Online Killer Sentenced To Life In Jail

Police have identified victims in 30 countries in one of the biggest investigations into catfishing, or sexual extortion, in the world. The police found victims aged between 10 and 16 in the UK, Europe, Australia and New Zealand. Prosecutors said the perpetrator had targeted around 3,500 children.

The  investigation into the horrific case of Alexander McCartney, who drove one girl to suicide, is one of the biggest into 'catfishing' undertaken. McCartney has now been given a jail life sentence with a minimum of 20 years, for the manslaughter of one child and the extreme sexual exploitation of other youngsters.

The term 'catfishing' describes when a person takes information and images from other people, and uses them to create a new identity for themselves. In some cases, a catfisher steals another individual's complete identity - including their image, date of birth, and geographical location and pretends that it is their own.

 McCartney pretended to be a teenage girl and carried out  attacks on thousands of  female victims whom he contacted on social media platforms including Snapchat.

In this case, Cimarron Thomas, located 3,000 miles away in West Virfginia, was 12 years old in 2018 when she used her father's gun to kill herself after she had been abused and blackmailed online by McCartney from Newry in  Northern Ireland, who is described as the UK's most prolific catfisher.

Using a fake identity, McCartney contacted Thomas online, complimented her on her appearance, and began grooming her before she sent him an intimate photo. The court heard that during the first abusive interaction, he kept her online for an hour and 45 minutes, demanding degrading sexual images. He told her if she didn't send him more photos, he'd publish the ones he already had on the Internet.

McCartney continued to pursue Cimarron and contacted her again a few days later using another fake account, saying: “I want to play one more time.”  but Cimarron refused and said she would rather kill herself. McCartney then put up a countdown clock, telling her "goodbye and good luck". Minutes later, Cimarron was found by her nine-year-old sister, who entered the room after she thought she heard a balloon pop and found that she had shot and killed herself using the family's legal firearm.

In an entirely  separate incident in 2017, British teenager, Molly Russel, killed herself after viewing material about self-harm, suicide and depression, on social media sites like Instagram and Pinterest.

In court, McCartney admitted 59 counts of blackmail, dozens of charges related to making and distributing indecent photographs and scores of charges of inciting children to engage in sexual activity. McCartney, who carried out his crimes from the bedroom of his childhood home, pleaded guilty to 185 charges involving 70 children, including the manslaughter charge.

At Belfast Crown Court, judge John O’Hara sentenced him to life with no chance of parole for 20 years.

BBC   |   AP News  |   Guardian   |    Irish News   |    ITV   |    LBC   |   BreakingNews.ie 

Image: Pixabay 

You Might Also Read:  

Instagram Aims To Prevent Sextortion:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible









 

« 2024 US Presidential Election Cyber Intrusion: Part 4 - Rising Hacktivist Threats
FT Cyber Resilience Summit: Europe »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG)

ISRG's mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

BlastWave

BlastWave

BlastWave deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Defend

Defend

DEFEND are 100% focused on providing managed cybersecurity solutions and services that make a real difference to the cyber resilience of your organisation.