DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

David Cecil, pleads guilty to 2 of 48 charges, faces 10years jail

Posted on December 8, 2011 by Lee J

Well back in the land down under, David Cecil the alleged NBN hacker has pleaded guilty to two of the 49 charges he is facing for hacking an ISP and causing no threat or damage at all. In a recent post we showed that the australian police used a full team of armed police to raid an arrest David who was going by the online name of Evil. David had hacked an Australian ISP and accessed part of its new National broadband network (NBN) that is still being rolled out. Despite the ISP stating that David caused no trouble, damage or harm he has been treated like a fully blown criminal. The two guilty pleas were entered on David Cecil’s behalf by his solicitor Peter Ringbauer. Cecil still faces 48 further charges related to his activities. The prosecution in consultation with Cecil’s defence agreed to consolidate the remaining 48 charges into a smaller number offences if the defendant pleaded guilty to the two counts as some of the offences had occurred within 10 seconds of each other. He was charged with unauthorised access to, or modification of restricted data, carrying a maximum penalty of two years’ gaol; and one count of unauthorised modification of data to cause impairment, punishable by maximum of 10 years’ imprisonment. So Australia, your not really setting a good example of how you handle such case’s and let drug addicts who rob and beat up people for money right back out the next day to do the same thing…. re-think your legal systems. Australian NBN hacker

Category: Breach Incidents

Post navigation

← UK: Probe launched as confidential files appear on Camden Council’s website
Four Romanian nationals indicted for hacking Subway and 50 other merchants’ POS systems →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.
  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news (Updated)
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.