Feeds

Iranian teen spared the rope

Campaign continues to secure Nazanin Fatehi's release - you can help

High performance access to file storage

There's some cheering news this cold January morning - condemned Iranian Nazanin Mahabad Fatehi has been spared the rope following an international net campaign led by former Miss Canada Nazanin Afshin-Jam.

Nazanin FatehiTo recap, Nazanin Fatehi was in January 2006 "sentenced to death for murder by court in Iran after she stabbed one of three men who attempted to rape her and her 16-year-old niece in a park in Karaj (a suburb of Tehran) in March 2005".

In June 2006, "the Head of Judiciary Ayatollah Shahroudi announced a stay of execution and the call for a complete new retrial" - scheduled for 10 January.

Mercifully, the five judges who reviewed her case "determined that the act was unintentional and was indeed a case of self-defense". As a result she was "exonerated from the charge of murder".

That's the good news. The bad news is that the judges "ruled that disproportionate force was used by Nazanin while trying to defend herself and her 15-year old niece" and ordered that she pay dieh, or blood money, "to receive a pardon from the family of the deceased before she can be released from prison".

Nazanin's lawyers say they "intend to appeal the payment of blood money, but since this may take several months they also have requested bail so that Nazanin may be released from prison immediately. The court has set bail in the amount of 400,000,000 Rials (over US$40,000)".

Since the poor girl's family is a bit cash-strapped, the Help Nazanin campaign is asking for donations. All cash received "will be allocated to the requested bail and other campaign costs" and, if the appeal is successful, "any excess donation fund will be used to assist Nazanin's family as well as any other cases of minors sentenced to death in Iran".

Well, El Reg has already walked it like it talks it, and this morning dispatched some cash to the fighting fund. We're sure those of you with a few quid or dollars to spare will be happy to do the same. You can find details on how to make a donation here. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.