Of the 26 arrests, which were made public Friday, half were made sporadically following forensics testing on their computers or online chats in which they expressed "nasty" and "abnormal" sexual desires to an agent posing as a child. A lieutenant in the Radcliff (Kentucky) Police Department typed to an undercover deputy about his wish to impregnate a child, according to the sheriff’s office.
The individual in question was charged as follows:
Initially I was figuring this to be an honorable mention since there is no direct evidence of him having committed the crime while on duty. That said, his position of authority and trust allowed him the opportunity to exploit it at his wish. It was mostly by luck that he was caught prior to him exploiting that power. See my original post and note the following from the rules:
The person committed the crime while on duty, or his job provided access to commit the crime under color of law (see the pedophile above).
This is a bit more difficult since the pedophile could use his job to touch children without legal recourse by the definition of his job as defined by the state. The officer however does have a position of trust and authority that he can use to manipulate children. While his department certainly wouldn’t protect his actions like the TSA would, we have seen elsewhere that departments will protect their officers until there is public backlash. So with that I’ll let it stand as a member of the count. It is borderline and if you feel differently, feel free to explain your reasoning in the comments.
State Sponsored Criminal Count: 29
Because what else would an official from the state do to someone who has been told to unquestionably follow their orders.
Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms.
He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.