Submit Article
Legal Analysis. Regulatory Intelligence. Jurisprudence.
Singapore

Liew Cheong Wee Leslie v Public Prosecutor

In Liew Cheong Wee Leslie v Public Prosecutor, the High Court of the Republic of Singapore addressed issues of .

Case Details

  • Citation: [2013] SGHC 141
  • Title: Liew Cheong Wee Leslie v Public Prosecutor
  • Court: High Court of the Republic of Singapore
  • Date of Decision: 25 July 2013
  • Case Number: Magistrate’s Appeal No 91 of 2012
  • Coram: Choo Han Teck J
  • Applicant/Appellant: Liew Cheong Wee Leslie
  • Respondent: Public Prosecutor
  • Counsel for Appellant: Wee Pan Lee (Wee Tay & Lim LLP) for Leslie Liew Cheong; Christopher Ong and Terence Chua (Attorney-General’s Chambers) for the Public Prosecutor
  • Legal Area: Criminal Procedure and Sentencing – Sentencing – Appeal
  • Statutes Referenced: Computer Misuse Act (Cap 50A, 1998 Rev Ed)
  • Key Provisions: s 3(1) and s 3(2) of the Computer Misuse Act
  • Judgment Length: 4 pages; 2,161 words
  • Cases Cited: [2013] SGHC 141 (as provided in metadata)

Summary

In Liew Cheong Wee Leslie v Public Prosecutor ([2013] SGHC 141), the High Court dismissed the appellant’s appeal against conviction for offences under the Computer Misuse Act. The appellant, an engineer working as a sub-contractor on the installation of a sophisticated power monitoring and control system at Marina Bay Sands (“MBS”), accessed and manipulated sensitive control functions in a manner that resulted in a massive blackout at the casino. The court accepted that the appellant’s conduct went beyond any misunderstanding of his work scope and amounted to deliberate unauthorised access and execution of commands intended to cause the blackout.

The appeal also involved a cross-appeal by the Public Prosecutor against the sentences imposed. While the trial judge had imposed fines and a short term of imprisonment, the High Court scrutinised the prosecution’s approach to the enhanced sentencing provision under s 3(2) of the Computer Misuse Act. The court held that the prosecution had not properly particularised and proved the statutory “damage” required for enhancement. As a result, the High Court amended the sixth charge and adjusted the sentence accordingly, while leaving the overall sentencing approach for the remaining charges essentially intact.

What Were the Facts of This Case?

The appellant, then 35 years old, was employed by Power Automation Pte Ltd (“PA”) from 17 January 2010 until 13 May 2010. During his employment, he was assigned to work at MBS, where PA was a sub-contractor responsible for setting up and installing a “Power Monitoring Control System” (“PMCS”). The PMCS was described in the trial court’s summary as a sophisticated client/server system that collected status from field devices (such as meters, circuit breakers, earth switches, battery chargers, UPS units, and network switches) and managed the distribution and control of electricity across the resort, including the casino.

The PMCS monitored both the 22kV and 6.6kV distribution systems and automatically reacted to power failure conditions. It also allowed operators to monitor and control high tension (“HT”) systems through a human-machine interface (“HMI”) at workstations. Critically, the system maintained logs (including entry logs and alarm logs) and required access through specific viewing accounts or operator-level accounts with passwords. The system’s ability to control circuit breakers depended on the breakers being set to “remote” mode; if set to “local”, the PMCS could not control them.

On 12 May 2010, a massive blackout occurred at the casino around 12.20am, affecting levels from the basement to level 3 of the northern section. Police were called because a security supervisor suspected that the blackout was caused by wilful tampering with the electrical system. After investigations, the appellant was charged with five counts under s 3(1) and one count under s 3(2) of the Computer Misuse Act. The charges related to the appellant’s access to the PMCS and the execution of instructions that led to the blackout.

At trial, the appellant claimed that he was working on an authorised project for his employer and that he had not misunderstood or exceeded his authority. He argued that his access was within a chain of command extending from MBS to the main contractor and then to PA. However, the court found that the appellant had taken an elaborate process to give himself remote access through his personal computer. Further, he added an email address (“ernie.masih@gmail.com”) to the system administrator in order to gain access; this address was his but was not used since 2009 and was not an address known to his employers. The court treated these acts as inconsistent with any innocent or accidental activation.

The first key issue was whether the appellant’s conduct satisfied the elements of offences under s 3(1) and s 3(2) of the Computer Misuse Act—particularly whether he “knowingly” caused a computer to perform functions “for the purpose of securing access without authority” to any program or data held in any computer. This required the court to assess whether the appellant had authority to access the system and, if so, whether his actions nonetheless constituted unauthorised access for the relevant purpose.

Relatedly, the court had to determine whether the appellant’s actions were deliberate and intended to cause the blackout, or whether they could be explained as an authorised operational activity or an accidental activation. The High Court’s reasoning turned on the nature of the steps taken by the appellant to obtain remote access and execute the instruction that produced the blackout.

The second key issue arose on sentencing. The Public Prosecutor argued that the sentences were inadequate and sought enhanced punishment, especially for the sixth charge under s 3(2). The High Court therefore had to consider what “damage” means under s 2 of the Computer Misuse Act and whether the prosecution had properly particularised and proved the specific statutory form of damage required to trigger the enhanced sentencing regime under s 3(2).

How Did the Court Analyse the Issues?

