Feeds

Net fuelled killer's necrophiliac lust

Victim's mother calls for porn site ban

  • alert
  • submit to reddit

The Power of One Infographic

The family of murdered school teacher Jane Longhurst (31)is calling for tighter regulation of online pornography following the sentencing of her murderer Graham Coutts yesterday in Lewes Crown Court.

Coutts (35), a voracious consumer of web sites devoted to snuff movies and necrophilia, was sentenced to life imprisonment, with a minimum tariff of 30 years. The Scottish-born part-time musician visited Web sites with names such as "necrobabes", "death by asphyxia" and "rape pleasure".

More than 800 pornographic images were found saved on Coutts' home computer – over three quarters of which showed acts of violence against women. The court also heard that Coutts had accessed violent images the day before Ms. Longhurst was murdered in March 2003.

After strangling Ms. Longhurst with a pair of tights, Coutts took her body to a storage unit, for which he had a pin number for out-of-hour-access. The security log showed that he had visited the corpse at least 10 times in the month before he finally disposed it in a marsh.

After the discovery of Ms. Longhurst's body, employees at the Big Yellow Storage company in Brighton informed the police that Coutts had hired the lockup shortly after her disapperance. When they opened the lockup, police found Ms. Longhurst's possessions as well as a blood-stained rope and a condom containing Coutts' semen.

Acting out fantasies

The prosecution suggested an “obvious parallel between the images he chose to access on his computer and the scene that confronted him at the storage location…..he acted out for real on the unfortunate Jane Longhurst the fantasies on his computer, the strangling, the killing and raping of her.”

In sentencing, Judge Richard Brown said: “By persisting in your denial and making her loved ones relive her last moments, and the unbelievable degradation of her body, you have shown not a jot of remorse.” Coutt’s had said Ms. Longhurst’s death was an accident, claiming it had occurred during consensual sex.

Outside Lewes Crown Court yesterday, Jane Longhurst’s mother, Liz Longhurst, said: “"Pressure should be put on Internet providers to close [these sites] down. It would be a memorial to Jane to prevent other lovely young women being harmed in this way."

The Internet Watch Foundation (IWF) said the sites named in the case could not be prosecuted, as they were hosted outside the UK:

“Legislation over Internet content, comes under the jurisdiction of the country of source, therefore the IWF and UK Law Enforcement Agencies can only control material hosted in the UK. It is our view, that if the two websites cited in this specific case, were hosted in the UK that we would have referred these sites to the UK Police for further investigation under the Obscene Publications Act." ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.