logo
Luciano Frattolin: Dad Who Killed His Daughter Was Struggling to Pay Child Support as He Tells Court He's Broke and Can't Hire a Lawyer

Luciano Frattolin: Dad Who Killed His Daughter Was Struggling to Pay Child Support as He Tells Court He's Broke and Can't Hire a Lawyer

The Canadian father charged with murdering his nine-year-old daughter was reportedly drowning in debt, was struggling to keep up with child support payments—and shared bizarre social posts claiming the young girl had turned his life upside down.
Luciano Frattolin, 45, who once claimed himself to be a successful coffee business owner living a lavish lifestyle, appeared in court on Monday facing charges of killing his daughter Melina during a trip to upstate New York. He told a judge that he couldn't hire a lawyer. This came as it was revealed that Frattolin hid his daughter's body in a remote pond after telling cops that two men had kidnapped her.
Motive Behind Murder
Luciano Frattolin's mugshot after his arrest X
Frattolin, who was born in Ethiopia, praised Melina on the official website of his Montreal-based coffee business, Gambella Coffee, describing her as "beautiful" and "the light of his life." However, the write-up also revealed unsettling clues about his troubled mental state.
He admitted struggling to cope with his daughter's "messy art projects" and "chaotic" toys, because of his obsession with keeping "perfect order" in his home.
Luciano Frattolin with his daughter Melina Instagram
In the biography — which has since been removed from the web — he also referenced a life marked by deep personal struggles, mentioning experiences with "racism," "feelings of isolation," and the loss of his father as a teenager.
Frattolin hints at a "unfortunate event" in 2019 that he claimed had a serious impact on his mental health and forced him onto a "long and arduous" path toward healing.
Police revealed during a press conference on Monday that he became estranged from his ex-wife that same year. Alongside emotional turmoil and a strained relationship with his former spouse, Frattolin was also dealing with over $200,000 in debt linked to his business ventures in Montreal.
Since 2020, the struggling businessman had been renting a property in Montreal's trendy Mile End neighborhood, which he subleased on Airbnb, according to La Presse. He hired two property managers to run the venture, including handling rent payments—allowing him to use the remaining income to cover child support, according to court records reviewed by the outlet.
Struggling to Survive
However, his lease was terminated by the landlord in August 2024 after he fell behind by $26,000 in rent. He was subsequently barred from accessing the property, where he claimed he kept his daughter's winter clothes and toys.
Melina Frattolin X
Frattolin is now suing the property managers for more than $115,000, alleging they misused the rental unit without his consent and failed to pay the rent as agreed, according to Le Devoir.
In response, the property managers accused Frattolin planned to empty his bank account and leave the country — a claim he has denied.
A former staff member at Dépanneur Café, a coffee shop previously owned by Frattolin, said he had been splitting his time between Italy and Canada over the past year and a half. Frattolin reportedly still owes the Bank of Nova Scotia around $83,000 related to that business.
Luciano Frattolin with his daughter Melina Instagram
The bank also claims he is responsible for another $97,000 in unpaid credit card debt from Café Gambella, a second coffee venture that shares its name with his online coffee brand.
However, Frattolin's Instagram painted a starkly different picture of his finances, filled with images of luxurious travel, high-end sports cars, and captions like "I'm truly addicted to Porsche."
He and his daughter were on a vacation in the Lake George area shortly before she was killed — just about 30 miles from where her body was later discovered.
Prior to the grim discovery, police said Frattolin had filed a false report claiming that Milena had been abducted by two men in a white van near Exit 22 on I-87 — less than an hour after she had spoken to her mother by phone before their scheduled flight back to Quebec.
Captain Robert McConnell said that Frattolin killed his daughter Melina on Saturday night while they were vacationing near the scenic town of Lake George in the Adirondack Mountains, roughly 60 miles north of Albany.
Luciano Frattolin with his daughter Melina Instagram
Frattolin and Melina had entered the U.S. legally and had been on vacation since July 11, with plans to return to Quebec on Sunday.
On Monday, Frattolin pleaded not guilty in court.
He was charged with second-degree murder — a crime that could result in a life sentence under New York law — along with a charge for hiding a human corpse. His next court appearance is scheduled for July 25.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft says Chinese state-backed hackers exploiting flaws in attacks
Microsoft says Chinese state-backed hackers exploiting flaws in attacks

