Isn't that just the poster? Where is the Indiana Most Wanted List?
Here is the top 10 that we keep mentioning...
https://www.fbi.gov/wanted/toptenj
ETA - I feel like we are talking in circle (not you and ST. Anthony) but these last few posts.
Isn't that just the poster? Where is the Indiana Most Wanted List?
I think we could all use some clarification as to why BG picture was on FBI most Wanted List with "identity unknown at this time" iirc and now it is gone from both Indiana and National FBI list and only poster remains. Sgt. Leazenby can you help clarify this. Thank you! A tweet from Sgt. Riley would be nice!Here is the top 10 that we keep mentioning...
https://www.fbi.gov/wanted/toptenj
ETA - I feel like we are talking in circle (not you and ST. Anthony) but these last few posts.
I think we could all use some clarification as to why BG picture was on FBI most Wanted List with "identity unkniwn at this time" iirc and now it is gone from both Indiana and National FBI list and only poster remains. Sgt. Leazenby can you help clarify this. Thank you!
I think we could all use some clarification as to why BG picture was on FBI most Wanted List with "identity unknown at this time" iirc and now it is gone from both Indiana and National FBI list and only poster remains. Sgt. Leazenby can you help clarify this. Thank you! A tweet from Sgt. Riley would be nice!
How about Indiana Most Wanted List?TIA
Yes, poster is there but not the BG picture that was there before.
http://www.sfgate.com/news/crime/ar...s-hope-in-1998-slaying-of-mother-11180447.php
This recent development (link above) makes me think of something brought up here before that DNA (if any) could be matched to another unsolved crime where the POI has not been identified. Clearly, if that was the case here, I think that information would be released.
All that to say, I can't see how these crimes are related to the Delphi murders, but it is interesting to me, since a young girl was targeted in two of the connected cases, and the murders all appear the work of an SK transient, which is one thought many have shared.
So long as a burner phone is powered on it sends its information, phone number, IMSI, and other data to the cell tower it is connected to about once a minute. The majority of people that use burner phones have terrible operational security and don't think twice about having the phone on - because they might be expecting a call or text. Consequently, when they do so they are likely in locations where they have also used other phones. By correlating the phones in those same locations over time there is a chance of identifying who might be the user of a particular burner phone.[/B]
My understanding here is that it would only tell what cell towers that phone number would hit when connecting. People using burner phones for nefarious reasons may not keep their phone long. Make a few calls throwaway and then get a new one.
At least thats my understanding.
1) Don't overthink.
2) Slow down your thoughts. Start over. Redirect your thinking. Start over in a new forum. Compile coverage since day one. Comb over that. Just the facts, each day, chronologically.
The best two thoughts I can provide, at this time.
So long as a burner phone is powered on it sends its information, phone number, IMSI, and other data to the cell tower it is connected to about once a minute. The majority of people that use burner phones have terrible operational security and don't think twice about having the phone on - because they might be expecting a call or text. Consequently, when they do so they are likely in locations where they have also used other phones. By correlating the phones in those same locations over time there is a chance of identifying who might be the user of a particular burner phone.
So long as you only ever use a burner phone (turn it on, use it, turn it off, throw it away) in a single location that otherwise is not connected to you - not a relative's home, your home, your workplace, your favorite pizza place, etc. - it can be "safe". If you turn it on and use it anywhere that you frequent, especially where you regularly use another phone or conduct a transaction with a debit or credit card or if you ever contact a number with the burner phone that you have also contacted with another phone then a determined adversary can find you. Correlation is the key to finding the user of a burner phone.
People are creatures of habit. They have specific patterns in their regular activities. Most importantly they make mistakes.
I feel like I always chime in to pour cold water on a new discussion but I don't think the FBI webmaster would be updating the FBI website before local news reporters were tipped off to an arrest. Usually the first people to know are a crime beat reporter or LE/FBI calls a press conference.
Sent from my iPhone using Tapatalk
Anyone have an update? We've been gone all weekend. From my brief reading sounds like something might be breaking soon or no??
TIA
Happy Memorial Day to all those WS'ers that are celebrating today!!
What I was thinking is that they added someone new to the list and it bumped him off. I know they do add them at times, depending on what crimes were committed. As bad as BG's were, there are a lot of others who are also bad. MOOI feel like I always chime in to pour cold water on a new discussion but I don't think the FBI webmaster would be updating the FBI website before local news reporters were tipped off to an arrest. Usually the first people to know are a crime beat reporter or LE/FBI calls a press conference.
You are probably correct Alethea but what if this is truly a much wider net than originally believed? I would think it would be very important to get everything in line before anything was told to anyone. <mod snip> in my heart I believe this is bigger than just Delphi and any leak could jeopardize everything.
My opinion only of course.