British teen arrested for contravening Computer Misuse Act

Unnamed boy from East Midlands picked up by police as reports suggest it could be in connection with CIA hack

A 16-year-old boy has been arrested on suspicion of committing offences contrary to sections 1, 2 and 3 of the Computer Misuse Act 1990. 

Some reports have suggested the arrest is linked to investigations into a series of hacking attacks on US intelligence and law enforcement personnel in late 2015. However UK authorities have neither confirmed nor denied a possible link between the two. 

Advertisement - Article continues below

A hacker going by the name of Cracka allegedly gained access to the personal emails of CIA director John Brennan, the personal emails and phone accounts of US intelligence director James Clapper and his wife, and the personal emails of FBI deputy director Mark Giuliano. The boy is also alleged to have leaked the personal details of tens-of-thousands of FBI agents and US Department of Homeland Security employees.

The Daily Dot reports the boy, who is from the East Midlands, is suspected of being Cracka. However, the South East Regional Organised Crime Unit (SEROCU) told IT Pro it cannot comment on any speculation as to whether the arrest was made in connection with the CIA attacks.

"The South East Regional Organised Crime Unit (SEROCU) can confirm we have arrested a 16-year-old boy on Tuesday (9/2) in the East Midlands on suspicion of conspiracy to commit Unauthorised access to computer material contrary to Section 1 Computer Misuse Act 1990, conspiracy to commit unauthorised access with intent to commit further offences contrary to Section 2 Computer Misuse Act 1990 and conspiracy to commit unauthorised acts with intent to impair, or with recklessness as to impairing operation of a computer contrary to Section 3 Computer Misuse Act 1990," a spokesperson for the crime agency told IT Pro, adding that the boy has been bailed until 6 June.

Advertisement - Article continues below

"No further information will be released at this stage," the spokesperson added.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now


ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular


How to find RAM speed, size and type

24 Jun 2020

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020