Feeds

NY subway perv busted by mobe snap

Police hunt flashing internet star

Next gen security for virtualised datacentres

New York's finest are currently hunting a "smirking sicko" who, having exposed himself on the city's subway to a 22-year-old web developer, found himself exposed across cyberspace and the NY Daily News after the quick-thinking victim snapped him on her mobe's* camera.

On 19 August, Thao Nguyen was at the receiving end of the unwanted attentions of the "degenerate" (NYDN's choice of words - good show) when travelling on the subway in Manhattan after a job interview. According to the Daily News, she claims "a middle-aged, blond-haired man dressed in a black shirt and jeans sat down across from her".

Nguyen takes up the story: "He kept staring at me. I could feel his eyes on me. I wanted to avoid eye contact so I looked away, but I could see his reflection in the window. I saw him massaging himself and then he unzipped and pulled it out. I thought, 'I can't believe he's doing this in the middle of the day!'

"I turned on the camera. He was still masturbating. I aimed it and quickly took the shot. As soon as I took it, he zipped up and got off the train," Nguyen explains.

That smirking sicko degenerate in fullNguyen immediately reported the matter to the police, and then posted the photo on the both Flickr and Craigslist, quickly provoking a flurry of cyberactivity. Bloggers picked up on the story, as did the Daily News, which published the smirking sicko degenerate's portrait.

Within days, six other victims had come forward claiming the perp has flashed his assets at them, too. Then came the breakthrough: a dozen people claimed to recognize the man as Dan Hoyt, owner of two health food restaurants, both called "Quintessence", and called law enofrcement agencies.

On Tuesday, the Daily News reported that 43-year-old Hoyt had previously been cuffed in 1994 for "public lewdness" at the same subway station where he had flashed all his victims. The paper said he pleaded guilty and was sentenced to two days' community service.

As we go to press (no emails please - that's the traditional phrase) Hoyt is still a fugitive from justice, although surely the ensnarement of the net's current Most Wanted is purely a matter of time. ®

Bootnote

*Yes, yes, we know what you really want: the model in question was a Samsung P777 with 1.3 megapixel, perv-busting camera facility.

Next gen security for virtualised datacentres

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.