Feeds

Sex, Text, Revenge, Hacking and Friends Reunited

This court case has the lot

  • alert
  • submit to reddit

The Power of One Infographic

Sometimes, you come across a court case that is simply perfect. And this one, a tale of two-timing, intercepted text messages, computer hacking, and publication of sex pictures on Friends Reunited, scores a big fat nine out of 10.

A 21-year old student who took revenge on his cheating girlfriend was jailed for five months at Guildford Crown Court on Tuesday.

Philip Nourse hacked the Friends Reunited account of his 19 year-old girlfriend -referred in court simply as "the young lady" - altered her details and pasted photographs of the two having sex. Enough revenge? Wrong: Nourse also set up a web site "showing video footage of him engaged in sexual acts with the 19-year-old air stewardess", The Telegraph reports. Surely that got it off his chest? Wrong. Nourse also printed 50 "explicit" posters of "the young lady" which he planned to paste up in her home town. That's enough? No, there's more: after hacking into the woman's e-mail account, he directed a friend of hers to the on-line sex images", The Telegraph reports.

So how did Nourse discover his girlfriend's infidelity? Simple, he persuaded two friends, employees at O2, to intercept her text messages and pass them on to him. The student then "realised she had been two-timing him with a previous boyfriend", the Telegraph says.

Nourse committed his offences after the young lady dumped him in June this year. His barrister told the court that he "accepts that what he did was utterly wrong. He was so upset and angry that he didn't think through what he was doing." But as a sport science student at Loughborough, this comes as little surprise.

We will be greatly surprised if Nourse's friends are still working at O2. The Register is astonished that it is so easy to obtain private text messages from stupid employees. O2 does not come out of this well.

So what stops this court case getting 10 out of 10? The humiliation suffered by the victim moves it beyond simple entertainment. "The hurt that this has caused to me and my family is indescribable," she told the police. On the face of it, there is a good case for sueing O2. ®

Related stories

Man suspended over sex boast email
Brian Tindle: Internet villain and the new Claire Swire
Claire Swire: wanna know who she is?
Tell him to Marry Me
Push off Sarah, says naked civil servant
Friends Reunited -interfere with nature at your peril

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.