<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>technology Archives - Crime Museum</title>
	<atom:link href="https://www.crimemuseum.org/tag/technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.crimemuseum.org/tag/technology/</link>
	<description></description>
	<lastBuildDate>Mon, 10 Jan 2022 21:12:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>10 Misconceptions About Lie Detector Tests</title>
		<link>https://www.crimemuseum.org/2012/05/24/10-misconceptions-people-have-about-lie-detector-tests/</link>
					<comments>https://www.crimemuseum.org/2012/05/24/10-misconceptions-people-have-about-lie-detector-tests/#view_comments</comments>
		
		<dc:creator><![CDATA[Susan Frese]]></dc:creator>
		<pubDate>Thu, 24 May 2012 21:42:29 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[polygraph]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.crimemuseum.org/blog/?p=3058</guid>

					<description><![CDATA[<p>You&#8217;ve seen them on TV crime dramas. A potential suspect is wired to a machine via a series of sensors attached to his body while he is grilled by an expert operator with a series of probing questions. Eventually, a needle goes haywire, and the lie is revealed. Well, not so fast. There are some&#8230;</p>
<p>The post <a href="https://www.crimemuseum.org/2012/05/24/10-misconceptions-people-have-about-lie-detector-tests/">10 Misconceptions About Lie Detector Tests</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You&#8217;ve seen them on TV crime dramas. A potential suspect is wired to a machine via a series of sensors attached to his body while he is grilled by an expert operator with a series of probing questions. Eventually, a needle goes haywire, and the <strong>lie</strong> is revealed. Well, not so fast. There are some serious misconceptions about this test, and we’re going to discuss <strong>10 misconceptions about lie detector tests</strong> below:</p>
<ol>
<li><strong>The Name Itself– </strong>The first misconception to address is the very name <em>lie detector </em>test. It is more correctly known as a polygraph, and can be more accurately considered to be a <em>truth verifier </em>test, because …</li>
<li><strong>They Don’t Detect Lies – </strong>Polygraphs can confirm that a person is responding truthfully to a question; however, the body functions that are monitored in a polygraph test will not specifically identify a lie, simply an abnormal physiological reaction.</li>
<li><strong>They Are 100% Accurate – </strong>When administered by an experienced professional examiner, a polygraph test can be very accurate in establishing truth or indicating deception, but there are many factors that can alter their reliability.</li>
<li><strong>They Are Not Admissible In Court – </strong>Contrary to the belief even among some lawyers, this is no longer universally true. There have been cases where polygraph results have been entered as evidence in trials.</li>
<li><strong>You Can “Beat” A Polygraph Test – </strong>A professional examiner will conduct a polygraph in three phases – the pre-exam interview, the polygraph exam, and the post-exam interview – over the course of several hours. The exam will include control questions, which are designed to confirm the truthfulness of the responses.</li>
<li><strong>Drugs Can Help You Beat The Exam – </strong>Drugs or medications won’t aid in defeating a polygraph. Part of the pre-exam phase is for the examiner to ensure that the subject is fit to take the exam, and verify if any medications have been taken.</li>
<li><strong>Nerves Can Affect The Results Of A Test – </strong>Nervousness does not register in the same way the physiological response of the nervous system does during a polygraph. Also, the examiner will work with the subject throughout the process to ensure that they are as relaxed as possible.</li>
<li><strong>Polygraphs Include Trick Questions Intended to Elicit A Response – </strong>In fact, the respondent will be made aware in advance, of every question he will be asked in the polygraph exam. There are no surprise questions.</li>
<li><strong>Control Questions Are Standard Questions With Standard Responses – </strong>Not exactly. A control question is not something like “Is your last name Lipschitz”. The purpose of a control question is to induce the subject into giving a deceptive answer, so that the examiner can have reliable measurements of what a deceptive response will look like.</li>
<li><strong>You Only Fail If You Lie –</strong> While polygraphs do have a high percentage of accuracy when administered by a well-trained and qualified examiner, it’s quite possible to be completely truthful and still “fail” a polygraph exam.</li>
</ol>
<p>For more information on this topic and much more check out this link <span style="text-decoration: underline;"><a href="http://www.nannybackgroundcheck.com/blog/10-misconceptions-people-have-about-lie-detector-tests/" target="_blank" rel="noopener">here</a></span>.</p>
<hr style="margin: 20px 0px 20px 0px;" />
<table width="620" border="0">
<tbody>
<tr>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #1 */ google_ad_slot = "2333158891"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[


// ]]&gt;</script></div>
</td>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #2 */ google_ad_slot = "5286625297"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[


