Lookup Oklahoma Inmates and Records in Wagoner County. Jail Roster Includes: Arrest No. Charges, Disposition, Arrested Date, Arresting Agency, DOB, Physical Description

Looking For A Licensed Bail Bond Agent in Wagoner County?

Wagoner County Bail Bonds

home Wagoner, OK, USA
phone (918) 485-2663

Reviewed from Google

5 out of 5 stars

Kate Warner
Kate Warner

5 out of 5 stars

posted 6 months ago

Brooke reponded to my message promply. She was very knowledgeable, friendly, and fast at getting my loved one out of jail. She helped out tremendously during a stressful situation.

Baylee Mason
Baylee Mason

5 out of 5 stars

posted 7 months ago

Brooke is very reliable and has been a huge help. Fast and friendly service ❤️

andrea mathis
andrea mathis

5 out of 5 stars

posted 7 months ago

Friendly, helpful, walked through the whole process.




According to the latest jail census:
Average Daily Inmate Population: unknown
Inmate Capacity: 72
Year Constructed: 2003
Full-Time Staff: 25
Total Staff Salaries: unknown

Wagoner County, OK Offense Statistics
Violent Crime 65
Murder and Non-Negligent Manslaughter 0
Rape (revised and legacy definition) 9
Robbery 4
Aggravated Assault 52
Property Crime 557
Burglary 222
Larceny-theft 286
Motor Vehicle Theft 49
Arson 9
Data Source: FBI Uniform Crime Reporting (UCR) Program – Offenses Known to Law Enforcement by Metropolitan and Nonmetropolitan Counties, 2015
Note: The data shown in this table does not reflect county totals but are the number of offenses reported by the sheriff’s office or county police department

Wagoner County Sheriff's Office

Sheriff Chris Elliott and the Wagoner County Sheriff' Office employs Approximately 30 full time deputies with 3 full time investigators as well as 19 detention officers. The Wagoner County Sheriff's Office commands 5 divisions including: Patrol, Investigations, Court Security, K9 operations and the Wagoner County Jail. The Wagoner County Jail houses a maximum of 152 inmates.
Wagoner County Sheriff's Office
Wagoner County Sheriff's Office added 5 new photos.Friday, January 11th, 2019 at 4:54am
Wagoner County Deputies will be out today emphasizing traffic safety during the inclement weather. Deputies exercise Zero tolerance for hazardous moving violations! Please drive safely and be courteous of other drivers.
Wagoner County Sheriff's Office
Wagoner County Sheriff's Office shared a link.Friday, January 11th, 2019 at 4:07am
Wagoner County Sheriff's Office
Wagoner County Sheriff's OfficeFriday, January 11th, 2019 at 4:05am
Wagoner County Sheriff Chris Elliott wants the public to be aware of scams with the 2019 Tax Season coming up. A scam that has been around for a while called Phishing can cause you to fight identity theft for years. Here is how Phishing works. Suppose you check your email one day and find a message from your bank. You've gotten e-mail from them before, but this one seems suspicious, especially since it threatens to close your account if you don't reply immediately. What do you do?

This message and others like it are examples of Phishing, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering.

Most people associate phishing with e-mail messages that spoof, or mimic, banks, credit card companies, or other business such as Amazon and eBay. These messages look authentic and attempt to get victims to reveal their personal information. But e-mail messages are only one small piece of a phishing scam.

From beginning to end, the process involves:

1. Planning. Phishers decide which business to target and determine how to get e-mail addresses for the customers of that business. They often use the same mass-mailing and address collection techniques as spammers.
2. Setup. Once they know which business to spoof and who their victims are, phishers create methods for delivering the message and collecting the data. Most often, this involves e-mail addresses and a Web page.
3. Attack. This is the step people are most familiar with -- the phisher sends a phony message that appears to be from a reputable source.
4. Collection. Phishers record the information victims enter into Web pages or popup windows.
5. Identity Theft and Fraud. The phishers use the information they've gathered to make illegal purchases or otherwise commit fraud. As many as a fourth of the victims never fully recover.

If the phisher wants to coordinate another attack, he evaluates the successes and failures of the completed scam and begins the cycle again.

Phishing scams take advantages of software and security weaknesses on both the client and server sides. But even the most high-tech phishing scams work like old-fashioned con jobs, in which a hustler convinces his mark that he is reliable and trustworthy. Next, we'll look at the steps phishers take to convince victims that their messages are legitimate.

