Feeds

Taiwanese sex scammer's net double is NYC model

'Shocked' Richie Kul expresses dismay to El Reg

Beginner's guide to SSL certificates

The news this week that a 55-year-old bald and "physically unattractive" Taiwanese man had posed online as a "youthful male model" to convince up to 20 women to have sex with his ailing father - who was actually himself - provoked a certain amount of incredulity among Reg readers.

To recap, Hsu Shian-ming got plenty of responses to his net pitch from ladies "interested in romantic liaisons". And that's exactly what they got, except not with the young man they were expecting. As well as receiving "treatment" for "prostate cancer", Hsu took compromising nude photos of his victims, and fleeced them of an estimated £3,725,000.

When he was eventually cuffed, cops found "dozens" of snaps of the chap used as bait - NYC male model Richie Kul, as it turns out. By an amazing coincidence, Richie is an avid Reg reader who was converted to the Church of Vulture Central when he was based in London between 2005-2008. He got in touch earlier this week to express his dismay.

Here are Richie and Hsu Shian-ming. See if you can spot which is which...

Richie Kul and Hsu Shian-ming

...and here are some of the other snaps Hsu used to bait his trap:

Various photos of Richie Kul used in the scam

Naturally, Richie is a bit upset by the whole thing, and sent us an email statement which reads: "Words cannot express how shocked and saddened I was to hear that my images and likeness were misappropriated without my knowledge to perpetrate such heinous and reprehensible crimes. My heartfelt and deepest sympathies go out to the victims and their families and they are foremost in my thoughts and prayers."

Regarding Hsu's shameless hijacking of his identity, Richie concludes: "These devastating incidents sadly highlight the disturbing truth that internet crimes are becoming increasingly prevalent and sophisticated. A click of the mouse can allow someone to appear to be anyone or anything online.

"We must not lose our faith in humanity, but we must at the same time be vigilant against those who exploit technology and its cloak of anonymity to prey on innocent and well-meaning people."

This is true, and I'm ashamed to say that I myself recently used someone else's photo in a failed attempt to join the wonderful world of BeautifulPeople. Luckily for them, they're a lot more sussed that Hsu's victims. ®

Remote control for virtualized desktops

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.