Feeds

PC thief steals court PC during trial

Double jeopardy

Internet Security Threat Report 2014

A light-fingered California crook has been convicted of stealing computers from a courthouse while on trial for computer theft.

Jon Houston Eipp, 39, of Novato, pleaded guilty on Monday to the computer theft crimes along with various burglary, theft, and drug possession offences. He faces up to five years in jail.

"It just amazed me that someone could be in the middle of a jury trial for a burglary involving computers and immediately get involved in another burglary at the Civic Centre," sheriff's seargent Jerry Niess told AP.

Speaking from jail, Eipp said he nicked the computers as a "crazy way" of asking for help with his drug problem. "I needed help, and I didn't know how to ask for help. And I guess, in my crazy way, that was my way of asking for help. Help with my drug problems, help with my sanity," he said. ®

Internet Security Threat Report 2014

More from The Register

next story
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.