About a month after the death-penalty verdict, a few jurors indicated to the Kansas City Star that they hadn’t had much difficulty in recommending Robinson for execution. It might have made a difference, they said, if one or more of the defendant’s children had come into the courtroom during the sentencing phase and asked them to spare their father’s life, but that hadn’t happened. During their first set of deliberations, a couple of jurors had taken the opportunity to examine the evidence more closely and to handle the yellow barrels for themselves. They’d wanted to see how much the barrels weighed and if one person could move them by himself, even if it contained a body. The jurors were satisfied that one man could do this alone. The jurors also talked about how hard it had been for them to watch the video of Suzette Trouten and Robinson in the motel room; even with their eyes closed, the sounds and words were still terribly disturbing. The group that had sat in judgment of Robinson had bonded during this ordeal, and with their work as a jury done and the holidays approaching, they’d made plans to get together outside the courtroom.
By now autumn had descended on eastern Kansas. The damp fog had given way to cold, driving rains that knocked the last leaves off the branches and turned the fields into standing bodies of water and mud. The rain came down in sheets and made the land seem grayer and more open all the way to the horizon. Winter was coming fast. The naked limbs of the elms down by La Cygne had dropped their big cocoons holding the webworms—the maggotlike creatures were at last gone for the year and would not return until next summer. Everything in the countryside that had not yet died was about to. The snows would soon fall and cover the rolling landscape with a blanket of white.
Appendix A
Back in the late 1980s, Donna Rice gained national notoriety and unwanted fame when the notorious photo of her sitting in then presidential candidate Gary Hart’s lap was flashed around the world. The scandal eventually died down and Rice went on to marry someone else and change her name to Donna Rice Hughes. With the emergence of the Internet, she became one of the leading crusaders in the fight against child pornography. She regularly appeared on TV and spoke passionately about the problem, she wrote at length about it, and she created a Web site called protectkids.com. She became an expert on cyber-behavior and put together statistics on the subject, accumulated from many different sources. The numbers and the sources, which are available on her Web site, reveal the effect of the Net on many American households. Some of the findings include:
On-line pornography was the first consistently successful e-commerce product.
In excess of forty thousand individual URLs contain child pornography, pedophilia, and pro-pedophilia content.
According to Nielsen//NetRatings, 17.5 million surfers visited porn sites from their homes in January 2000, a 40 percent increase compared with four months earlier.
Thirty percent of all unsolicited e-mails contain pornographic information.
Web surfers spent $970 million on access to adult-content sites in 1998 and this number is expected to rise to more than $3 billion by 2003, according to the research firm Data monitor.
Cyber-porn—including videos and accessories ordered on-line—accounted for 8 percent of 1999’s $18 billion e-commerce sales.
Fifty-three percent of teens have encountered offensive Web sites that offer pornography, hate, or violence. Of these, ninety-one percent unintentionally found the offensive sites while searching the Web.
Sixty-two percent of parents of teenagers are unaware that their children have accessed objectionable Web sites
Pornographers disguise their sites by using “stealth” sites. These can use common brand names such as Disney, Barbie, and ESPN and are designed to entrap children.
The bulk of teenagers’ on-line use occurs at home, immediately after school, when working parents are not at home.
Students are most at risk for cyber-sex compulsions due to several factors: greater access to computers, more private leisure time, and increasing sexual awareness and experimentation. Those teaching computer classes need to be aware of this vulnerability and institute prevention strategies.
Sixty percent of all Web site visits are sexual in nature.
Sex is the number one searched-for topic on the Internet.
Twenty-five million Americans visit cyber-sex sites one to ten hours per week; 4.7 million Americans visit these sites more than eleven hours per week.
Of all born-again Christian adults in the United States, 17.8 percent have visited sexually oriented Web sites.
Sixty-three percent of men attending Men, Romance & Integrity seminars admit to struggling with porn in the past year. Two-thirds are in church leadership and 10 percent are pastors.
Appendix B
Here are my tips for helping adults and kids avoid the dangers of online predators. For adults they include:
Do not give out personal information about yourself or anyone else on-line.
Become more computer literate and Internet savvy. It’s important for those who want to explore in cyberspace to educate themselves about Net lingo and rules of conduct—the so-called Netiquette.
Certain words and symbols mean very specific things in cyberspace and have strong sexual connotations. Stalkers can identify the innocent and the naive (or “newbies”) by their lack of Net sophistication and will regard them as prey.
Avoid a physical description of yourself in your on-line profile. When going into a chat room, you should choose a genderless screen name. Don’t flirt on-line unless you’re prepared for the consequences.
