Feeds

Aussie court denies bail to accused hacker 'Evil' Cecil

Wistful magistrate wishes he'd used his skills for good

Build a business case: developing custom apps

Australian hacking cause célèbre, David Noel Cecil, who goes by the nickname of "Evil", remains behind bars after being formally refused bail yesterday at Cowra Local Court.

Cecil, an unemployed truck driver, was arrested by police last week and charged with 49 counts of accessing restricted data while unlawfully gaining access and control of the entire system of ISP Platform Networks.

When denied bail, Cowra Local Court Magistrate Peter Dare said Cecil had "certainly demonstrated an ability to do things with computers. It reminds me of that quote, 'If only he'd turned his mind to good'," reports the Central Western Daily.

Commonwealth prosecutor Katriona Musgrove told the court that Cecil had placed malicious software on some of the servers he had accessed and that investigations were ongoing.

The Australian Federal Police, who have been investigating his antics for six months, are continuing investigations into Cecil's alleged access of up to 100 other computer servers, the court heard.

In a lengthy bail hearing, the Central Western Daily reports that the magistrate was told a warrant exists in Queensland for Cecil's arrest on unrelated matters in relation to a breach of a probation order for stealing a motor vehicle. The court also head that Cecil had a criminal record in Queensland dating back to 2004.

Musgrove said that Cecil was spending between 18 and 20 hours a day in front of a computer and suggesting that he had "a compulsion or obsession to being online".

"Access to computers today is far reaching. Given his compulsion, conditions would not be effective enough and there are not sufficient police resources to monitor him 24 hours a day," Musgrove said.

The magistrate also ordered that Cecil not have access to a computer or the internet while on remand.

Matters were adjourned to Orange Local Court on 20 September. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?