logo
Her father's murder has been unsolved for over 20 years. Here's how Madison McGhee is trying to get answers

Her father's murder has been unsolved for over 20 years. Here's how Madison McGhee is trying to get answers

CBS News08-04-2025

For 10 years, Madison McGhee believed her father had died of a heart attack. It wasn't until she was 16 that she learned the truth: He was murdered. John Cornelius "J.C." McGhee had been shot and killed at his Ohio home on July 11, 2002.
Not long afterwards, McGhee learned that his killing had never been solved. Her father was a former drug dealer and a confidential informant, McGhee said, which provided possible motives for his death — but she also felt it made police less willing to investigate the case thoroughly.
The case is in the jurisdiction of the Belmont County Sheriff's Department in Ohio. An arrest has never been made. The sheriff's office declined to comment on the case or McGhee's allegations that it was not investigated appropriately.
In the late 2010s, McGhee began to notice cases, like that of the
Golden State Killer
, were going to trial after podcast investigations led to new answers. She started to wonder if something similar could help her solve her father's killing. McGhee would occasionally message family members on Facebook to ask if they knew anything about her dad or his death. In 2020, during the early days of the coronavirus pandemic, she turned her attention to the project more fully.
"My dad was killed with a gunshot to the head, so only one person shot that gun, and that's what I need to figure out, is who that person was," McGhee told CBS News. "I believe there were multiple people there, so it's just a matter of who's capable of it and which person did it. That is a struggle. And then also there's the motive piece. Why did this happen? Were there strings being pulled behind the scenes? Was this a targeted thing, was this an accident?"
McGhee, 29, used her background as an independent video producer to start "Ice Cold Case," a podcast where she would try to solve her father's killing. She said she was able to get access to the case files, and began interviewing people who were mentioned in those files. Soon, she started getting tips from people who had been around at the time.
This led to her belief that police did not investigate her father's killing thoroughly. McGhee claims police told her they had been searching for a witness, but had not been able to find her. She said after a few minutes of searching on social media, she was able to find the witness. McGhee said the witness still lives in the county, and she was able to interview her on the podcast. When asked about the witness, the Belmont County Sheriff's Office declined to comment.
McGhee said police have not been cooperative with the podcast or her investigation: While she has the case files, she has not been able to see any evidence from the crime scene, which she said she believed would help her solve the crime. When asked about the request, the Belmont County Sheriff's Office declined to comment. Now, her hope is that she will be able to learn enough from interviews that she can go to the sheriff's office and see if the details she learns corroborate the information in the police files. McGhee said that she believes she is close to identifying who was present when her father died. After that, she says she'll still need to identify who fired the shot that killed J.C. McGhee.
During the podcast's second season, McGhee interviewed a man who several witnesses and people who knew her father told her was the main suspect in the killing. A grand jury was convened, but charges were never brought. When asked about the grand jury and why charges were not brought, the Belmont County Sheriff's Office declined to comment. The office also declined to comment about whether the man was a suspect. McGhee interviewed him in a library in West Virginia, she said, and his comments later appeared on the podcast. She doesn't know if he is the one who pulled the trigger.
"We sat for two hours together, and he told me he didn't kill my dad, and it was really emotional," McGhee said. "If that's all true, great. I don't know. He could be lying. That interview doesn't prove his innocence by any means, but it was interesting for sure, and it taught me a lot."
McGhee's hope is that the investigation will eventually encourage the sheriff's office to identify a suspect and file charges. If no charges are filed, she predicts the third season of "Ice Cold Case," which premieres on Wednesday, April 7, will be the last. The podcast is independently produced by McGhee, without a studio or company funding it. McGhee said she has spent over $100,000 on the podcast. It has burned through her savings, run up her credit card debt and led to strained relationships with some family members. If an arrest is made, McGhee said she will cover any legal proceedings.
Even if the podcast doesn't solve the case, McGhee said she hopes it will lead to enough interest in her father's killing to put pressure on police to keep investigating. She also said she hopes the podcast helps humanize her father in the public eye.
"I was trying to get people to see oh, wait, a lot of people like J.C. McGhee get killed, and we really don't give a s***, and maybe we should," she said. "I was really trying to get people to see my dad as the dynamic person he was: Yes, drug dealer, yes, confidential informant, yes, maybe a little bit of a shady business guy. But he was a hell of a dad ... He did everything he could for his family, and he made sure we were always provided for, and I think that should be discussed when talking about my dad."
"I don't know what will happen. I don't know if the Belmont County Sheriff's Department will decide that they are going to move with an arrest, or if they're going to do something," McGhee continued. "My hope for the next 12 months is you can't go anywhere without seeing J.C. McGhee."

