Log in

View Full Version : Fat Slob Starves Her Kids - "There was only enough food for me!"



Methais
07-18-2015, 03:56 PM
Obese Woman Arrested For Starving Her 7 Kids: “There Was Only Enough Food For Me”

http://now8news.com/wp-content/uploads/2015/07/connors.jpg

News 8 – A disturbing report is coming out of that Baton Rouge, Louisiana this morning that tells the story of 27-year-old Lakisha Connors who reportedly starved her children nearly to death. The 27-year-old mother of 7 was arrested on Thursday evening when neighbors called police and said they saw extremely unhealthy looking children digging through the trash cans on the side yard.

When police arrived and knocked on the door, they were greeted by three-year-old Amonte Connors and five-year-old Dante Connors who let them into the home. Authorities say they found the Lakisha Connors passed out on the couch.

“The house was disgusting, probably the worst I’ve ever seen,” said police chief Ronnie Hernandes. “When we enter the home, we found seven children who looked extremely malnourished. In addition to that there was a lock on the refrigerator and all nonperishable foods were locked in a huge wooden makeshift storage container in the mother’s bedroom.”

Neighbors say that Connors moved into this rental home about six weeks ago.

“Lakisha just moved in not too long ago. This was the first time I had ever seen any children!” said a neighbor who wishes to stay anonymous. “But we see her almost every day coming into the house with groceries. So for her children to be starting like that was absolutely shocking!”

Authorities on the scene say when Lakisha was awoke by the police, she was very combative. “We pulled her up off the couch and asked her to explain herself,” said Hernandes. “When asked why her children were in this condition, Lakisha plainly said, without any remorse, ‘There was only enough food for me! Them kids get on my nerves. But they eat, they eat my scraps. I’m a big girl I need more than them!'”

The 7 children, whose ages range from 1 to 11 years of age, were taken into protective custody by Child Protective Services.

Lakisha is currently being held on a $500 bond.

http://now8news.com/obese-woman-arrested-for-starving-her-7-kids-there-was-only-enough-food-for-me/

Seriously thought this was satire. But it's not.


https://www.youtube.com/watch?v=pcv52Ee3W5U

rolfard
01-19-2019, 06:52 PM
https://www.snopes.com/fact-check/obese-woman-starving-7-kids/

Taernath
01-19-2019, 06:56 PM
Methais falling for the same hoaxes grandmas on facebook do.

...4 years ago. WTF rolfard

Gelston
01-20-2019, 09:42 AM
It was believable because it was in baton rouge.

Methais
01-20-2019, 10:25 AM
rolfard is clearly stalking me

https://media.giphy.com/media/l0IypeKl9NJhPFMrK/giphy.gif


It was believable because it was in baton rouge.

This is correct.

Back
01-20-2019, 11:05 AM
Methais,

You're welcome.

How to Identify an Email Hoax & What to do if You Fall Victim

There are a variety of email-based hoaxes demanding money and threatening SLTT government recipients in various ways. Hoax campaigns include illegitimate threats ranging from distributed denial of service (DDoS) attacks to physical violence and threats to reveal sensitive information purportedly gathered through exploited vulnerabilities or malware infections. The theme of the hoaxes change, but in recent cases, the threat actors’ goal has remained the same - attempting to elicit fear in the recipient in order to prompt the recipient to pay the extortion demand.
Hoax emails are opportunistic in nature with threats that the threat actor will not follow through on. It is imperative that recipients of hoax emails identify them as scams in order to avoid being hoodwinked. However, be aware that if you receive a malicious email with any one or more of the below identifiers it may also be a legitimate threat. For this reason, it is important to follow standard incident response procedures while also investigating the accuracy of the claim.

