Feeds

Victim not killer owned 'murder manual' game

Manhunt off the hook?

  • alert
  • submit to reddit

The copy of the computer game Manhunt that was discovered during the investigation into the murder of a 14-year-old boy was not the possession of the killer but the victim, it has emerged.

UK retailers Dixons and Game both pulled the title from their stores' shelves last week after the parents of the murdered boy, Stefan Pakeerah, alleged that his murderer, Warren LeBlanc, 17, was "obsessed" by the grisly game and that it had inspired has murderous actions.

The victims father dubbed Manhunt "a manual for murder".

It was widely reported by the mainstream press, online and TV media that the game had been found in LeBlanc's bedroom.

However, today it emerged that Leicestershire police found the game in Pakeerah's room, not LeBlanc's, GamesIndustry.biz reports.

"The video game was not found in Warren LeBlanc's room, it was found in Stefan Pakeerah's room," a police spokesperson said today. "Leicestershire Constabulary stands by its response that police investigations did not uncover any connections to the video game, the motive for the incident was robbery."

Police believe LeBlanc murdered Pakeerah, whom he knew, to obtain money to pay back a drug-related debt.

LeBlanc's assumed possession of Manhunt raised the questions as to how a 17-year-old was able to get hold of the game. The game carries an 18 certificate, so it is illegal to sell it to anyone under that age. Now it has emerged that the game was owned by the 14-year-old Pakeerah, that question has not gone away. ®

Related stories

Retailers bans Manhunt after murder link claim
Eidos confirms takeover talks
Tag, track, watch, analyse - UK goes mad on crime and terror IT

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.