Hackers: Crimes and punishments

Many feel Gary McKinnon’s possible extradition to the US is harsh punishment. We look at ten other hackers from around the world to see how their punishments weigh up against their crimes.

Max Ray Butler was arrested in 2000 after refusing to cooperate with the FBI.

Previously, Butler was an informant for the Bureau, helping them track down other computer hackers.

Butler was charged with 15 counts of cyber crimes in 2001 including computer intrusion, possession of stolen passwords, and interception of communications, receiving 18 months in an American prison.

Butler was arrested again in 2007 after a raid on his apartment revealed 1.8 million stolen credit card accounts stored on his computer.

The case, which is set to go to court in October, could result in Butler receiving 40 years in prison and a possible fine of $1.5 million if found guilty.

Jeanson James Ancheta

Californian hacker Jeanson Ancheta, was the first cyber criminal to be convicted for the control of a large number of hijacked computers, known as botnets, which he used to access nearly 400,000 separate computers, as well as two military facilities.

Arrested in 2005, Ancheta was officially charged in January 2006 with conspiracy to violate CANSPAM Act, conspiracy to violate the computer fraud act, damaging military computers, and illegal computer access with intent to commit fraud.

He received 57 months in prison, and was ordered to pay $60,000 in cash, as well as an additional $15,000 to the federal government for damages he caused to its computers.

Simon Vallor

Unemployed warehouseman Simon Vallor was convicted and jailed for two years in January 2003 by Southwark crown court.

Vallor from North Wales created three viruses - Gokar, Redesi-B and Admirer - that hit thousands of computers globally.

According to reports, if the FBI and Scotland Yard had not caught up with the Welsh hacker, his viruses could have caused global disruption to tens of thousands of computers, businesses, organisations and people.

Click here for to read more on the most infamous hackers of all time.

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020