Feeds

Illicit phone rings in Sri Lankan inmate's back crack

Ill-timed call rumbles rectal ruse

7 Elements of Radically Simple OS Migration

A Sri Lankan lag at Colombo's Welikada jail was relieved of his illicit mobe after it inconveniently rang during a cell search, alerting officers that he'd concealed it where the sun don't shine.

Artist's impression of Nokia 8850 stuck up Taiwanese woman's back passageAn official at the Colombo hospital where the phone was later extracted from the prisoner's rectum said of the ill-timed call: "The man had concealed the phone inside his person. Unfortunately for him, the phone rang at the wrong time and guards knew he had a phone at the wrong end."

Long-term Reg readers will be familiar with our world-beating "mobile stuck up [insert cavity]" coverage. Way back in 2001, we caused quite a rumpus with a report on the 20-year-old Taiwanese woman who required surgical intervention to extract a Nokia 8850 from her back passage.

Our artist's impression of what doctors might have seen (above) prompted an email tsunami of protests that the picture was fake, which in turn prompted us to add an exasperated clarification to the story.

The make and model of phone in the Sri Lankan rectomobe case is unknown. ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?