OH Pike Co., 8 in Rhoden Family Murdered Over Custody Issue, 4 Members Wagner Family Arrested #55

Status
Not open for further replies.
  • #821
Wasn’t he an avid video gamer? Was Jake? Of the two boys I’m curious to know who was more tech savvy. They would be responsible for the hacking into Facebook accounts. Planting spyware and creating tons of burner accounts to spread disgusting lies about the Rhodens. Trying to sway the investigation away from the family.

This might be a stupid question, but would hacking into a facebook account require guessing the password, or would there be more involved? Not that I have any intention of ever trying to do it, but I'm am curious with respect to this case if it is a function of guessing, or if more skill is involved.
 
  • #822
Why on earth would he start spying on her in 2014 I wonder? Humm...S was just 2 months old in January 2014 and they were planning to get married in August 2015. Matching ring tattoos and "marrying my best friend." I bet Jake and Angela were really pushing for that marriage because it would give Jake full parental rights and shield him from any charges ever being filed because HR was only 15. Cancelling that wedding was a big blow in my opinion. A big blow.

I agree it had to be a big blow. My thoughts are if they wanted to control the children, they may have also have wanted to control the child's mother. Especially if the child's mother was acting independent or wasn't being totally submissive. Just my guess.

JMO
 
  • #823
This might be a stupid question, but would hacking into a facebook account require guessing the password, or would there be more involved? Not that I have any intention of ever trying to do it, but I'm am curious with respect to this case if it is a function of guessing, or if more skill is involved.

Their indictments state more or less this could have been hired out.
 
  • #824
It's not usually mentioned that there are multiple conversations with other similar threats made, easy to think it's just one conversation. I take "multiple conversations" to mean that there were several as opposed to just 2 or 3.

All it takes is one incriminating statement to make you look bad before a jury. Better to have multiple conversations that don't incriminate you than to have just one that does.

Questions -
Who/what is the confidential reliable source?
(A witness? Wiretap? Witness wearing a wire?)
Will the Wagner threats be put before the jury?
Did they say anything to incriminate themselves about their crimes?
If put before the jury will Fred be quoted in some conversations?

Interesting questions - these are only my guesses:
1. Voice activated recording device
2. Put before the jury - yes
3. As far as incriminate specific to the murders - maybe not, but yes to entering into a conspiracy to seek revenge and perform jail breaks
4. On Fred - yes
 
  • #825
Their indictments state more or less this could have been hired out.

It will be interesting to see if a third party testifies about the hacking.
 
  • #826
This might be a stupid question, but would hacking into a facebook account require guessing the password, or would there be more involved? Not that I have any intention of ever trying to do it, but I'm am curious with respect to this case if it is a function of guessing, or if more skill is involved.

He may have known HR’s passwords and used them to log into her accounts and read things.
 
  • #827
Their indictments state more or less this could have been hired out.

What in the indictments state that the hacking accounts could have been hired out?
 
  • #828
He may have known HR’s passwords and used them to log into her accounts and read things.

I think we will learn at trial how they were able to electronically spy on the R's. I'm very curious about this because a friend of mine was spied on electronically, via her home computer a few years ago. It was done by her soon-to-be ex husband and what happened to her makes me wonder if a similar or the same method was used. I'm not even sure what was done, but something was definitely done to her home computer and it was done in a matter of a few minutes.

The guy who did it (soon-to-be ex husband) is no genius. But he's a very tricky person and it occurred as she was divorcing him. She made him leave, and he had his own place, a new computer and a new email address and he did not want the divorce. One day a few weeks into it, he called her and told her he had an urgent business matter and needed to make a copy of a business file that was on her home computer. She allowed him to come over to do this and she did not stay in the same room as he did it.

In the weeks going forward, he confronted her several times and he seemed to know things she was emailing to her attorney and to her friends. Perhaps it was divine intervention, but one night she typed his new email address into her browser and all of a sudden a new screen appeared. She could see everything on his new computer, his emails, folders, files, etc. and she could open and read them. She also realized that had she chosen to do so, she could have sent emails or responded to emails from his email address. It was absolutely bizarre and it was frightening. She bought a new computer and put the old one in a closet in case she ever needed it.

Does anyone know what he did? And could this be something that was done to the R's, under the guise of needing to use the computer for a few minutes, or another device owned by them? This would provide the stalker access to everything - emails, facebook, other social media, possibly online banking accounts, etc. I don't think someone who does something like this would even need to have passwords in order to get access to just about everything.

