Feeds

Vigilant mother foils dirty old man's chat-room plan

He was 17, going on 47

  • alert
  • submit to reddit

Mobile application security vulnerability report

Police yesterday warned parents of the perils of the Internet after a middle-aged man duped a 13-year-old girl he met in an online chat room into a clandestine date. The 47-year-old perv masqueraded as a teenager, sending the girl a series of intimate messages online. The man, traced by police to the North of England, asked her for photos of herself before arranging to meet. Luckily, the youngster's mother grew suspicious and decided to play chaperone. "I was also a bit worried because he insisted if I was there he would drive away immediately," she said. The mother dropped her daughter at the proposed place for the romantic rendezvous - Milton Keynes in Buckinghamshire - and waited at a discreet distance to watch the goings-on. To her horror, the "boy" who walked up to her daughter was actually a "middle-aged, not very well-dressed man". The vigilant mother confronted him, saying: "You are not 17". According to her, the man tried to weasel his way out, claiming first to be 17, but then wisely admitting he wasn't. The man was arrested, but released without charge. Police said there was not enough evidence that an offence had been committed. Chief Inspector Neville Pinkny of Milton Keynes police commented: "This was a most disturbing case and had it not been for the vigilance of the mother, the girl could have placed herself at quite considerable risk." John Carr, a consultant on Internet safety with a children's charity, told the Times: "The Internet is a great thing, but parents should view it as they would Central London – it's a great place to be, but you would not let your kids go there unaccompanied unless you were sure they knew all about stranger danger." Last year Patrick Naughton, a former Infoseek exec, was arrested after trying to solicit sex with a 13-year-old girl. He had also met his victim in an online chat room. ® Related stories Disney Web exec on kiddie porn charge Child sex Disney exec 'admitted offence' Infoseek porn exec gets porridge for Xmas

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.