Feeds

Bound robbery victim IMs for help with toes

CALL 911 POLICE. IM HOME TIED TO BEED

Next gen security for virtualised datacentres

An Atlanta woman who was tied to her bed by an armed robber managed to alert her boyfriend by instant messenger - no mean feat since she was obliged to type with her toes.

Amy Windom from her Facebook profileAccording to the Atlanta Journal-Constitution, 39-year-old Amy Windom (pictured) was in bed around midnight on Tuesday when the intruder burst into her bedroom. She told the paper: “We struggled for some amount of time. He hit me on the head with the gun.”

The robber tied Windom's wrists to the bed posts and then spent almost an hour searching for booty. Once he left, Windom shouted for help and tried to free herself, without result.

She said: “But the way he had tied my wrists with shoe strings, it was tightening around my wrists, cutting off my circulation and cutting into my skin. He tied me really well and I wasn’t able to get myself free.”

After further struggling and yelling, Windom realised at around 4.15am that the assailant had "left my laptop at the foot of my bed".

She continued: “I flipped my legs over my head and turned off my alarm clock so my radio wouldn’t be blaring and block me from hearing anybody walking by that might be able to help me, and I was like, ‘wow, I guess I can do more than I thought with my feet,’ so I dragged my laptop over with my feet and I pried it open.”

After unsurprisingly "struggling" to simultaneously hit control, alt and delete to unlock the PC, Windom enjoyed a "wonderful moment" when she realised her Wi-Fi connection was live.

She explained: “I was worried that the guy had cut my phone line, so I was worried that I wouldn’t have an internet connection.”

Using one big toe as a mouse, and the end of the power cord gripped between toes on her other foot as an improvised typing tool - “because my big toe was too big to hit individual keys" - she managed to get boyfriend John Hilton on IM, and he called cops just before 5.30am.

He told the Atlanta Journal-Constitution: “I email her every morning before I go to work. I saw her on AIM, and she ‘pinged’ me first and her first word was, ‘HELP. CALL 911.’”

Hilton added that his quick-thinking girlfriend held onto her computer because although the intruder was "was interested in her laptop ... she said there was a way to trace it so he shouldn’t take that".

He noted: "She’s got her wits about her all the time."

The Atlanta Journal-Constitution has more, including a screenshot of part of the IM conversation, right here. ®

Bootnote

Thanks to Simon Bache for the tip-off.

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.