Page 1 of 3 123 LastLast
Results 1 to 10 of 23

Thread: Fat Slob Starves Her Kids - "There was only enough food for me!"

  1. #1

    Default Fat Slob Starves Her Kids - "There was only enough food for me!"

    Obese Woman Arrested For Starving Her 7 Kids: “There Was Only Enough Food For Me”



    News 8 – A disturbing report is coming out of that Baton Rouge, Louisiana this morning that tells the story of 27-year-old Lakisha Connors who reportedly starved her children nearly to death. The 27-year-old mother of 7 was arrested on Thursday evening when neighbors called police and said they saw extremely unhealthy looking children digging through the trash cans on the side yard.

    When police arrived and knocked on the door, they were greeted by three-year-old Amonte Connors and five-year-old Dante Connors who let them into the home. Authorities say they found the Lakisha Connors passed out on the couch.

    “The house was disgusting, probably the worst I’ve ever seen,” said police chief Ronnie Hernandes. “When we enter the home, we found seven children who looked extremely malnourished. In addition to that there was a lock on the refrigerator and all nonperishable foods were locked in a huge wooden makeshift storage container in the mother’s bedroom.”

    Neighbors say that Connors moved into this rental home about six weeks ago.

    “Lakisha just moved in not too long ago. This was the first time I had ever seen any children!” said a neighbor who wishes to stay anonymous. “But we see her almost every day coming into the house with groceries. So for her children to be starting like that was absolutely shocking!”

    Authorities on the scene say when Lakisha was awoke by the police, she was very combative. “We pulled her up off the couch and asked her to explain herself,” said Hernandes. “When asked why her children were in this condition, Lakisha plainly said, without any remorse, ‘There was only enough food for me! Them kids get on my nerves. But they eat, they eat my scraps. I’m a big girl I need more than them!'”

    The 7 children, whose ages range from 1 to 11 years of age, were taken into protective custody by Child Protective Services.

    Lakisha is currently being held on a $500 bond.

    http://now8news.com/obese-woman-arre...h-food-for-me/

    Seriously thought this was satire. But it's not.

    Discord: 3PiecesOfToast
    [Private]-GSIV:Nyatherra: "Until this moment i forgot that i changed your name to Biff Muffbanger on Lnet"
    Quote Originally Posted by Back View Post
    I am a retard. I'm disabled. I'm poor. I'm black. I'm gay. I'm transgender. I'm a woman. I'm diagnosed with cancer. I'm a human being.
    Quote Originally Posted by time4fun View Post
    So here's the deal- I am just horrible



  2. #2

  3. #3
    Join Date
    Jan 2003
    Location
    an orbit gone wrong
    Posts
    13,608
    Blog Entries
    2

    Default

    Methais falling for the same hoaxes grandmas on facebook do.

    ...4 years ago. WTF rolfard
    Last edited by Taernath; 01-19-2019 at 07:27 PM.
    You had better pay your guild dues before you forget. You are 113 months behind.

  4. #4
    Join Date
    Jun 2007
    Location
    Mars
    Posts
    34,075
    Blog Entries
    17

    Default

    It was believable because it was in baton rouge.
    Ceterum censeo Carthaginem esse delendam

  5. #5

    Default

    rolfard is clearly stalking me



    Quote Originally Posted by Gelston View Post
    It was believable because it was in baton rouge.
    This is correct.
    Last edited by Methais; 01-20-2019 at 10:27 AM.
    Discord: 3PiecesOfToast
    [Private]-GSIV:Nyatherra: "Until this moment i forgot that i changed your name to Biff Muffbanger on Lnet"
    Quote Originally Posted by Back View Post
    I am a retard. I'm disabled. I'm poor. I'm black. I'm gay. I'm transgender. I'm a woman. I'm diagnosed with cancer. I'm a human being.
    Quote Originally Posted by time4fun View Post
    So here's the deal- I am just horrible



  6. #6

    Default

    Methais,

    You're welcome.

