
Man charged with manslaughter after Louisiana student hazing death
A man has been charged in connection with the death of a Louisiana college student who collapsed after being repeatedly punched in the chest during a hazing ritual, police said.Officials said Caleb McCray, 23, a member of the Omega Psi Phi Fraternity, allegedly punched Caleb Wilson multiple times during the off-campus initiation ceremony. He was charged with criminal hazing and manslaughter. Mr Wilson was a 20-year-old college band member and mechanical engineering student at Southern University and A&M, Baton Rouge, Louisiana.The suspect's lawyer told CBS News his client deserved due process and asked the public "to withhold rushing to judgment until all the evidence is heard".
Hazing, which is illegal in most US states, is a tradition where people pledge their loyalty by doing something painful, humiliating or dangerous.Speaking at a news conference, Baton Rouge Police Chief Thomas Morse Jr stated that Mr Wilson's death on 27 February was a "direct result" of the hazing incident.According to police, a group of individuals dropped Mr Wilson off at a hospital and allegedly lied to the staff, saying he had collapsed while playing basketball. They left before authorities arrived.But detectives later determined that information to be inaccurate.A police arrest report reviewed by US media outlets states that Mr Wilson and eight others pledging the Omega Psi Phi Fraternity were struck by Mr McCray and at least two others wearing boxing gloves.Mr McCray allegedly hit Mr Wilson four times in the chest, after which he collapsed, suffered a seizure, and lost control of his bodily functions, the the arrest warrant affidavit said.No one present attempted to call for emergency assistance, police said. Mr Wilson was later pronounced dead at the hospital.An autopsy found no significant trauma to his body, aside from a small bruise on the right side of his chest, according to the affidavit.It also noted that investigators found no indication that Mr McCray intended to "cause death or great bodily harm to any of the pledges".Mr McCray, a member of Omega Psi Phi and a Louisiana Army National Guard member, reportedly graduated from Southern University in December 2024, according to ABC News.East Baton Rouge District Attorney Hillar Moore said two additional people, who have not been publicly identified, will be charged with misdemeanour hazing.The investigation is ongoing and remains active.Southern University System President Dennis Shields expressed deep sorrow over Mr Wilson's death."Words cannot express how deeply saddened we are by the loss of our student, Caleb Wilson," he said.Mr Shields said the campus chapter of Omega Psi Phi has been ordered to suspend all activities. Students involved in the incident could face expulsion.Additionally, all Greek organisations at the university— a historically black college— have been barred from accepting new members for the remainder of the academic year.Mr Wilson's passing has sparked widespread grief.The Human Jukebox Marching Band, which recently performed at the Super Bowl, honoured him in a Facebook post:"A talented trumpet player, a dedicated student, and a bright soul, Caleb was a mechanical engineering major who poured his passion into both his studies and his time with the Human Jukebox. His energy, spirit, and impact on those around him will never be forgotten."Hundreds of people gathered for a vigil outside Southern University's Smith-Brown Student Union.One friend, speaking of Mr Wilson, told local media outlet WAFB: "His light does not die with himself. It dies with all of us. We have to make sure his light lives within all of us and make sure you stand up tall like he's on your shoulders reaching for the sky."The Omega Psi Phi Fraternity released a statement offering condolences and supporting law enforcement's efforts "to seek the truth".Under Louisiana state law, if a person dies or is seriously injured during a hazing ritual, it can be prosecuted as a criminal offence under the Max Gruver Act. Max Gruver was a Louisiana State University who died of alcohol poisoning after hazing in 2018.Those prosecuted can face up to a $10,000 (£7,745) fine and five years in prison. Organisations and educational institutions can also face penalties under the act.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Telegraph
2 days ago
- Telegraph
M&S food sales growth collapses after cyber attack
Rapid growth at Marks & Spencer's food business has ground to a halt after the retailer was struck by a devastating cyber attack that left shelves empty. New figures seen by The Telegraph show that spending in M&S's food halls rose by 0.8pc in the four weeks to May 17 compared with a year earlier. The data covered a period when the retailer was in the initial throes of the hack. It marks a major slowdown from the rampant growth experienced by the retailer over the past year. According to the unpublished figures from analysts at NIQ, grocery spending at M&S had been up by 11pc in the 12 months to May 17. It has consistently ranked among the fastest-growing supermarkets in recent months. The NIQ data showed M&S sold fewer items in the four weeks to May 17 compared with the same period last year and its market share slipped to 3.3pc, compared with 3.6pc in the year as a whole. M&S slipped below Waitrose in the ranks of the largest grocers as a result, having overtaken the retailer for the first time in November. Previous figures had suggested M&S had escaped a major hit from the cyber attack. Separate data from Kantar recently suggested that M&S grocery sales rose by 8pc in the four weeks to May 18 and by 12.3pc in the 12 weeks to the same date. Kantar uses a different methodology, which does not include grocery sales from delivery apps such as Deliveroo. The NIQ survey data shed fresh light on the effect of the cyber attack that has crippled M&S. M&S was forced to halt online orders in mid-April after being struck by a cyber incident, which also disrupted food deliveries into stores. It led to gaps on shelves and forced the retailer to pause some offers in some stores. The attack has been blamed on criminal gang Scattered Spider. Stuart Machin, M&S's chief