Language Selection

English French German Italian Portuguese Spanish

Defense Planting Seeds of Doubt; Is the Reiser Son to be Believed?

Filed under
Reiser

The Hans Reiser defense on Thursday zeroed in on the case's only eyewitness -- the Linux programmer's 8-year-old son: A child psychologist took the stand in a bid to convince jurors that the boy, when he was 6, saw his mother Nina Reiser walk out of the Oakland hills house where prosecutors said she never left alive.

The boy, the only witness in the case who was at the scene of the alleged crime when her mother vanished, has said repeatedly to the police and during a preliminary hearing outside the jury's presence that he saw his mother leave the house. But in November, while in front of the 12-member jury here, he never directly said he saw his mother leave.

On the stand was Michael Fraga, a child psychologist who reviewed the transcripts of the six different interviews the young son gave to jurors and to the authorities about that Sept. 3, 2006 fateful day. (Fraga concludes that the "predominant theme" of seeing the mother leave should be given "credibility.")

Here is what Fraga said about children's thoughts:

More here

Also: Hans Reiser Trial: Feb. 28, 2008




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News