The man who recognized the alleged “killer grandma,” who was wanted to the murders of her husband and a woman she resembled, told Inside Edition her silver hair gave her identity away.
George Higginbotham said he recognized Lois Riess when on Thursday she walked into Dirty Al’s, the restaurant he manages on South Padre Island, a popular vacation spot in Texas.
“She came in; she asked to see the menu,” he said.
Higginbotham first noticed Riess’ silver hair from reports about the nationwide hunt for her on “CBS This Morning.”
“We were very lucky to notice her white hair. She liked to throw it back with her left arm and all,” he told reporters.
He called police, but Riess had already left by the time authorities arrived.
“She turned around and walked out,” Higginbotham said.
South Padre Police Chief Randy Smith said his officers missed Riess by a few minutes, but quickly caught up to her. Riess was captured that night at Sea Ranch Restaurant, another local eatery in the beach resort community located just 27 miles from the Mexico border.
“She seemed to have let her guard down a little bit,” Smith said. “By the time she realized what was going on, I believe it was out of her control.”
Riess had been staying in a $59-a-night room at a Motel 6. She had apparently befriended two other people on the island and were with them at the time of her arrest, police said.
Riess is accused of fatally shooting her husband, David Riess, in their Minnesota home last month before fleeing with $11,000 from his bank account to pay for her alleged gambling addiction, police said.
Newly released surveillance footage showed Riess buying a sandwich at an Iowa convenience store. There, she can be heard asking for the quickest route south.
“If you wanted to start heading south, would you take 35 south?” Riess says. “Just to keep going on down to the next state?”
She traveled to Fort Myers, Fla., where she allegedly befriended and fatally shot Pam Hutchinson.
Hutchinson resembled Riess, who police said stole the victim’s identity and car.
She drove across Louisiana to Texas, spending five weeks on the run before she was caught on Thursday.
Hutchinson’s cousins told Inside Edition they were relieved their loved one’s alleged killer was finally behind bars.
“The American people are safe,” one cousin said. “She’s not going to have a chance to kill again and keep this going.”
During the team’s match away to FC Fakel Voronezh on Sunday, the fan threw the rooster in the direction of Grigoryan. Footage on social media showed the bird fluttering its wings and gliding onto the touchline, where it sat for a few moments before being removed.
The visiting section of fans at Tsentralnyi Profsoyuz Stadion in Voronezh, around 500km south of Moscow, then broke out into chants of “Grigoryan is a rooster!” The Russian word for rooster can be loosely used as a term for a “traitor,” in such instances.
The reason for the poultry protest seems to be the unwillingness of supporters’ in the Far Eastern Russian city to forgive Grigoryan’s departure to FC Tosno during his first spell in charge in the 2013/14 season.
The Armenian then went on to take charge of Luch-Energiya’s fiercest rivals and neighbors, SKA Khabarovsk, before returning to the Vladivostok outfit last year.
Speaking in a post-match interview after his side had been soundly beaten 3-1 by the home side, Grigoryan revealed he had been the subject of a hate campaign from supporters who target him with “obscenities and threats.”
“Who did this? I don’t know, it’s hard for me to say. There are two possibilities: either they are enemies I have acquired in the Far East (of Russia), or through me they are trying to influence the new owners,” the mulleted manager said.
“I have a phone full of videos and text messages from real people, who threaten me. One got worked up to such an extent that today he organizes this disgrace with a rooster. He will be jailed for 15 days for that.
“It is the former leader of a fan group, who came from St. Petersburg. He sends text messages with obscenities and threats. It has got to such an extent that no one can believe it,” Grigoryan added.
Some fans might say it’s simply a case of chickens coming home to roost for the manager’s perceived betrayal of the club.
Jersey City, NJ — Two New Jersey police officers have been suspended without pay after multiple videos showed them attacking a Domino’s manager while on Duty. Surprisingly, both of them have also been charged with multiple crimes.
