Feeds

Megan's Law snafu fingered in rapist's murder

Big Brother makes a clerical error

High performance access to file storage

The stabbing death of a convicted rapist 35 days after he was released from prison may have stemmed from a public database that erroneously described him as a child molester, California police say.

Michael A. Dodele was found dead in his run-down mobile home on November 20. The cause of death was puncture wounds to his side and chest. Prosecutors say they are investigating the possibility that the 67-year-old was killed because of an incorrect entry in California's so-called Megan's Law database.

It described his offenses as "rape by force" and "oral copulation with a person under 14 or by force". In fact, all of his sex crimes involved assaults on adult women, according to this article in The Los Angeles Times. Dodele committed his first offenses at age 15, according to court records. His last conviction was for the 1987 knife-point rape of a 37-year-old woman.

"Society may see the action I took as unacceptable in the eyes of 'normal' people," Ivan Garcia Oliver, the man suspected of the stabbing told the paper during a jailhouse interview. Oliver, who has pleaded not guilty to charges of first-degree murder, burglary and elder abuse, also said he had a son who was molested.

"I felt that by not taking evasive action as a father in the right direction, I might as well have taken my child to some swamp filled with alligators and had them tear him to pieces," he added. "It's no different."

A neighbor at the Western Hills Resort & Trailer Park, where both suspect and victim lived, said two days before the killing that Oliver "told every house" in the park that he'd found Dodele listed on the Megan's Law website.

"He said [Dodele] can't be around here," the neighbor said, referring to Oliver. Shortly after the slaying, police found blood at Oliver's house, according to The Times. Deputies also found Oliver with blood on his hands and clothes and injuries that were consistent with having been in a physical fight.

Police have yet to assign a motive for the slaying, but they say one possibility was that Oliver knew Dodele was on the Megan's Law list and didn't want him as a neighbor. Assuming that theory is correct, Dodele's death may be the first in the state to result from being listed in the database. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.