Am very curious about thoughts on this from anyone who is more tech savvy than I am.
 
  • #829
I think we will learn at trial how they were able to electronically spy on the R's. I'm very curious about this because a friend of mine was spied on electronically, via her home computer a few years ago. It was done by her soon-to-be ex husband and what happened to her makes me wonder if a similar or the same method was used. I'm not even sure what was done, but something was definitely done to her home computer and it was done in a matter of a few minutes.

The guy who did it (soon-to-be ex husband) is no genius. But he's a very tricky person and it occurred as she was divorcing him. She made him leave, and he had his own place, a new computer and a new email address and he did not want the divorce. One day a few weeks into it, he called her and told her he had an urgent business matter and needed to make a copy of a business file that was on her home computer. She allowed him to come over to do this and she did not stay in the same room as he did it.

In the weeks going forward, he confronted her several times and he seemed to know things she was emailing to her attorney and to her friends. Perhaps it was divine intervention, but one night she typed his new email address into her browser and all of a sudden a new screen appeared. She could see everything on his new computer, his emails, folders, files, etc. and she could open and read them. She also realized that had she chosen to do so, she could have sent emails or responded to emails from his email address. It was absolutely bizarre and it was frightening. She bought a new computer and put the old one in a closet in case she ever needed it.

Does anyone know what he did? And could this be something that was done to the R's, under the guise of needing to use the computer for a few minutes, or another device owned by them? This would provide the stalker access to everything - emails, facebook, other social media, possibly online banking accounts, etc. I don't think someone who does something like this would even need to have passwords in order to get access to just about everything.

Am very curious about thoughts on this from anyone who is more tech savvy than I am.

Spy programs can be in attachments in an e-mail. It can say it is a file, picture, or joke to open and see. They can be a link in an e-mail to click on. They can give access to a phone or computer. They can be a tracker on a smart phone so every where you go is tracked.
Windows has a built in program to give remote access to a computer to someone so they can control it to fix.
If that program gets set up anything you can do on your computer can be done remotely.
 
  • #830
Spy programs can be in attachments in an e-mail. It can say it is a file, picture, or joke to open and see. They can be a link in an e-mail to click on. They can give access to a phone or computer. They can be a tracker on a smart phone so every where you go is tracked.
Windows has a built in program to give remote access to a computer to someone so they can control it to fix.
If that program gets set up anything you can do on your computer can be done remotely.

Thanks. In the case I discussed, I think it was done through Windows.
 
  • #831
From what I gather the reason to seal pre-trial Motions is to keep the public from reading them and if you go to the Court Docket you can see the Motions laid out. But for some reason these 2 Motions with their respective Journal Entries, pertaining to GW4, have been sealed from public view. This has happened before with Wagner Motions.

We should be privy to these Motions at GW4's Bond hearing...Humm...Sudden Bond Hearing...sudden sealing of Motions...Plot thickens fellow sleuthers!...:cool:

WAGNER, IV, GEORGE WASHINGTON

06/30/2020 ENTRY --

THE ENVELOPE TO WHICH THIS JOURNAL ENTRY IS ATTACHED CONTAINS 2 MOTIONS AND 2 JOURNAL ENTRIES FILED UNDER SEAL WITH THE JUDGE OF THIS COURT ON JUNE 30, 2020;

IT IS ORDERED THAT THE CLERK OF COURTS SHALL HOLD THE CONTENTS OF THE ENVELOPE UNDER SEAL, AND THAT THE ENVELOPE SHALL NOT BE OPENED AND THE CONTENTS OF THE ENVELOPE SHALL NOT BE DISCLOSED, EXCEPT UNDER ORDER OF THIS COURT OR UPON THE ORDER OF A COURT OF JURISDICTION SUPERIOR TO THIS COURT
 
Last edited:
  • #832
From what I gather the reason to seal pre-trial Motions is to keep the public from reading them and if you go to the Court Docket you can see the Motions laid out. But for some reason these 2 Motions with their respective Journal Entries, pertaining to GW4, have been sealed from public view. This has happened before with Wagner Motions.

