SSCC #566: Kern County

The victim reported that two deputies went to her home in the Tehachapi area at about 11:00 p.m., to investigate a burglary involving a man who was at her home. 

While speaking to deputies in her home she was handcuffed and led into a room by one of the deputies to be searched.  While being searched she was sexually assaulted by the deputy, according to reports.

Violated not once but twice.  First by the criminal who stole her property and then by the agent of the state sent there to investigate the crime.  This isn’t the first time something like this has happened either.

Not only that but he returned and assaulted her again.

State Sponsored Criminal #566: Gabriel Lopez

Because when a woman reports a crime you can just commit one against her yourself right?

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms. He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.

About Barron

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms. He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.
Tagged , , , , , , , . Bookmark the permalink.

Comments are closed.