Feeds

US woman attacks missus with sperm-filled syringe

Home insemination attempt ends in court

Intelligent flash storage arrays

A Massachusetts woman has appeared in court on a domestic assault and battery rap after allegedly attempting to impregnate her wife with a plastic syringe containing her brother's sperm.

Stephanie K Lighten, 26, of Pittsfield, was reportedly “all liquored up” when she made unwelcome advances towards her other half, 33-year-old Jennifer Lighten. Jennifer explained to officers that Stephanie "had been talking about trying to impregnate her for some time", and that she'd accordingly armed herself with a "turkey baster and her brother’s semen in a sealed container".

The turkey baster was actually a "large syringe with a catheter tip", Lez Get Real clarifies, but whatever the implement in question, Jennifer told her partner "she didn’t want to get pregnant".

Things at this point allegedly took a turn for the worse, as Stephanie "threw Jennifer on the couch, grabbed at her clothes and threatened to impregnate her".

Lez Get Real continues: "Jennifer broke free, ran into the bathroom and locked the door. When Stephanie broke the bathroom door down, she hurt her wrist in the process, and Jennifer escaped when Stephanie went to get an ice pack from the freezer.

"Jennifer attempted to get away in the couple’s SUV and as she tried to pull away, Stephanie jumped on the side of car and made Jennifer stop."

Cue cops and a cuffing for the "intoxicated" Stephanie. Police confiscated the syringe "plus a container of semen and some aluminum foil, which was originally was used to hold the semen". Officers apparently confirmed the sperm was donated by Stephanie's bruv, Nicholas Lighten.

Jennifer Lighten decided not to press a charge of assault with intent to rape, because "she did not believe Stephanie was going to sexually assault her with the syringe".

Stephanie denied the remaining domestic assault and battery charge in Central Berkshire District Court. Judge Rita S Koenigs advised her to “refrain from abuse”, before releasing her on personal recognisance.

Stephanie Lighten is scheduled to appear in in court on 29 April for a pre-trial hearing, while her MySpace page is now "set to private". ®

Beginner's guide to SSL certificates

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.