Story image

Sydney IT consultant charged with insider trading and unauthorised access to data

15 May 2018

Sydney IT Consultant Steven Oakes has been charged with 115 offences for unauthorised access to data held in a computer, insider trading, and destroying or concealing books required by the Australian Securities and Investments Commission (ASIC).

According to the ASIC, between January 2012 and February 2016, Oakes gained unauthorised access to inside information held on the private computer network of a Melbourne-based financial publisher.

The information accessed comprised of recommendations to buy particular shares that were about to be published in stock recommendations reports.

ASIC alleges that Oakes then used this information on 70 occasions to buy shares in 52 different ASX-listed companies before the ‘Buy’ recommendations for the shares in those companies were published.

ASIC says Oakes made profits from selling the shares a short time later, following the reports’ publication.

ASIC also alleges that in March 2016, Oakes concealed, destroyed, mutilated or altered ‘books’ in the form of electronic devices that were required to be produced to ASIC in connection with the investigation.

Specifically, Oakes’ charges comprised:

  • 43 serious computer offences under s477.1(1) of the Criminal Code (Cth) for unauthorised access to data held in a computer with the intention to commit a serious offence, namely insider trading;
  • 70 insider trading offences under s1043A (1) of the Corporations Act 2001 (Cth); and
  • 2 offences under s67(1) of the Australian Securities and Commission Act 2001 (Cth) for conduct that resulted in the concealment, destruction, mutilation or alteration of books required by ASIC.

Oakes doesn’t have to enter a plea and the matter was adjourned to 25 June 2018 for committal mention.

The Commonwealth Director of Public Prosecutions is prosecuting the matter.

Microsoft urges organisations to tackle data blindspots
Despite significant focus placed on CX transformation, over a third of Australian organisations claimed that more than one in five of their projects failed.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Renesas develops 28nm MCU with virtualisation-assisted functions
The MCU features four 600 megahertz CPUs with a lock-step mechanism and a large 16 MB flash memory capacity.
DOCOMO ranked world's top mobile operator in 5G SEP applications
NTT DOCOMO has been ranked the world's leading mobile operator in terms of applications for candidate standard-essential patents.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.
Gartner’s top 10 data and analytics trends for 2019
Data is the fuel for the modern world, and analytics the engine. Gartner has compiled the top 10 trends to watch this year.
How CIOs can work with colleagues to drive new competitive advantages
"If recent history has taught us anything, it’s that the role of the CIO is always changing, and that it won’t stop changing anytime soon."