Feeds

Aussie court denies bail to accused hacker 'Evil' Cecil

Wistful magistrate wishes he'd used his skills for good

The Essential Guide to IT Transformation

Australian hacking cause célèbre, David Noel Cecil, who goes by the nickname of "Evil", remains behind bars after being formally refused bail yesterday at Cowra Local Court.

Cecil, an unemployed truck driver, was arrested by police last week and charged with 49 counts of accessing restricted data while unlawfully gaining access and control of the entire system of ISP Platform Networks.

When denied bail, Cowra Local Court Magistrate Peter Dare said Cecil had "certainly demonstrated an ability to do things with computers. It reminds me of that quote, 'If only he'd turned his mind to good'," reports the Central Western Daily.

Commonwealth prosecutor Katriona Musgrove told the court that Cecil had placed malicious software on some of the servers he had accessed and that investigations were ongoing.

The Australian Federal Police, who have been investigating his antics for six months, are continuing investigations into Cecil's alleged access of up to 100 other computer servers, the court heard.

In a lengthy bail hearing, the Central Western Daily reports that the magistrate was told a warrant exists in Queensland for Cecil's arrest on unrelated matters in relation to a breach of a probation order for stealing a motor vehicle. The court also head that Cecil had a criminal record in Queensland dating back to 2004.

Musgrove said that Cecil was spending between 18 and 20 hours a day in front of a computer and suggesting that he had "a compulsion or obsession to being online".

"Access to computers today is far reaching. Given his compulsion, conditions would not be effective enough and there are not sufficient police resources to monitor him 24 hours a day," Musgrove said.

The magistrate also ordered that Cecil not have access to a computer or the internet while on remand.

Matters were adjourned to Orange Local Court on 20 September. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.