Straits Times

time3 hours ago

  • Straits Times

Microsoft says Chinese state-backed hackers exploiting flaws in attacks

Microsoft said it had identified at least two China-based groups linked to the Chinese government that it said had been taking advantage of security flaws in its SharePoint software. BEIJING – Microsoft said that Chinese state-sponsored actors were exploiting vulnerabilities in one of its popular collaboration software products, SharePoint, which is used by US government agencies and many companies worldwide. Microsoft said in a notice on its security blog on July 22 that it had identified at least two China-based groups linked to the Chinese government that it said had been taking advantage of security flaws in its SharePoint software. Such attacks aim to sneak into the computer systems of users. Those groups, called Linen Typhoon and Violet Typhoon, were ones that Microsoft said it had been tracking for years, and which it said had been targeting organisations and personnel related to government, defence, human rights, higher education, media, and financial and health services in the United States, Europe and East Asia. Microsoft said another actor, which it called Storm-2603, was also involved in the hacking campaign. It said it had 'medium confidence' that Storm-2603 was a 'China-based threat actor'. The US government's Cybersecurity and Infrastructure Security Agency issued a notice that said it was aware of the hacking attack on SharePoint. It added that it had notified 'critical infrastructure organisations' that were affected. 'While the scope and impact continue to be assessed,' the agency said, the vulnerabilities would enable 'malicious actors to fully access SharePoint content, including file systems and internal configurations and execute code over the network.' A Microsoft spokesperson wrote in an emailed response that the company had been 'coordinating closely' with the Cybersecurity and Infrastructure Security Agency, the Department of Defense's Cyber Defense Command and 'key cybersecurity partners globally throughout our response'. The Chinese Embassy in Washington did not immediately respond to a request for comment. China has routinely denied being behind cyberattacks and asserts that it is a victim of them. Microsoft said in its blog post that investigations into other actors also using these exploits were still ongoing. Eye Security, a cybersecurity firm, said that it had scanned more than 23,000 SharePoint servers worldwide, and discovered more than 400 systems had been actively compromised. The cybersecurity firm also noted that the breaches could allow hackers to steal cryptographic keys that would allow them to impersonate users or services even after the server was patched. It said users would need to take further steps to protect their information. Chinese hackers have shown growing sophistication in their ability to penetrate US government systems, leaving American officials increasingly alarmed. During a breach of the US telecommunications system last year, Chinese hackers were able to listen in on telephone conversations and read text messages, members of Congress said. The hack was considered so severe that former President Joe Biden took it up directly with President Xi Jinping of China when they met in Peru in November. In this latest breach, Microsoft said hackers had been using the software weaknesses to attempt, and gain, access to 'target organisations' since as early as July 7. It issued security updates and urged users to install them immediately. Microsoft revealed the vulnerabilities in SharePoint this month, but at first patched them only partially. It said on July 19 that it was aware of active attacks trying to exploit those vulnerabilities. Cybersecurity firms had said that they believed Chinese actors were among those attackers, even before Microsoft said so on July 22. SharePoint helps organisations create websites and manage documents. It integrates with other Microsoft services such as Office, Teams and Outlook. Microsoft said the vulnerabilities affected only on-premises SharePoint servers, meaning those managed by organisations on their own computer networks, and not those operated on Microsoft's cloud. Palo Alto Networks, a cybersecurity company, said in a post about the breach that on-premises servers 'particularly within government, schools, health care (including hospitals) and large enterprise companies' were 'at immediate risk.' 'A compromise in this situation doesn't stay contained, it opens the door to the entire network,' the cybersecurity company said. NYTIMES

