Feeds

Chav burglar collared by webcam

11 months' slammer for baseball-capped blagger

  • alert
  • submit to reddit

High performance access to file storage

Benjamin Park: caught on cameraA 19-year-burglar has just begun an 11-month stretch at Her Majesty's Pleasure after he was captured burgling a house by the owner's webcam. Fed-up software engineer Duncan Grisby set up the surveillance system following a previous burglary three years before. It recorded deliciously crisp images of Benjamin Park who delighted police immediately identified.

Cambridgeshire Police Burglary Squad supremo, Det Sgt Alan Page, told the BBC: "The webcam was set up in his computer and began filming once it registered motion. It captured every movement Park made. At one point he stared into the computer as if it might be making a noise or something to make him suspicious.

"He then stole the computer but it didn't matter because Mr Grisby had set it up so that as it was recording it was sending the images to an email address. When the break-in was discovered Mr Grisby simply gave us the email address and we were able to watch several minutes of footage and say: 'That's Ben Park'."

Page continued: "Mr Grisby is an extremely bright man. He'd set this up because he'd been burgled some years ago and the quality was superb. It was better than a burglar alarm and when Park initially denied breaking in to the property we were simply able to show him the footage."

Cambridge magistrates heard that Park - who has more than 13 previous convictions for theft, and was on bail for attempted burglary when he struck at Grisby's hi-tech domicile - lifted computer equipment and other property with a value of almost £4,000 from the house. They jailed him for 11 months.

Grisby noted: "The burglary was a real violation of my private space but at least he got caught. I just wish he'd got a longer sentence." ®

Bootnote

Thanks to reader Mike Plunkett whose Chav radar is in fine working order today.

Further Chav resources

eBayers go mental for Burberry-clad Chavmobile
Oi, Chav! Check out me website!

Related stories

Webcam snares toff 'tea leaf'
Mobile fingers UK's thickest armed robber
Blaggers lift 60 CCTV cameras

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.