    How to Identify an Email Hoax & What to do if You Fall Victim


    There are a variety of email-based hoaxes demanding money and threatening SLTT government recipients in various ways. Hoax campaigns include illegitimate threats ranging from distributed denial of service (DDoS) attacks to physical violence and threats to reveal sensitive information purportedly gathered through exploited vulnerabilities or malware infections. The theme of the hoaxes change, but in recent cases, the threat actors’ goal has remained the same - attempting to elicit fear in the recipient in order to prompt the recipient to pay the extortion demand.
    Hoax emails are opportunistic in nature with threats that the threat actor will not follow through on. It is imperative that recipients of hoax emails identify them as scams in order to avoid being hoodwinked. However, be aware that if you receive a malicious email with any one or more of the below identifiers it may also be a legitimate threat. For this reason, it is important to follow standard incident response procedures while also investigating the accuracy of the claim.

    How to know if it’s a hoax

    There are a couple of key indicators that can help you in determining if the email is a hoax or not. For instance, many hoaxes are opportunistically emailed to multiple recipients. Identifying the threat actors’ use of generic language and lack of specific details about the target are good indicators that it’s a hoax. Another key component of these scams is that the threat actor incites a sense of urgency by demanding immediate payment to avoid the malicious activity, which makes it harder for the recipient to calm down and think it through. Furthermore, in a hoax, the email will not include legitimate proof of the ability to pull off these claims. One word of warning, some observed hoax campaigns attempt to gain legitimacy by claiming to be from groups known to conduct successful attacks.
    The case of the compromising video

    A recent campaign affecting various SLTT governments claims, via email, that the threat actor placed malware on the email recipient’s system. The email then explains that the malware allowed the threat actor to capture webcam footage of the recipient while the recipient was purportedly viewing pornographic videos. Furthermore, the threat actor claims the malware grants access to all of the recipient’s personal contacts. The recipient is instructed to pay the extortion demand to a bitcoin wallet within 24 hours in order to prevent the video from being emailed to all their personal contacts.

    Recommendations


    • Verify the accuracy of the claim while also investigating whether or not it is a hoax.
    • To check if it is a hoax:
      • Determine if the email contains any specific knowledge about operations or if the language is generic and appears to be part of a mass mailing campaign.
      • Conduct searches on keywords, the cryptocurrency wallet ID, and sender’s email address, as this may yield multiple examples of others affected by the same hoax.
      • Check the cryptocurrency wallet ID for transactions to the wallet, which may provide insight into the threat actor’s operations.
      • Contact the MS-ISAC and other information sharing resources to determine if other entities report receiving similar emails.

    • Verify the accuracy of the claim:
      • Confirm that malware was not placed on the system by running an antivirus scan. Ensure that the antivirus program uses updated signatures.
      • Reimage the machine and reset passwords if malware is discovered.
      • Speak with the employee to determine any relevant information they may have.

    • Provide social engineering training to employees and direct them to immediately report potential hoaxes.
    • Implement spam filtering at the email gateway to filter out emails with known phishing indicators, such as the known malicious subject lines.
    • Implement Domain-Based Message Authentication, Reporting & Conformance (DMARC), a validation system that minimizes spam emails by detecting email spoofing using Domain Name System (DNS) records and digital signatures.
    • Adhere to best practices, such as those described in the CIS Controls and the CIS Benchmarks programs.

  7. #7
    Join Date
    Jan 2008
    Location
    A Corporate Republic
    Posts
    12,640

    Default

    Quote Originally Posted by Back View Post
    Methais,

    You're welcome.

    How to Identify an Email Hoax & What to do if You Fall Victim


    There are a variety of email-based hoaxes demanding money and threatening SLTT government recipients in various ways. Hoax campaigns include illegitimate threats ranging from distributed denial of service (DDoS) attacks to physical violence and threats to reveal sensitive information purportedly gathered through exploited vulnerabilities or malware infections. The theme of the hoaxes change, but in recent cases, the threat actors’ goal has remained the same - attempting to elicit fear in the recipient in order to prompt the recipient to pay the extortion demand.
    Hoax emails are opportunistic in nature with threats that the threat actor will not follow through on. It is imperative that recipients of hoax emails identify them as scams in order to avoid being hoodwinked. However, be aware that if you receive a malicious email with any one or more of the below identifiers it may also be a legitimate threat. For this reason, it is important to follow standard incident response procedures while also investigating the accuracy of the claim.