Rodney Clark and Courtney Solomon are both charged with disorderly conduct, harassment and making terroristic threats after they stormed into a Domino’s pizza restaurant and began shaking down the manager.
Marina Elsamina, an employee at the Communipaw Avenue pizza shop, told The Jersey Journal in an interview that workers there received an online complaint on Tuesday evening by one of the police officers, apparently over a delivery issue, according to NJ.com.
Shortly after receiving the complaint, the officers showed up at the store and began attacking the manager, Mena Kirolos. The initial confrontation was captured on employee cellphones as well as surveillance video.
After the officers threw the innocent man up against the wall, they then demanded he go outside. According to the video, Kirolos, and multiple witnesses, cops made several threats toward him while physically assaulting him and saying they were going to lock him up—over pizza.
As NBC New York reports, Kirolos said at that point, the more irate of the two officers told him “I’ll lock you up,” and the cellphone footage then shows the manager holding his hands out as if they were cuffed as he says “please do it!”
“(I was thinking) What can I do?,” Kirolos said. “He’s a police officer. I can’t do anything back.”
During the attack, the manager called 911 and the officers then left.
The dispute happened after cops claimed that the driver never showed up with their pizza. However, according to the Domino’s employees, the driver went to the address and knocked for several minutes but nobody answered the door nor the repeated calls back to the number.
Instead of simply asking for a refund, these officers used their police powers to assault an innocent man and threaten him with kidnapping.
“We confront customers every day who fight with us, but he’s using his police powers,” Elsamina said.
“The prosecutor’s office will fully investigate the allegations against these officers and prosecute in accordance with the law to ensure that justice is served,” Hudson County Prosecutor Esther Suarez said in a statement. “Officers who abuse their power and break the law must be held accountable for their actions.”
As NJ.com reports, the cops in New Jersey are on a seeming rampage lately as they’ve been the subject of repeated stories of violence and corruption.
“Eleven cops, including the former police chief, have pleaded guilty in federal court to collecting pay for off-duty jobs they did not perform. Earlier this month, another officer was sentenced for striking a man with his police car during an arrest. Four others face charges related to a scheme to falsify timesheets. Four additional cops were indicted last year on charges related to a high-speed police pursuit that ended in a fiery crash on Tonnelle Avenue,” reports NJ.com.
Both of the officers seen in the video below have been on the force since 2015 and they are now due in court on April 11.
As for Kirolos, he just wants an apology—one that will likely never come.
“I don’t like being cursed at, being touched,” he said. “I only demanded an apology. That’s it.”
President Donald Trump announced that he’s running for re-election in 2020, and Brad Parscale, who served as the Trump campaign’s 2016 digital guru, has been named campaign manager.
In an announcement posted on the president’s campaign website, his son, Eric Trump, called Parscale “an amazing talent” who was “pivotal to our success in 2016.” Top Trump adviser and Trump son-in-law Jared Kushner said that Parscale “was essential in bringing a disciplined technology and data-driven approach to how the 2016 campaign was run.”
For the last few days I’ve been working on a new project which I developed for very specific needs and reasons:
I need to store safely (encrypted) my passwords, sensitive files, notes, etc.
I need to access them from anywhere, with every possible device ( desktop, mobile, terminal ).
I need those objects to be syncronized accros all my devices.
I don’t want to use “the cloud”.
I don’t want to pay for a server.
I don’t want to enable port forwarding and host it myself with DynDNS or alikes.
So I wrote ARC.
Of course there are plenty of solutions already that mostly involve the use of pass, ssh, git and various synchronizations hacks, but:
Either you’ll host that stuff on github ( “the cloud” ), or you’ll need a server.
You will need a terminal to access that data or complex procedures … good luck when you’re in a hurry and only have your phone.
The type of data you can store and access and the interactions you have with it are very limited.
The approach I decided to try is different.
Arc is a manager for your secrets made of arcd, a RESTful API server written in Go which exposes read and write primitives for encrypted records on a sqlite database file.
