Singapore ‘The Messiah’ hacker faces additional drug charge

The man accused of being “The Messiah” computer hacker who compromised a town council’s website faces an additional charge of drug consumption.
The man accused of being “The Messiah” computer hacker who compromised a town council’s website faces an additional charge of drug consumption.

 

James Raj Arokiasamy now faces a total of four drug consumption charges, in addition to the hacking charges of breaking into the Ang Mo Kio Town Council website and modifying its contents without authorization.

He is accused of using drugs between May 2011 and November 2013.

The 35-year-old suspect allegedly added an image of a Guy Fawkes mask to the town council website on October 28, 2013, and also added texts and banners from a Kuala Lumpur, Malaysia apartment at approximately 1:35pm.

During Tuesday’s court session, the prosecution said investigations into the charge are ongoing, and objected to bail being set for James Raj.

The prosecution argued that the suspect is a flight risk, having previously absconded while on police bail for the 2011 drug charges. It also noted that the five charges against Mr. Raj are “all non-bailable offences”, said reports.

The defence will presumably make submissions on the matter of bail on Wednesday, December 4.

“The Messiah” was a moniker used in several high-profile hacking attacks in recent months. In addition to the Ang Mo Kio Town Council site, it was also used in the hacking of Sun Ho’s official website and the PAP Community Foundation website.

A YouTube video uploaded by the Anonymous group on October 31 made reference to “The Messiah”.

Singapore, like much of Southeast Asia, has some of the toughest drug laws in the world.

http://www.freedistrict.com/2-asia/singapore-2-asia/5438/singapore-the-messiah-hacker-faces-additional-drug-charge.html

Advertisements

About Gregory D Evans

Gregory Evans is one of the worlds greatest security consultants. Go to http://GregoryDEvans.com for more details.
This entry was posted in Cell phone security, cyber, internet safety, Technology, wireless and tagged , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s