Online Killer Sentenced To Life In Jail

Police have identified victims in 30 countries in one of the biggest investigations into catfishing, or sexual extortion, in the world. The police found victims aged between 10 and 16 in the UK, Europe, Australia and New Zealand. Prosecutors said the perpetrator had targeted around 3,500 children.

The  investigation into the horrific case of Alexander McCartney, who drove one girl to suicide, is one of the biggest into 'catfishing' undertaken. McCartney has now been given a jail life sentence with a minimum of 20 years, for the manslaughter of one child and the extreme sexual exploitation of other youngsters.

The term 'catfishing' describes when a person takes information and images from other people, and uses them to create a new identity for themselves. In some cases, a catfisher steals another individual's complete identity - including their image, date of birth, and geographical location and pretends that it is their own.

 McCartney pretended to be a teenage girl and carried out  attacks on thousands of  female victims whom he contacted on social media platforms including Snapchat.

In this case, Cimarron Thomas, located 3,000 miles away in West Virfginia, was 12 years old in 2018 when she used her father's gun to kill herself after she had been abused and blackmailed online by McCartney from Newry in  Northern Ireland, who is described as the UK's most prolific catfisher.

Using a fake identity, McCartney contacted Thomas online, complimented her on her appearance, and began grooming her before she sent him an intimate photo. The court heard that during the first abusive interaction, he kept her online for an hour and 45 minutes, demanding degrading sexual images. He told her if she didn't send him more photos, he'd publish the ones he already had on the Internet.

McCartney continued to pursue Cimarron and contacted her again a few days later using another fake account, saying: “I want to play one more time.”  but Cimarron refused and said she would rather kill herself. McCartney then put up a countdown clock, telling her "goodbye and good luck". Minutes later, Cimarron was found by her nine-year-old sister, who entered the room after she thought she heard a balloon pop and found that she had shot and killed herself using the family's legal firearm.

In an entirely  separate incident in 2017, British teenager, Molly Russel, killed herself after viewing material about self-harm, suicide and depression, on social media sites like Instagram and Pinterest.

In court, McCartney admitted 59 counts of blackmail, dozens of charges related to making and distributing indecent photographs and scores of charges of inciting children to engage in sexual activity. McCartney, who carried out his crimes from the bedroom of his childhood home, pleaded guilty to 185 charges involving 70 children, including the manslaughter charge.

At Belfast Crown Court, judge John O’Hara sentenced him to life with no chance of parole for 20 years.

BBC   |   AP News  |   Guardian   |    Irish News   |    ITV   |    LBC   |   BreakingNews.ie 

Image: Pixabay 

You Might Also Read:  

Instagram Aims To Prevent Sextortion:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible









 

« 2024 US Presidential Election Cyber Intrusion: Part 4 - Rising Hacktivist Threats
FT Cyber Resilience Summit: Europe »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.