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

How to tell if a login alert is real or a scam
How to tell if a login alert is real or a scam

Fox News

time23 minutes ago

  • Fox News

How to tell if a login alert is real or a scam

Online scams thrive on the urgency and fear of their victims. If you've ever been a victim of a scam, you'd know that bad actors often try to rush you into taking action by creating a sense of fear. A scammer may call you impersonating a government agency and claim your Social Security number has been linked to drug trafficking. A phishing email might ask you to update your tax details or claim you've won a lottery or a free product, all to get you to click a malicious link. A more effective tactic scammers use is sending fake login alerts. These are warnings that someone has logged into your account, prompting you to take immediate action. This method works well because legitimate services like Google, Apple, Netflix and Facebook also send these types of notifications when someone, including you, logs in from a new device. It can be tricky to tell the difference. As Robert from Danville asks, "I constantly get in my spam junk folder emails saying 'someone has logged into your account.' Is this spam? legitimate? concerning? How do I know? How to avoid wasting time checking? How do I check?" Thanks for writing to us, Robert. I completely understand how tricky it can be to figure out whether these messages are legitimate or just another scam attempt. Let's break down what these urgent warnings usually look like and go over a few ways you can stay safe. Scammers often pose as login alerts from Google, Apple, Meta or even your bank, complete with official-looking logos, because fear is effective. But not every alert is a scam. In many cases, these notifications are legitimate and can help you detect unauthorized access to your accounts. Let's focus on the scam side first. Login alert scams have been around for a while. Early reports date back to 2021, and the trend has persisted since then. In 2022, reports surfaced that scammers were impersonating Meta and sending phishing emails to users. One such email used a clean layout with minimal text. It avoided the usual scare tactics and stuck to a simple message. But that is not always the case. A common red flag in phishing attempts is the tendency to overload the email with unnecessary details. These messages often include cluttered formatting, excessive explanations and an increasing number of typos or design errors. One phishing email simply gets to the point: Someone tried to Iog into Your Account, User lD A user just logged into your Facebook account from a new device Samsung S21. We are sending you this email to verify it's really you. Thanks, The Facebook Team What's concerning now is that poor grammar is no longer a reliable sign of a scam. Thanks to AI, even those with limited English skills can write emails that sound polished and professional. As a result, many phishing messages today read just like legitimate emails from trusted companies. Receiving a phishing email is not the real issue. The real problem starts when you click on it. Most of these emails contain links that lead to fake login pages, designed to look exactly like platforms such as Facebook, Google or your bank. If you enter your credentials there, they go directly to the scammer. In some cases, simply clicking the link can trigger a malware download, especially if your browser is outdated or your device lacks proper security. Once inside, attackers can steal personal information, monitor your activity or take control of your accounts. Real login notifications do exist; they're just much less scary. A genuine alert from Google, Apple or Microsoft will come from an official address (for example, no-reply@ or security@ and use consistent branding. The tone is factual and helpful. For instance, a legit Google security alert might say, "We detected a login from a new sign-in to your Google Account on a Pixel 6 Pro device. If this was you, you don't need to do anything. If not, we'll help you secure your account." It may include a "Check activity" button, but that link always redirects to a address, and it won't prompt you to reenter your password via the email link. Similarly, Apple notes it will never ask for passwords or verification codes via email. 1. Don't click any links or attachments and use strong antivirus software: Instead, manually log in to the real site (or open the official app) by typing the URL or using a bookmarked link. This guarantees you're not walking into a scammer's trap. The FTC recommends this: if you have an account with that company, contact them via the website or phone number you know is real, not the info in the email. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2. Remove your data from the internet: Scammers are able to send you targeted messages because your data, like your email address or phone number, is already out there. This often happens due to past data breaches and shady data brokers. A data removal service can help clean up your digital trail by removing your information from public databases and people-search sites. It's not a quick fix, but over time, it reduces how easily scammers can find and target you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 3. Check your account activity: Go to your account's security or sign-in page. Services like Gmail, iCloud or your bank let you review recent logins and devices. If you see nothing unusual, you're safe. If you do find a strange login, follow the site's process (usually changing your password and logging out all devices). Even if you don't find anything odd, change your password as a precaution. Do it through the official site or app, not the email. Consider using a password manager to generate and store complex passwords. 4. Enable two-factor authentication (2FA): This is your best backup. With 2FA enabled, even if someone has your password, they can't gain access without your phone and an additional second factor. Both Google and Apple make 2FA easy and say it "makes it harder for scammers" to hijack your account. 5. Report suspicious emails: If you receive a suspicious email claiming to be from a specific organization, report it to that organization's official support or security team so they can take appropriate action. You shouldn't have to vet every sketchy email. In fact, your email's spam filters catch most phishing attempts for you. Keep them enabled, and make sure your software is up to date so that malicious sites and attachments are blocked. Still, the most powerful filter is your own awareness. You're definitely not alone in this. People receive these spammy login scares every day. By keeping a cool head and following the steps above, you're already ahead of the game. Have you ever encountered a suspicious email or phishing attempt? How did you handle it, and what did you learn from the experience? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

New York State trooper launched over guardrail after semi-truck plowed into patrol car during traffic stop on Thruway
New York State trooper launched over guardrail after semi-truck plowed into patrol car during traffic stop on Thruway

New York Post

time16 hours ago

  • New York Post

New York State trooper launched over guardrail after semi-truck plowed into patrol car during traffic stop on Thruway

A New York State trooper was seriously injured when a semi-truck plowed into his parked patrol car on the side of a busy upstate highway – obliterating the cruiser and sending the cop flying over a guardrail, police said. The freakish incident unfolded around 12:39 p.m. Friday as the trooper was conducting a traffic stop on the New York State Thruway in Schenectady County, just 25 miles southwest of Albany. The trailer-less tractor was traveling westbound on Interstate 90 when it slammed into the squad car, according to state police, which shared startling images of the collision. 4 The collision obliterated the New York State Police cruiser Friday afternoon. New York State Police/Facebook Police said the impact hurled the trooper, who was standing on the passenger side of a Honda Odyssey involved in the traffic stop, over the metal barrier and tumbling down an embankment. 'The incident is a powerful reminder: New York's Move Over Law is not optional,' police said, referring to a state law that requires motorists to slow down and shift lanes when a vehicle is stopped on an Empire State roadway. 4 The disastrous incident occurred on the New York State Thruway while the trooper was conducting a traffic stop. New York State Police/Facebook 'When you see emergency, police, fire, or highway crews on the shoulder – slow down and move over. Lives depend on it.' Images of the wreck showed the mangled cop car perched atop the flattened guardrail, its rear end sheared off, car hood damaged, windshield shattered and airbags deployed. The cruiser also smashed into the back of the Honda, leaving it severely damaged and shuttering the thruway for hours. 4 The trooper was sent to the hospital with serious injuries. New York State Police/Facebook The trooper was taken to Albany Medical Center with serious but non-life-threatening injuries. The Honda driver and passenger suffered minor injuries and were transported to St. Mary's Hospital in Amsterdam, police said. 4 The wreck, which sent the driver and passenger involved in the traffic stop to the hospital, closed the highway for hours. New York State Police/Facebook It was not immediately clear if the truck driver, who was not identified, was charged. 'We wish our Trooper a full and speedy recovery,' police said.

Jared Leto Responds To Sexual Misconduct Allegations
Jared Leto Responds To Sexual Misconduct Allegations

Buzz Feed

time17 hours ago

  • Buzz Feed

Jared Leto Responds To Sexual Misconduct Allegations

This story contains discussion of sexual misconduct. Jared Leto is responding to allegations, including several claims of sexual misconduct, from multiple women. Earlier today, Air Mail published a story that included interviews with nine women who claimed that the actor and musician had behaved inappropriately towards them. Some women alleged that the incidents took place while they were underage, and one anonymously claimed that 'It's been an open secret for a long time." The reporting accuses Jared of, among other things, allegedly appearing nude in front of model Laura La Rue when she was 17 years old, and allegedly exposing himself and masturbating in front of an 18-year-old before placing their hand "on him." In a statement to Air Mail, Jared's rep "expressly" denied the allegations in the story. They also directly addressed Laura's allegation, claiming that hers and Jared's "communications contain nothing sexual or inappropriate" and that she "later applied to work as Mr. Leto's personal assistant, further underscoring the absence of anything inappropriate in any of their interactions." In the story, Laura denied having ever applied to work for him. In response to another accuser's allegation that he would call her in the middle of the night and didn't "know if he was on drugs," Jared's rep claimed that the actor 'has not had a drink or used drugs in over 35 years.' The rep also told the publication that 'there was never any recruiting, complaints or impropriety" in response to allegations that Jared had hosted parties with the intent for young women to go skinny-dipping. The publication also reported that these allegations against Jared surfaced after DJ Allie Teilz reposted a Facebook status from 2012 on IG, alleging that she was "assaulted and traumatized by this creep when I was 17." Jared's reps say that her "allegations are demonstrably false." You can read the entire report containing the allegations that Jared is denying here.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store