there is a connection between adolescents using alcohol, cigarettes, and marijuana that makes them take the risk of moving onto cocaine and other illegal drugs. This is not true and there is no order in which teenagers begin to use drugs that will automatically compel them to attempt harsher drugs. An individual is highly likely to seek harder drugs because of certain factors in their life, not due to the impact of the drug on them. These factors could include stress in school where the student is pushed to maintain a good GPA. They could also be in a situation of peer pressure among their friends, where everyone around them is trying and using drugs so they feel the need to keep up with the social standard of belonging in the group. Another one could be the living situation of the