Judge to rule in sexual assault case that shook Canadian hockey
Judge to rule in sexual assault case that shook Canadian hockey

Straits Times

time6 hours ago

  • Straits Times

Judge to rule in sexual assault case that shook Canadian hockey

Find out what's new on ST website and app. A Canadian judge will deliver a verdict on July 24 in the trial of five professional ice hockey players on sexual assault charges. TORONTO – A Canadian judge will deliver a verdict on July 24 in the trial of five professional ice hockey players on sexual assault charges, in a case that has rocked the cherished national sport. The players stood trial over allegations they assaulted a woman in a hotel room following a June 2018 celebration for a national men's junior team. Michael McLeod, Alex Formenton, Dillon Dube, Carter Hart and Callan Foote have denied wrongdoing, insisting the accuser – whose identity is protected – consented to a variety of sex acts. The complainant, 20 at the time, met McLeod at a bar in London, Ontario, before having sex with him. That initial encounter is not at issue in the trial, which is about events that occurred after McLeod messaged a team-wide group chat asking if anyone was interested in a 'three-way'. The players have confirmed participating in sex acts with the complainant and an initial police investigation produced no charges. Media investigations then revealed Hockey Canada, a governing body, used funds from subscription fees paid by ordinary families for a $3.55 million CAD out-of-court settlement with the woman. Top stories Swipe. Select. Stay informed. Singapore HDB launches 10,209 BTO and balance flats, as priority scheme for singles kick in Business Singapore's digital banks finding their niche in areas like SMEs as they narrow losses in 2024 Asia Japan Prime Minister Ishiba to resign by August, Mainichi newspaper reports World Trump says US will charge 19% tariff on goods from Philippines, down from 20% Singapore Two found dead after fire in Toa Payoh flat Singapore 2 foreigners arrested for shop theft at Changi Airport Opinion Most companies onboard the wrong way – here's how to get it right Singapore Ports and planes: The 2 Singapore firms helping to keep the world moving Public outrage forced the resignation of Hockey Canada's board, and London police, under a new chief, re-investigated the case led by a female detective with expertise in sexual assault. Western University law professor Melanie Randall, who has closely followed the case, told AFP the flawed initial investigation included an 'inappropriate fixation' by the detective on the complainant's alcohol consumption. Randall added the first detective did not apply up-to-date understandings of consent under criminal law, the issue that defined the trial. 'Consent has to be voluntarily and freely given, and it has to be contemporaneous with each and every sexual act,' Randall said. 'You can't give consent in advance and you can't give it retroactively,' she added, calling that a 'powerful shift in (Canadian) law'. The trial heard that players made videos of the complainant saying she was OK with what happened. Prosecutors argued the decision to make a video indicated concern the sex was not consensual. Hart, a former NHL goaltender, testified such videos were common practice among professional athletes. Randall noted, 'the idea that you could film someone afterwards and say – 'hey, this was all consensual, right?' – to prove that there was consent is actually completely discordant with how consent is defined (in Canadian law).' In a landmark 1999 decision, Canada's Supreme Court barred defense lawyers in sexual assault cases from a tactic it called 'whack the complainant.' Scholar have defined this as withering cross examination attacking a complainant's credibility through outdated stereotypes about sexual encounters. Raising their entire sexual history, alleged promiscuous behavior, or questions about why they did not resist are prohibited. For Randall, defense lawyers in the hockey case committed 'a pretty egregious and blatant example of whack the victim, full force,' citing 'nine days of brutal cross-examination.' Some commentators have rejected claims the case exposed broader issues in hockey culture, arguing the sport remains a positive force for hundreds of thousands of young Canadians despite a disturbing incident involving several players. But Simon Darnell, a professor of sport for development and peace at the University of Toronto, told AFP 'it would be a problem to say that these five men were somehow bad apples and that there's nothing systemic here.' Regardless of whether the judge finds the players guilty, Darnell said the conduct in the hotel room needs to be addressed. 'Young, elite male hockey players grow up in an environment, where they are told both implicitly and explicitly that they are really important,' he said. 'They probably grew up feeling like sexual conquest was this thing that they're owed as a result of being a hockey player,' he added, urging more work to foster a sports culture that emphasizes 'a positive form of masculinity.' AFP

