Select a language:
Showing: 6681 - 6690 of 12347 results

August 1966 Robert Lee Nusbaum

In August 1966, 41-year-old Robert Lee Nusbaum was a victim of homicide in his home on Huber Street in Anaheim.   Around 11:15 a.m. on Aug. 13, 1966, a friend stopped by Nusbaum’s…

May 1980 Dorothy Jane Scott

In May 1980, Santa Ana Register City Editor, Pat O. Riley received a phone call from an anonymous caller. “Dorothy Jane Scott…she was my love. I caught her cheating with another man…she denied…

February 1981 Lee Ray Rowland

On Feb. 22, 1981, Lee Ray Rowland was discovered lying face down on his bed by his parents. The 30-year-old was pronounced deceased a few moments later.  Rowland’s parents went away for…

December 1985 Michelle Marie Sagel

On December 7, 1985, the Sheriff’s Department was notified around 7 a.m. about a blue nylon bag with a possible body inside located on the side of Jeffrey Road in North Irvine.   A…

October 1984 Darrell Attardo and Stephanie Anderson

On Oct. 30, 1984, 25-year-old Darrell Attardo and 20-year-old Stephanie Anderson were found deceased in a small home on 9th street in Sunset Beach by Sheriff’s Department investigators. …

May 1987 Joe Luis Avila

In early May, 1987, restaurant owner Joe Luis Avila was found shot to death in his black 1985 Porsche Cabriolet Carrera.   He left his “El Ranchito” restaurant on Mesa Drive and Irvine…

Orange County ClerkRecorder Now Hosting Virtual Wedding Guests in Ceremony Rooms

Have you checked your e-mail or text messages? Someone is getting married, and you’re invited! Can’t make it? No problem! Starting Saturday, October 21, 2023, 10 a.m. to 3 p.m., Clerk-Recorder Hugh…

Social Engineering

The term "social engineering" refers to an attempt to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals. Most users should…

What is Identity Theft

Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume your identity, often…

Cyber Secure your House

Most workplaces have cyber security policies, processes, and technologies. You can create a more cyber-secure environment at home by implementing similar strategies. Policies - At home, agree as a…