Are police officers allowed to lie to you? Yes the Supreme Court has ruled that police officers can lie to the American people. Police officers are trained at lying, twisting words and being manipulative. Police officers and other law enforcement agents are very skilled at getting information from people. So don’t try to “out smart” a police officer and don’t try being a “smooth talker” because you will lose! If you can keep your mouth shut, you just might come out ahead more than you expected.

Friday, August 28, 2015

An investigation in Baltimore has 'opened the floodgates' on the use of secretive FBI cellphone tracking devices

By Barbara Tasch Business Insider

A USA Today investigation has led Baltimore defense lawyers to review almost 2,000 cases in which police secretly used expensive, powerful cellphone tracking devices known as stingrays.

In Maryland, the use of electronic surveillance must be disclosed in court, but the use of stingrays in these cases was never revealed, according to USA Today.
From the 1,900 cases USA Today identified in which police used a stingray, at least 200 public defender clients were convicted of a crime.

"This is a crisis, and to me it needs to be addressed very quickly. No stone is going to be left unturned at this point," Baltimore's public defender, Natalie Finegar, told USA Today.

Related article: How to beat Stingray, NSA, FBI, and police surveillance

The device has been marketed as a tool to catch terrorists and kidnappers, according to USA Today, but police in many parts of the US have been accused time and again of using it to catch perpetrators of petty crimes.

The device is about the size of a suitcase and looks like a cell tower. It "tricks" cellphones into transmitting data to the police rather than an operator's tower. The stingray can cost up to $400,000, according to USA Today.

This CNN image details another way the US is spying on its citizens.

Baltimore defense lawyer Josh Insley told USA Today that he might start challenging some of his clients' convictions as soon as next week.

"This has really opened the floodgates," he said.

In many cases, including in Baltimore, the police say they cannot release the information because of non-disclosure agreements with the company that makes the devices. The FBI has also required police and prosecutors to sign documents stating that they were not to discuss the device, according to the Baltimore Sun.

Related article: The Domestic Drone threat

In March, The New York Times noted that the secrecy surrounding the stingray could raise major privacy concerns, and that the non-disclosure agreement could be trying to hide those privacy issues.

"It might be a totally legitimate business interest, or maybe they're trying to keep people from realizing there are bigger privacy problems," Orin S. Kerr, a privacy-law expert at George Washington University, told The Times. "What's the secret that they're trying to hide?"

Baltimore isn't the only police department to use stingrays. Last year, the American Civil Liberties Union noted that the Tallahassee Police Department had used it 200 times as of 2010. In 2012, the Los Angeles Police Department reportedly used it 21 times in a four-month period, and in April 2015 the Baltimore Sun revealed that police there had used a stingray 4,300 times since 2007.

In 2011, the FBI admitted that the stingray also affected the cellphones of innocent users in the area where it has operated, the Associated Press reported.

This blog has been shifted!(Due to Censorship) Blog has been shifted to: 
Articles and videos from now on will be posted at:
Underground America Inc.
Follow on YouTube
and Twitter

NEW!! Underground Forum Post anything!!

Hacker killed by US Drone strike

By Mark Hosenball

WASHINGTON (Reuters) - A British hacker who U.S. and European officials said became a top cyber expert for Islamic State in Syria has been killed in a U.S. drone strike, a U.S. source familiar with the matter said on Wednesday.

It was the second reported killing of a senior Islamic State figure in the last eight days after the group's second-in-command was killed in a U.S. air strike in Iraq on Aug. 18.

The source indicated that the U.S. Defense Department was likely involved in the drone strike that killed British hacker Junaid Hussain, a former Birmingham, England, resident.

A CSO Online report said the strike took place on Tuesday near Raqqa, Syria. Hussain, 21, moved to Syria sometime in the last two years.

U.S. and European government sources told Reuters earlier this year that they believed Hussain was the leader of CyberCaliphate, a hacking group which in January attacked a Twitter account belonging to the Pentagon, though the sources said they did not know if he was personally involved.

While the American sources said they were confident he was killed in the strike, some people disputed that view. Two Twitter accounts that U.S. intelligence experts say are connected to Islamic State reported that his wife had said he was still alive.

Seamus Hughes, a former U.S. government counterterrorism expert now affiliated with George Washington University, said that while the reports came from Twitter accounts known to be connected to Islamic State, it was not possible to determine whether they were accurate.

"It could be a concerted attempt to deceive," Hughes said.