// ]]&gt;</script></div>
</td>
</tr>
</tbody>
</table>
<p>The post <a href="https://www.crimemuseum.org/2012/05/24/10-misconceptions-people-have-about-lie-detector-tests/">10 Misconceptions About Lie Detector Tests</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.crimemuseum.org/2012/05/24/10-misconceptions-people-have-about-lie-detector-tests/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Recovering Indented Writing</title>
		<link>https://www.crimemuseum.org/2012/04/19/recovering-indented-writing/</link>
					<comments>https://www.crimemuseum.org/2012/04/19/recovering-indented-writing/#view_comments</comments>
		
		<dc:creator><![CDATA[Susan Frese]]></dc:creator>
		<pubDate>Thu, 19 Apr 2012 18:48:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Criminals]]></category>
		<category><![CDATA[document]]></category>
		<category><![CDATA[identification]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[writing]]></category>
		<guid isPermaLink="false">https://www.crimemuseum.org/blog/?p=2865</guid>

					<description><![CDATA[<p>What would you do if your pen ran out of ink? Get a new pen, right? Unfortunately for Trish Vickers, when her pen ran out of ink, she kept writing. After Vickers lost her eyesight to diabetes in 2005, she began writing poetry which escalated to writing her first novel titled Grannifer’s Legacy. After reading&#8230;</p>
<p>The post <a href="https://www.crimemuseum.org/2012/04/19/recovering-indented-writing/">Recovering Indented Writing</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What would you do if your pen ran out of ink? Get a new pen, right? Unfortunately for Trish Vickers, when her pen ran out of ink, she kept writing. After Vickers lost her eyesight to diabetes in 2005, she began writing poetry which escalated to writing her first novel titled <em>Grannifer’s Legacy</em>. After reading some of her manuscript her son had to give her the unlucky news that 26 pages that Vickers thought she wrote were completely blank, with only the impressions left from her pen. Not knowing what to do, they finally called a nearby police department who offered their forensic document examiners to help them with their dilemma. Using specialized light to enhance the indented writing, the questioned document team recovered the lost writing after five months.</p>
<p>The use of light being held at oblique angles towards a document is one of the simpler methods of examining indented writing. In Vickers&#8217; case it was an effective method of identifying what she wrote. In forensic cases, examiners may want to look for indentation caused from pages several sheets above the original document, which calls for a much more sensitive device. An electrostatic detection device (EDD) is a piece of equipment that is used to find impressions left on a questioned document. The device is about the size of a standard home printer and its basic components include a grounded plate and thin piece of film. After a questioned document is placed in between the plate and the film, an electrostatic charge is passed through the paper. Special toner is added to the device and is attracted areas of indentation, which have a higher charge.</p>
<p>While Vicker’s case called for a simple method of identifying indented writing and did not require specialized equipment, EDD has been helpful in visualizing writing in pages that are several sheets above the original document. This type of sensitivity may be very helpful in determining who wrote a document or where it may have came from, such as kidnapping cases that involve ransom notes.</p>
<hr style="margin: 20px 0px 20px 0px;" />
<table width="620" border="0">
<tbody>
<tr>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #1 */ google_ad_slot = "2333158891"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[

// ]]&gt;</script></div>
</td>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #2 */ google_ad_slot = "5286625297"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[

// ]]&gt;</script></div>
</td>
</tr>
</tbody>
</table>
<p>The post <a href="https://www.crimemuseum.org/2012/04/19/recovering-indented-writing/">Recovering Indented Writing</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.crimemuseum.org/2012/04/19/recovering-indented-writing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Bullying Case at Rutgers University</title>
		<link>https://www.crimemuseum.org/2012/04/15/cyber-bullying-case-at-rutgers-university/</link>
					<comments>https://www.crimemuseum.org/2012/04/15/cyber-bullying-case-at-rutgers-university/#view_comments</comments>
		
		<dc:creator><![CDATA[Susan Frese]]></dc:creator>
		<pubDate>Sun, 15 Apr 2012 19:52:56 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[bullying]]></category>
		<category><![CDATA[college]]></category>
		<category><![CDATA[cyber bullying]]></category>
		<category><![CDATA[death]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[Suicide]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.crimemuseum.org/blog/?p=2769</guid>

