Police are still searching for a robber whose Halloween disguise helped her walk away with money from a Virginia Beach, Virginia, Bank of America. The woman walked into the bank wearing white face paint, a rainbow-colored wig, and a multi-colored clown costume and handed the teller a note demanding money. She was given the money, left the bank, and took a taxi instead of a getaway car. Police spokesman Don Rimer says police don’t know if the timing of the robber—the day before Halloween—was a factor in the woman’s success. Although she did not use a weapon or suggest she had one, police believe she may be armed and dangerous.
Woman Robs Bank Dressed as Clown
Police are still searching for a robber whose Halloween disguise helped her walk away with money from a Virginia Beach, Virginia, Bank of America.
More Technology

The University of Alabama Rolls Out Couter-Drone Technology
The University of Alabama is using D-Fend Solutions as a counter-drone technology supplier for campus and game-day airspace security. The University integrates D-Fend’s EnforceAir into its Emergency Operations Center (EOC), utilizing a unified command framework to collaborate with local, state, and federal partners during major events.
Read More →
Motorola Solutions Now Part of the Cyber Threat Alliance
Motorola Solutions is now part of the Cyber Threat Alliance, the first formally organized nonprofit group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries.
Read More →
Genetec 2026 State of Physical Security Report Reveals Public Safety Priorities & Challenges
Survey results from Genetec’s 2026 State of Physical Security Report highlight the demand for integrated systems that improve response times and reduce investigative workload. Nearly nine in 10 respondents said they use security data to help keep officers safe.
Read More →
Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool
Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.
Read More →
Panasonic Connect Launches the Toughbook 56
The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.
Read More →
Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions
Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.
Read More →
D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology
D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.
Read More →
Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security
With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.
Read More →
A police department’s guide to fleet management and vehicle health
Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.
Read More →
Public Safety Surveillance Technology: Built on Compliance and Trust
ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.
Read More →