If a situation becomes hostile, log off or surf elsewhere. Don’t confront the offender yourself, as this only escalates the problem.
Save any offending messages and report them to your service provider. Report any attacks or threats to police.
If you agree to meet someone offline that you’ve met online, take along a friend and always meet in a public place.
When making on-line purchases, make sure a Web site has a stated privacy policy about not giving out your e-mail address or personal information to other companies or individuals.
Be appropriately skeptical of virtually everything that you read on-line. Make certain the Web site or organization you’re interacting with is legitimate.
No e-mail is private unless it’s encrypted. Never put anything on an e-mail that you wouldn’t put on a postcard.
Block personal messages from people you don’t know.
Participating in a chat room greatly increases your chances of receiving unsolicited pornography. Without the filtering technology to prevent this, it will come in regularly.
Here are some tips adults can share with children:
Never give out personal information (such as name, age, home address, phone number, school, town, password, schedule, or your picture) or fill out questionnaires or any forms on-line.
Never meet in person with anyone you have met on-line without mom and/or dad present.
Do not enter a chat room without mom and /or dad’s presence or supervision. Some “kids” you meet in chat rooms may not really be kids but adults with bad intentions. Remember—people on-line may be very different from who you think they are.
Be suspicious of anyone who tries to turn you against your parents, teachers, or friends. They may have a hidden agenda.
Never respond to or send e-mail or instant messages to new people you’ve met on-line. Talk to your parents first so that they can check out the situation. Never engage in an on-line conversation that makes you feel uncomfortable; log off and tell your parents. If you get such a message, DO NOT respond. Sending a response only encourages the person. Instead, show it to your parents and let them handle it.
Use Control-H while browsing the Web to see a list of Web sites that have been accessed by your computer in the last few weeks. This can help you determine if your child is visiting any dangerous sites.
Install filtering software like CYBERsitter, CyberPatrol, or Net Nanny. The software costs about $50
and acts as a digital chaperon, blocking any inappropriate content. These programs work by checking which sites your child visits against a list of disapproved sites, compiled by the makers of the software.
Install software that will actually record images of every Web site that your child visits. The software won’t stop them from accessing sites, but it will let you know if you have a problem. For truly concerned parents (or employers), you can now buy Investigator, which allows you to track every mouse click made by your child when on-line. It reads secret passwords, records everything that has been deleted, catalogs Web sites that have been visited, shows credit card usage on the Internet, and can even tell you what your child purchased. At present, it is the most sophisticated software yet created to spy on those in cyberspace.
Be a part of your children’s on-line lives as well as their off-line ones. Talk to your children about what sites they visit, whom they communicate with, and who are on their buddy lists. No software will ever be a substitute for being an active parent.
Acknowledgments
from John Douglas
I wish to thank my long time editor Lisa Drew for her support in writing this book. Additionally, her assistant, Erin Curler, has made the publication process run smoothly. Also, a nod to my agent, Jay Acton, who helps keep me on the straight and narrow.
Acknowledgments
from Stephen Singular
My wife, Joyce, was instrumental in the whole process of putting this book together. Before we had a contract with Scribner, Joyce attended legal proceedings in Kansas City for the case, she did research about the Internet, she conducted interviews with people, she was in attendance at parts of the trial, and she helped shape certain areas of the manuscript that were tied to very complicated forensic testimony. She was an important part of transferring that testimony into clear and readable sections of the book. Her help was especially critical near the end of this long process—at crunch time. I would also like to thank our editor, Lisa Drew; my agent, Reid Boates; Gerald Hay of the Olathe Daily News; and Sarah Hitt of the Lyndon (Kansas) Public Library.
Index
adoptions, illegal
Advanced Research Projects Agency (ARPA)
Amadi, Mildred
American Registry of Radiologic Technologists
America Online
Anderson, John, III
antisocial personalities
ARPAnet
Ashcroft, John
Atlanta, Ga., child murders in
autopsies
Back Care Systems
Bales, Robert
Barker, Kate “Ma,”
Belton, Mo.
Berkowitz, David
Berlin Associates, Ltd.
Berrigan, Patrick
Bible
Big Pine Key, Fla.
Billam, Jason
“Bill Summers,”
bin Laden, Osama
Birthright
Blattner, Irvin
Blue Valley Sheltered Workshop
Bondage-Discipline-SadoMasochism (BDSM)
Boniedot, Jennifer
Bonner, Beverly
alimony checks of
disappearance of
letters supposedly written by
murder of
remains of
Robinson’s relationship with
Bonner, William
bootlegging
Bowersock, Charlotte
Boyer, Jack
Boy Scouts
Brooks, Pierce
Brown, Dave
Brown, John
Brown, Julia
Brownback, Sam
Bundy, Ted
Burchett, Wayne
Burgess, Billy Charles
Bush, George W.
