Feeds

Oregon man stripped by Craigslist looters

Fake ads provoke giveaway stampede

The Power of One Brief: Top reasons to choose HP BladeSystem

An Oregon man is attempting to regain possession of his worldly goods after fake Craigslist ads provoked a stampede of looters who stripped his property of pretty much eveything that wasn't nailed down, local news channel Kgw.com reports.

According to Jackson County Sheriff's Detective Sgt. Colin Fagan, the fake adverts popped up on Saturday claiming Robert Salisbury of Jacksonville "was forced to leave the area suddenly and his belongings, including a horse, were free for the taking".

The first "independent contractor" Jackson knew of it was when he got a call while at nearby Emigrant Lake from "a woman who had stopped by his house to claim his horse".

Salisbury quickly headed for home, but interrupted his journey to stop a truck "loaded down with his work ladders, lawn mower and weed eater". He recounted: "I informed them I was the owner, but they refused to give the stuff back. They showed me the Craigslist printout and told me they had the right to do what they did."

The driver duly "rebuked" Salisbury and drove off with his booty - just some of the items the poor chap spotted packed into cars leaving the scene of the looting where he discovered "30 people rummaging through his barn and front porch".

Once again, Salisbury's protests met with a defensory waving of printouts of the Craigslist adverts. He said: "They honestly thought that because it appeared on the internet it was true. It boggles the mind."

Cue the arrival of Jacksonville police and Jackson County sheriff's deputies, albeit it too late to stop much of the net-provoked piracy. However, Salisbury provided cops with a few licence plate numbers, and by Monday "some people who learned of the hoax began to return items taken from the home".

Michelle Easley, the horse-rustler whose call alerted Salisbury to the free-for-all, explained she'd "seen the ad that claimed Salisbury's horse had been declared abandoned by the sheriff's department and was free to a good home".

She elaborated: "I can't stand to see a horse suffer so I drove out there and got her. The horse didn't look abandoned. She is in good shape for being 32 years old."

Easley admitted the whole thing "looked odd", so she "left a note on Salisbury's door explaining the ad", then "decided to call to make sure the ad was legitimate".

While detectives have contacted Craigslist's legal team to try to trace the ad, officers were earlier this week "still contacting people who were seen leaving Salisbury's house with his stuff". Sgt. Fagan explained that they could return looted items "no questions asked", but if they decided to hang onto their ill-gotten gains, they "may face charges". ®

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.