    How to know if it’s a hoax

    There are a couple of key indicators that can help you in determining if the email is a hoax or not. For instance, many hoaxes are opportunistically emailed to multiple recipients. Identifying the threat actors’ use of generic language and lack of specific details about the target are good indicators that it’s a hoax. Another key component of these scams is that the threat actor incites a sense of urgency by demanding immediate payment to avoid the malicious activity, which makes it harder for the recipient to calm down and think it through. Furthermore, in a hoax, the email will not include legitimate proof of the ability to pull off these claims. One word of warning, some observed hoax campaigns attempt to gain legitimacy by claiming to be from groups known to conduct successful attacks.
    The case of the compromising video

    A recent campaign affecting various SLTT governments claims, via email, that the threat actor placed malware on the email recipient’s system. The email then explains that the malware allowed the threat actor to capture webcam footage of the recipient while the recipient was purportedly viewing pornographic videos. Furthermore, the threat actor claims the malware grants access to all of the recipient’s personal contacts. The recipient is instructed to pay the extortion demand to a bitcoin wallet within 24 hours in order to prevent the video from being emailed to all their personal contacts.

    Recommendations


    • Verify the accuracy of the claim while also investigating whether or not it is a hoax.
    • To check if it is a hoax:
      • Determine if the email contains any specific knowledge about operations or if the language is generic and appears to be part of a mass mailing campaign.
      • Conduct searches on keywords, the cryptocurrency wallet ID, and sender’s email address, as this may yield multiple examples of others affected by the same hoax.
      • Check the cryptocurrency wallet ID for transactions to the wallet, which may provide insight into the threat actor’s operations.
      • Contact the MS-ISAC and other information sharing resources to determine if other entities report receiving similar emails.

    • Verify the accuracy of the claim:
      • Confirm that malware was not placed on the system by running an antivirus scan. Ensure that the antivirus program uses updated signatures.
      • Reimage the machine and reset passwords if malware is discovered.
      • Speak with the employee to determine any relevant information they may have.

    • Provide social engineering training to employees and direct them to immediately report potential hoaxes.
    • Implement spam filtering at the email gateway to filter out emails with known phishing indicators, such as the known malicious subject lines.
    • Implement Domain-Based Message Authentication, Reporting & Conformance (DMARC), a validation system that minimizes spam emails by detecting email spoofing using Domain Name System (DNS) records and digital signatures.
    • Adhere to best practices, such as those described in the CIS Controls and the CIS Benchmarks programs.

  8. #8

    Default

    Quote Originally Posted by Back View Post
    Methais,

    You're welcome.

    How to Identify an Email Hoax & What to do if You Fall Victim


    There are a variety of email-based hoaxes demanding money and threatening SLTT government recipients in various ways. Hoax campaigns include illegitimate threats ranging from distributed denial of service (DDoS) attacks to physical violence and threats to reveal sensitive information purportedly gathered through exploited vulnerabilities or malware infections. The theme of the hoaxes change, but in recent cases, the threat actors’ goal has remained the same - attempting to elicit fear in the recipient in order to prompt the recipient to pay the extortion demand.
    Hoax emails are opportunistic in nature with threats that the threat actor will not follow through on. It is imperative that recipients of hoax emails identify them as scams in order to avoid being hoodwinked. However, be aware that if you receive a malicious email with any one or more of the below identifiers it may also be a legitimate threat. For this reason, it is important to follow standard incident response procedures while also investigating the accuracy of the claim.

    How to know if it’s a hoax

    There are a couple of key indicators that can help you in determining if the email is a hoax or not. For instance, many hoaxes are opportunistically emailed to multiple recipients. Identifying the threat actors’ use of generic language and lack of specific details about the target are good indicators that it’s a hoax. Another key component of these scams is that the threat actor incites a sense of urgency by demanding immediate payment to avoid the malicious activity, which makes it harder for the recipient to calm down and think it through. Furthermore, in a hoax, the email will not include legitimate proof of the ability to pull off these claims. One word of warning, some observed hoax campaigns attempt to gain legitimacy by claiming to be from groups known to conduct successful attacks.
    The case of the compromising video

    A recent campaign affecting various SLTT governments claims, via email, that the threat actor placed malware on the email recipient’s system. The email then explains that the malware allowed the threat actor to capture webcam footage of the recipient while the recipient was purportedly viewing pornographic videos. Furthermore, the threat actor claims the malware grants access to all of the recipient’s personal contacts. The recipient is instructed to pay the extortion demand to a bitcoin wallet within 24 hours in order to prevent the video from being emailed to all their personal contacts.

