![]() |
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | |
England and Wales Court of Appeal (Criminal Division) Decisions |
||
You are here: BAILII >> Databases >> England and Wales Court of Appeal (Criminal Division) Decisions >> Martin, R. v [2013] EWCA Crim 1420 (31 July 2013) URL: http://www.bailii.org/ew/cases/EWCA/Crim/2013/1420.html Cite as: [2013] EWCA Crim 1420 |
[New search] [Printable RTF version] [Help]
CRIMINAL DIVISION
Strand London, WC2A 2LL |
||
B e f o r e :
MRS JUSTICE SHARP DBE
MR JUSTICE SPENCER
____________________
R E G I N A | ||
v | ||
LEWYS STEPHEN MARTIN |
____________________
WordWave International Limited
A Merrill Communications Company
165 Fleet Street London EC4A 2DY
Tel No: 020 7404 1400 Fax No: 020 7404 1424
(Official Shorthand Writers to the Court)
Mr M Yale appeared on behalf of the Crown
____________________
Crown Copyright ©
The offences and sentences
i) For five offences of unauthorised modification of computer material contrary to section 3(1) of the Act he was sentenced to two years' imprisonment. The maximum sentence for that offence is ten years' imprisonment. These were counts 1, 3, 5, 7 and 8.
ii) For one offence of securing unauthorised access to computer material with intent contrary to section 2(1)(a) of the Act he was sentenced to 12 months' imprisonment. The maximum sentence for that offence is five years' imprisonment. This was count 9.
iii) For one offence of securing unauthorised access to computer material contrary to section1 of the Act he was sentenced to six months' imprisonment. The maximum sentence for that offence is two years' imprisonment. This was count10.
iv) For two offences of making, supplying or obtaining articles for use contrary to section 3(A) and (5) of the Act he was sentenced to four months' imprisonment. The maximum sentence for that offence is also two years' imprisonment. These were counts 12 and 13.
The facts
"I have owned you once before (DDOS attack about six to seven months ago?) and I am going to do it again along with Cambridge. I have access to your SQL users and password database, they are encrypted as you obviously know but it won't take long and by the time you have read this message I will have sold the two databases and what is needed to have been done will have been done".
i) There was a significant degree of sophisticated planning. The appellant attacked targets on more than one occasion and sent e-mails making claims about what he had done and threats about what he would do. He installed software on his computer for the purpose of orchestrating a DOS attack, namely Jaindos (count 12) and Cyber Ghost (count 13): these are programmes, as we have said, which provide misleading information about the IP address of the user and a cloak of anonymity for illegal acts. The list of possible targets found, three of which had already been attacked, provided further evidence of substantial and wide-ranging planning. He had encrypted his computer, thereby making full investigation more difficult.
ii) The appellant's conduct was persistent. The period covered by the offences spanned a period of nearly a year: from March 2011 to February 2012; it involved five different victims, two of whom were targeted twice. It involved offences committed whilst on bail.
iii) We have already dealt with the damage caused to those targeted by the appellant. The suggestion that the fullest weight should not be given to the time the organisations had to spend in dealing with the attacks perpetrated by the appellant because this resulted more from the content of his e-mails, rather than from the offences themselves, is in our judgment entirely misconceived. The content of those e-mails connoted a deliberate desire to maximise the damage and disruption which the appellant's offending would cause; and we regard the fact that they were sent as a seriously aggravating feature.
iv) As for the public interest, the websites of the Universities of Oxford and Cambridge and the Kent Police were attacked rendering them unusable. This had serious potential consequences for those organisations. The nature of the organisations the appellant selected really speaks for itself with regard to the potential for harm.
v) The invasion of the individual privacy of two of the victims itself cannot be underestimated. The appellant accessed the personal bank account of Mr Bradley and his personal and banking details were found on the appellant's computer. Mr Kerin's PayPal account was compromised; and used by the appellant for his own purposes. Mr Kerin's password had been obtained when the appellant held himself out as a computer repair man, and purported to repair his computer, thereby demonstrating a gross breach of trust. His password and personal details, as well as those of his girlfriend, were found on a mobile phone belonging to the appellant.