Janell Louisa, 36, was arrested after she allegedly took a purse from a
Staten Island bowling alley after that used the card inside, prosecutors said.
DONGAN HILLS — A woman took a purse from a Staten Island bowling street after that utilized the card inside at an alcohol shop, prosecutors stated.
Janell Louisa, 36, presumably swiped the purse of a 19-year-old lady while inside Rab's nation Lanes, at 1600 Hylan Blvd., at about 1:45 p.m. July 2, prosecutors stated.
In the case were two iPhone 6 phones and a debit card, which Louisa always invest $25.03 at an alcohol store and $53.39 at an automobile store later on that time, prosecutors stated.
Louisa had been arrested on July 15 and faced with grand larceny, criminal ownership of stolen residential property and petit larceny at the woman arraignment, based on the Staten Island District lawyer's office.
Her bail ended up being set at $5, 000 and she actually is due back in court on Thursday, relating to on line court public records.
Louisa was once arrested in January and July and faced with unlawful ownership of a controlled compound, according to court records.
Share this article
Glever is an AI based resume writing service . It can help you write, and thus you can finish a resume in a few minutes
BeyondTrust is pleased to announce the availability of Retina Network Security Scanner (RNSS) version 6.1! This release adds basic IPv6 scanning support for SCAP (benchmark) scans. networksecurityscanner-blog With this enhancement, you are now able to manage SCAP scans in both a blended IPv4/IPv6, and a pure IPv6 environment. Retina’s SCAP Job Wizard has been enhanced with a new option to allow users to enter IPv6 addresses.
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions. Blackberry PGP PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a user name or an e-mail address.