The teen accused of launching DDoS attacks on a number of websites including that of the Serious Organised Crime Agency (SOCA) will be allowed to prepare his defence at home after being granted conditional bail.
Judge Nicholas Loraine-Smith ruled that 19 year-old Ryan Clearly should be released from custody on condition that he observes a curfew between 9am and 7pm, does not leave his house unaccompanied by one parent and wears an electronic tag at all times.
Police will check on that he is meeting his strict bail conditions, which also include that he should not use a computer or access the Internet. His computers, reportedly including an Apple iPhone and Sony PS3 games console. have already been confiscated by police.
"Ryan Cleary is very relieved to be granted bail and to be home to his mum, his cats and his books," Cleary's lawyers said in a statement outside Southwark Crown Court.
"He has cooperated with police and will continue to do so. Ryan has last week been diagnosed with Aspergers. He will now be provided with the professional support he needs. His obvious intelligence can now be channelled into a worthwhile pursuit."
"One thing not so positive from this case is that the British police are investigating and appear to be accepting jurisdiction. Ryan will not be making further statements for the time being," it concluded in apparent reference to the attempts by the US authorities to extradite another accused British hacker, Gary McKinnon. It has been suggested in recent days that Cleary could also be extradited by the US.
Cleary was arrested last Monday after being connected to the LulzSec hacking group that perhaps not coincidentally announced on Twitter that it had reached the end of its "50 day cruise" and would cease DDoS and low-level hacking operations.
Most commentators believe that the group is under pressure after Cleary's arrest but the precise connection between the group and the teen is still speculative.
Cleary has been charged on five counts under the Computer Misuse Act, including building and using a DDoS botnet against a variety of targets, including the British Phonographic Industry as well as SOCA.