DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK man charged under Computer Misuse Act over US crime

Posted on September 27, 2016 by Dissent

Okay, I missed one where an arrest in the UK is allegedly linked to a breach in the U.S. On September 2, the Thames Valley Police announced:

SEROCU’s Cyber Crime Unit has arrested a man in connection with computer misuse and fraud offences.

A 37-year-old man from Reading was arrested yesterday (1/9) on suspicion of unauthorised access with intent to commit or facilitate commission of further offences contrary to Section 2 of Computer Misuse Act 1990; unauthorised access with intent to impair operation of a computer, contrary to Section 3 of Computer Misuse Act 1990 and fraud by False Representation contrary to Section 2 of the Fraud Act 2006.

The arrest is in connection with a number of incidents that occurred between January and March 2016.

Between January 2016 to March 2016 staff of the Orange County Employees Retirement System (OCERS) in the United States of America were requested to setup online accounts for their retirement funds. This would allow them to log on via a web portal and change the bank account in which their pensions were paid.

A number of fraudulent web portal accounts were set up for staff members, and the benefits were directed to be deposited into an internet bank account.

The arrested man was bailed until 22 September.

This week, Jonathan Low reports that the bail date has been continued until November 18.

Anyone know anything about this case? I don’t remember seeing any reported fraud reports or breach involving OCERS earlier this year.

Category: MiscellaneousPhishingU.S.

Post navigation

← Alberta Hospital Edmonton notifying 1,300 of snooping employee
Ex-Verizon worker accused of selling customer phone records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • Credit Control Corporation data allegedly from 9.1 million consumers listed for sale on forum
  • Copilot AI Bug Could Leak Sensitive Data via Email Prompts
  • FTC Provides Guidance on Updated Safeguards Rule

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.