British teen arrested for contravening Computer Misuse Act
Unnamed boy from East Midlands picked up by police as reports suggest it could be in connection with CIA hack
A 16-year-old boy has been arrested on suspicion of committing offences contrary to sections 1, 2 and 3 of the Computer Misuse Act 1990.
Some reports have suggested the arrest is linked to investigations into a series of hacking attacks on US intelligence and law enforcement personnel in late 2015. However UK authorities have neither confirmed nor denied a possible link between the two.
A hacker going by the name of Cracka allegedly gained access to the personal emails of CIA director John Brennan, the personal emails and phone accounts of US intelligence director James Clapper and his wife, and the personal emails of FBI deputy director Mark Giuliano. The boy is also alleged to have leaked the personal details of tens-of-thousands of FBI agents and US Department of Homeland Security employees.
The Daily Dot reports the boy, who is from the East Midlands, is suspected of being Cracka. However, the South East Regional Organised Crime Unit (SEROCU) told IT Pro it cannot comment on any speculation as to whether the arrest was made in connection with the CIA attacks.
"The South East Regional Organised Crime Unit (SEROCU) can confirm we have arrested a 16-year-old boy on Tuesday (9/2) in the East Midlands on suspicion of conspiracy to commit Unauthorised access to computer material contrary to Section 1 Computer Misuse Act 1990, conspiracy to commit unauthorised access with intent to commit further offences contrary to Section 2 Computer Misuse Act 1990 and conspiracy to commit unauthorised acts with intent to impair, or with recklessness as to impairing operation of a computer contrary to Section 3 Computer Misuse Act 1990," a spokesperson for the crime agency told IT Pro, adding that the boy has been bailed until 6 June.
"No further information will be released at this stage," the spokesperson added.
Navigating the new normal: A fast guide to remote working
A smooth transition will support operations for years to comeDownload now
Putting a spotlight on cyber security
An examination of the current cyber security landscapeDownload now
The economics of infrastructure scalability
Find the most cost-effective and least risky way to scaleDownload now
IT operations overload hinders digital transformation
Clearing the path towards a modernised system of agreementDownload now