Feeds

Police detain Craigslist masseuse murder suspect

Two more women attacked

Top 5 reasons to deploy VMware with Tegile

Police investigating the murder and attacks of three women who offered lap dance, massage and other services on Craigslist have taken a man into custody.

The 23-year-old man is suspected of murdering Julissa Brisman at an upscale Marriott Hotel in Boston's Copley district. He is also believed to have robbed two other woman within days of the homicide. All three women were attacked in hotels after advertising their services on Craigslist. Physical evidence at the crime scenes, including plastic cuffs to bind the women's hands, lead police to believe the same person carried out all three crimes.

It's no secret that Craigslist has become the preferred forum for advertising and soliciting casual flings and erotic services. The New York Times became the latest publication to document the phenomenon with this article published over the weekend. The website's anonymity makes it perfect for such trysts, but it also leaves those who use the site open to attack, it would seem.

The arrest on Monday came hours after police in Rhode Island, where one of the women was attacked, released pictures of the suspect captured on closed circuit TV. They showed a clean-cut man inside the Holiday Inn Express Hotel last Thursday evening, where he went to meet a woman who advertised erotic dancing. She was held at gunpoint before her husband entered the room and her attacker fled.

The third victim, described as a 29-year-old prostitute from Las Vegas, was bound at a Westin Hotel in Boston and robbed of a debit card and $800 cash. Police have speculated that the shooting death of Brisman came after she struggled and resisted robbery attempts.

In November, Craigslist announced a series of steps to curb ads for prostitution and other illegal services. Although the site boasts a 95-per cent drop in listings to its erotic services section, critics claim the site continues to stretch the resources of police vice squads. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.