Cyber security experts have said they believe that Hussain and other hackers working for Islamic State lack the skills needed to launch serious attacks such as ones that could shut down computer networks or damage critical infrastructure.

"He wasn't a serious threat. He was most likely a nuisance hacker," said Adam Meyers, vice president of cybersecurity firm CrowdStrike. "It was his involvement in recruitment, communications and other ancillary support that would have made him a target."

In 2012 he was jailed for six months for stealing former British Prime Minister Tony Blair's address book from an account maintained by a Blair adviser.

Hussain recently had become a subject of considerable U.S. interest. However, the sources denied a British news report that he was No. 3 on a drone target list, saying other Islamic State commanders were regarded as far more dangerous.

This blog has been shifted!(Due to Censorship) Blog has been shifted to: 
Articles and videos from now on will be posted at:
Underground America Inc.
Follow on YouTube
and Twitter

NEW!! Underground Forum Post anything!!

Thursday, August 27, 2015

Police State, DC

Mayor Muriel E. Bowser (D)  will hold a press conference Thursday morning to outline her new agenda to reduce crime in the city — and Black Lives Matter organizers will be there to say her approach is wrong.

Bowser is expected to ask the D.C. Council to expand law enforcement powers, making it easier for officers to search individuals on parole or probation and immediately detain anyone found in violation of the terms of release. This announcement comes amid a citywide homicide spike — one that city officials says is partially driven by repeat offenders.

Related article: Pig tactics and how to beat them

The D.C. region’s chapter of Black Lives Matter is calling on residents to attend Bowser’s press conference at 10:30 a.m. at the former Malcolm X Elementary School near the Congress Heights Metro station to express their concerns over her agenda. Nationwide, Black Lives Matter activists have called to limit police interventions, which seems to contradict with Bowser’s proposed new policies.

“It seems that they are trying to re-justify stop and frisk at a time when the public has decided that’s not the way we want our communities to policed, said Aaron Goggans, a member of the local chapter of Black Lives Matter.  “We want Mayor Bowser to know that there are people in the community who do not think police are the answer.”

Goggan said he doesn’t think the city should be investing more in the police, but rather in more social services, like mental health resources and secure housing.

The Black Lives Matter flier for Thursday’s press conference calls on people to tell Bowser “No! to expanding #policeterror in D.C.”

This blog has been shifted!(Due to Censorship) Blog has been shifted to: 
Articles and videos from now on will be posted at:
Underground America Inc.
Follow on YouTube
and Twitter

NEW!! Underground Forum Post anything!!

Police secretly track cellphones to solve routine crimes

Brad Heath, USA TODAY 

BALTIMORE — The crime itself was ordinary: Someone smashed the back window of a parked car one evening and ran off with a cellphone. What was unusual was how the police hunted the thief.

Detectives did it by secretly using one of the government’s most powerful phone surveillance tools — capable of intercepting data from hundreds of people’s cellphones at a time — to track the phone, and with it their suspect, to the doorway of a public housing complex. They used it to search for a car thief, too. And a woman who made a string of harassing phone calls. 

In one case after another, USA TODAY found police in Baltimore and other cities used the phone tracker, commonly known as a stingray, to locate the perpetrators of routine street crimes and frequently concealed that fact from the suspects, their lawyers and even judges. In the process, they quietly transformed a form of surveillance billed as a tool to hunt terrorists and kidnappers into a staple of everyday policing.

The suitcase-size tracking systems, which can cost as much as $400,000, allow the police to pinpoint a phone’s location within a few yards by posing as a cell tower. In the process, they can intercept information from the phones of nearly everyone else who happens to be nearby, including innocent bystanders. They do not intercept the content of any communications.

Dozens of police departments from Miami to Los Angeles own similar devices. A USA TODAY Media Network investigation identified more than 35 of them in 2013 and 2014, and the American Civil Liberties Union has found 18 more. When and how the police have used those devices is mostly a mystery, in part because the FBI swore them to secrecy.

Related article: How to beat Stingray, police, DEA, FBI and NSA surveillance 

Police and court records in Baltimore offer a partial answer. USA TODAY obtained a police surveillance log and matched it with court files to paint the broadest picture yet of how those devices have been used. The records show that the city's police used stingrays to catch everyone from killers to petty thieves, that the authorities regularly hid or obscured that surveillance once suspects got to court and that many of those they arrested were never prosecuted.

