Feeds

'Cops help kill 32 Students', claims furious blogger

Anger follows tech college massacre

High performance access to file storage

Blogs written by students at Virginia Tech University have expressed fury at how police and university authorities dealt with the shooting there yesterday.

Yesterday morning a man shot 32 students at the Virginia campus before killing himself. A male and female student were shot at a hall of residence early in the morning. Two hours after the initial shooting the man returned and went on the rampage. It has been reported that the original shooting resulted from the man looking for his girlfriend and finding her with another student.

The Virginia Police Department received a 911 call from a dormitory on the Virginia campus at about 7.15am. On arriving they found the bodies of a male and female. This shooting was initially believed to be an isolated incident. University authorities met at 9.00am to discuss the situation and at 9.26am staff and students were told by email of the killing and warned to be alert to suspicious activity.

At 9.45am the police got another 911 call that there was a shooting at Norris Hall, an engineering block. When officers arrived at the building they found the doors locked and heard gunshots. As officers reached the second floor the gunshots stopped - the gunman had shot himself. A further email sent to staff and students warned there was a gunman on campus and they should stay inside and away from windows.

Virginia Tech website has more information here.

Some student bloggers blamed Virginia Tech president and the local police for the tragedy. There are blogs here and here and mobile phone footage here.

A student run news website is here.

The engineering department was the subject of two bomb threats over recent weeks, which some believe should have indicated more serious trouble ahead.

The National Rifle Association expressed its condolences "to the families of Virginia Tech University and everyone else affected by this horrible tragedy".

Virginia Tech was founded in 1872 as an agricultural college and is a renowned centre for science and technology. It has over 25,000 full-time students. Alumni include Nasa flight director Robert E Castle Jr, and three astronauts. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.