crime bulletin for march 6, 2012
DESCRIPTION
The Anniston Star's Crime Bulletin section for March 6, 2012.TRANSCRIPT
Page 6A Tuesday, March 6, 2012 The Anniston Star
6A
Northeast Alabama's Law Enforcement Community Billboard
A product of the marketing department of The Anniston Star
CALHOUN COUNTY SHERIFF’S OFFICE / www.calcoso.org
WANTED
THE CRIME BULLETIN
MISSING PERSONS (800) 228-7688
Hurst, Floyd Roger
Last Seen: Oxford, Alabama
Fuqua, Carla MichelleLast Seen:
Piedmont, Alabama
Steed, Karen Denise
Last Seen: Piedmont, Alabama
Jones, Jayson ELast Seen:
Birmingham, Alabama
Burrows, PatrickLast Seen:
Calhoun County, Alabama
3815 Leatherwood Plaza Hwy. 431 • (256) 236-1114Mon. - Fri. 8-5; Sat. 9-12 • [email protected] & [email protected]
www.annistonfireplaceandpatio.com
ANNISTONFIREPLACE & PATIO
Membership in Fort McClellan Credit Union is available for anyone who lives, works or attends school in the following counties: Calhoun, Cleburne, Etowah, Cherokee, St. Clair, Talladega, Clay, Randolph and Chambers.
FORT MCCLELLAN
CREDIT UNION
Apply At A Nearby Fort McClellan Credit Union
Anniston1731 Noble St.(256) 237-2113
Jacksonville1204 Church Ave. SE(256) 435-5741
RoanokeHwy. 431 N Bypass(334) 863-8902
OhatcheeIndian Village(256) 892-7129
Centre500 Cedar Bluff Rd. (256) 927-4203
BEFORE YOU SELL - GIVE US A TRY We Pay
More For...GOLD • SILVER
COINS • SCRAP • BULLION
OXFORD PAWN & GUN L.L.C.729 Snow Street • Oxford, AL • 256-831-8895
PATRICK CARRSex offender registtatin/
notifi cation act
MISTI HILLFTA-Assault III
JEFFREY MARTINFTA-Domestic violence
III-harassment
DANIEL PEOPLESFTA-Theft of property III
DAVID PHILLIPSTheft of property III
LONNIE HOWARDTheft of property I-motor
vehicle x2
JOHN SMITHHome repair fraud
WILLIAM SPURLOCKFTA-Break/enter
vehicle x2
TIMOTHY TEAGUEFTA-Criminal Trespass I
REGINALD TURNERChild support contempt
arrest order
LAQUINTA MITCHELLPossession
marijuana I (alias)
JERMAINE JENKINS FTA-child support x2, Child
support contempt arrest order
DOUGLAS BEASLEYChild support contempt
arrest order
DEBRA TIDWELLSex offender registration/
notifi cation act (alias)
The Anniston Star Tuesday, March 6, 2012 Page 7A
11A7A
ANNISTON POLICE DEPARTMENT www.annistonal.gov
WANTEDContact the Anniston Police Department at
256-240-4018
JAMES SMITH JRTWO FELONY AND FOUR
MISDEMEANOR WARRANTS
DARRELL BOYKINSPOSSESSION OF FORGED
INSTRUMENT 2ND
NIGEL DREUITTTHEFT OF PROPERTY 2ND DEGREE
MALCOLM BODISONVAUCSA DISTRIBUTION OF CONTROLLED SUBSTANCE
DEVONTA JAMESTHEFT OF PROPERTY 2ND &
ATTEMPT TO ELUDE
QUINTORA CHATMANTHEFT OF PROPERTY 2ND
MONTREZBURTON
THEFT OF PROPERTY 2ND
MACK TRIPLETBURGLARY 3RD
Tapping into a cell phone to steal private information seems like something out of a blockbuster thriller. In reality, this type of crime does happen to ordinary people. Individuals who rely heavily on mobile phones should recognize their susceptibility to identity theft should their phone be lost or stolen. The increased use and capabilities of mobile phones open users up to a host of security issues that go beyond overheard phone messages. Viruses, malware and identity theft are no longer just topics for PC users. Smartphones can be breached or knocked out by the same viruses that plague desktop or laptop computers. According to a survey by CellPhone.org, 44 percent of people think that surfi ng the Web on their phone is as safe or safer than browsing on a PC. The fact remains that eavesdropping and viewing text messages are possible with software that can easily be bought by third-party individuals. Furthermore, encryption software and other security enhancements offered by many providers must be activated by the phone user, who may otherwise unknowingly be leaving him or herself open to security issues if the software is not activated. Cell phone tapping software is available on the Web by companies marketing to those who have been scorned or want to keep tabs on someone else. Finding out about a cheating spouse or keeping a close eye on a babysitter can spur people to purchase this software. Still others have more malevolent intentions when downloading tapping software. They are interested in stealing personal information or even stalking or bullying others. These illegal spy software programs allow criminals to view text messages, hear phone conversations (even if the phone is turned off), and even receive GPS tracking information on the cell phone user. Those doing the spying may then be privy to social security numbers, birth dates, addresses, phone numbers,
credit card information, and any other personal data that is transmitted via text messaging or phone conversations. Keep in mind that high-tech identity theft isn’t the only way privacy can be breached with cell phones. Simply stealing another person’s mobile phone that hasn’t been locked down with a pass code is one way to retrieve potentially private information. Some others have used cell phone cameras to covertly photograph credit card information being used in restaurants and other personal details. Others unwittingly give out personal information when donating or selling used mobile phones. Cell phones store data on a microchip housed in the device. Information thought to be erased can be retrieved by hackers employing certain software. A British identity theft protection fi rm called CPP studied mobile phones purchased by consumers on eBay and determined that 54 percent of these devices contained extensive personal data. This included bank account information, user account passwords, login information for social networking sites, phone numbers and PIN numbers. It’s important to have a provider erase the memory before donating the phone. Restoring the phone to factory settings or doing a manual erase of data may not be enough to offer adequate protection.Cell phones have dramatically increased in use and so have scams and methods for stealing personal information from these devices.
PREVENT CELL PHONE IDENTITY THEFT
KIMBERLY DAVISFRAUDULENT USE OF CREDIT CARD
JOSEPH WHITETHEFT OF PROPERTY 1ST
WILLIAM LAWUNLAWFUL BREAKING
AND ENTERING OF VEHICLE