logo
Diddy convicted over prostitution, cleared of others

Diddy convicted over prostitution, cleared of others

Perth Now2 days ago
Sean "Diddy" Combs was acquitted of racketeering conspiracy and two counts of sex trafficking. (AP PHOTO)
Sean "Diddy" Combs was acquitted of racketeering conspiracy and two counts of sex trafficking. (AP PHOTO) Credit: AAP
Sean "Diddy" Combs has been found guilty of prostitution-related offences but cleared of more serious charges after a criminal trial in which two of the music mogul's former girlfriends testified that he physically and sexually abused them.
Combs was convicted of transportation to engage in prostitution but acquitted of racketeering conspiracy and two counts of sex trafficking, a partial win for the former billionaire known for elevating hip-hop in US culture.
After the jury read its verdict, defence lawyer Marc Agnifilo asked Subramanian to release Combs on bail.
"This is his first conviction and it's a prostitution offence, and so he should be released on appropriate conditions," Agnifilo said.
Combs faces a maximum 10-year prison sentence on each of the two prostitution counts.
US District Judge Arun Subramanian will determine Combs' sentence at a later date.
The acquittals on the sex trafficking counts means he will avoid a 15-year mandatory minimum sentence.
He could have faced life in prison if he were convicted on sex trafficking or racketeering conspiracy.
Prosecutors say Combs for two decades used his business empire to force two of his romantic partners to take part in drug-fuelled, days-long sexual performances sometimes known as "Freak Offs" with male sex workers in hotel rooms while Combs watched and occasionally filmed.
During raids of Combs' homes, authorities found drugs and 1000 bottles of baby oil and lubricant that he would use in the performances, prosecutors said.
Combs, 55, had pleaded not guilty to all five counts.
His lawyers acknowledged that the Bad Boy Records founder, once famed for hosting lavish parties for the cultural elite in luxurious locales like the Hamptons and Saint-Tropez, was at times violent in his domestic relationships.
But they said the sexual activity described by prosecutors was consensual.
The seven-week trial in Manhattan federal court exposed the inner workings of Combs' business empire and gave the 12-member jury an intimate look into his volatile romantic relationships with the rhythm and blues singer Casandra "Cassie" Ventura and a woman known in court by the pseudonym Jane.
Ventura sued Combs in November 2023 for sex trafficking, the first of dozens of civil lawsuits accusing him of abuse.
Combs, also known throughout his career as Puff Daddy and P. Diddy and once feted for turning artists like Notorious B.I.G. and Usher into stars, settled with Ventura for $US20 million ($A30 million).
He has denied all wrongdoing.
At the trial, jurors saw surveillance footage from 2016 showing Combs kicking and dragging Ventura in the hallway of an InterContinental hotel in Los Angeles, where she said she was trying to leave a "Freak Off".
According to prosecutors, physical violence was just one way Combs compelled Ventura and Jane to take part in the performances - an act of coercion they say amounts to sex trafficking because the male escorts were paid.
Both women testified that he threatened to withhold financial support and to leak sexually explicit images of them if they refused to comply.
"The defendant used power, violence and fear to get what he wanted," prosecutor Christy Slavik said in her closing argument on June 26.
"He doesn't take no for an answer."
Combs' defence lawyers argued that while Combs may have committed domestic violence in the context of volatile romantic partnerships, his conduct did not amount to sex trafficking.
They argued that Ventura and Jane were strong, independent women who voluntarily took part in the sexual performances because they wanted to please Combs.
1800 RESPECT (1800 737 732)
National Sexual Abuse and Redress Support Service 1800 211 028
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Best friend of Sean ‘Diddy' Combs' late ex-wife has shocking reaction to verdict
Best friend of Sean ‘Diddy' Combs' late ex-wife has shocking reaction to verdict

