You Ought to be in Pictures

Rosenblatt, Roger
October 1977
New Republic;10/1/77, Vol. 177 Issue 14, p45
Book Review
Reports on the arrest of imposter Oscar E. Kendall. Accusations made against Kendall; Strategies employed by him to cheat people; Victimization of several innocent women by him; Information on rape of a female by Kendell in a hotel room in 1974; Report on the women escaping from the hotel room; Focus on Kendell trying to defend himself by saying that he was someone else at that time.


Related Articles

  • The Rascals Who Impersonate Me. Wylie, Philip // Saturday Evening Post;3/21/1959, Vol. 231 Issue 38, p31 

    Presents information on the author who describes the jams he gets into when impostors woo women or sign checks while using his name. Discussion on how the ideal subject for an impersonator is a minor celebrity in a major field; Focus on how in order to be the subject of imposture one has to be...

  • The Impostor Syndrome. Moon, Tom // Outlook Weekly;2/21/2008, Vol. 12 Issue 34, p15 

    The article focuses on the impostor syndrome. This is the consistent feeling of a person that what he is doing is just a front and that it is not what they really are. They often attribute their success due to a stroke of luck and that this can be easily taken away from them at any time once...

  • Watch out for fuel card fraudster.  // Commercial Motor;1/13/2005, Vol. 201 Issue 5111, p7 

    Reports on the warning issued to truck operators regarding a fuel card fraudster who poses as a truck driver in Great Britain. Account of John Kendall, an executive at haulage contractor Sandy Bruce Trucking, on the scam; Description of the impostor.

  • Fake TV Producer Gets Year in Jail. Sheward, David // Back Stage East;12/14/2006, Vol. 47 Issue 50, p6 

    The article reports that Joseph Medawar was sentenced to a year in prison for fraudulently claiming to be producing a government-supported television show about the U.S. Department of Homeland Security. He pleaded guilty to tax evasion and conspiracy to commit mail and wire fraud. He also...

  • Internet Hoaxes: Don't Believe Everything You Read. Kowalski, Kathiann M. // Odyssey;Dec2000, Vol. 9 Issue 9, p34 

    Discusses several Internet hoaxes, including computer virus, emotional appeals, pyramids and urban legends.

  • Telephone scam artists target Buchanan Dam. Hatt, George // Burnet Bulletin (Texas);12/24/2008, Vol. 136 Issue 52, p12A 

    The article reports on the telephone scam involving fake solicitors who claim to raise funds for the Buchanan Dam Volunteer Fire Department.

  • Identity Theft: The Pros and Cons of Identity Scoring vs. Credit Monitoring. Collins, Jim // Business Journal (Central New York);8/1/2008, Vol. 22 Issue 31, p10 

    The article discusses identity theft. The Identity Theft Resource Center, a nonprofit organization which focuses on the understanding and prevention of identity theft, defines identity theft as a crime wherein an impostor obtains important pieces of personal identifying information, such as...

  • THE INVISIBLE AGENCY. Hay, Jacob // Saturday Evening Post;2/7/1959, Vol. 231 Issue 32, p35 

    Narrates the story of Ben Wattress, an ordinary citizen and reporter who invented the U.S. Inland Security Board. Impression of the author on Wattress' ingenuity; Factors contributing to the discovery of Wattress' fraudulent act; Evidences supporting the notion that Wattress' girlfriend connived...

  • UNDERSTANDING IDENTITY THEFT.  // Identity Theft Repair Kit;Jan2007, p1 

    The article focuses on the protection from identity theft. It says that identity theft starts when a stranger gets hold of identifying information of someone including social security number, address and date-of-birth. It cites that use credit cards on a trusted internet site only, keep the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics