Violent assault case took five years to get to court

IT TOOK almost five years for a man who violently assaulted his partner to be found guilty of the crime, due largely to police inaction.

(Picture by Sophie Rabey, 28903177)
(Picture by Sophie Rabey, 28903177)

Judge Graeme McKerrell said the delay in prosecuting 22-year-old Liam Michael James Simon was undoubtedly unconscionable.

After the assault on Christmas Day 2015 the case file had lain dormant on a dusty shelf somewhere in the Police Station for some three-and-a-half years, he said.

During that time the defendant had been prosecuted for other matters and even sent to prison, but nobody had picked the file up. They might never have done so had it not been for proceedings in another court, when it was raised by a third party.

The defendant had caused some of the delay himself but police were the main reason for it, said Judge McKerrell.

Simon appeared from custody in court this week to deny the offence, which took place at his then home in Les Genats Estate, Castel. The court heard how he and his then partner had been together for about three years. On the day in question they argued as she planned to visit her father later that day but he was not invited.

The woman told the court how she had been in the bathroom. The defendant pushed the door open and grabbed a pair of scissors. When she leaned backwards he had grabbed her hair, holding her over the bath which had ripped her earrings out in the process. He stamped on her phone. When she went downstairs he had followed her into the kitchen where he took a knife from a drawer and threatened her with it. As the woman walked in the lounge he had grabbed her around the ribcage from behind. She heard a popping noise and found it difficult to breathe.

At this point he had put her on a sofa and went to fetch a glass of water for her. Their relationship, she said, which was an abusive one, had ended that day.

She had not visited a doctor at the time but had since found that she had a bent rib which they were talking about removing.

Defending, Advocate Paul Lockwood said the woman had said nothing about his client stamping on her phone or her having a bent rib in her statement. She said she had mentioned the rib to her advocate.

Advocate Lockwood asked why she had not complained to police until February 2016.

‘I was scared and young and he had hit me before,’ she said.

Her sister had persuaded her that she should go to the police.

Simon denied attacking the woman. He said he could not remember the incident but he would not have done such a thing. He thought the woman had ended the relationship because he cheated on her. He could not explain why the woman had said the things she had. He could not remember whether he got on with her father or not.

Advocate Lockwood asked the court to stay the case. He said the delay in proceedings had caused such prejudice to his client’s case that it was an abuse of process.

Judge McKerrell said Advocate Lockwood was not arguing that he had been unable to take proper instructions from his client because of the delay.

The judge said he believed the problem lay with the quality and honesty of the instructions Advocate Lockwood had been given.

The defendant had been able to give the court more detail about his induction into the Army than about the break-up of his relationship with his childhood sweetheart. He did not believe the defendant had amnesia. None of the evidence that the woman had given had re-kindled his memory about what happened five years ago. The defendant told the court he did not think he had ever been violent towards her but in a message extracted from the woman’s telephone in February 2016 he had admitted it.

If the woman had not been telling the truth, why would she have said that he put her on a sofa and got her a glass of water? When Simon had contacted the woman in January asking to discuss his problems with her she had sent quite a forgiving response.

He found the woman had been a witness of truth and said he had found her account to be accurate.

He found the defendant guilty. Simon will be sentenced for that and other matters later this month.

Sorry, we are not accepting comments on this article.

Top Stories

More From The Guernsey Press


Sam Field - Sure's Enterprise Solutions Product Manager discusses how the global pandemic and restrictions on movement have led to an increased dependency on digital services for both businesses and consumers, and to a large extent, pretty much everyone has had to adapt to new ways of working. Enforced lockdown has seen a massive rise in the use of collaboration services, and workforce transformations have taken place before our very eyes. Digital communications in whatever format have massively increased the amount of business data in circulation. Cybercriminals quickly identified dispersed working as a major opportunity, and have responded with pandemic themed scams and attacks to steal information and data. Whilst cyberattacks on individuals are very upsetting, they are generally easier to spot and deal with. A ‘take no action’ approach to any form of contact outside the norm is the key learning point on a personal level, and nobody can claim to be so smart they are not vulnerable. The workplace however is a much more complex environment with hierarchical relationships, managerial directives and business systems that aren’t always the simplest to operate. There’s a greater scope for cybercrime in organisations with operational complexity, and the value of data and information that can be stolen or extorted tends to be higher. Furthermore, it isn’t just criminals who are interested in business data. There are many business information platforms and other data centric organisations who are benefitting from the wealth of information flowing around the digital economy. And for many island organisations, protecting intellectual property (IP) from cybercriminals and other interested parties is vital. The arms race between data protection, criminals and legal data hunters is here for the long-haul as organisations strive to protect their businesses, customers, revenues and reputation. The focus still remains on cybercrime though, and the five overriding threats that are targeting hybrid working environments are: Email Phishing Defined as the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity. Covid phishing activity often impersonates government and health authorities to deceive users into sharing confidential information such as payment and account credentials. When hackers break into corporate networks, they often take their time monitoring emails and activity, to maximise the impact of their attack. Criminals then mimic existing accounts and send emails instructing people to take action … do this, click here, update that, … all in an attempt to obtain the information and the access to funds they are looking for. SMS Phishing Also known as ‘Smishing’, is text messaging fraud that tries to lure victims into taking action. Clicking on links in texts can activate the downloading of malware that will reveal and extract sensitive account information. The increased use of smartphones for so much business activity exposes organisations to an extended perimeter, through a non-PC based zone of extended vulnerability. Fraudulent Domains Or domain spoofing, is also associated with phishing. Attackers use a ‘bogus domains’ to impersonate a company or its employees. This can be done by sending emails with false domain names which appear legitimate, or by setting up websites with slightly altered characters that look authentic, and asking you to take action that will compromise your security. Counterfeit Apps A counterfeit app is an app that claims to do something, but is actually fake, ineffective, or harmful to a user's device and information. They have been found on legitimate app stores including Apple and Google Play, where they have not yet been detected or reported. They aim to defraud users by offering fake functionality, and stealing data. Malware Malware is software that has been intentionally designed to cause damage or harm to a computer, server, client, or computer network - often for the purposes of extorting money. A wide variety of malware exist, including viruses, worms, trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware. Malware exists for a number of reasons: such as causing malicious damage, and stealing financial details and sensitive information. Ransomware is a form of malware where attacks are designed to block access or take down sites until a sum of money is paid. Clear and Present Danger The average cost of a business cyberattack is estimated to be £3million, and around half of the cyberattacks involve email phishing, a figure that’s 20% higher than the global average. We partner with Mimecast, a ‘Gartner Magic Quadrant’ global cyber security leader, to provide a unique range of on and off-shore services. Cloud based, layered security provides advanced safeguarding and business continuity, protecting email and messaging services, along with access to your securely archived information. Download Sure's 'Creating your Digital Workplace’ here: Download 'Unified Communications' brochure: Find more information about Sure's portfolio of flexible working solutions: Sponsored content

UK & International News