How to know if it’s a hoax

There are a couple of key indicators that can help you in determining if the email is a hoax or not. For instance, many hoaxes are opportunistically emailed to multiple recipients. Identifying the threat actors’ use of generic language and lack of specific details about the target are good indicators that it’s a hoax. Another key component of these scams is that the threat actor incites a sense of urgency by demanding immediate payment to avoid the malicious activity, which makes it harder for the recipient to calm down and think it through. Furthermore, in a hoax, the email will not include legitimate proof of the ability to pull off these claims. One word of warning, some observed hoax campaigns attempt to gain legitimacy by claiming to be from groups known to conduct successful attacks.
The case of the compromising video

A recent campaign affecting various SLTT governments claims, via email, that the threat actor placed malware on the email recipient’s system. The email then explains that the malware allowed the threat actor to capture webcam footage of the recipient while the recipient was purportedly viewing pornographic videos. Furthermore, the threat actor claims the malware grants access to all of the recipient’s personal contacts. The recipient is instructed to pay the extortion demand to a bitcoin wallet within 24 hours in order to prevent the video from being emailed to all their personal contacts.
https://www.cisecurity.org/wp-content/uploads/2018/04/malware.png
Recommendations



Verify the accuracy of the claim while also investigating whether or not it is a hoax.
To check if it is a hoax:

Determine if the email contains any specific knowledge about operations or if the language is generic and appears to be part of a mass mailing campaign.
Conduct searches on keywords, the cryptocurrency wallet ID, and sender’s email address, as this may yield multiple examples of others affected by the same hoax.
Check the cryptocurrency wallet ID for transactions to the wallet, which may provide insight into the threat actor’s operations.
Contact the MS-ISAC and other information sharing resources to determine if other entities report receiving similar emails.


Verify the accuracy of the claim:

Confirm that malware was not placed on the system by running an antivirus scan. Ensure that the antivirus program uses updated signatures.
Reimage the machine and reset passwords if malware is discovered.
Speak with the employee to determine any relevant information they may have.


Provide social engineering training to employees and direct them to immediately report potential hoaxes.
Implement spam filtering at the email gateway to filter out emails with known phishing indicators, such as the known malicious subject lines.
Implement Domain-Based Message Authentication, Reporting & Conformance (DMARC), a validation system that minimizes spam emails by detecting email spoofing using Domain Name System (DNS) records and digital signatures.
Adhere to best practices, such as those described in the CIS Controls and the CIS Benchmarks programs.

Wrathbringer
01-20-2019, 01:09 PM
Methais,

You're welcome.

How to Identify an Email Hoax & What to do if You Fall Victim

There are a variety of email-based hoaxes demanding money and threatening SLTT government recipients in various ways. Hoax campaigns include illegitimate threats ranging from distributed denial of service (DDoS) attacks to physical violence and threats to reveal sensitive information purportedly gathered through exploited vulnerabilities or malware infections. The theme of the hoaxes change, but in recent cases, the threat actors’ goal has remained the same - attempting to elicit fear in the recipient in order to prompt the recipient to pay the extortion demand.
Hoax emails are opportunistic in nature with threats that the threat actor will not follow through on. It is imperative that recipients of hoax emails identify them as scams in order to avoid being hoodwinked. However, be aware that if you receive a malicious email with any one or more of the below identifiers it may also be a legitimate threat. For this reason, it is important to follow standard incident response procedures while also investigating the accuracy of the claim.

How to know if it’s a hoax

There are a couple of key indicators that can help you in determining if the email is a hoax or not. For instance, many hoaxes are opportunistically emailed to multiple recipients. Identifying the threat actors’ use of generic language and lack of specific details about the target are good indicators that it’s a hoax. Another key component of these scams is that the threat actor incites a sense of urgency by demanding immediate payment to avoid the malicious activity, which makes it harder for the recipient to calm down and think it through. Furthermore, in a hoax, the email will not include legitimate proof of the ability to pull off these claims. One word of warning, some observed hoax campaigns attempt to gain legitimacy by claiming to be from groups known to conduct successful attacks.
The case of the compromising video

A recent campaign affecting various SLTT governments claims, via email, that the threat actor placed malware on the email recipient’s system. The email then explains that the malware allowed the threat actor to capture webcam footage of the recipient while the recipient was purportedly viewing pornographic videos. Furthermore, the threat actor claims the malware grants access to all of the recipient’s personal contacts. The recipient is instructed to pay the extortion demand to a bitcoin wallet within 24 hours in order to prevent the video from being emailed to all their personal contacts.
https://www.cisecurity.org/wp-content/uploads/2018/04/malware.png
Recommendations



