Masked Man Robs Convenience Stores With Klingon Sword

Majin Boo

Superhero
Joined
Nov 11, 2003
Messages
5,038
Reaction score
0
Points
31
COLORADO SPRINGS, Colo. -- Colorado Springs police are looking for a man who hit two 7-Eleven convenience stores early Wednesday, armed with a Klingon sword.

The first robbery was reported at 1:50 a.m., at 145 N Spruce St. The clerk told police a white man in his 20s, wearing a black jacket, blue jeans and wearing a black mask, entered the store with a weapon the clerk recognized from the Star Trek TV series.

The robber demanded money and left with an undisclosed amount.
half hour later, police received a call from a 7-Eleven at 2407 N. Union Blvd., where a man matching the previous description entered the store with a similar weapon. He also demanded money from the store clerk. The clerk refused and the robber ran off.

Both clerks described the weapon as a Star Trek Klingon type sword, called a "Batleth."

Neither clerk was injured in the robberies.
 

Attachments

  • 18637186_640X480.jpg
    18637186_640X480.jpg
    32.9 KB · Views: 12
hahahahah!!

The robber was then stopped when one of the clerks used a phaser on him...
The Federation was pleased....
 
Jesus Christ, Worf!

1332605547_b0a5f2305e_o831.jpg


I knew times were tough but if you needed money all you had to do was ask...
 
:facepalm <- Most appropriate for a Trekkie thread.
 
Idiot. A lirpa would've been much more effective.

I bet he measured how long it would take to make his getaway in parsecs as well. ****in' dork.
 
Last edited:
Please tell me he hummed the Star Trek fight music while he robbed the store too and the clerk screamed Khan after he ran off.
 
Did the clerk bang a green chick after?
 
I bet this is all a publicity stunt for the new Star Trek film...
 
<This worthless coward dares use ancient battle arts to steal currency! The shame and dishonor abounds!*>

*Translated from Klingon
 
Amazing part is, the clerks were the ones to identify the weapon.
 

Users who are viewing this thread

Back
Top
monitoring_string = "afb8e5d7348ab9e99f73cba908f10802"