British teen arrested for contravening Computer Misuse Act

Unnamed boy from East Midlands picked up by police as reports suggest it could be in connection with CIA hack

A 16-year-old boy has been arrested on suspicion of committing offences contrary to sections 1, 2 and 3 of the Computer Misuse Act 1990. 

Some reports have suggested the arrest is linked to investigations into a series of hacking attacks on US intelligence and law enforcement personnel in late 2015. However UK authorities have neither confirmed nor denied a possible link between the two. 

A hacker going by the name of Cracka allegedly gained access to the personal emails of CIA director John Brennan, the personal emails and phone accounts of US intelligence director James Clapper and his wife, and the personal emails of FBI deputy director Mark Giuliano. The boy is also alleged to have leaked the personal details of tens-of-thousands of FBI agents and US Department of Homeland Security employees.

The Daily Dot reports the boy, who is from the East Midlands, is suspected of being Cracka. However, the South East Regional Organised Crime Unit (SEROCU) told IT Pro it cannot comment on any speculation as to whether the arrest was made in connection with the CIA attacks.

"The South East Regional Organised Crime Unit (SEROCU) can confirm we have arrested a 16-year-old boy on Tuesday (9/2) in the East Midlands on suspicion of conspiracy to commit Unauthorised access to computer material contrary to Section 1 Computer Misuse Act 1990, conspiracy to commit unauthorised access with intent to commit further offences contrary to Section 2 Computer Misuse Act 1990 and conspiracy to commit unauthorised acts with intent to impair, or with recklessness as to impairing operation of a computer contrary to Section 3 Computer Misuse Act 1990," a spokesperson for the crime agency told IT Pro, adding that the boy has been bailed until 6 June.

"No further information will be released at this stage," the spokesperson added.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

Monero miners target cloud-native development environments
cryptocurrencies

Monero miners target cloud-native development environments

5 Mar 2021
Ten ways to protect your company from the next big data breach
data breaches

Ten ways to protect your company from the next big data breach

5 Mar 2021
High-risk email security threats increased by 32% last year
phishing

High-risk email security threats increased by 32% last year

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021

Most Popular

Star Alliance passenger data stolen in SITA data breach
data breaches

Star Alliance passenger data stolen in SITA data breach

5 Mar 2021
I went shopping at Amazon’s till-less supermarket so that you don’t have to
automation

I went shopping at Amazon’s till-less supermarket so that you don’t have to

5 Mar 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021