Feeds

Cypherpunk Bell found guilty

Incomplete verdict passes muster

  • alert
  • submit to reddit

Top three mobile application threats

A Washington state federal jury found cypherpunk Jim Bell guilty on two of five counts of stalking government agents. US District Judge Jack Tanner dismissed the three remaining counts after jurors indicated they could not reach a unanimous verdict on them.

"The [partial] verdict will be accepted," Tanner said, and scheduled sentencing for 6 July.

Bell was convicted of stalking IRS agent Jeff Gordon who had previously investigated the defendant, but the jury locked on similar charges involving Bureau of Alcohol, Tobacco and Firearms (BATF) agent Mike McNall.

Bell and his lawyer, Robert Leen, had argued that the defendant was investigating the agents for legitimate purposes of sniffing out official wrongdoing; but his publication of an essay called Assassination Politics, which appears to advocate using digital cash to reward people who kill undesirable members of the government, made his inquiries appear quite sinister to the Feds.

Some of Bell's own testimony last week became paranoid and bizarre with allegations that his lawyer wished to kill him, perhaps in hopes that the jury would give him a walk on grounds that he's mad. Evidently he's not quite the actor he needed to be. ®

Related Story

Wired reporter forced to testify at cypherpunk trial

Related Link

Wired's detailed coverage

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.