Iranians targeted with spyware in lead-up to war with Israel: Research
Iranians targeted with spyware in lead-up to war with Israel: Research

Straits Times

time20 hours ago

  • Straits Times

Iranians targeted with spyware in lead-up to war with Israel: Research

Find out what's new on ST website and app. According to new research, more than a dozen Iranians' mobile phones were targeted with spyware in the months prior to the country's war with Israel. TEXAS – More than a dozen Iranians' mobile phones were targeted with spyware in the months prior to the country's war with Israel, according to new research. Miaan Group, a digital human rights organisation based in Austin, Texas, found a number of Iranians who received threat notifications from Apple Inc. in the first half of 2025, and researchers believe they only identified a fraction of the total targets. Another round of Iranian spyware targets was discovered by Mr Hamid Kashfi , a Sweden-based cybersecurity researcher and founder of the firm DarkCell. The attacks mark the first known example of such highly advanced cyber-espionage tools being used both inside Iran and against Iranians living abroad. It's not clear who was behind the attacks. Miaan Group said the victims included two Iranian dissidents inside the country and a technology worker who is an Iranian citizen living in Europe, who were targeted with spyware on their iPhones. They were first notified of the incident via text message by Apple, which typically sends a threat notification message to victims when a hack is detected. Mr Kashfi said he found 12 victims, all inside Iran and working either in the country's technology sector or for the government. Both Mr Kashfi and the Miaan Group declined to name the victims in order to protect their safety. Top stories Swipe. Select. Stay informed. Singapore Singaporeans aged 21 to 59 can claim $600 SG60 vouchers from July 22 Singapore Singaporeans continue to hold world's most powerful passport in latest ranking Singapore Woman evacuated from lift in Supreme Court building after falling glass triggers emergency halt Asia Malaysian aide's unresolved 2009 death tests govt's reform pledge despite DAP chief's apology Singapore Prosecution says judge who acquitted duo of bribing ex-LTA official had copied defence arguments Singapore Singapore not affected by haze despite smoke plumes in Sumatra: NEA Singapore Miscalculation of MOH subsidies and grants led to $7m in overpayments, $2m in shortfalls Singapore Ports and planes: The 2 Singapore firms helping to keep the world moving The threat notifications, which were seen by Bloomberg, describe the attacks as 'exceptionally rare' and costing 'millions of dollars'. The Apple notification, which is careful to note that the company doesn't attribute the attacks, compared the sophistication and cost of the recent attacks to Pegasus spyware from NSO Group. 'The extreme cost, sophistication and worldwide nature makes mercenary spyware attacks some of the most advanced digital threads in existence today,' Apple told the Iranian targets. 'This attack is likely targeting you specifically because of who you are or what you do.' Apple didn't respond to a Bloomberg request for comment. The notification added that 'Apple has high confidence in this warning.' Mr Kashfi said his investigation concluded that 'zero-day zero-click' attacks were likely used. That approach exploits hidden vulnerabilities and require no interaction from the victim. 'Zero-click chains are more sophisticated, more expensive, one stage higher than typical hacking campaigns,' Mr Kashfi said. 'But they weren't shy about using it and burning it.' Neither Mr Kashfi nor the Miaan Group were able to do full forensic examinations of the targeted iPhones. In several cases, being inside Iran made examinations impossible. In others, victims only came forward months after the notification. Finally, other targets chose to take their targeted iPhones to be examined by the Iranian government security services rather than independent experts living abroad, Mr Kashfi said. BLOOMBERG

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store