On conviction, the High Court emphasised that the case was not simply about whether the appellant had access in a general sense, but whether he had authority to access the sensitive and vital controls and whether he knowingly secured access without authority for the relevant purpose. The court accepted that access to the PMCS’s sensitive controls required special access codes. While the appellant argued that he was authorised because he was working on the project, the court focused on the appellant’s actual conduct in obtaining remote access.

The court found that the appellant went through an elaborate process to give himself remote access through his personal computer. It also found that he added an email address that was not known to his employers and was not used since 2009. These facts were treated as “unanswerable evidence” that the appellant completed layers of security commands to execute the instruction causing the blackout. The court reasoned that the procedure required for such an instruction ruled out accidental activation. In other words, the technical steps and command structure implied intention rather than mistake.

Accordingly, the High Court drew the “inescapable conclusion” that the appellant deliberately intended to cause the blackout. Even if the appellant may have been angry with MBS or his employer, the court held that the offence under s 3 of the Computer Misuse Act was made out. The trial judge’s assessment of inconsistent statements by the appellant regarding whether he acted deliberately was also treated as undermining his explanation. The High Court therefore dismissed the appeal against conviction.

On sentencing and the cross-appeal, the High Court’s analysis centred on the statutory meaning of “damage” for the purposes of s 3(2). The prosecution had originally framed the sixth charge as an enhanced version of s 3(1), relying on the fact that “damage” was caused. Under s 3(2), the sentencing court may impose a higher penalty if damage is caused, with the maximum enhanced punishment reflecting the seriousness of the statutory damage categories.

The court carefully explained that “damage” is defined in s 2 of the Act and is not any form of harm. The definition includes specific types of impairment or threats, such as: impairment to a computer or integrity/availability of data or system information causing loss aggregating at least $10,000 (subject to temporal limits); impairment to medical examination/diagnosis/treatment; causing or threatening physical injury or death; or threatening public health or public safety. The High Court stressed that it is the prosecution’s duty to ensure that all particulars constituting the charge are given so that the accused knows exactly what he needs to defend against.

In the sixth charge, the original charge appeared to specify that the damage was under s 3(2)(a) because it contained the phrase “of at least $10,000” immediately after “causing damage”. However, those words were later struck out. The High Court treated this as indicating that the prosecution was not alleging and proving that the appellant caused damage of at least $10,000. Yet the court found that the prosecution did not specify what “damage” was actually alleged and proved. The trial judge had assumed that damage was proved, relying on reasoning about financial losses and reputational harm to MBS.

The High Court held that this was legally incorrect. A loss of reputation is not defined as “damage” under the Computer Misuse Act. The court also rejected the prosecution’s attempt on appeal to frame the blackout as a threat to public safety, noting that this was not particularised in the charge and was not supported by evidence at trial. Since damage was neither particularised nor proved, and since the trial judge made no findings based on evidence of the statutory damage categories, the sixth charge could only properly be treated as a charge under s 3(1). The High Court therefore amended the sixth charge by deleting the words “Section 3(2) read with” and adjusted the sentence accordingly.

What Was the Outcome?

The High Court dismissed the appellant’s appeal against conviction. It affirmed that the appellant’s deliberate steps to obtain remote access and execute commands that caused the blackout satisfied the elements of the Computer Misuse Act offences under s 3(1). The court accepted that the appellant had no authority to access the computer systems in the manner and for the purpose alleged, and that the blackout was not an accidental outcome.

On sentencing, the High Court amended the sixth charge to remove the s 3(2) enhancement basis and varied the sentence for that charge. The court ordered a fine of $3,000, with a default term of three weeks’ imprisonment. For the remaining charges, the court indicated that the sentences were not manifestly harsh and did not disturb them beyond the correction required by the improper application of the enhanced sentencing provision.

Why Does This Case Matter?

This decision is significant for practitioners because it clarifies two recurring themes in Computer Misuse Act prosecutions: first, how courts infer intention and unauthorised access from technical conduct; and second, how strictly courts require the prosecution to particularise and prove the statutory basis for enhanced sentencing.

On conviction, the case demonstrates that courts will look closely at the method by which access was obtained and commands were executed. Even where an accused claims workplace authorisation or a legitimate project context, the court may find deliberate unauthorised access where the accused takes steps that bypass or manipulate security controls in a manner inconsistent with lawful authority. The decision therefore supports a fact-intensive approach to “knowingly” and “purpose” under s 3(1), particularly in high-stakes systems where access controls are clearly designed to prevent unauthorised operation.

On sentencing, the case is a strong reminder that enhanced punishment under s 3(2) depends on the prosecution proving “damage” as defined in s 2. The High Court’s insistence on proper particularisation and evidence is practically important: prosecutors must plead the specific statutory category of damage and adduce evidence to support it. Defence counsel, likewise, can use this reasoning to challenge enhancements where the charge is amended or where the trial record does not contain findings tied to the statutory definition.

Legislation Referenced

  • Computer Misuse Act (Cap 50A, 1998 Rev Ed), s 3(1)
  • Computer Misuse Act (Cap 50A, 1998 Rev Ed), s 3(2)
  • Computer Misuse Act (Cap 50A, 1998 Rev Ed), s 2 (definition of “damage”)

Cases Cited

  • [2013] SGHC 141

Source Documents

This article analyses [2013] SGHC 141 for legal research and educational purposes. It does not constitute legal advice. Readers should consult the full judgment for the Court's complete reasoning.

Written by Sushant Shukla

More in

Legal Wires

Legal Wires

Stay ahead of the legal curve. Get expert analysis and regulatory updates natively delivered to your inbox.

Success! Please check your inbox and click the link to confirm your subscription.