Feeds

Internet logs nail fetus snatcher

Forced Caesarian adoption none too clever

  • alert
  • submit to reddit

High performance access to file storage

A grotesque crime in which a pregnant woman was murdered and her fetus snatched and adopted by another has been solved quickly, thanks to the enormous amount of electronic evidence the murderer left behind.

Lisa Montgomery, 36, of Melvern, Kansas arranged the fatal meeting with her victim, Bobbie Jo Stinnett, 23, via e-mail and instant messaging.

The late Stinnett was a dog breeder, and Montgomery approached her on line with the pretext of wishing to buy a puppy. Stinnett invited Montgomery to her Skidmore, Missouri house, where Montgomery strangled her, performed an impromptu Caesarian, and stole the fetus.

After murdering Stinnett and stealing her fetus, Montgomery drove to Topeka, Kansas and rang her husband, telling him that she'd given birth. Why the husband was not suspicious has not been explained.

Montgomery was apparently none too savvy about the techniques of covering one's tracks online, and leaked prodigious amounts of data. While she did have the foresight to use an alias for her emails to Stinnett, she connected from her house without any precautions, and appears to have posted a message to Stinnett on a board where her IP address was logged. Stinnett's computer provided enough evidence for police to zero in on Montgomery within a day.

It was trivial to trace Montgomery's IP address to her house, where police found the stolen infant, pretty much blowing any non-insanity defence Montgomery might have hoped to mount.

The premature infant, named Victoria, is reported to be healthy and has since been re-united with her father. ®

Related stories

Online baby muncher is an artist
Web paedophile jailed for four years
NSW police email child abuse pics to school heads

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.