Defense attorneys assigned to many of those cases said they did not know  a stingray had been used until USA TODAY contacted them, even though state law requires that they be told about electronic surveillance.

“I am astounded at the extent to which police have been so aggressively using this technology, how long they’ve been using it and the extent to which they have gone to create ruses to shield that use,” Stephen Mercer, the chief of forensics for Maryland’s public defenders, said.

Prosecutors said they, too, are sometimes left in the dark. "When our prosecutors are made aware that a detective used a cell-site stimulator, it is disclosed; however we rely upon the Police Department to provide us with that information," said Tammy Brown, a spokeswoman for the Baltimore's State's Attorney. "We are currently working with the Police Department to improve upon the process to better obtain this information in order to comply with the law.”

Baltimore is hardly alone. Police in Tallahassee used their stingray to track a woman wanted for check forging, according to records provided to the ACLU last year. Tacoma, Wash., police used theirs to try to find a stolen city laptop, according to records released to the website Muckrock. Other departments have acknowledged that they planned to use their stingrays for solving street crimes.

Related article: New radar allows LE to peek into homes

As that surveillance became more common — and more widely known — state and federal lawmakers moved to put new limits on the circumstances in which it can be used. Some states require the police to get a search warrant before they can use a stingray, and Congress is considering a similar rule for the federal government.

Federal officials have said stingrays allow them to track dangerous criminals. “It’s how we find killers,” FBI Director James Comey said last year. “It’s how we find kidnappers. It’s how we find drug dealers. It’s how we find missing children. It’s how we find pedophiles.”

In Baltimore, at least, it’s how the police tracked the man they suspected stole a phone from the back seat of a car parked outside the city’s central booking facility in 2009. Two days after the theft, an officer said in a court filing that detectives found Danell Freeman holding the phone in the doorway of an East Baltimore public housing complex. The court filing did not say how detectives knew to look for the phone there, but a police surveillance log indicates they used a stingray.

Related article: The Domestic Drone Threat

Police charged Freeman with misdemeanor theft. Prosecutors dropped the case a month later.

“The problem is you can’t have it both ways. You can’t have it be some super-secret national security terrorist finder and then use it to solve petty crimes,” Electronic Frontier Foundation lawyer Hanni Fakhoury said.

FBI spokesman Chris Allen said the bureau does not have the authority to tell police departments how they should use stingrays. It has asked them to keep that use confidential, requiring them to sign non-disclosure agreements that prohibit officers from revealing how the phone-tracking technology works. Baltimore police officials signed one in 2011.


Baltimore’s police are prolific stingray users. In April, Det. Emmanuel Cabreja testified that officers had used cell-site simulators more than 4,300 times since 2007, a figure that easily dwarfs the tallies reported by the few police departments that have released details of their usage. The police have not previously identified the crimes they used the device to investigate or the people they arrested as a result.

By matching court records and a surveillance log from the police department’s Advanced Technical Team, USA TODAY identified 837 criminal cases in which the police indicated they had used a device to simulate a cell tower. The log does not expressly reference cell-site simulators, but detectives and a police spokesman, Det. Jeremy Silbert, confirmed the language officers used in the log to indicate a stingray had been used.

Among those cases are some of the most serious crimes the police were called on to investigate — and some of the least.

In 2010, police used a stingray to track a man they suspected had kidnapped his girlfriend’s two daughters, ages 3 and 5, and demanded half of her $6,000 tax refund as a ransom “in exchange for her older daughter’s life.” He threatened in text messages to throw the older daughter off a bridge if he didn't get the money, according to court records. Detectives quickly recovered the children unharmed. Prosecutors quickly dropped the kidnapping charges against the man, Kwame Oseitutu; he was convicted only of misdemeanor misuse of a telephone. Prosecutors did not explain that decision.

Related article: How to go invisible on the net

Officers rely on reports from phone companies to track a suspect's phone to a particular neighborhood, then use their tracker, known as a Hailstorm, to pinpoint his location. In one court filing in 2013, an officer said Advanced Tactical Team detectives received 40 hours of training on using the tracker and an additional eight hours of "cellular theory" training from the U.S. Secret Service.

The team's log shows the police used cell-site simulators in at least 176 homicide cases, 118 shootings and 47 rapes since 2008. Usually they were searching for suspects, but occasionally, the records show they  used the devices to track down witnesses. The most common use by far was solving robberies. Stingrays are especially well-suited to that job because robbers frequently take their victims' phones.

