Feeds

Man U fan pwned in Facebook honeypot

'Emma' actually Liverpudlian hoaxers

Secure remote control for conventional and virtual desktops

A Manchester United fan who drove 400 miles for an amorous rendevous with a woman he wooed on Facebook discovered he'd been well and truly stitched up by a couple of Liverpudlian pranksters.

Stuart Slann, 39, met the pair on a holiday in Cancun, Mexico, last November. According to the Telegraph, the three soon started giving it some gob about their rival football teams, and Slann was subsequently thrown into the swimming pool by the Liverpool fans.

Back in Blighty, the two decided to further humiliate their victim, and set up a Facebook page under the name of "Emma" - a Scottish temptress who began to flirt with the unsuspecting Slann. After a month of preliminaries, Emma arranged a face-to-face with her beau in Aberdeen, and he duly drove from Sheffield to the remote farm where he expected to have his evil way with his online girlfriend.

Slann explained: "I'd been chatting to this girl on Facebook for about a month or so. I really thought she was genuine, and I had no reason to doubt it. On the night she asked me to Scotland I was on the road for about nine hours. And then when I got to this remote farm she sent me a text to say she was still in work.

"That's what made it worse, not only had I driven for nine hours, but I had to wait for about another three and a half hours for her to finish work."

Finally, one of the Liverpudlians rang to tell Slann the terrible truth. The recorded conversation last week escaped into the wild, and has since popped up on YouTube. The recording contains further humiliating details of the hoax, and is NSFW:

Slann said: "There's no doubt that I've been done good and proper by the lads from Liverpool. It was cruel but I'll hold my hands up and say they really wound me up."

He concluded: "If they had asked to drive to Manchester, Leeds or even Liverpool it wouldn't have been so bad and maybe I'd have seen the funny side. But to drag me all the way to Aberdeen was just cruel."

Slann's wife Louise, 32, discovered the "affair" last week when the whole sorry tale went public. The Slann's marriage "is now over", the Telegraph notes. ®

Internet Security Threat Report 2014

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.