Feeds

Police smoke out 300-pound frozen turkey thief

Homeless giant repaid hospitality with fridge invasion

7 Elements of Radically Simple OS Migration

Police in Michigan are hunting an enormous homeless burglar who swiped a family's Thanksgiving turkey.

The Jackson Citizen Patriot reports that the Sobiegray family were left facing a fowl-free Thanksgiving, after the man kicked down their front door and raided their freezer on Tuesday night.

The suspect in the theft of the 13-pound bird is described as a "300-pound, 6-foot man who is bald with blue eyes".

To add insult to injury, lady of the house Susan Sobiegray said that she and her neighbours had been helping the homeless giant with food and a place to stay in recent weeks.

That was clearly not enough for the famished man mountain, who tore into the Sobiegray's fridge, "as if there was gold in it".

"It was ridiculous," Sobiegray said. "He threw all the food all over the kitchen floor, which wasn't much."

The paper reports that the investigation continues. Given the bird was frozen, we suspect the thief may get his comeuppance in the form of a massive dose of salmonella.

In a suitably heartwarming touch, a local businessman has supplied the bereft Sobiegrays with a replacement feast of a turkey, stuffing, vegetables and a small ham. ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?