“We’re out riding around every day,” said one officer assigned to the surveillance unit, who spoke on the condition of anonymity because of the department’s non-disclosure agreement with the FBI. “We grab a lot of people, and we close a lot of cases.”

Not all of those cases are big. Records show police used a cell-site simulator to track down a woman charged with stealing credit cards from a garage and using them to pay two months’ rent at a self-storage unit. They used it to hunt for a stolen car and to find a woman who sent hundreds of “threatening and annoying” text messages to a Baltimore man. In each case, prosecutors ultimately dropped the charges or agreed to pretrial diversion.

Related article: Pig tactics and how to beat them

In 2011, detectives used a stingray to try to find a man who took his wife’s cellphone during an argument, telling her, “If you won’t talk to me, you’re not going to talk to anyone,” according to court records, a crime the surveillance team classified as a robbery. Police tracked the phone that day, but by then, it had already been returned to his wife, so they tracked it to her house.

Police did not find Jarrod Tongue until he showed up in court a month and a half later, when the case was dismissed. Tongue could not be reached to comment.

Baltimore police officials declined to comment.

Baltimore's use is consistent with how the police have used cell trackers in other cities, ACLU lawyer Nathan Wessler said, albeit on a much larger scale. “We know that they have been purchased widely and used widely,” he said. “In the few departments that we’ve seen [records from], they are being used for a wide range of investigations.”

Rochelle Ritchie, a spokeswoman for Baltimore’s state’s attorney, could not say whether prosecutors had ever dropped a case because of issues related to such surveillance.

Still, barely half of the cases USA TODAY identified ended in a conviction. Prosecutors dismissed about a third of the cases outright, even when suspects had stolen phones with them when they were arrested. What’s less clear is whether those outcomes were the result of the secret surveillance or merely reflected the normal ebb and flow of Baltimore’s clogged criminal justice system.

Prosecutors have certainly agreed to forgo evidence officers gathered after using a stingray. At a court hearing in November, a lawyer for a robbery suspect pressed one of the detectives assigned to the surveillance team, John Haley, for information about how the police had found a phone and gun prosecutors wanted to use as evidence against his client. Haley refused to explain, citing the non-disclosure agreement. “You don’t have a non-disclosure agreement with the court,” Judge Barry Williams replied and threatened to hold the detective in contempt if he did not answer.

Prosecutors quickly agreed to forgo the evidence rather than let the questioning continue. “I don’t think Det. Haley wants to see a cell today,” Assistant State's Attorney Patrick Seidel said.


In court records, police routinely described the phone surveillance in vague terms — if they mentioned it at all. In some cases, officers said only that they used “advanced directional finding equipment” or “sophisticated electronic equipment" to find a suspect. In others, the police merely said  they had “located” a suspect’s phone without describing how, or they suggested they happened to be in the right place at the right time.

Such omissions are deliberate, said an officer assigned to the department’s Advanced Technical Team, which conducts the surveillance. When investigators write their reports, “they try to make it seem like we weren’t there,” the officer said.

Related article: Revo-fuckin-lution

Public defenders in Baltimore said that robbed them of opportunities to argue in court that the surveillance is illegal. “It’s shocking to me that it’s that prevalent,” said David Walsh-Little, who heads the felony trial unit for Baltimore’s public defender office. “We can’t challenge it if we don’t know about it, that’s sort of the horror of it.”

Defendants usually have a right to know about the evidence against them and to challenge the legality of whatever police search yielded it. Beyond that, Maryland court rules generally require the government to tell defendants and their lawyers about electronic surveillance without being asked. Prosecutors say they are not obliged to specify whether a stingray was used. Referring to direction-finding equipment “is sufficient to place defense counsel on notice that law enforcement employed some type of electronic tracking device,” Ritchie said.

In at least one case, police and prosecutors appear to have gone further to hide the use of a stingray. After Kerron Andrews was charged with attempted murder last year, Baltimore's State's Attorney's Office said it had no information about whether a phone tracker had been used in the case, according to court filings. In May, prosecutors reversed course and said the police had used one to locate him. “It seems clear that misrepresentations and omissions pertaining to the government’s use of stingrays are intentional,” Andrews’ attorney, Assistant Public Defender Deborah Levi, charged in a court filing.

Judge Kendra Ausby ruled last week that the police should not have used a stingray to track Andrews without a search warrant, and she said prosecutors could not use any of the evidence found at the time of his arrest.

