Feeds

American Jezebel solicited 'freelance' hit men on Craigslist

Will pay for death of Butte lover's wife

Reducing security risks from open source software

A 49-year-old Michigan woman has been arrested after she tried to hire a hit man on Craigslist.

Last November, Ann Marie Linscott posted an ad to the famous classifieds site in the hopes of finding someone who would agree to kill the wife of her internet-savvy lover, The Associated Press said.

Linscott's Craigslist ad said she was looking to fill a "Freelance" position. This elicited an email response from a man looking for work as a freelance writer, but Linscott had something very different in mind. According to court documents, she told the would-be writer - as she told at least two other respondents - that she was looking for "silent assassins".

Calling herself "Marie," Linscott asked the writer "to eradicate a targeted victim... Marie described the victim's age as 56... provided an address, and identified that the victim as a county government employee. Marie told [the freelance writer] that he would receive $5,000 upon completion of the eradication task", according to a criminal complaint filed by the FBI with the US District Court for the Eastern District of California.

With address in hand, the FBI had little trouble locating Linscott's targeted victim. As it turns out, the targeted victim is married to a man who seduced Linscott during an "online college course".

In July 2005, after developing a "deep and intimate online relationship," Linscott and this net maven met up in Reno, Nevada, where he was attending "a convention". While there, they had "sexual relations".

Nearly two years later, Linscott flew to the man's home in Butte County, California. Court documents don't say if they resumed their "sexual relations" during this visit, but Butte County sounds like a mighty romantic place. At some point, Linscott told the man she would like to move to Butte County.

And then she posted her Craigslist ad.

Last Thursday, agents showed up at Linscott's door in Rockford, Michigan with a search warrant, and she agreed to an interview. During the interview, Linscott acknowledged that she emailed at least three Craigslisters regarding the "eradication" of her "targeted victim". When asked what she meant by "eradicate", Linscott said "Duh, well, have her killed."

Linscott was subsequently arrested by Michigan police, and is likely to be extradited to California. According to court documents, she too is married, and she chose that $5,000 fee at random. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
L33t haxxors compete to p0wn popular home routers
EFF-endorsed SOHOpelessly Broken challenge will air routers' dirty zero day laundry
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.