Murder Enabled By Social Media

Three British school children lured 13-year-old Oliver Stephens to a park where he was stabbed to death.  This murder came after a dispute between some of the children that took place on social media and now the murder and accomplice have been sentenced to jail for their roles in his killing. 

Oliver’s parents said they were “completely broken” by his murder. 

Instagram and YouTube have been accused of pushing content to teenagers that glorifies violence and invites them to buy knives. An investigation by the BBC programme Panorama found that the companies’ algorithms were recommending harmful content to young people. 

Olly Stephens was murdered, in a field near his home in Reading, but it was only after the murder that his mother and father realised the violent and disturbing world that their son had been exposed to through social media on his phone. Amanda and Stuart Stephens watched their son from separate windows as he left home, not realising it would be the last time.  

Olly wandered over to a field, Bugs Bottom, opposite their house with his phone in hand and fifteen minutes later, he was murdered.  He was stabbed to death by two teenage boys, after they recruited a girl online to lure him there. The entire attack had been planned on social media and triggered by a dispute in a social media chat group.  

His parents were shocked to discover the murky world of violence and hate that their son and his friends had inhabited through their phones.  

Thames Valley Police say Olly's story stands out because of the huge role social media played in the case. And they fear that the evidence of bullying, and violent videos featuring knives found on the killers' phones, is just "the tip of a very large iceberg".  

Just before he was murdered, Olly had been diagnosed with autism and, at that time, he most enjoyed gaming and listening to music in his bedroom. The night after his murder, looking through social media posts about Olly and screengrabs his friends shared with their daughter, Stuart and Amanda began to realise the role social media had played in what happened. 

There was enough social media evidence to convict two boys, aged 13 and 14 at the time, of murder last November who were convicted for a minimum of 12 and the stabber for a minimum of 13 years.  

Sentencing the three, Judge Heather Norton said: “What you did was utterly cruel and utterly pointless, you have taken one life and you have damaged your own futures and you have caused so much pain to so many people... The evidence retrieved from their phones and social media accounts played a vital part in the case we presented to the jury, which has today found both boys guilty of Olly’s murder.” 

Stuart Stephens told Reading crown court “Olly trusted people too much, it was part of his makeup, it was part of his autism, it was why we loved him.” 

What struck the police initially about the mountain of videos, photos and screengrabs they began to sift through was the persona that 13 and 14 year-olds linked to the case were presenting online, so at odds with the suburban reality they were living.  There were images shared on Instagram of people holding knives, with balaclavas on and hoods up.  

The police also found videos of knives being flicked and shown off, and of boys linked to Olly's murder attacking one another, which DCI Howard told Panorama he believes were being shared "openly and very regularly" on Instagram and Snapchat. 

A recent study by the Huddersfield University's Applied Criminology and Policing Centre backs up that idea, finding that social media was a key factor in almost a quarter of crimes committed by under-18s.  Most of these were acts of violence that started with confrontation online. 

Speaking after the sentencing, Olly’s parents urged the parents of teenage children to “take their phones off them” after warning how social media “played a massive part” in their son’s death. They also called for new laws to be introduced to ban unidentifiable social media accounts. 

BBC:      ITV:      Crown Prosecution Service:    Reading Chronicle:    The Times:    Get Reading:

You Might Also Read: 

The British Online Harms Bill Takes Shape:

 

« Putin Lashes Out After His Speech Is Delayed By DDoS
US Bank Loses Critical Data Of Over A Million Customers - Again »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.