Feeds

Master crim leaves vital clue at scene of burglary

'Peter Addison was here!'

Next gen security for virtualised datacentres

An 18-year-old burglar spectacularly avoided elevation to the league of master criminals by writing "Peter Addison was here!" at the scene of a break-in, the Sun reports.

Addison and Mark Ridgeway, 18, both subsequently admitted burglary at Macclesfield magistrates' court after a short police investigation into the raid on the Toc H campsite for under-privileged children in Adlington, Cheshire. The pair "let off fire extinguishers and smashed crockery by using dinner plates as cricket balls, causing damage totalling £2,175", the court heard.

The incriminating message - written in black felt marker - was accompanied by one identifying Addison's membership of "The Adlington Massiv!" and another reading "Thanks for the Stay".

Camp volunteer Irene Power, 61, explained: "When I saw the message 'Peter Addison was here!' I just assumed it was a decoy to throw police off the scent. I couldn't believe it when I found the burglar was actually called Peter Addison. I'm very disappointed with the boys who carried out this crime — their actions were irresponsible and stupid. We had only just finished renovating the site and it took us hours to clear up the mess."

Insp Gareth Woods of Cheshire Police said: "There are some pretty stupid criminals around but to leave your own name at the scene of the crime takes the biscuit. The daftness of this lad certainly made our job a lot easier."

Addison, of Heaton Mersey, Stockport, was slapped with a one-year conditional discharge and ordered to pay £750 compensation and £20 costs. His partner in crime was sentenced to 60 hours’ community service and will also pay £750 compensation and £20 costs. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
ISIS terror fanatics invade Diaspora after Twitter blockade
Nothing we can do to stop them, says decentralized network
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.