Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Glenrothes man avoids jail despite being caught with 1,300 indecent child images

Douglas Bell.
Douglas Bell.

A Glenrothes man with more than 1,300 indecent images of children on his computer has escaped a jail sentence.

Douglas Bell, of Cadham Court, was told he was “on the cusp” of imprisonment after claiming he was an internet hacker who targeted the computers of paedophiles in an effort to crash their machines.

The 37-year-old had previously pleaded guilty on indictment to a charge of downloading indecent images of children between May 2010 and September 2013 at his parents’ address in Windygates.

He had been traced by police following an operation by officers who discovered a total of 1,328 images and seven videos on Bell’s devices, although he claimed they had not been downloaded for “sexual excitement”.

At Kirkcaldy Sheriff Court, Sheriff Grant McCulloch said Bell was narrowly avoiding a spell behind bars.

“I trust that it has got through to you that being the end user is only half of the story,” he said. “Without end users there would be no images.

“The fact remains that people like you are the reason that this disgusting trade exists.

“Looking at the guidance, you are on the cusp of a custodial and non-custodial sentence. I feel that it is capable within the public interest to deal with this by a non-custodial order.”

Bell, a former IT technician, had initially claimed he was tracing real paedophiles so he could hack into their systems and crash their machines through a Distributed Denial of Service attack, often used by high-profile “hacktivist” groups.

These claims were largely dismissed at a previous hearing, where Bell also claimed he had to download the material in order to hack the original owner. He also conceded his efforts were unsuccessful.

Sheriff McCulloch warned Bell that a custodial sentence would follow should he appear before him again.

He was placed under supervision and had his name added to the sex offenders register for three years.