Feeds

Twitter airport bomb joker loses second job

A week before appeal

Build a business case: developing custom apps

Paul Chambers, the Twitter joker victim, has been sacked from a second job a week before his appeal against a widely criticised conviction for sending a "threatening" message to to blow Doncaster airport "sky high".

Chambers, 27, got into a world of hurt after posting an ill-conceived update on 6 January, after inclement weather forced the Yorkshire airport to shut up shop shortly before he was fly over to Belfast to meet a girl (@crazycolours), who has since become his girlfriend.

Crap! Robin Hood Airport is closed. You've got a week and a bit to get your shit together otherwise I'm blowing the airport sky high!

An off-duty manager at Doncaster's Robin Hood Airport reported the message to the police. Even though airport staff later testified that the update was not considered as a credible threat and had no effect on the airport's operations, a prosecution was initiated.

Chambers, of the Balby area of Doncaster, lost his job as a trainee accountant over the prosecution even before he was tried and convicted of sending a threatening message by Doncaster Magistrates' Court. Chambers' testimony that the the message was "innocuous hyperbole" was rejected by magistrates, who fined him £1,000 after ruling that he was guilty of an offence against the Communications Act 2003.

The ruling left Chambers with a criminal conviction, and he has since been sacked from a second job a week before an appeal against his conviction was due to be heard at Doncaster Crown Court on 24 September. This appeal will hinge on arguments that Chambers' ill-thought-out update could not reasonably be considered as menacing.

Lawyer Allen Green, who is coordinating the appeal, has more background on the case on the Jack of Kent blog here. Other supporters include Graham Linehan, writer of the IT Crowd and Father Ted, and ordinary internet users who have contributed to an appeal fund. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?