Skip to main content

MRPD Calls for Service Report: March 21-22

Date
Time
Incident Type
Location
03/21/2018
08:04
PREMISE CHECK
2300 block Varnum St
03/21/2018
09:00
ASSIST
1 Municipal Pl
03/21/2018
09:35
ACCIDENT
Shepherd St / 28th St
03/21/2018
09:46
PROPERTY ALARM
3200 block Queens Chapel Rd
03/21/2018
10:39
PREMISE CHECK
3000-3100 blocks Chillum Rd
03/21/2018
12:44
WIRES DOWN
30th St / Taylor St
03/21/2018
15:45
911 DISCONNECT
3500 block Bunker Hill Rd
03/21/2018
15:46
ASSAULT
2500 block Queens Chapel Rd
03/21/2018
15:53
ASSIST
2500 block Queens Chapel Rd
03/21/2018
17:35
PARKING ENFORCMENT
4500 block 32nd St
03/21/2018
18:55
DOMESTIC
25th Ave / Arundel Rd
03/21/2018
19:04
911 DISCONNECT
4500 block 34th St
03/21/2018
19:53
PARKING ENFORCMENT
4500 block 32nd St
03/21/2018
22:44
T - Traffic Stop
3200 block Queens Chapel Rd Sb
03/21/2018
23:03
T - Traffic Stop
3100 block Queens Chapel Rd Sb
03/22/2018
05:53
HOUSE FIRE
3400 block Eastern Ave

Comments

Popular posts from this blog

Boston Marathon/West, Texas Spam Campaigns

There is a new spam campaign in circulation using the Boston Marathon bombings that occurred on April 15, 2013 as a lure. Users are sent an e-mail encouraging them to a watch a video of the explosion. When the user clicks on the enclosed link to watch the video malware is installed on the user’s computer.   The following URL patterns have been found in these e-mails: http://[IP-address]/boston.html   http://[IP-address]/news.html   When the user clicks on one of the links the Kehlios worm is installed on the user’s system which has the capacity to send spam; carry out Distributed Denial of Service Attacks; and steal online currency such as bitcoins. Most major anti-virus vendors have signatures for detecting this malware so users should keep their antivirus programs up-to-date.   In addition to the Boston Marathon spam campaign, a West, Texas plant explosion spam campaign has also sprung up. This spam campaign uses similar exploitation techniques as the Boston Marathon spam campaign p

The Risks of Connecting Devices to Public Charging Stations

The following information  comes courtesy  of the  New Jersey Cybersecurity & Communications Integration Cell Public cell phone charging stations supplied with power cables or USB ports located in stores, airports, libraries, and schools may seem like a convenient way to charge your mobile devices on-the-go, but can you be sure that your device and data will be safe if you connect? These kiosks can contain concealed computers that attempt to extract data such as contact information, photos, and videos from connected devices, unbeknownst to the users. Additionally, malicious or compromised charging stations can expose devices to the risk of a malware infection. Even if the charging station isn’t malicious, the manufacturer or owner of the kiosk may require users to input their email addresses or phone numbers in order to charge their devices, potentially exposing them to unwanted marketing campaigns, spam emails, and scam calls. The NJCCIC recommends ensuring your d

Police Report: May 8-11

Friday May 8th : 3400 block of 11 Newton Street : At about 2 pm officers responded for the report of a woman who had been assaulted by her boyfriend. The boyfriend allegedly punched the woman in the mouth and choked her. She told the officers that she did not want any police assistance and refused to tell the officers what had occurred. She was referred to the District Court Commissioner if she decided to press charges at a later time. Saturday May 9th : Nothing significant to report. Sunday May 10th : 4500 block of Eastern Avenue (BP station) : At about 11 am officers responded for the report of a stolen auto. The officers met with the victim/owner who told them that he left the keys to his 2002 Lincoln on the front seat when he went inside to pay for gas. When he came out of the store he saw his Lincoln being driven up Eastern Avenue towards Rhode Island Avenue by a black male (no further description). A check of the area for the stolen car proved negative and a lookout for it was gi