British teen arrested for contravening Computer Misuse Act

Unnamed boy from East Midlands picked up by police as reports suggest it could be in connection with CIA hack

A 16-year-old boy has been arrested on suspicion of committing offences contrary to sections 1, 2 and 3 of the Computer Misuse Act 1990. 

Some reports have suggested the arrest is linked to investigations into a series of hacking attacks on US intelligence and law enforcement personnel in late 2015. However UK authorities have neither confirmed nor denied a possible link between the two. 

A hacker going by the name of Cracka allegedly gained access to the personal emails of CIA director John Brennan, the personal emails and phone accounts of US intelligence director James Clapper and his wife, and the personal emails of FBI deputy director Mark Giuliano. The boy is also alleged to have leaked the personal details of tens-of-thousands of FBI agents and US Department of Homeland Security employees.

The Daily Dot reports the boy, who is from the East Midlands, is suspected of being Cracka. However, the South East Regional Organised Crime Unit (SEROCU) told IT Pro it cannot comment on any speculation as to whether the arrest was made in connection with the CIA attacks.

"The South East Regional Organised Crime Unit (SEROCU) can confirm we have arrested a 16-year-old boy on Tuesday (9/2) in the East Midlands on suspicion of conspiracy to commit Unauthorised access to computer material contrary to Section 1 Computer Misuse Act 1990, conspiracy to commit unauthorised access with intent to commit further offences contrary to Section 2 Computer Misuse Act 1990 and conspiracy to commit unauthorised acts with intent to impair, or with recklessness as to impairing operation of a computer contrary to Section 3 Computer Misuse Act 1990," a spokesperson for the crime agency told IT Pro, adding that the boy has been bailed until 6 June.

"No further information will be released at this stage," the spokesperson added.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Recommended

Android apps still vulnerable to a major bug despite an existing patch
Google Android

Android apps still vulnerable to a major bug despite an existing patch

3 Dec 2020
20 Universities targeted by “Shadow Academy” hackers
hacking

20 Universities targeted by “Shadow Academy” hackers

3 Dec 2020
Data: A resource much too valuable to leave unprotected
Whitepaper

Data: A resource much too valuable to leave unprotected

2 Dec 2020
Canon employee data exposed in ransomware attack
ransomware

Canon employee data exposed in ransomware attack

1 Dec 2020

Most Popular

Samsung Galaxy Note might be discontinued in 2021
Mobile Phones

Samsung Galaxy Note might be discontinued in 2021

1 Dec 2020
Microsoft Teams no longer works on Internet Explorer
Microsoft Office

Microsoft Teams no longer works on Internet Explorer

30 Nov 2020
Sopra Steria cyber attack costs to hit €50 million
Security

Sopra Steria cyber attack costs to hit €50 million

26 Nov 2020