Hackers: Crimes and punishments

Many feel Gary McKinnon’s possible extradition to the US is harsh punishment. We look at ten other hackers from around the world to see how their punishments weigh up against their crimes.

Max Ray Butler was arrested in 2000 after refusing to cooperate with the FBI.

Previously, Butler was an informant for the Bureau, helping them track down other computer hackers.

Butler was charged with 15 counts of cyber crimes in 2001 including computer intrusion, possession of stolen passwords, and interception of communications, receiving 18 months in an American prison.

Butler was arrested again in 2007 after a raid on his apartment revealed 1.8 million stolen credit card accounts stored on his computer.

Advertisement
Advertisement - Article continues below

The case, which is set to go to court in October, could result in Butler receiving 40 years in prison and a possible fine of $1.5 million if found guilty.

Jeanson James Ancheta

Californian hacker Jeanson Ancheta, was the first cyber criminal to be convicted for the control of a large number of hijacked computers, known as botnets, which he used to access nearly 400,000 separate computers, as well as two military facilities.

Arrested in 2005, Ancheta was officially charged in January 2006 with conspiracy to violate CANSPAM Act, conspiracy to violate the computer fraud act, damaging military computers, and illegal computer access with intent to commit fraud.

He received 57 months in prison, and was ordered to pay $60,000 in cash, as well as an additional $15,000 to the federal government for damages he caused to its computers.

Simon Vallor

Unemployed warehouseman Simon Vallor was convicted and jailed for two years in January 2003 by Southwark crown court.

Vallor from North Wales created three viruses - Gokar, Redesi-B and Admirer - that hit thousands of computers globally.

According to reports, if the FBI and Scotland Yard had not caught up with the Welsh hacker, his viruses could have caused global disruption to tens of thousands of computers, businesses, organisations and people.

Click here for to read more on the most infamous hackers of all time.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019