Business Journal
cadaver dogs
Cahal, Mac
Capone, Al
Capone, Frank
Capote, Truman
Carter, Rosalynn
Cass County, Mo.
Catholic Charities
Central Intelligence Agency (CIA)
Chicago Tribune
children:
Internet use by
kidnapping of
in pornography
sexual abuse of
Children’s Mercy Hospital
Cicero, Ill.
City Union Mission
Civil War, U.S.
Clampitt, Catherine
Clampitt, Ryan
Clay County Courthouse
Clay County Jail
Clinton, Bill
Club, the
Clutter family
Cody, William F. “Buffalo Bill,”
Collins, Eric
computers:
“autopsies” of
firewalls for
mainframe
passwords for
personal
Robinson’s interest in
Robinson’s ownership of
viruses of
see also Internet
Constitution, U.S.
contracts, slave
Control-H command
Cornwall, Carl
Cox, Alecia
Crawford, Denise Voigt
crime:
clearance rate for
disorganized
evidence of
jurisdictional issues in
mixed
organized
white-collar
crime labs
criminals:
common
confessions by
interrogations of
personalities of
profiling of
unpredictable behavior of
Crossroads Shopping Center Mail Room
Customs Service, U.S.
CyberPatrol
CYBERsitter
Dallas
Dalton gang
Dancer, Jeffrey
data recovery
Davis, Bob
Davis, Scott
Defense Department, U.S.
Democratic Missourian
de Sade, Marquis
disabled individuals
Dixon, David J.
Dixon, Larry
DNA evidence
dot-com businesses
Douglas, John
Drug Enforcement Administration U.S.
drug trafficking
Elizabeth II, Queen of England
Elledge, Marty
e-mail:
deletion of
personal information contained in
Robinson’s use of
safety precautions for
Encase program
Enough Is Enough
Equi-II
Equi-Plus
Evans, Ron
Extended Stay America
Faith, Debbie:
disappearance of
medical disabilities of
murder of
personality of
remains of
Robinson’s relationship with
Social Security payments for
Faith, John
Faith, Sheila
disappearance of
letters supposedly written by
murder of
remains of
Robinson’s relationship with
Farley, Michael
Farm Journal
“Father Martin,”
Federal Bureau of Investigation (FBI):
Behavioral Science Unit of
child pornography investigated by
Robinson investigated by
serial killers investigated by
white-collar crime investigated by
Federal Cyber Service
Ferguson, Ronald L.
Fields, Gracie
Finegan, Michael
First Blood
Floyd, Pretty Boy
forensic evidence
Fountain Plaza X-Ray
Fourth Amendment
Freeh, Louis J.
Fun with Home Hobby Hydroponics
Ga
cy, John
Gaddis, Karen
“Gang Show, The,”
Garland, Judy
Glines, Jean
Godfrey, Bill
Godfrey, Paula
Goldman, Ron
Gorean sadomasochism
Graham, Wallace
Grant, Mary
Grant, Retia
Green, Debra
Greshem, Evi
Grissom, Richard, Jr.
Guest House Suites motel
Guy’s Foods
Gwartney, Steve
Habitual Criminal Act
Hamilton, John
Hansen, Robert
Hari (Trouten’s dog)
Harpers Ferry raid (1859)
Hart, Gary
Hartlein, John
Hayes, Jennifer
Haymes, Steve:
background of
FBI contacted by
as parole officer
Robinson as viewed by
Robinson file compiled by
Robinson investigated by
Robinson’s adoption scam investigated by
Robinson’s arrest and
Robinson’s contacts with
Robinson’s grudge against
Hazelwood, Roy
Hickock, Dick
Hickok, James Butler “Wild Bill,”
Hoang, Ky
Holbert, Ginny
Holmes, Cora
homicides
Hope House
Houdek, Bruce
Howell, William
Hughes, Donna Rice
Hughes, Harold
Hutcherson, John
Hutchinson Correctional Facility
Hydro-Gro, Inc.
hydroponics
Ibarra, Carlos
In Cold Blood (Capote)
Internal Revenue Service (IRS)
International Association of Computer Technologists
International Council of Masters (ICM)
Internet:
chat rooms on
children as users of
criminal activities on
cyber-investigations of
development of
e-mail used in, see e-mail
as escapist pastime
false identities used on
Anyone You Want Me to Be Page 31