Verify the accuracy of the claim while also investigating whether or not it is a hoax.
To check if it is a hoax:

Determine if the email contains any specific knowledge about operations or if the language is generic and appears to be part of a mass mailing campaign.
Conduct searches on keywords, the cryptocurrency wallet ID, and sender’s email address, as this may yield multiple examples of others affected by the same hoax.
Check the cryptocurrency wallet ID for transactions to the wallet, which may provide insight into the threat actor’s operations.
Contact the MS-ISAC and other information sharing resources to determine if other entities report receiving similar emails.


Verify the accuracy of the claim:

Confirm that malware was not placed on the system by running an antivirus scan. Ensure that the antivirus program uses updated signatures.
Reimage the machine and reset passwords if malware is discovered.
Speak with the employee to determine any relevant information they may have.


Provide social engineering training to employees and direct them to immediately report potential hoaxes.
Implement spam filtering at the email gateway to filter out emails with known phishing indicators, such as the known malicious subject lines.
Implement Domain-Based Message Authentication, Reporting & Conformance (DMARC), a validation system that minimizes spam emails by detecting email spoofing using Domain Name System (DNS) records and digital signatures.
Adhere to best practices, such as those described in the CIS Controls and the CIS Benchmarks programs.


:lol:

Methais
01-20-2019, 01:11 PM
Methais,

You're welcome.

How to Identify an Email Hoax & What to do if You Fall Victim

There are a variety of email-based hoaxes demanding money and threatening SLTT government recipients in various ways. Hoax campaigns include illegitimate threats ranging from distributed denial of service (DDoS) attacks to physical violence and threats to reveal sensitive information purportedly gathered through exploited vulnerabilities or malware infections. The theme of the hoaxes change, but in recent cases, the threat actors’ goal has remained the same - attempting to elicit fear in the recipient in order to prompt the recipient to pay the extortion demand.
Hoax emails are opportunistic in nature with threats that the threat actor will not follow through on. It is imperative that recipients of hoax emails identify them as scams in order to avoid being hoodwinked. However, be aware that if you receive a malicious email with any one or more of the below identifiers it may also be a legitimate threat. For this reason, it is important to follow standard incident response procedures while also investigating the accuracy of the claim.

How to know if it’s a hoax

There are a couple of key indicators that can help you in determining if the email is a hoax or not. For instance, many hoaxes are opportunistically emailed to multiple recipients. Identifying the threat actors’ use of generic language and lack of specific details about the target are good indicators that it’s a hoax. Another key component of these scams is that the threat actor incites a sense of urgency by demanding immediate payment to avoid the malicious activity, which makes it harder for the recipient to calm down and think it through. Furthermore, in a hoax, the email will not include legitimate proof of the ability to pull off these claims. One word of warning, some observed hoax campaigns attempt to gain legitimacy by claiming to be from groups known to conduct successful attacks.
The case of the compromising video

A recent campaign affecting various SLTT governments claims, via email, that the threat actor placed malware on the email recipient’s system. The email then explains that the malware allowed the threat actor to capture webcam footage of the recipient while the recipient was purportedly viewing pornographic videos. Furthermore, the threat actor claims the malware grants access to all of the recipient’s personal contacts. The recipient is instructed to pay the extortion demand to a bitcoin wallet within 24 hours in order to prevent the video from being emailed to all their personal contacts.
https://www.cisecurity.org/wp-content/uploads/2018/04/malware.png
Recommendations



Verify the accuracy of the claim while also investigating whether or not it is a hoax.
To check if it is a hoax:

Determine if the email contains any specific knowledge about operations or if the language is generic and appears to be part of a mass mailing campaign.
Conduct searches on keywords, the cryptocurrency wallet ID, and sender’s email address, as this may yield multiple examples of others affected by the same hoax.
Check the cryptocurrency wallet ID for transactions to the wallet, which may provide insight into the threat actor’s operations.
Contact the MS-ISAC and other information sharing resources to determine if other entities report receiving similar emails.