executive, was reportedly directly contacted by the hackers, with an abuse-filled email seen by the BBC allegedly showing hackers gloated about the attack. M&S declined to comment on the report. Seven weeks after the company disclosed the attack, it is still battling to bring its IT systems back online. M&S has not yet brought back online orders, with disruption expected to continue until July. The retailer has already admitted that the attack will knock an estimated £300m off its profits this year, dealing a setback to Mr Machin's efforts to rapidly grow the retailer. Clive Black, an analyst at Shore Capital, said the hit to food sales was to be 'wholly expected post the cyber incident, when considerable disruption to store operations was evident, meaning lots of gaps at time, famine and feast in terms of product coming into stores managed by manual rather than automated processes'. However, he suggested M&S was likely to experience a 'robust bounce back' once the IT issues were resolved. Richard Hyman, a partner at Aria Intelligent Solutions, added: 'If there was ever a good time for this to happen to M&S, it's now when they're in a position of strength. If this had happened several years ago, I think that one would be much more worried about them.' A spokesman for M&S said: 'We have made good progress in growing our food business and gaining market share over the long term. The most recent Kantar report shows market share growth of over 12pc, which is ahead of the market and underlines our resilience. 'Our stores are back to normal for our customers and have been for some time. We are getting on with providing the best quality products and service for our customers. In fact, just this week, we have launched 100 new or upgraded M&S Food products for summer.'


Scottish Sun
2 days ago
- Scottish Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
The blackmail message is believed to have included a racist term RANSOM DEMAND Terrifying message sent by 'Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) 'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. Sign up for Scottish Sun newsletter Sign up 2 High street retailer Marks & Spencer was hit by a cyber attack over the Easter holiday Credit: Alamy 2 M&S boss Stuart Machin, pictured, along with seven other company executives were emailed by the hackers, believed to be DragonForce Credit: PA The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. The £3.50 M&S buy that'll make your whole house smell like a 'boujee candle' Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations. A spokesperson for the company told The Sun Online: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'


Daily Mirror
2 days ago
- Daily Mirror
Gloating email from M&S hackers to CEO confirms motives behind cyber attack
A email has come to light sent to the boss of Marks & Spencer from a now notorious gang of online hackers called DragonForce, who are also believed to be behind an attack on the Co-op A gloating email from a gang of cyber hackers to Marks & Spencer has emerged. The message - to M&S boss Stuart Machin - confirms for the first time that retailer had been targeted by the ransomware group. In it, they wrote: 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers." It then says "The dragon wants to speak" before giving a link to the darknet - - a hidden part of the internet. The email, seen by the BBC, was sent on April 23 from the hacker group called DragonForce. The gang apparently used the account of an employee from the Indian IT giant Tata Consultancy Services, which has provided IT services to M&S for over a decade. M&S has been left reeling by the cyber attack, which has seen its online clothing, homewares and beauty sales for more than six weeks. The retailer has already estimated it could wipe £300million off its annual profits. Online has become an increasingly important to M&S - as for other retailers - and had more than 10 million 'active' customers and over £1.3billion a year of sales. Join Money Saving Club's specialist topics According to the BBC, the email is in broken English and includes a racist term. It was sent to Mr Machin and seven other executives. As well as bragging about infecting M&S's IT systems with ransomware, they also claim to have stolen the private data of millions of customers. A link in the email connects to a portal on the so-called darknet for DragonForce, the ransomware used in the attack. The hackers wrote: 'let's get the party started. Message us, we will make this fast and easy for us.' The message also appears to suggest the crooks may have details about M&S's cyber insurance policy, saying 'we know we can both help each other handsomely : ))'. M&S has said insurance should reduce the overall £300million hit. M&S has refused to say if the company has paid a ransom to the hackers. M&S is among a wave of companies struck by ransomware - a form of malicious software designed to burrow into companies' systems, steal commercially sensitive information, which is then locked, with crooks demanding their victims pay money before handing them the key. The Co-op and Harrods have also been hit recently. The gang has previously claimed the Co-op narrowly avoided being locked out of its own computer systems. On May 21, M&S said it hoped to resume online sales 'within weeks'. It also warned its operations could be out of action until as late as July, though it expected to begin resuming orders sooner than that. The gang known as DragonForce has been implicated in the first two of those, but speculation is rife about who -or what -it is. While it seems to have first emerged up to two years, experts say they use operate in a similar way to others that specialise in creating ransomware Another gang known as Scattered Spider -with members said to be aged as young as 16 -is said to have used DragonForce's ransomware in the M&S attack. DragonForce's rumoured link to Russia has been fuelled by the fact that a number of other ransomware attacks have been launched from the country in the past. Other reports have linked DragonForce to a pro-Palestinian group located in Malaysia. There has also been speculation about the group's motives, and that they could be political in some way.