Alleged Cisco hacker convicted in Sweden, bewails fate
19-year-old admits he built the tools but says he didn't crack the boxes
(Computer Sweden) -- A 19-year-old from Uppsala, Sweden, has been found guilty on seven counts of unauthorized access to Swedish university servers and research computers. He is also suspected by the FBI of breaking into servers at Cisco Systems and stealing classified source code.
The man, who was no older than 16 when the crimes were committed, was found guilty by the court of appeals on Monday. He will have to pay about $32,000 to three Swedish universities and to the national supercomputer center in Linköping. The man, who had no previous record, was also given a suspended prison sentence.
In a separate investigation being carried out by the FBI, the same man is suspected of breaking into Cisco servers in May 2004 and stealing source code for networking equipment, which was later posted online. The FBI has made a formal request for the Swedish authorities to investigate the Cisco incident.
Prosecutor Chatrine Rudström said she welcomed the verdict. She is now deciding whether the charges requested by the FBI can be pressed against the "Uppsala hacker," as he has become known. "We are about to finish the investigation and will then make a decision," she told Computer Sweden.
The U.S. has not submitted an extradition request, according to Rudström.
The 19-year-old said immediately after his conviction that he will take the verdict to the Supreme Court. He contends that the Court of Appeals did not fully understand the advanced technical evidence presented to them, and called the verdict "a tragedy."
"They have destroyed my life before I'm even a grown-up," he said.
The man was arrested after Swedish police raided his home in Uppsala, about an hour's drive north of Stockholm, in 2004, seizing computers and other equipment. The raid was prompted by a wave of intrusions into the university computers, and the intrusions stopped after the raid, according to expert witnesses.
The man has subsequently admitted to creating some of the tools used in the crimes, but he claims that other people who had access to the tools and to his personal server were probably responsible.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts