British teen arrested for contravening Computer Misuse Act
Unnamed boy from East Midlands picked up by police as reports suggest it could be in connection with CIA hack
A 16-year-old boy has been arrested on suspicion of committing offences contrary to sections 1, 2 and 3 of the Computer Misuse Act 1990.
Some reports have suggested the arrest is linked to investigations into a series of hacking attacks on US intelligence and law enforcement personnel in late 2015. However UK authorities have neither confirmed nor denied a possible link between the two.
A hacker going by the name of Cracka allegedly gained access to the personal emails of CIA director John Brennan, the personal emails and phone accounts of US intelligence director James Clapper and his wife, and the personal emails of FBI deputy director Mark Giuliano. The boy is also alleged to have leaked the personal details of tens-of-thousands of FBI agents and US Department of Homeland Security employees.
The Daily Dot reports the boy, who is from the East Midlands, is suspected of being Cracka. However, the South East Regional Organised Crime Unit (SEROCU) told IT Pro it cannot comment on any speculation as to whether the arrest was made in connection with the CIA attacks.
"The South East Regional Organised Crime Unit (SEROCU) can confirm we have arrested a 16-year-old boy on Tuesday (9/2) in the East Midlands on suspicion of conspiracy to commit Unauthorised access to computer material contrary to Section 1 Computer Misuse Act 1990, conspiracy to commit unauthorised access with intent to commit further offences contrary to Section 2 Computer Misuse Act 1990 and conspiracy to commit unauthorised acts with intent to impair, or with recklessness as to impairing operation of a computer contrary to Section 3 Computer Misuse Act 1990," a spokesperson for the crime agency told IT Pro, adding that the boy has been bailed until 6 June.
"No further information will be released at this stage," the spokesperson added.
Consumer choice and the payment experience
A software provider's guide to getting, growing, and keeping customersDownload now
Prevent fraud and phishing attacks with DMARC
How to use domain-based message authentication, reporting, and conformance for email securityDownload now
Business in the new economy landscape
How we coped with 2020 and looking ahead to a brighter 2021Download now
How to increase cyber resilience within your organisation
Cyber resilience for dummiesDownload now