Feeds

Brits ignore bloke trapped down manhole

Good show

  • alert
  • submit to reddit

High performance access to file storage

There was a time when Britons could leave the security of their homes and venture forth safe in the knowledge that in the unlikely event of falling down a manhole, their fellow citizens would at least have the courtesy to stop and enquire: "Hello, are you from the Water Board or are you down that manhole involuntarily?"

Not any more, as 65-year-old Clive Collins can attest. The poor bloke fell down a 5ft-deep manhole in a car park in Boscombe, Dorset, and was trapped for 45 minutes "while shoppers ignored his cries for help", the BBC explains.

Collins recalled: "Probably about 15, 20 people walked by. The more I called out, the less they seemed to notice me."

He continued: "What surprised me is that they didn't make eye contact. A woman actually parked along side my camper and put the hood up on her car.

"I said 'can you please call me an ambulance' and she refused to acknowledge the fact that I was there. One chap looked straight at me in his car driving very slowly by and I waved. He waved back and then carried on."

Collins was, despite having two broken ribs, able to fish his mobile out of his pocket and call 999. He was subsequently treated at Royal Bournemouth Hospital for said rib damage, plus a chipped tooth, a strained groin and other injuries requiring 47 stitches.

Bournemouth Borough Council spokeswoman Carly Earnshaw assured: "A full investigation is being carried out as to how this happened and if any vandalism on the manhole has taken place. In the meantime we would like to reassure residents that the site is now secure and that we do have policies in place to maintain our car parks."

Sadly, a quick poll of members of the Vulture Central staff reveals that this disregard for the wellbeing of others is not confined to Dorset. One hack confessed he'd probably use the opportunity to steal the poor chap's car, while another said he'd have his phone away - "but only if it was 3G". Otherwise, he added, "I'd steal his wallet and use his credit card to buy a 3G phone". ®

Related stories

Error: a thorough search of the Register database for "manhole" and "trapped" returned [0] results. Please modify your search to contain at least one IT-related term.

High performance access to file storage

More from The Register

next story
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.