Records are generated, encrypted and decrypted client side only (Arc relies on CryptoJS for its AES encryption and the PRNG) by arc, which offers an intuitive management system equipped with UI widgets including:
Simple text inputs.
Simple text areas.
Custom file attachments (files are encrypted client side before being uploaded as binary records).
A markdown editor area with preview and full screen mode.
A password field with password strength estimation and a random password generator.
Elements can be created (with optional expiration dates), arranged and edited using arc and are stored on arcd safely.
A client side encrypted record set to expire and self delete with a markdown area and a password widget.
Markdown and various attached files.
The idea is to use the Arc™ as a single manager for your passwords, encrypted notes, files and -all the secret things here- while hosting arcd yourself on some spare hardware like a Raspberry Pi and accessing arc from every device with a modern browser, so let’s see how to configure it on a Raspberry Pi Zero in order to have a secure and portable setup for your secrets! 😀
The following instructions are Raspberry Pi Zero specific, but the same procedure should work on any similar hardware ( like another RPi or the USB Armory for instance ), the RPiZ is just what I found to be more convenient and cheap.
First of all, format a micro sd card and install Raspbian on it as usual (download iso, verify, dd, mount), next we need to apply a few tweaks in order to enable ethernet connectivity over its USB port.
With the RPi boot partition mounted, edit the /path/to/pi/boot/config.txt and append:
Then edit /path/to/pi/boot/cmdline.txt and insert between the rootwait and the quiet parameters:
Eventually your cmdline.txt file will look like this:
At last, we need to make Raspbian enable SSH on boot so we’ll be able to connect to it if needed, in order to do this just create an /path/to/pi/boot/ssh empty file.
Unmount the micro sd, insert it into the RPiZ and plug it to the computer using the USB data port (not the charge one, we don’t need it ;)).
If everything went fine, your computer should now detect a new network interface, in order to connect to it just assign it any static IP address ( on Ubuntu and similar, set the connection type to Link-Local Only), restart the interface and the RPiZ should be reachable:
Let’s finish the setup of the board, connect to it via SSH:
Expand the filesystem as usual, change the default SSH password, enable private key only SSH authentication, copy your certificate, etc … as for the hardware part, we’re ready 🙂
The easiest way for now is to build the arcd server directly on a Raspberry Pi in order to produce an ARMv6 binary, once you installed Go on the RPi (not necessarily the one you’re going to use as the secrets store) just follow the instructions on the repository to compile the server.
Once you compiled it, edit the configuration file:
cp sample_config.json config.json
And change the address field so we’ll be able to connect to the Arc web interface:
Now just copy the arc folder, the new config.json file and the ARM compiled arcd server to the RPiZ:
Open the browser and go to http://raspberrypi.local:8080/, you should now be able to login and use ARC whenever you plug your RPi Zero to the USB port 🙂
( Make sure to start arcd at boot by editing /etc/rc.local or whatever )
It should be obvious, but physically isolated data on dedicated hardware is safer.
All the data is encrypted client side, which means everything that is stored physically on the RPiZ is encrypted with AES, make sure to use a strong encryption key, the stronger the key, the safer the data will be in case you lose the hardware.
For additional security, you might store the arc.db server database on a LUKS volume which you will need to manually unlock at boot.
You should generate your own self signed certificate and use it in the tls configuration of Arc in order to use https instead of http.
DO NOT enable any type of connection sharing from your computer to the RPiZ, we do not want anything from the outside world to reach our secure storage, ideally you should disable the wireless interface too if using the W model.
Username and password are needed to access the API itself, but they will not decrypt the records, that’s why the encryption key is requested as well. You can login with the same API credentials but different encryption keys, you will create records with a new key and will not be able to decrypt other records that have been created with a different AES key.
Elements can be configured with an expiration date, using it is a good way to remember how old a given password is and have some sort of reminder when it’s time to change it (or just encrypted reminders ^_^).
