True Crime Online by Hitchcock J. A
Author:Hitchcock, J. A. [J. A., HITCHCOCK]
Language: eng
Format: epub
ISBN: 9781937290313
Publisher: Information Today, Inc.
Jamie Rose Bolen, killed by her neighbor Kevin Ray Underwood [Courtesy of Bonnie Kernene, mylifeofcrime.wordpress.com]
Underwood after his arrest and before his eventual sentence of death [Courtesy of Purcell Police Department]
The First Internet Serial Killer
“I’m your slave. I’m yours.” A dark-haired woman named Suzette Trouten looked directly into the video camera as she pledged her undying devotion to a 58-year-old man known as the “Slavemaster.” She sat on the edge of the motel bed and waited for the videotape to stop and the action to begin.
John Robinson just smiled.
By day, middle-aged Robinson led a seemingly normal life. Neighbors called him a wonderful guy who gardened and entertained his grandchildren; he seemed to be happily married, too. But by night, Robinson—aka the Slavemaster—had a dark side as a well-known master of a troupe of sex slaves, most of whom he first met online.
Robinson trolled the internet hunting for new victims, although he says his killing spree started long before the internet was created. He won’t admit to how many women he killed, but police can link him to the murders of least five.
Between 1969 and 2000, Robinson spent some 15 years off and on in prison for an assortment of theft and fraud charges. During the time that he was serving one of his sentences between 1987 and 1993, he met and wooed prison librarian Beverly Bonner. Robinson convinced Beverly that he was in love with her, and they decided to get married after Robinson was released. Robinson started using the alias of James Turner after he left prison, and he and Beverly moved to Olathe, Kansas, after she divorced her husband. Beverly started working for Robinson, who was then president of HydroGro, Inc. No one ever heard from her again.
Beverly had told her ex-husband and friends that she was traveling abroad on business with Robinson and gave them a post office box for her mail. Her ex-husband sent the alimony checks there on a regular basis, and Robinson routinely cashed the checks, so no one was ever suspicious. When Robinson tired of Beverly, he made sure she disappeared without a trace. He rented a storage unit and moved her belongings into it. Among the items that he tucked into the storage unit was the 55-gallon chemical drum that held Beverly’s body, along with two other similar drums containing the bodies of two other women. The other two women had been receiving government checks, which Robinson continued to cash for pocket money.
Robinson managed to keep his double life a secret for years, even from his wife, Nancy, to whom he’d been married since 1964. While Nancy managed the mobile home park where they lived, Robinson had launched his own venture: a magazine about mobile home living that became relatively successful. Robinson’s employment options were somewhat compromised by his prior criminal record, so Nancy was pleased that her husband had found interesting work to keep him busy. Little did she know that he had become the Slavemaster in his off hours.
Robinson kept a regular daily routine.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6578)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6298)
Machine Learning Security Principles by John Paul Mueller(6271)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5944)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5905)
Solidity Programming Essentials by Ritesh Modi(4042)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3681)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3411)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3172)
Incident Response with Threat Intelligence by Roberto Martínez(2898)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2760)