Here are a few extra tips:

Your garbage can is the thieves’ goldmine. Think about all the things you throw away, receipts, bank statements, tax information, bills etc. All these contain important personal information that can be used by others. All it takes is just one letter with your name and another important personal information. Make sure to Shred sensitive material before you dispose of them.

Your mail is another goldmine for ID thieves. Stolen mail is one of the most popular methods of stealing identities; your mail contains all the personal information someone would need. All the marketing material you receive from companies and banks contains vital personal information. Most companies give you the option of receiving your mail online; view your banking and credit card statements online. You may choose this option to limit the amount of postal mail you receive. You might also want to consider having a postbox as they are often monitored and protected by the postal service. Put your mail on hold if you will be absent for a while. Do not just throw away marketing material, open and shred them first.

Another very popular strategy employed by ID thieves is “card skimming.” Skimming is when your cards information is stolen by swiping your card through a magnetic card reader, which stores/downloads your card information. The thieves can then use this info to make purchases online or even load it on another card and use it in stores. Be careful when handing your card over to someone else to swipe, if you notice anything suspicious contact the authorities and your institution immediately. For example, if they swipe your card more than once or drop the card and pick it up you could potentially become a victim of ID fraud. Also, when using the PIN pad cover your PIN with your hand, even if you are using an ATM and nobody is around you. Always cover your PIN because a hidden camera could have been placed to obtain your PIN.

One of the best ways to steal ID is by stealing a wallet. Think about all the things you have in your wallet like your license, health card, bankcards, credit cards, even pictures and Social Insurance Card? Imagine all the good things that one can do with all this info. Try to minimize what you carry in your wallet, don’t keep 3 different credit cards and two debit cards on you at all times. Never keep your PIN in your wallet.

What should be in our wallet?

1. Driver’s license or other form of government issued ID
2. Car registration and insurance if required by law (most people keep these in glovebox of the vehicle)
3. One or two credit/debit cards
4. Any other personal identification document you need on daily basis.

You should NOT keep the following in your wallet: Social Security Card, Passwords or PINs, excess credit cards or debit cards, Check stubs, and any other personal identification documents that you do not need on a daily basis.

These are just couple ways your ID can be stolen. There are numerous other methods such as hacking into government and/or corporation database, stealing info through employer and many others. Although you cannot stop this trend, nor can you be 100% safe against ID theft, you can try to prevent it and minimize the chances that your ID will be stolen.

If you believe you may be a victim of fraud or identity theft you can contact the Wagoner County Sheriff’s Office at 918-485-3124.
Wagoner County Sheriff's Office
Wagoner County Sheriff's OfficeThursday, January 10th, 2019 at 4:15pm
Get your umbrella's out Wagoner County and do your #9pmroutine.
Wagoner County Sheriff's Office
Wagoner County Sheriff's Office shared a link.Thursday, January 10th, 2019 at 2:00pm
Wagoner County Sheriff's Office
Wagoner County Sheriff's Office added 2 new photos.Thursday, January 10th, 2019 at 4:01am
On 01/09/2019 Wagoner County Sheriff’s Deputies and Investigators located and arrested two convicted sex offenders that were failing to register as required. They were both were living within blocks of each other in the Lakecrest area of Wagoner County.

65 year old Harold Pedigo was found living with friends after failing to register for nearly 3 years. He has been charged with Failure to Comply with Sex Offender Compliance Act. Wagoner County Investigators learned that he last registered in Muskogee County in 2016. Pedigo is listed as an aggravated offender, requiring a lifetime registration requirement. State law requires offenders to register within 3 days of notification. He was taken into custody without incident and booked into the Wagoner County Detention Center with no bond.

43 year old Ian Bliss was found to be in violation and has been charged with Failure to Comply with Sex Offender Compliance Act. On 01/08/2019 Wagoner County deputies were notified that he was in violation of the Sex Offenders Registration Act. Wagoner County deputies attempted to make contact with Mr. Bliss at his residence but were unsuccessful. On 01/09/2019 Mr. Bliss came to the Wagoner County Sheriff's Office to register as a sex offender. Deputies made contact with him and explained that he was already in violation. Mr. bliss acknowledged that he had received the registration letters but did not come to register with the Sheriff's Office. He is believed to have used numerous residences in the past to avoid law enforcement. He was taken into custody without incident and booked into the wagoner County Detention Center with no bond.

The below address takes you to the Oklahoma Sex and Violent Offender Registry.