It’s officially 2018, which means the midterm elections are right around the corner. When a successful Republican tax reform package kicks in next month, Democrats will have to reach even deeper to find a winning argument for November.
In 2017, Russia was used as a political hammer by Democrats against President Trump and Republicans closely associated with him. As the Special Counsel investigation drags on, with multiple investigations on Capitol Hill failing to turn up evidence of collusion, it’s still being used as a talking point against the White House.
But according to former Clinton campaign manager Robby Mook, using the Russia narrative to win elections and take back red seats just isn’t going to cut it.
“I don’t think the Russia investigation is a winning message. You know, voters watch and they look to see what your priorities seem to be,” Mook said during a recent interview on CNN. “This is actually why the Republicans are looking to have a fight over immigration because they want to send a signal to voters that Democrats are not focused on the voters but on immigration and that sort of thing. Obviously it’s an important issue but the Republicans see that as a helpful wedge for their base. I think Democrats need to run on what everybody always needs to run on which is, what are you doing for the voters? What’s in it for them?”
(relevant portion is at minute mark 5:23)
Will Democrats drop Russia in 2018? Highly unlikely, but there is a chance their push for impeachment takes precedent.
Polling on the issue continues to show Americans split.
The United Nations Is positioning for the takeover of the United States. They are starting with Illinois as this will be the first state to declare bankruptcy and there willl be massive civil unrest. They are housed in HUD repossessed home abandoned bases and are asssigned to some active bases and coordinate with some troops, but they are not under the control of any domestic authority.
Dave Hodges is a satisfied customer. Listeners to The Common Sense Show will receive 5% off their next order by mentioning “Hodges9” in the coupon code box. Don’t wait until it is too late.Click Herefor more information.
From the Hagmann blood sugar protocol to the Hodges joint protocol, Dr. Broer has helped hundreds of thousands of people. There is something for everybody at Healthmasters.com. FOR COMMON SENSE SHOW LISTENERS, YOU CAN TAKE 5% OFF OF ALL ORDERS FROM HEALTHMASTERS. ACT NOW, THIS IS A VERY LIMITED TIME OFFER. USE THE COUPON CODE “5HODGES”
A Seattle-area Immigration and Customs Enforcement agent accused of pointing her service pistol at another immigration officer after being told to sign a “performance improvement plan” now faces federal charges.
Prosecutors claim deportation officer Peggy Lee Robbins drew down on her supervisor Thursday during a performance review inside the Department of Homeland Security offices at Tukwila. According to charging papers, other officers took cover until Robbins was coaxed into surrendering her pistol.
Writing in court papers, a Federal Protective Service special agent said Robbins had been asked to sign an improvement plan when she unholstered her pistol and pointed it at her supervisor. Believing he was about to be shot, Robbins’ supervisor fled the cubicle.
Another ICE officer then came upon Robbins, who was crying at her desk, the special agent said in court papers. A civilian worker unaware of the incident approached Robbins and asked if she was all right.
“I’m not going to say anything until the police arrive,” Robbins told her, according to charging papers.
Meanwhile, Robbins’ supervisor and other officers gathered to clear people out of the workspace. The area was evacuated and a team moved in to retrieve Robbins.
Robbins heard them coming and announced she was “at peace,” the special agent said in court papers.
“I am at peace,” she is alleged to have said. “Are you coming at peace?”
A supervising officer approached Robbins with his hands up and asked that Robbins surrender her gun, the special agent said. She did so and was arrested.
Robbins was charged Friday with assaulting a federal officer. She remains jailed pending a Monday hearing at U.S. District Court in Seattle.
var params =
cb: (new Date()).getTime()
for(var key in params) qs.push(key+’=’+encodeURIComponent(params[key]));
var p = ‘https:’ == document.location.protocol ? ‘https’ : ‘http’;
s.src = p + “://api.content-ad.net/Scripts/widget2.aspx?” + qs.join(‘&’);