Feeds

Dubai hacker loses appeal

Double jeopardy for 22-year old Brit

  • alert
  • submit to reddit

Seven Steps to Software Security

The appeal of a 22 year-old Briton against his hacking sentence has backfired. A court in Dubai has not only upheld his conviction, but also found him guilty of a charge that was dismissed at his original trial.

Lee Alan Ashurst, from Oldham near Manchester, was found guilty of opening the private emails destined for staff of ISP Etisalat as well as "misusing the services" of the Arab ISP in a judgement before the Dubai Appeal Court, according to a report by Arab news service Zawya.com.

The ruling confirmed the fine of 10,000 Dirhams (£1,850) against Ashurst on the hacking charge and added a conviction for opening the private emails of Etisalat staffers, which a lower court dismissed on legal grounds during a trial in July.

The case prompted the UAE to introduce legislation against hacking.

In a separate civil case, Etisalat (the United Arab Emirates sole ISP) is suing Ashurst for 2,835,000 Dirhams (£524,000) in damages, which it claims to have incurred due to Ashurst's hacking activity.

Etisalat claims that Ashurst scanned its network and discovered security gaps which he was able to exploit and recover password files. He was then able to gain unauthorised access to its network, according to Etisalat, which alleges Ashurst was the source of "extensive disruption to its service".

Zawya.com reports that a forensic examination of Ashurst's laptop found 'John the Ripper' and 'Saint', security tools which though not in themselves illegal, cast suspicion on Ashurst because they can be used by hackers. ®

External Links

Dubai court finds hacker guilty on two charges
BBC story of Ashurst's trail which features a picture of the 22 year-old

Related Stories

We've cracked into bin Laden's bank - UK hackers
Taiwanese engineer pleads self defence in hacking case
Welsh hacker pleads guilty to deception and theft
New anti-terror bill limits life sentence for hackers
NASA hacker 'rolex' jailed for four months

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.