police

May 4, 1970 - The Kent State Riots - Massacre or Mislead by the Media?

May 4, 1970 – The Kent State Riots – Massacre or Mislead by the Media?

May 4, 1970 – The Kent State Riots – Massacre or Mislead by the Media? 1200 781 Jason Stadtlander

What they don’t tell you is that the students struck first.

“May 4, 1970 was a day that I will never forget,” begins my father, Pete Stadtlander with a story that I have heard so many times growing up. He is beginning to tell his story about the riots and shootings that occurred as he stood in his woodshop class in Van Duesen Hall, which faced the Commons at Kent State University. He has had told me many times over the years how he and several of his friends snuck to his car by the stadium by crawling from under car to under car to avoid State Police locked arm in arm sweeping people into the Commons after the shootings. How he had eventually made it to his car and began driving home to Mantua but while driving through Ravenna had a rock thrown at his window because he had a Kent State sticker on his window. But this time, when I am now almost forty-five, for some reason he chose to go into much more detail than I have ever heard before.

MAY 4, 1970 – THE KENT STATE RIOTS – MASSACRE OR MISLEAD BY THE MEDIA?He continued, “I remember working in my advanced woodshop class and at some point, the people outside were louder than our equipment. That’s when we shut it all off and opened the garage door on the Commons.

Let me also point out, that there were a handful of people in thier late twenties that were not what I would call real students. They were people who supposedly took classes but spent most of their time hanging around campus in the cafeterias with people gathered at their tables. They were the ones that were good at leading people to do what they wanted them to and they were never the ones in the middle of the crowds. They always stood at arm’s length letting the kids do the dirty work.

MAY 4, 1970 – THE KENT STATE RIOTS – MASSACRE OR MISLEAD BY THE MEDIA?The National Guard had stated earlier ‘No assembly on the commons. No more than a hundred students are allowed to gather in one place.’ after the students had set fire to the ROTC building. Well, there were at least a hundred people out in the commons when we opened that door and they were joined by fifty more, then a hundred, then four hundred and before I knew it there were a couple of thousand students gathering on the grass chanting and yelling as there frequently were during the [Vietnam] war. There were perhaps a thousand National Guardsman and another thousand State Police. That’s when I saw the kids coming in from different points on the commons, hundreds, then on the other end, I saw several thousand students flatten a huge hurricane fence at once. They toppled it as if it were nothing but paper and marched across it to join the main body of students already on the Commons. It was scary as hell to watch.

The media will tell you how the National Guard opened fire on the students, how they couldn’t control the situation and chose instead to shoot a bunch of kids.” My father paused, and this was when the story begins to take on a different color than it ever had before, “What they don’t tell you is that the students struck first. I stood there watching as students that had climbed to the top of several of the dorms began to hurl concrete blocks from the tops of the Stouffer Hall and Taylor Hall [dorms] at the Guardsman below. I even saw them throwing railroad ties off the top of the building! Railroad ties! Can you imagine that? Do you know how much a railroad tie weighs?”

“I’m not sure.” I respond, shocked at the story.

“Two hundred pounds. Imagine that you are tasked with protecting the university from riots, you are just kids yourself trying to serve your country and you see bricks and railroad ties coming at you from above. Tell me that wouldn’t freak you out and piss you off? ” he took a breath, “These men were going to be slaughtered. They opened fire not to control the crowd but in self-defense. It could not have been more clear.

Yet the media twisted it and they ended up indicting eight of the Guardsman. They all were acquitted, but I couldn’t believe that they even charged them with this. It was absurd.

One of the Guardsman [Ralph Zoller] that was indicted was a very friend of mine from Mantua. The Zollers owned a pharmacy in Mantua. His brother [Bob Jr.] was hit with a mortar in Vietnam shortly after and brought back in a plastic bag. His name is on the wall. That family endured far more than any family should. It shattered them.

History is in the eye of the beholder. I’m not recounting things I read about or heard about. I’m just telling you what I saw with my eyes on that day back in 1970.”

To Catch a Thief – How CyberCrime is Stopped

To Catch a Thief – How CyberCrime is Stopped 150 150 Jason Stadtlander

It’s a question that I am asked at least once every few months, “How exactly do authorities catch cyber criminals?”

It’s also a question that isn’t so easy to answer. Cybercrime (like many crimes) are dynamic in their attack as well as execution to capturing them. However there are a few standards that are followed when authorities get a search warrant or are investigating a cybercrime.

Stopping CybercrimeSeizure of logs and details online / phone / etc.

One of the first tasks performed is to confiscate all data containing electrical equipment (Desktops, Laptops, Tablets, Phones, iPods, DS, etc.). Equipment seizure is not as simple as shutting everything down, pulling the wires and taking it with them however. They must first capture the memory of the device – that part of the computer that holds everything in a temporary space while it is operating. Once shut down electronics clear the memory and everything that is running is lost forever. Hard data (on the hard drive, USB drives, etc.) is another matter, but if a computer is shutdown that hard data will not be affected. So, the first thing a cyber-crime investigator will do is use a special program in conjunction with a special device to capture that memory for analysis and cataloging at a later date.

Pulling data from Internet service providers (ISP) and social websites

If an ISP is involved, which it almost always is, investigators will collect the unique number that all users are given; IP Address along with as many details as possible that the ISP may contain. Most ISPs are required by law to retain logs of who has what IP address and even some of their browsing activities for an established amount of time. Investigators will also contact social websites such as Twitter, Facebook and Instagram to request logs, photographs and details from the sites concerning the suspect’s activities. This is often a difficult and laborious process as social websites usually prefer to maintain a level of privacy for their users, regardless of their activities. The sites will often push the letter of the law to the edge to protect themselves.

Cataloging and entered into evidence

Computers are then taken back to a lab for analysis and cataloging just as other evidence might be. There are special programs such as Forensic Toolkit (FTK), that investigators use to catalog every byte of data so that it can be used in court showing; when the data was created, who created it, when it was last modified and where it came from. If a hard drive shows evidence of mass deletion or formatting, they may use a program to do a deep disk analysis which can recover deleted data after a perpetrator has formatted the drive.

All of this allows the district attorney to gather evidence against the suspect. Investigators have to be extremely careful as defense attorneys will take any hole in the evidence to sway a juror in their direction. Investigators also want to ensure that the person being suspected of the crime is actually guilty and that the evidence wasn’t just put there maliciously by someone else.

Presentation in court

Cyber investigators will then be called in to appear in court, testifying on the data that they collected, where it was collected and how it connected the dots to lead investigators to believe beyond a shadow of a doubt that the suspects are guilty.

Back to top