Some states require officers to get a search warrant, in part because the technology is so invasive. The Justice Department is considering whether to impose a similar rule on its agents. In Baltimore, police routinely relied instead on what are known as “pen register” orders, which must be approved by a judge but do not require the same level of proof as a search warrant. For a time last year, Baltimore officers also started getting search warrants,  then stopped, Haley testified at a hearing in June.

Related article: How to beat Stingray, police, DEA, FBI and NSA surveillance 

Few courts have weighed in on stingrays' legality, partly because so much of the surveillance happened in secret that defense lawyers had few opportunities to challenge it.

Levi, for example, said she did not realize until USA TODAY contacted her that the police had used stingrays in at least three other cases she  handled.

In one, police tracked a rape suspect to an address on the city's west side. Their arrest report didn’t specify how they found him there, and a disclosure form filed in Baltimore’s Circuit Court did not indicate that the police had conducted any electronic surveillance. But his case number and the address where he was arrested appear in the Advanced Technical Team’s surveillance log with language indicating that a stingray was used.

Even when stingray cases reach appeals courts responsible for settling those legal questions, the judges don't always appear to know about the surveillance.

Two years ago, for example, a Maryland appeals court heard a case in which the police arrested a robbery suspect after tracking a stolen cellphone. Kenneth Redmond had been convicted of robbing a high school student at knife-point; police found him by tracking her stolen phone to a house. The court’s description of how they did that was vague; detectives found him by “triangulating the signal from cellphone towers in the area,” the judges wrote, using “phone company technology.”

In fact, according to the police log, detectives used a stingray.

This blog has been shifted!

(Due to Censorship) Blog has been shifted to: 

Articles and videos from now on will be posted at:
Underground America Inc.

Follow on YouTube
and Twitter

NEW!! Underground Forum Post anything!!


Wednesday, August 26, 2015

CIA Spies Caught in Iran

By Christopher R Rice
Does anyone else remember this headline from July 24, 2015: CIA Confident It Would Catch Iran Cheating on Nuclear Deal (ABC news) The number two man at the CIA said today he has a "high degree of confidence" that if Iran cheats on the newly-signed, controversial nuclear deal, the U.S. intelligence community would catch them in the act.
The CIA lost its agents in the Middle East in 2011. The CIA is sloppy, spies on the US senate, is run by a BDSM freak and is completely worthless as a spy agency. Hence the CIA's need to spy on the very people funding the agency. SMH.

There's a running joke, goes something like this: what ever you do, do not allow yourself to be captured by the Americans. They are so sex crazed they want to get freaky deiky with the prisoners.
Nov. 21, 2011 Exclusive: CIA Spies Caught, Fear Execution in Middle East (ABC news) By Matthew Cole
In a significant failure for the United States in the Mideast, more than a dozen spies working for the CIA in Iran and Lebanon have been caught and the U.S. government fears they will be or have been executed, according to four current and former U.S. officials with connections to the intelligence community.

The spies were paid informants recruited by the CIA for two distinct espionage rings targeting Iran and the Beirut-based Hezbollah organization, considered by the U.S. to be a terror group backed by Iran.
"Espionage is a risky business," a U.S. official briefed on the developments told ABC News, confirming the loss of the unspecified number of spies over the last six months.
"Many risks lead to wins, but some result in occasional setbacks," the official said.
Robert Baer, a former senior CIA officer who worked against Hezbollah while stationed in Beirut in the 1980's, said Hezbollah typically executes individuals suspected of or caught spying.
"If they were genuine spies, spying against Hezbollah, I don't think we'll ever see them again," he said. "These guys are very, very vicious and unforgiving."
Other current and former officials said the discovery of the two U.S. spy rings occurred separately, but amounted to a setback of significant proportions in efforts to track the activities of the Iranian nuclear program and the intentions of Hezbollah against Israel.
"Remember, this group was responsible for killing more Americans than any other terrorist group before 9/11," said a U.S. official. Attacks on the U.S. embassy and Marine barracks in Beirut in 1983 killed more than 300 people, including almost 260 Americans.
The U.S. official, speaking for the record but without attribution, gave grudging credit to the efforts of Iran and Hezbollah to detect and expose U.S. and Israeli espionage.
"Collecting sensitive information on adversaries who are aggressively trying to uncover spies in their midst will always be fraught with risk," said the U.S. official briefed on the spy ring bust.
But others inside the American intelligence community say sloppy "tradecraft" -- the method of covert operations -- by the CIA is also to blame for the disruption of the vital spy networks.
In Beirut, two Hezbollah double agents pretended to go to work for the CIA. Hezbollah then learned of the restaurant where multiple CIA officers were meeting with several agents, according to the four current and former officials briefed on the case. The CIA used the codeword "PIZZA" when discussing where to meet with the agents, according to U.S. officials. Two former officials describe the location as a Beirut Pizza Hut. A current US official denied that CIA officers met their agents at Pizza Hut.
From there, Hezbollah's internal security arm identified at least a dozen informants, and the identities of several CIA case officers.
Hezbollah then began to "roll up" much of the CIA's network against the terror group, the officials said.
One former senior intelligence official told ABC News that CIA officers ignored warnings that the operation could be compromised by using the same location for meetings with multiple assets.
"We were lazy and the CIA is now flying blind against Hezbollah," the former official said.

