UK hackers charged with stealing Michael Jackson songs

Two UK men have been charged with breaking into servers at Sony Music and downloading Michael Jackson's 50,000-track back catalogue

Two UK men have been charged with breaking into servers at Sony Music and downloading Michael Jackson's 50,000-track back catalogue.

Michael Jackson's estate signed a $250m recording deal with Sony in 2010, giving it the rights to sell his back catalogue as well as previously unreleased tracks, according to The Guardian.

News of the theft emerged when James Marks, 26, from Daventry in Northamptonshire, and James McCormick, 25, from Blackpool, appeared at Leicester crown court.

The two men denied charges under the Computer Misuse Act and the Copyright, Designs and Patents Act. They were released on bail to await trial in January 2013.

Marks and McCormick were arrested in May last year after Sony discovered the breach during an investigation into the massive security breach on Sony's PlayStation Network and online entertainment services the month before. The hack exposed more than 100 million users to fraud.

In June, hacker group LulzSec claimed to have accessed the servers hosting Sony Pictures Entertainment and obtained the e-mail addresses, birth dates and passwords of more than one million users.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Hackers and cybercrime prevention

Join the conversation


Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

50k tracks ?? O_o 


Two Men Charged in Theft of Unreleased Michael Jackson Songs from Sony. The computers at Sony Music were hacked by two men, who have been charged with stealing music, according to British police and Sony. 





  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...