Murder Enabled By Social Media

Three British school children lured 13-year-old Oliver Stephens to a park where he was stabbed to death.  This murder came after a dispute between some of the children that took place on social media and now the murder and accomplice have been sentenced to jail for their roles in his killing. 

Oliver’s parents said they were “completely broken” by his murder. 

Instagram and YouTube have been accused of pushing content to teenagers that glorifies violence and invites them to buy knives. An investigation by the BBC programme Panorama found that the companies’ algorithms were recommending harmful content to young people. 

Olly Stephens was murdered, in a field near his home in Reading, but it was only after the murder that his mother and father realised the violent and disturbing world that their son had been exposed to through social media on his phone. Amanda and Stuart Stephens watched their son from separate windows as he left home, not realising it would be the last time.  

Olly wandered over to a field, Bugs Bottom, opposite their house with his phone in hand and fifteen minutes later, he was murdered.  He was stabbed to death by two teenage boys, after they recruited a girl online to lure him there. The entire attack had been planned on social media and triggered by a dispute in a social media chat group.  

His parents were shocked to discover the murky world of violence and hate that their son and his friends had inhabited through their phones.  

Thames Valley Police say Olly's story stands out because of the huge role social media played in the case. And they fear that the evidence of bullying, and violent videos featuring knives found on the killers' phones, is just "the tip of a very large iceberg".  

Just before he was murdered, Olly had been diagnosed with autism and, at that time, he most enjoyed gaming and listening to music in his bedroom. The night after his murder, looking through social media posts about Olly and screengrabs his friends shared with their daughter, Stuart and Amanda began to realise the role social media had played in what happened. 

There was enough social media evidence to convict two boys, aged 13 and 14 at the time, of murder last November who were convicted for a minimum of 12 and the stabber for a minimum of 13 years.  

Sentencing the three, Judge Heather Norton said: “What you did was utterly cruel and utterly pointless, you have taken one life and you have damaged your own futures and you have caused so much pain to so many people... The evidence retrieved from their phones and social media accounts played a vital part in the case we presented to the jury, which has today found both boys guilty of Olly’s murder.” 

Stuart Stephens told Reading crown court “Olly trusted people too much, it was part of his makeup, it was part of his autism, it was why we loved him.” 

What struck the police initially about the mountain of videos, photos and screengrabs they began to sift through was the persona that 13 and 14 year-olds linked to the case were presenting online, so at odds with the suburban reality they were living.  There were images shared on Instagram of people holding knives, with balaclavas on and hoods up.  

The police also found videos of knives being flicked and shown off, and of boys linked to Olly's murder attacking one another, which DCI Howard told Panorama he believes were being shared "openly and very regularly" on Instagram and Snapchat. 

A recent study by the Huddersfield University's Applied Criminology and Policing Centre backs up that idea, finding that social media was a key factor in almost a quarter of crimes committed by under-18s.  Most of these were acts of violence that started with confrontation online. 

Speaking after the sentencing, Olly’s parents urged the parents of teenage children to “take their phones off them” after warning how social media “played a massive part” in their son’s death. They also called for new laws to be introduced to ban unidentifiable social media accounts. 

BBC:      ITV:      Crown Prosecution Service:    Reading Chronicle:    The Times:    Get Reading:

You Might Also Read: 

The British Online Harms Bill Takes Shape:

 

« Putin Lashes Out After His Speech Is Delayed By DDoS
US Bank Loses Critical Data Of Over A Million Customers - Again »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

Vantea SMART

Vantea SMART

Vantea SMART have decades of experience in cybersecurity resulting in an approach of proactive prevention - Security by Design and by Default.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.