    Recommendations


    • Verify the accuracy of the claim while also investigating whether or not it is a hoax.
    • To check if it is a hoax:
      • Determine if the email contains any specific knowledge about operations or if the language is generic and appears to be part of a mass mailing campaign.
      • Conduct searches on keywords, the cryptocurrency wallet ID, and sender’s email address, as this may yield multiple examples of others affected by the same hoax.
      • Check the cryptocurrency wallet ID for transactions to the wallet, which may provide insight into the threat actor’s operations.
      • Contact the MS-ISAC and other information sharing resources to determine if other entities report receiving similar emails.

    • Verify the accuracy of the claim:
      • Confirm that malware was not placed on the system by running an antivirus scan. Ensure that the antivirus program uses updated signatures.
      • Reimage the machine and reset passwords if malware is discovered.
      • Speak with the employee to determine any relevant information they may have.

    • Provide social engineering training to employees and direct them to immediately report potential hoaxes.
    • Implement spam filtering at the email gateway to filter out emails with known phishing indicators, such as the known malicious subject lines.
    • Implement Domain-Based Message Authentication, Reporting & Conformance (DMARC), a validation system that minimizes spam emails by detecting email spoofing using Domain Name System (DNS) records and digital signatures.
    • Adhere to best practices, such as those described in the CIS Controls and the CIS Benchmarks programs.
    Allow me to return the favor.

    How to identify a retard on a 4 year old post

    Discord: 3PiecesOfToast
    [Private]-GSIV:Nyatherra: "Until this moment i forgot that i changed your name to Biff Muffbanger on Lnet"
    Quote Originally Posted by Back View Post
    I am a retard. I'm disabled. I'm poor. I'm black. I'm gay. I'm transgender. I'm a woman. I'm diagnosed with cancer. I'm a human being.
    Quote Originally Posted by time4fun View Post
    So here's the deal- I am just horrible



  9. #9
    Join Date
    Jun 2007
    Location
    Mars
    Posts
    34,075
    Blog Entries
    17

    Default

    I just realized this was a 4 year old post and rolfard bumped it. wtf
    Ceterum censeo Carthaginem esse delendam

  10. #10

    Default

    Quote Originally Posted by Gelston View Post
    I just realized this was a 4 year old post and rolfard bumped it. wtf
    I remember looking it up at the time to see if it was fake and no one including snopes had anything about it being fake.



    BACK WITH THAT SICK BURN THO!
    Last edited by Methais; 01-20-2019 at 01:39 PM.
    Discord: 3PiecesOfToast
    [Private]-GSIV:Nyatherra: "Until this moment i forgot that i changed your name to Biff Muffbanger on Lnet"
    Quote Originally Posted by Back View Post
    I am a retard. I'm disabled. I'm poor. I'm black. I'm gay. I'm transgender. I'm a woman. I'm diagnosed with cancer. I'm a human being.
    Quote Originally Posted by time4fun View Post
    So here's the deal- I am just horrible



Similar Threads

  1. Replies: 10
    Last Post: 06-15-2021, 08:46 AM
  2. Nixon: Fred Thompson is "Dumb as hell" but "Friendly"
    By chillmonster in forum Politics
    Replies: 108
    Last Post: 02-23-2021, 08:12 AM
  3. Replies: 48
    Last Post: 08-18-2011, 01:15 PM
  4. Why I love Russia! "Homo-Scanners" "Nigaz"
    By Solkern in forum Social Forum
    Replies: 4
    Last Post: 01-27-2011, 04:37 PM
  5. Replies: 20
    Last Post: 01-18-2011, 12:51 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •