Feeds

Teen escapes email bombing charge

Loophole in UK hacker law exposed

Remote control for virtualized desktops

A British teenager who allegedly flooded his former employers' email system with five million emails has escaped trial after a judge ruled that he had no case to answer.

The ruling at Wimbledon Magistrates Court raises fresh doubts about the effectiveness of the Computer Misuse Act [CMA] in dealing with denial of service attacks by hackers.

District Judge Kenneth Grant ruled that the unnamed teenager's alleged actions did not fall foul of the Computer Misuse Act even though the email flood the firm suffered caused its email servers to crash.

The Computer Misuse Act - which dates back to 1990, before the widespread use of the net - outlaws the "unauthorised access" or "unauthorised modification" of computer systems. The unnamed teenager was charged under Section Three of the Act which covers the more serious offence of unauthorised modification of a computer system.

The judge accepted defence arguments that since the firm's email server was set up for the express purpose of receiving emails then sending a flood of unsolicited emails could not be considered an act of unauthorised modification.

In a written ruling, Judge Grant said: "In this case the individual emails caused to be sent each caused a modification which was in each case an 'authorised' modification. Although they were sent in bulk resulting in the overwhelming of the server, the effect on the server is not a modification addressed by section 3 [of the CMA]."

Zdnet reports that the defendant was not called to testify so it remains unclear whether or not he was responsible for the alleged attack. Peter Sommer, expert witness for the defence, said the case highlighted a need to reform the UK's Computer Misuse Act. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.