Alleged Cisco hacker convicted in Sweden, bewails fate
19-year-old admits he built the tools but says he didn't crack the boxes
(Computer Sweden) -- A 19-year-old from Uppsala, Sweden, has been found guilty on seven counts of unauthorized access to Swedish university servers and research computers. He is also suspected by the FBI of breaking into servers at Cisco Systems and stealing classified source code.
The man, who was no older than 16 when the crimes were committed, was found guilty by the court of appeals on Monday. He will have to pay about $32,000 to three Swedish universities and to the national supercomputer center in Linköping. The man, who had no previous record, was also given a suspended prison sentence.
In a separate investigation being carried out by the FBI, the same man is suspected of breaking into Cisco servers in May 2004 and stealing source code for networking equipment, which was later posted online. The FBI has made a formal request for the Swedish authorities to investigate the Cisco incident.
Prosecutor Chatrine Rudström said she welcomed the verdict. She is now deciding whether the charges requested by the FBI can be pressed against the "Uppsala hacker," as he has become known. "We are about to finish the investigation and will then make a decision," she told Computer Sweden.
The U.S. has not submitted an extradition request, according to Rudström.
The 19-year-old said immediately after his conviction that he will take the verdict to the Supreme Court. He contends that the Court of Appeals did not fully understand the advanced technical evidence presented to them, and called the verdict "a tragedy."
"They have destroyed my life before I'm even a grown-up," he said.
The man was arrested after Swedish police raided his home in Uppsala, about an hour's drive north of Stockholm, in 2004, seizing computers and other equipment. The raid was prompted by a wave of intrusions into the university computers, and the intrusions stopped after the raid, according to expert witnesses.
The man has subsequently admitted to creating some of the tools used in the crimes, but he claims that other people who had access to the tools and to his personal server were probably responsible.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts