Feeds

'Pentagon hacker' prepares for verdict

Full disclosure

High performance access to file storage

Infosec Gary McKinnon, the British hacker who's due to hear whether he will be extradited to the US on 10 May, rates his chances of avoiding trial in the States as only "50/50".

McKinnon, 40, faces possible trial under US anti-terror laws over alleged attacks on military and NASA systems between 2001 and 2002.

The unemployed sys admin has had these charges over his head since first been arrested by officers from the UK's National High Tech Crime Unit in March 2002. The case against him lay dormant until July 2005 since when he's been unable to find work. Bail conditions mean he's unable to access the internet except in the course of employment and even then under tight conditions. He is, however, allowed to have a mobile phone.

Lawyers for McKinnon want him to be tried over his offences in the UK rather than the US. "I'm very worried. Whatever happens I'll have a fight on my hands for the next 18 months or so," he said. "If I'm sent to the US, I'd face trial in front of a secret military tribunal."

McKinnon admits he looked at computer systems without permission but claims he did no harm. He got involved in hacking after reading Disclosure by Stephen Greer and becoming convinced that the US had harvested advanced technology from UFOs and was keeping it secret to the detriment of the public. His hacking activities were a means to an end, uncovering evidence that the US had developed anti-gravity and zero point energy devices.

He was caught after US military agencies detected system intrusions which were traced back to the UK. UK authorities identified McKinnon as the attacker after obtaining records of British sales of a tool called RemotelyAnywhere to McKinnon and subsequent police work that made him a prime suspect in the case.

"The US authorities are using a hammer to squash a nut. I didn't do any damage. The Love Bug (an infamous computer virus) caused far more harm," he said.

McKinnon added that, as in the case of Mathew Bevan, the US authorities were "over reacting". Bevan (AKA Kuji) was accused of breaking into US military computer systems but escaped without punishment when a 1997 case at Woolwich Crown Court was dropped after a long-running legal battle. After the case Bevan became an ethical hacker and security consultant with Tiger Computer Security, and later on a freelance basis with his firm the Kuji Media Corporation.

McKinnon says he's not been approached by companies offering work. Many well-wishers have sent McKinnon messages of support, some of whom express an interest in hacking. McKinnon is keen to discourage others from following his path.

"Organised criminals are far more effective than script kiddies or those that hack for an intellectual challenge because they know the sentence they face," he said. McKinnon made his comments during an interview at the Infosec trade show in London on Thursday. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.