We should be privy to these Motions at GW4's Bond hearing...Humm...Sudden Bond Hearing...sudden sealing of Motions...Plot thickens fellow sleuthers!...:cool:

WAGNER, IV, GEORGE WASHINGTON

06/30/2020 ENTRY --

THE ENVELOPE TO WHICH THIS JOURNAL ENTRY IS ATTACHED CONTAINS 2 MOTIONS AND 2 JOURNAL ENTRIES FILED UNDER SEAL WITH THE JUDGE OF THIS COURT ON JUNE 30, 2020;

IT IS ORDERED THAT THE CLERK OF COURTS SHALL HOLD THE CONTENTS OF THE ENVELOPE UNDER SEAL, AND THAT THE ENVELOPE SHALL NOT BE OPENED AND THE CONTENTS OF THE ENVELOPE SHALL NOT BE DISCLOSED, EXCEPT UNDER ORDER OF THIS COURT OR UPON THE ORDER OF A COURT OF JURISDICTION SUPERIOR TO THIS COURT

The defense attorneys are certainly trying to have it both ways with these trials. They demand repeated copies of prosecution discovery, but provide none of their own.

They try to selectively expose evidence and attempt to try the case in public, before the trial, but make sure the defendant's information remains under seal.

They expect the courts to overturn state law and overthrow the Grand Jury rulings by demanding their clients be released on "reasonable" bond.

These are the only tricks they have and they can only use them before the trials begin. Because once that happens and the state's evidence is revealed, the W's are done.
 
  • #833
What in the indictments state that the hacking accounts could have been hired out?

It was Count 20, excuse me, instead of Count 19 (hacking). It's good to review both here.

COUNT 20
INTERCEPTION OF WIRE, ORAL, OR ELECTRONIC COMMUNICATION

"George Washington Wagner III, on or about July 1, 2014 through May 9, 2017, at the County of Pike; and in the State of Ohio, did unlawfully and purposely, intercept, OR PROCURE another person to intercept or attempt to intercept a wire, oral or electronic communication, in violation of..." (SEE INDICTMENTs)

Indictment details alleged cover-up of Pike County massacre..
 
  • #834
It was Count 20, excuse me, instead of Count 19 (hacking). It's good to review both here.

COUNT 20
INTERCEPTION OF WIRE, ORAL, OR ELECTRONIC COMMUNICATION

"George Washington Wagner III, on or about July 1, 2014 through May 9, 2017, at the County of Pike; and in the State of Ohio, did unlawfully and purposely, intercept, OR PROCURE another person to intercept or attempt to intercept a wire, oral or electronic communication, in violation of..." (SEE INDICTMENTs)

Indictment details alleged cover-up of Pike County massacre..

We debated that a while back, IIRC. It could refer to such an individual or it's just the wording that appears in the Ohio Revised Code. We'll see when the trial starts, it could be either.
 
  • #835
We debated that a while back, IIRC. It could refer to such an individual or it's just the wording that appears in the Ohio Revised Code. We'll see when the trial starts, it could be either.

This was in reply to Dudly's question. Thanks.
 
  • #836
Interesting discussion is few and far between...perhaps the reason for few posts? I feel like we are dying on the vine. Everyone seems reluctant to discuss anything new as relates to court entries, motions, anything. JMO
 
  • #837
The amount of information for this case on this site is very large. I always have had trouble keeping up with the flow, If not all the facts. Considering that the prosecution has held the vast majority of evidence out of sight and the press, It will be very to keep up with the trials and the deluge of evidence when the time comes. I do hope that all the evidence will be presented. If the defendants plea out, That may not happen. All the dirty facts needs to be shown in the light of day.
 
  • #838
The amount of information for this case on this site is very large. I always have had trouble keeping up with the flow, If not all the facts. Considering that the prosecution has held the vast majority of evidence out of sight and the press, It will be very to keep up with the trials and the deluge of evidence when the time comes. I do hope that all the evidence will be presented. If the defendants plea out, That may not happen. All the dirty
 
  • #839
Dbm
 
  • #840
Interesting discussion is few and far between...perhaps the reason for few posts? I feel like we are dying on the vine. Everyone seems reluctant to discuss anything new as relates to court entries, motions, anything. JMO

What's new that hasn't been discussed? Until the hearings next month, there probably won't be much news, unless the defense attorneys try to leak more info to the public in order to help their clients.

The motions re GW4 are very interesting, but they're being kept under seal. We should keep an eye on that in case something changes. Otherwise, this is the way the prosecution wants it - quiet until the trial, unless one of the defendants goes public with a plea deal.
 
Status
Not open for further replies.

Members online

Online statistics

Members online
77
Guests online
2,524
Total visitors
2,601

Forum statistics

Threads
633,153
Messages
18,636,477
Members
243,415
Latest member
n_ibbles
Back
Top