Feeds

Ninja she-devils rob Pennsylvania gas station

Crouching tigress, hidden blagger

7 Elements of Radically Simple OS Migration

Pennsylvania's Richmond Township is indubitably bemoaning its lack of a mobile SWAT team of crimebusting vigilante Shaolin Temple kung fu monks after two women dressed as ninjas robbed a local gas station at swordpoint.

According to thepittsburghchannel.com, the pair crouching tigered their way into the Sunoco station at 3am on Saturday, menaced the clerk with a sword and dagger, tied the poor fellow up and made off with "cash, cigarettes and lottery tickets".

Chief Robert Amman of the Northern Regional Police Department said: "They were all covered in black and carrying swords, so it did appear that they were dressed like ninjas. Swords, daggers could be used to seriously harm victims, so this is a very serious crime."

The revelation that ninja she-devils are operating in Richmond Township has evidently left locals in a state of shocked bewilderment. Rick Lekki, who owns the R and J's bar across the street from the Japanese-themed blag, admitted: "It's shocking. Things like that just don't happen out here. I just can't believe it happened." ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?