Easily distracted by music and wine poster
Buy this product here: Easily distracted by music and wine poster
Home page: Beutee Store
A Blair County jury concluded Wednesday that an Altoona man was the driver of a minivan who, in 2015, led police on a 5-mile chase from Altoona into Logan Township, ending with a fiery crash off Grandview Road. The jury deliberated about 90 minutes to convict Troy S. Stehley, 39, on charges of fleeing and eluding police, possession with intent to deliver cocaine, possession with intent to deliver bath salts, recklessly endangering another person, and four counts of possession linked to heroin, Easily distracted by music and wine poster cocaine, bath salts, and drug paraphernalia. The jury acquitted Stehley on the two most serious charges, possession with intent to deliver heroin and possession of a firearm with an obliterated serial number, a second-degree felony.
Judge Daniel Milliron, who presided over the three-day trial, set Stehley’s sentencing date for March 5. Until then, Stehley will remain incarcerated at the State Correctional Institution in Huntingdon, where he is currently serving time on other offenses. First Assistant District Attorney Pete Weeks said that in light of the convictions, he expects the judge to impose consecutive sentences to lengthen Stehley’s incarceration. Stahley's defense attorney, Richard Corcoran, said he was pleased with the jury’s acquittal verdicts, especially on the gun charge, and will consider appeals on the convictions. Corcoran already has appeals pending on Easily distracted by music and wine poste rStehley’s behalf with the state Superior Court, based on a June trial where he was convicted of illegal possession of a handgun and possession of a handgun without a license. Those two charges, also filed in connection with the March 29, 2015, chase and crash, were severed so the jury could be told that Stehley was a convicted felon who is not allowed to possess a handgun.
Weeks said he respects the verdicts the jury rendered Wednesday and recognizes that possession of a gun with an obliterated serial number carries a high burden of proof. In the judge’s instructions to the jurors, Weeks said, he told them that they would have to be convinced that Stehley knew the gun had an obliterated serial number. Trial testimony left no doubt that the gun’s serial number had been destroyed. It also recognized that Stehley’s DNA had been found on the gun, along with the DNA of others. Stehley had “reason to have the gun,” Weeks said, because he had $3,000 to $5,000 worth of illegal drugs with him on the night of the crash, along with $890 in cash. Stanley testified that he knew nothing about the gun found a few feet from his body at the crash site. He also tried unsuccessfully to convince the jury that he was a passenger in the minivan and that another man was driving. Police found no evidence of another person in the minivan. Easily distracted by music and wine poster.
Banking fraud is an unfortunate fact of life these days. At some point when reviewing your monthly checking account statement or online activity, you may notice a purchase you didn’t make. What should you do next? If you find any unauthorized transactions have occurred in your checking account, it’s important to handle the situation right away. When fraud involves a debit card rather than a credit card, the process can be a bit different. How Did Someone Else Get Access to Your Checking Account? There are a number of ways criminals can get their hands on your checking account information. It’s possible that you lost your card and the wrong person found it. Criminals Easily distracted by music and wine poster also set up card skimmers and hidden cameras to steal your account number and PIN at places like ATMs and gas pumps. Sometimes, however, account holders accidentally give their personal information away. “Social engineering is one of the most effective ways to gain access to a bank account,” says Jason Ioannides, manager of solutions consulting at Alloy, a financial technology firm that helps banks automate customer verification and identification. According to Ioannides, this is when a bad actor reaches out to a prospective victim and appears to be an authority figure.