Feeds

Aussie court denies bail to accused hacker 'Evil' Cecil

Wistful magistrate wishes he'd used his skills for good

Next gen security for virtualised datacentres

Australian hacking cause célèbre, David Noel Cecil, who goes by the nickname of "Evil", remains behind bars after being formally refused bail yesterday at Cowra Local Court.

Cecil, an unemployed truck driver, was arrested by police last week and charged with 49 counts of accessing restricted data while unlawfully gaining access and control of the entire system of ISP Platform Networks.

When denied bail, Cowra Local Court Magistrate Peter Dare said Cecil had "certainly demonstrated an ability to do things with computers. It reminds me of that quote, 'If only he'd turned his mind to good'," reports the Central Western Daily.

Commonwealth prosecutor Katriona Musgrove told the court that Cecil had placed malicious software on some of the servers he had accessed and that investigations were ongoing.

The Australian Federal Police, who have been investigating his antics for six months, are continuing investigations into Cecil's alleged access of up to 100 other computer servers, the court heard.

In a lengthy bail hearing, the Central Western Daily reports that the magistrate was told a warrant exists in Queensland for Cecil's arrest on unrelated matters in relation to a breach of a probation order for stealing a motor vehicle. The court also head that Cecil had a criminal record in Queensland dating back to 2004.

Musgrove said that Cecil was spending between 18 and 20 hours a day in front of a computer and suggesting that he had "a compulsion or obsession to being online".

"Access to computers today is far reaching. Given his compulsion, conditions would not be effective enough and there are not sufficient police resources to monitor him 24 hours a day," Musgrove said.

The magistrate also ordered that Cecil not have access to a computer or the internet while on remand.

Matters were adjourned to Orange Local Court on 20 September. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?