Feeds

Aussie court denies bail to accused hacker 'Evil' Cecil

Wistful magistrate wishes he'd used his skills for good

Securing Web Applications Made Simple and Scalable

Australian hacking cause célèbre, David Noel Cecil, who goes by the nickname of "Evil", remains behind bars after being formally refused bail yesterday at Cowra Local Court.

Cecil, an unemployed truck driver, was arrested by police last week and charged with 49 counts of accessing restricted data while unlawfully gaining access and control of the entire system of ISP Platform Networks.

When denied bail, Cowra Local Court Magistrate Peter Dare said Cecil had "certainly demonstrated an ability to do things with computers. It reminds me of that quote, 'If only he'd turned his mind to good'," reports the Central Western Daily.

Commonwealth prosecutor Katriona Musgrove told the court that Cecil had placed malicious software on some of the servers he had accessed and that investigations were ongoing.

The Australian Federal Police, who have been investigating his antics for six months, are continuing investigations into Cecil's alleged access of up to 100 other computer servers, the court heard.

In a lengthy bail hearing, the Central Western Daily reports that the magistrate was told a warrant exists in Queensland for Cecil's arrest on unrelated matters in relation to a breach of a probation order for stealing a motor vehicle. The court also head that Cecil had a criminal record in Queensland dating back to 2004.

Musgrove said that Cecil was spending between 18 and 20 hours a day in front of a computer and suggesting that he had "a compulsion or obsession to being online".

"Access to computers today is far reaching. Given his compulsion, conditions would not be effective enough and there are not sufficient police resources to monitor him 24 hours a day," Musgrove said.

The magistrate also ordered that Cecil not have access to a computer or the internet while on remand.

Matters were adjourned to Orange Local Court on 20 September. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.