Feeds

Aussie court denies bail to accused hacker 'Evil' Cecil

Wistful magistrate wishes he'd used his skills for good

Beginner's guide to SSL certificates

Australian hacking cause célèbre, David Noel Cecil, who goes by the nickname of "Evil", remains behind bars after being formally refused bail yesterday at Cowra Local Court.

Cecil, an unemployed truck driver, was arrested by police last week and charged with 49 counts of accessing restricted data while unlawfully gaining access and control of the entire system of ISP Platform Networks.

When denied bail, Cowra Local Court Magistrate Peter Dare said Cecil had "certainly demonstrated an ability to do things with computers. It reminds me of that quote, 'If only he'd turned his mind to good'," reports the Central Western Daily.

Commonwealth prosecutor Katriona Musgrove told the court that Cecil had placed malicious software on some of the servers he had accessed and that investigations were ongoing.

The Australian Federal Police, who have been investigating his antics for six months, are continuing investigations into Cecil's alleged access of up to 100 other computer servers, the court heard.

In a lengthy bail hearing, the Central Western Daily reports that the magistrate was told a warrant exists in Queensland for Cecil's arrest on unrelated matters in relation to a breach of a probation order for stealing a motor vehicle. The court also head that Cecil had a criminal record in Queensland dating back to 2004.

Musgrove said that Cecil was spending between 18 and 20 hours a day in front of a computer and suggesting that he had "a compulsion or obsession to being online".

"Access to computers today is far reaching. Given his compulsion, conditions would not be effective enough and there are not sufficient police resources to monitor him 24 hours a day," Musgrove said.

The magistrate also ordered that Cecil not have access to a computer or the internet while on remand.

Matters were adjourned to Orange Local Court on 20 September. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.