Feeds

Hotel prank call badboy tracked down to mum's flat

Alleged PrankNET leader forced to cower inside

Using blade systems to cut costs and sharpen efficiencies

Online news mag The Smoking Gun (TSG) claims it to have tracked down the leader of prank call website PrankNET to the suburban flat in Windsor, Ontario he shares with his mum.

PrankNET's stock in trade is to pose as hotel employees, emergency service staff or representatives of fire alarm companies in order to trick their marks into trashing hotel rooms, setting off sprinkler systems or damaging fast food restaurants. These hoaxes are broadcast live on the internet for the twisted pleasure of listeners.

Its tricks include claiming that a ruptured gas line threatened the lives of hotel guests, who were induced to smash open windows and throw out TV sets (on the pretext that a charge from its internal CRT could set off an explosion).

On two occasions, members of the group tricked fast food workers into stripping off clothes outside their restaurants in order to guard against the supposed risk that chemicals released from an outlet's fire suppression system could cause burns. Injuries, hapless workers were told, could be mitigating by urinating on each other.

A wave of these types of destructive pranks across the US prompted internal warnings by Choice Hotels (parent company of Comfort Inn and EconoLodge) and advisories from Orange County (Florida) Sheriff's office, among others. Quite apart from embarrassment it caused and possible health risk (one hotel worker was tricked into drinking a guest's urine in the belief that it was an apple juice sample), PrankNET's stunts have resulted in thousands of dollars worth of damage.

PrankNET makes its calls using Skype, the IP telephony service, which for its denizens makes the pranks untraceable. Its members meet in online forums to plot scams.

A disaffected former member of the group helped TSG to track down Dex, on of its PrankNET's leaders, following a seven week investigation chronicling the group's stunts. Two reporters doorstepped Dex - named by TSG as Tariq Malik, 25 - who reportedly responded by hiding in the flat before calling the police. Dex's nickname comes from the titular protagonist of TV series Dexter, a Miami PD blood spatter analyst by day and serial killer of other murderers by night.

The Globe and Mail contacted Dex online after the TSG expose last week. TSG described him as a "sociopath, a mean-spirited sadist" who manipulates "naive and compliant dupes", but Dex compared his "humour" to that of Sacha Baron Cohen. Dex further claimed that TSG had identified the wrong man and that his identity remains a secret.

PrankNET's Twitter and YouTube accounts have been suspended but TSG's story contains links to archived audio clips of PrankNET's calls. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.