News.com.au

time2 hours ago

  • News.com.au

Best friend of Sean ‘Diddy' Combs' late ex-wife has shocking reaction to verdict

Kim Porter's best friend, Eboni Elektra, has stayed silent about Sean 'Diddy' Combs' legal troubles — until now. The 54-year-old broke her silence via Instagram on Wednesday after the rapper's mixed verdict was revealed, reports Page Six. The Grammy winner, notably, was found guilty of two counts of transportation to engage in prostitution but acquitted of sex trafficking and racketeering. 'PRAISE GOD,' Elektra captioned a close-up photo of Combs' face. 'OPINIONS …. we are all entitled to them. MISTAKES … we all make them. JUDGING … we all do it. GOSSIP …. we are all guilty of it. 'GOD'S WILL … is higher than any opinion, mistake, Judgement, or gossip,' she continued. 'If this is God's will for Puff / diddy, than that's His will. In the end, what we think does not compare to His will.' Elektra concluded by asking, 'WHO ARE WE TO JUDGE??? That's God's job. It's all in His hands. U never know. #isallintheword#readyourbible … my opinionâ�¤ï¸�.' T.I.'s wife, Tameka 'Tiny' Harris supported Elektra in the comments, defending 'being freaky.' Many social media users, however, blasted Elektra's reaction, calling her a 'clown.' One claimed, 'Poor Kim it's becoming very apparent she had no REAL friends,' while another added, 'You haven't made not one comment about this until now. Really should've kept it that way, but hey.' A third pointed out that Combs' on-again, off-again ex-girlfriend Cassie — who testified in Combs' six-week trial about the alleged rape and physical abuse she endured during their relationship — follows Elektra and may have seen the 'sick' post. Cassie, 38, dated the Bad Boy Records founder between 2007 and 2018. Porter, for her part, was romantically linked to Combs from 1994 to 2007, and the duo shared four kids — Quincy, 34, Christian 'King,' 27, and twins D'Lila and Jessie, 18. Combs, notably, is also the father of Justin, 31, Chance, 18, and Love, 2. Porter, whose children have supported Combs in court, died in November 2018 at age 47. Five years later, Combs' legal battle kicked off when Cassie sued him in a bombshell lawsuit, which he quickly settled for $20 million. The dancer's claims, as well as a 2016 video that surfaced of Combs beating Cassie in a hotel, led many to speculate about his dynamic with Porter — including the late model's 'disgusted' dad. 'I didn't know he could stoop that low,' Jake Porter told Rolling Stone last year, saying it gave him a 'different outlook' that made him 'wonder' about Combs. The record executive was arrested in September 2024 following headline-making raids on his homes, with his federal court case beginning in May. Combs is facing up to 20 years in prison. He was denied bail on Wednesday due to a 'disregard for the rule of law and a propensity of violence.' Combs' sentencing is scheduled for October 3.

Sean 'Diddy' Combs juror hits back at 'insulting' public reaction to verdict
Sean 'Diddy' Combs juror hits back at 'insulting' public reaction to verdict

Perth Now

time7 hours ago

  • Perth Now

Sean 'Diddy' Combs juror hits back at 'insulting' public reaction to verdict

A juror in the Sean 'Diddy' Combs case has hit back at the "insulting" public response to the verdict. The 55-year-old rapper was found guilty of two counts of transportation to engage in prostitution relating to ex-girlfriend Cassie Ventura and a woman who testified under the name 'Jane' but was acquitted on the more serious charges of sex trafficking and racketeering and a jury member has denied claims that Diddy's celebrity status influenced their decision. The unnamed juror told ABC News: "We spent over two days deliberating. Our decision was based solely on the evidence presented and how the law is stated. We would have treated any defendant in the same manner regardless of who they are. I have nothing else to say." Diddy's attorney Anna Estevao described Wednesday's (02.07.25) verdict as a "huge win" for the I'll Be Missing You hitmaker as he avoided the possibility of life in prison, although he was denied bail by US District Judge Arun Subramanian. She said outside the courtroom in Manhattan: "This is a reminder to everyone I hope of the flaws in the criminal justice system and for everybody to take a second look when the government charges people with crimes. "This is a huge win. He was acquitted of sex trafficking, acquitted of RICO conspiracy and he will sleep well at night knowing that." Diddy - who has been in custody in Brooklyn since his arrest last September - was convinced of flying people around the US to engage in sexual encounters and Judge Subramanian denied bail as he noted the prosecution's argument that a Mann Act violation means the detention is "mandatory". The original 1919 law prohibited interstate or foreign commerce transport of a woman or girl "or prostitution, debauchery or for any other immoral purpose". In 1986, the law was made gender-neutral, and the wording altered to change "debauchery" and "immoral purpose" to "any sexual activity for which any person can be charged with a criminal offence". Judge Subramanian said that "for present purposes, the defendant is unable to meet his burden" to show "lack of danger to any person or the community" with clear and convincing evidence. He added: "Prior to the trial, the court denied bail, and sees no reason to reverse that now." Diddy could now face a combined sentence of up to 20 years in federal prison, with Judge Subramanian scheduling a sentencing hearing for October 3.

Qantas's two-day hack delay fuels customer scam fears
Qantas's two-day hack delay fuels customer scam fears

The Advertiser

time7 hours ago

  • The Advertiser

Qantas's two-day hack delay fuels customer scam fears

Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022. Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022. Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022. Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store