					<description><![CDATA[<p>Dharun Ravi, 20, a former Rutgers University student accused of spying on and intimidating his gay roommate by use of a webcam was found guilty on all accounts.  Ravi was found guilty of invasion of privacy, bias intimidation, witness tampering, hindering apprehension and tampering with physical evidence, and could now face up to 10 years&#8230;</p>
<p>The post <a href="https://www.crimemuseum.org/2012/04/15/cyber-bullying-case-at-rutgers-university/">Cyber Bullying Case at Rutgers University</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dharun Ravi, 20, a former Rutgers University student accused of spying on and intimidating his gay roommate by use of a webcam was found guilty on all accounts.  Ravi was found guilty of invasion of privacy, bias intimidation, witness tampering, hindering apprehension and tampering with physical evidence, and could now face up to 10 years in jail and deportation back to his native country of India.  Because prosecutors were able to link Ravi’s actions to that of gay bias, the possible amount of time Ravi could spend in prison doubles from five years to 10.  Sentencing has been scheduled for May 21.</p>
<p>Ravi’s roommate, Tyler Clementi, killed himself in September of 2010 at the age of 18 by jumping off the George Washington Bridge into the Hudson River after finding out about the secret webcam documenting his sexual relationship with another man.</p>
<p>After facing two counts of invasion of privacy, Molly Wei, a fellow student at Rutgers University who admitted to joining Ravi in spying on his roommate, reached a plea deal required her to testify against her friend and former high school classmate as well as to complete a three-year program on cyber bullying and do 300 hours of community service.</p>
<p>Ravi turned down a plea deal offered by Middlesex County prosecutors that would have allowed him to avoid jail time in exchange for undergoing counseling, doing 600 hours of community service and disposing of any information that could identify the man who appeared in the Web video with Clementi.</p>
<p>Prosecutors also offered to help him avoid deportation, though they said they could not guarantee it.</p>
<p>Ravi, who had been studying on a visa at the New Jersey university, did not testify on his own behalf.</p>
<p>In Twitter messages from that day, Ravi wrote that he&#8217;d gone into a friend&#8217;s room, &#8220;turned on my webcam&#8221; and saw his roommate &#8220;making out with a dude.&#8221;</p>
<p>Then on September 22, 2010, Clementi took a train to New York and posted a mobile status update on his Facebook page that read, &#8220;Jumping off the gw bridge sorry.&#8221;</p>
<p>The post <a href="https://www.crimemuseum.org/2012/04/15/cyber-bullying-case-at-rutgers-university/">Cyber Bullying Case at Rutgers University</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.crimemuseum.org/2012/04/15/cyber-bullying-case-at-rutgers-university/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>More Ransom Emails from “The Keeper”</title>
		<link>https://www.crimemuseum.org/2011/11/15/more-ransom-emails-from-the-keeper/</link>
					<comments>https://www.crimemuseum.org/2011/11/15/more-ransom-emails-from-the-keeper/#view_comments</comments>
		
		<dc:creator><![CDATA[Susan Frese]]></dc:creator>
		<pubDate>Tue, 15 Nov 2011 18:25:07 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[keeper]]></category>
		<category><![CDATA[kidnapping]]></category>
		<category><![CDATA[missing]]></category>
		<category><![CDATA[random notes]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.crimemuseum.org/blog/?p=2225</guid>

					<description><![CDATA[<p>More ransom emails from &#8220;The Keeper&#8221; have appeared. A ransom email has been received concerning the disappearance of two-year-old Sky Metalwala. This email resembles the one sent after the disappearance of Patty Krieger and both were signed by “The Keeper.” Patti Krieger disappeared on October 2, 2010. She was on a hiking trip with her&#8230;</p>
<p>The post <a href="https://www.crimemuseum.org/2011/11/15/more-ransom-emails-from-the-keeper/">More Ransom Emails from “The Keeper”</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>More ransom emails from &#8220;The Keeper&#8221;</strong> have appeared. A ransom email has been received concerning the disappearance of two-year-old Sky Metalwala. This email resembles the one sent after the disappearance of Patty Krieger and both were signed by “The Keeper.”</p>
<p>Patti Krieger disappeared on October 2, 2010. She was on a hiking trip with her friends on Sauk Mountain. The police were unable to find her and until recently nothing has been heard about her. At the end of October 2011, over a year after her disappearance, a ransom email was sent. Alan Patterson, Krieger’s son, created a website in order to receive reliable tips concerning his mother’s disappearance. The ransom email sent to the website contained “options” for Patterson to choose from. He was told to wire $250,000 to Ghana in order to see his mother again. At the end of the email, the sender even offered to cut off one of his mother’s fingers to prove she was alive and being held hostage. The sender signed the email as “The Keeper.”</p>
<p>On November 6, 2011, two-year-old Sky Metalwala disappeared after his mother and four-year-old sister left to go get gas. A Facebook page was developed in order to help search for Sky, and they received an email. This email was very similar to the email regarding the disappearance of Patty Krieger. Both emails had similar grammatical errors, offered to fingers as proof the victims were alive, and were signed “The Keeper.”</p>
<p>Is “The Keeper” some sort of con-artist who runs a scam on these websites that are set up as a tipline? Patterson, Krieger’s son, claimed this has to be a scam when he received the email about his missing mother. And now that Sky is missing, will the Metalwala family feel the same way?</p>
<hr style="margin: 20px 0px 20px 0px;" />
<table width="620" border="0">
<tbody>
<tr>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #1 */ google_ad_slot = "2333158891"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[