CIA Spies Caught in Iran

At about the same time that Hezbollah was identifying the CIA network in Lebanon, Iranian intelligence agents discovered a secret internet communication method used by CIA-paid assets in Iran.
The CIA has yet to determine precisely how many of its assets were compromised in Iran, but the number could be in the dozens, according to one current and one former U.S. intelligence official.
The exposure of the two spy networks was first announced in widely ignored televised statements by Iranian and Hezbollah leaders. U.S. officials tell ABC News that much of what was broadcast was, in fact, true.
Hezbollah's leader, Sayyed Hasan Nasrallah, announced in June of this year that two high-ranking members of Hezbollah had been exposed as CIA spies, leading U.S. officials to conclude that the entire network inside Hezbollah had been compromised.
In Iran, intelligence minister Heidar Moslehi announced in May that more than 30 U.S. and Israeli spies had been discovered and an Iranian television program, which acts as a front for Iran's government, showed images of internet sites used by the U.S. for secret communication with the spies.
U.S. officials said the Iranian television program showed pictures of people who were not U.S. assets, but the program's video of the websites used by the CIA was accurate.
Some former U.S. intelligence officials say the developments are the result of a lack of professionalism in the U.S. intelligence community.
"We've lost the tradition of espionage," said one former official who still consults for the U.S. intelligence community. "Officers take short cuts and no one is held accountable," he said.
But at the CIA, officials say such risks come with the territory.
"Hezbollah is an extremely complicated enemy," said a U.S. official. "It's a determined terrorist group, a powerful political player, a mighty military and an accomplished intelligence operation, formidable and ruthless. No one underestimates its capabilities."
This blog has been shifted!

(Due to Censorship) Blog has been shifted to: 

Articles and videos from now on will be posted at:
Underground America Inc.

Follow on YouTube
and Twitter

NEW!! Underground Forum Post anything!!


Tuesday, August 25, 2015

FBI: Woman Robs Third North Side Bank In A Month

(CBS) — A woman suspected of robbing two TCF Bank branches this month on the North Side struck again Saturday afternoon, this time in the Uptown neighborhood.

At 3:07 p.m. Saturday, the woman entered the TCF Bank branch at 4355 N. Sheridan Rd. and handed the teller a note demanding money, according to Chicago Police and the FBI.

She then ran away with an unknown amount of money.

The woman implied she had a weapon, but did not show one, police said.

The suspect is described as a 5-foot-3 to 5-foot-5 black woman between 30 and 40 years old, the FBI said. She was wearing a white shirt and a white hat, police said.

Related article: (How to) Rob a bank and get away

The same woman is suspected in a bank robbery in the Edgewater neighborhood on Aug. 14 and again in the Lake View neighborhood on Aug. 5.

The Aug. 14 robbery happened at 3:52 p.m. at a TCF Bank branch at 5343 N. Broadway, the FBI said.

On Aug. 5, the woman is suspected of robbing a TCF at 3531 N. Broadway at 12:56 p.m., the FBI said. In that robbery, the suspect was wearing a large hat, sunglasses and a green shirt.

She did not show a weapon in any of the robberies, authorities said.
Anyone with information is asked to call the FBI at (312) Ima-Snitch.

This blog has been shifted!(Due to Censorship) Blog has been shifted to: 
Articles and videos from now on will be posted at:
Underground America Inc.
Follow on YouTube
and Twitter

NEW!! Underground Forum Post anything!!

Judge denies injunction to