Verify the accuracy of the claim:

Confirm that malware was not placed on the system by running an antivirus scan. Ensure that the antivirus program uses updated signatures.
Reimage the machine and reset passwords if malware is discovered.
Speak with the employee to determine any relevant information they may have.


Provide social engineering training to employees and direct them to immediately report potential hoaxes.
Implement spam filtering at the email gateway to filter out emails with known phishing indicators, such as the known malicious subject lines.
Implement Domain-Based Message Authentication, Reporting & Conformance (DMARC), a validation system that minimizes spam emails by detecting email spoofing using Domain Name System (DNS) records and digital signatures.
Adhere to best practices, such as those described in the CIS Controls and the CIS Benchmarks programs.


Allow me to return the favor.

How to identify a retard on a 4 year old post

https://i.imgur.com/f8gudxf.jpg

Gelston
01-20-2019, 01:23 PM
I just realized this was a 4 year old post and rolfard bumped it. wtf

Methais
01-20-2019, 01:27 PM
I just realized this was a 4 year old post and rolfard bumped it. wtf

I remember looking it up at the time to see if it was fake and no one including snopes had anything about it being fake.

https://i.imgur.com/iY9knNv.jpg

BACK WITH THAT SICK BURN THO! :lol:

Back
01-20-2019, 01:47 PM
I remember looking it up at the time to see if it was fake and no one including snopes had anything about it being fake.

BACK WITH THAT SICK BURN THO! :lol:

Dang I look young there. I think that pic is about 10 years old.

Methais
01-20-2019, 01:56 PM
Dang I look retarded there. I think that pic is about 10 years old. I’m much more retarded now.

I would be a liar if I said I didn’t agree.

Astray
01-20-2019, 02:03 PM
Nobody has shopped a MAGA hat on drunk Back? What the fuck, PC?

Gelston
01-20-2019, 02:10 PM
Nobody has shopped a MAGA hat on drunk Back? What the fuck, PC?

You can do it. I dont care enough.

Astray
01-20-2019, 02:15 PM
You can do it.

You're assuming I can.

kutter
01-20-2019, 03:26 PM
Well I never saw this post originally and did not notice the date, but when I saw Baton Rouge I totally believed it. The city is not what it once was. The flood did me a favor of sorts, it sucked losing so many personal things but it was the catalyst to get out. And things are only getting worse and worse. I cannot imagine what is going happen if Exxon/Mobil pulls out.

rolfard
01-20-2019, 03:52 PM
It popped up in a search I was doing for a seller and I remember reading (and believing) it at the time. I did a quick search to see what the outcome was as I was curious to see if the kids were ok and Snopes popped up discrediting the account.

sellstuff1
01-20-2019, 03:57 PM
Retarded conservatives posting fake news again? I'm absolutely shocked.

Stumplicker
01-20-2019, 05:27 PM
Four year old post or not, it does remind me of the worst "i can't believe you fell for that crap" I saw on Facebook. It was from my own mother. She's always looking for ways to hate police officers (because her first ex husband was one). She found a video that purportedly showed a cop being caught with a dead hooker in his hotel room and other cops helping him cover it up. Because cops all look out for their own and are above the law!!!

It was a clip from Reno 911.

sellstuff1
01-20-2019, 05:39 PM
Because cops all look out for their own and are above the law!

They do, though

https://en.wikipedia.org/wiki/Murder_of_Laquan_McDonald

Stumplicker
01-20-2019, 05:45 PM
They do, though

https://en.wikipedia.org/wiki/Murder_of_Laquan_McDonald

First of all, if you want to rag on the Chicago PD, you're doing it wrong unless you mention their 20 year long institutionalized torture program for minorities. Second of all, ALL cops do not think they're above the law. Yes, some do, including the one my mother hated, but they are now and always have been a minority.

drauz
01-20-2019, 09:10 PM
It's easy to fall for because I could imagine a person horrible enough to do it.

Gelston
01-20-2019, 09:47 PM
I'm pretty sure it has happened. The picture and shit aren't from it, but yeah, it is plausible.