// ]]&gt;</script></div>
</td>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #2 */ google_ad_slot = "5286625297"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[


// ]]&gt;</script></div>
</td>
</tr>
</tbody>
</table>
<p>The post <a href="https://www.crimemuseum.org/2011/11/15/more-ransom-emails-from-the-keeper/">More Ransom Emails from “The Keeper”</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.crimemuseum.org/2011/11/15/more-ransom-emails-from-the-keeper/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Prison Cell Phone Usage</title>
		<link>https://www.crimemuseum.org/2011/09/12/prisoners-playing-farmville/</link>
					<comments>https://www.crimemuseum.org/2011/09/12/prisoners-playing-farmville/#view_comments</comments>
		
		<dc:creator><![CDATA[Susan Frese]]></dc:creator>
		<pubDate>Mon, 12 Sep 2011 14:49:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[imprisonment]]></category>
		<category><![CDATA[Prison]]></category>
		<category><![CDATA[prisoners]]></category>
		<category><![CDATA[Punishment]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.crimemuseum.org/blog/?p=2040</guid>

					<description><![CDATA[<p>Facebook games are common ways of occupying the prisoners’ time. Prison cell phone usage has become increasingly popular. The number of cell phones inside prisons has quadrupled over the past three years. Prisoners are under secure monitoring, so how are they getting that many phones past security? These inmates, essentially these criminals, are making unmonitored phone&#8230;</p>
<p>The post <a href="https://www.crimemuseum.org/2011/09/12/prisoners-playing-farmville/">Prison Cell Phone Usage</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Facebook games are common ways of occupying the prisoners’ time. <strong>Prison cell phone usage</strong> has become increasingly popular.</p>
<p>The number of cell phones inside prisons has quadrupled over the past three years. Prisoners are under secure monitoring, so how are they getting that many phones past security? These inmates, essentially these criminals, are making unmonitored phone calls while supposedly having their rights restricted while in prison.  </p>
<p>Former New York City Correction Commissioner Martin Horn argues that prison is used as punishment by separating the inmates from society. How does this punish them if they still have access to the outside world through the possession of cell phones? Horn believes these efforts are useless.</p>
<p>Facebook applications such as Farmville might not be the only thing they are working on using their Smartphones. As far as we know, they could be planning the same sorts of crimes for which they were sent to prison. The best example of an inmate continuing the criminal life through prison doors using a cell phone is Anthony Kidd. Kidd arranged the murder of his girlfriend from inside a prison in New Jersey. As technology improves and time passes, criminals get smarter. They think of new ways to get around the security systems the same way they think of other ways to commit crimes.</p>
<p>Since these inmates are getting smarter, how can the prisons keep these cell phones out? The security officials monitor the activities of the inmates to the best of their abilities, but they can’t watch the entire facility every second of the day. There has been talk of employing K-9 units to sniff out the cell phones inside the prisons. The dogs would be able to detect the ionization in the cell phone batteries. This may be effective in recovering some of the phones, but will it be available for use in all prisons?</p>
<p>Even the most watched inmates are finding ways to sneak phones in. Charles Manson had access to a cell phone. This man orchestrated several murders by simply convincing other people to commit them. Imagine what sorts of things he could be working on with this access to unlimited unmonitored calls.</p>
<p>For information on cell phones in prisons in general, go <a class="wp-oembed" title="CNN" href="http://www.cnn.com/2011/CRIME/09/06/prisoners.cell.phones/" target="_blank" rel="noopener">here</a> or <a class="wp-oembed" title="NY Times" href="http://www.nytimes.com/2011/01/03/us/03prisoners.html?_r=1&amp;pagewanted=all" target="_blank" rel="noopener">here</a>.</p>
<hr style="margin: 20px 0px 20px 0px;" />
<table width="620" border="0">
<tbody>
<tr>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #1 */ google_ad_slot = "2333158891"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[


// ]]&gt;</script></div>
</td>
<td>
<div align="center"><script type="text/javascript">// <![CDATA[
google_ad_client = "ca-pub-9320153290864720"; /* Crime Museum Bottom #2 */ google_ad_slot = "5286625297"; google_ad_width = 300; google_ad_height = 250;
// ]]&gt;</script><br />
<script type="text/javascript" src="https://pagead2.googlesyndication.com/pagead/show_ads.js">// <![CDATA[


// ]]&gt;</script></div>
</td>
</tr>
</tbody>
</table>
<p>The post <a href="https://www.crimemuseum.org/2011/09/12/prisoners-playing-farmville/">Prison Cell Phone Usage</a> appeared first on <a href="https://www.crimemuseum.org">Crime Museum</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.crimemuseum.org/2011/09/12/prisoners-playing-farmville/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Minified using Disk

Served from: www.crimemuseum.org @ 2026-04-14 04:30:00 by W3 Total Cache
-->