Feeds

McKinnon loses fight against extradition

Faces US trial on Pentagon hack allegations

SANS - Survey on application security programs

Updated Gary McKinnon, the alleged Pentagon hacker, has lost his appeal against extradition to the US on hacking charges.

McKinnon, 41, failed to convince Appeal Court judges on Tuesday to overturn a 2006 ruling by Home Secretary John Reid that his extradition should go ahead. The Scot now faces a US trial of breaking into and damaging 97 US government computers in what US authorities have described as the "biggest military" hack ever.

McKinnon is alleged to have hacked into computers belonging to the US Army, US Navy, US Air Force, Department of Defense, and NASA in 2001 and 2002. The Scot lost his first appeal against extradition in an High Court hearing last July but was given leave to take his case to a Appeal Court, a move that culminated in failure on Tuesday. McKinnon's final option is an appeal to the House of Lords but there is no guarantee that Appeal Court judges will even grant this leave to final appeal.

This week's hearing was McKinnon "last best" chance to avoid extradition.

His lawyers argued that he had been subjected to "improper threats" that he would receive a much harsher sentence and be denied the opportunity to serve out the back-end of his jail term in the UK unless he played ball. But Lord Justice Maurice Kay and Mr Justice Goldring said: "We do not find any grounds of appeal", in dismissing McKinnon's legal challenge against the Home Secretary's decision to confirm a ruling that McKinnon ought to be extradited to the US.

The unemployed sysadmin has had these charges over his head since March 2002 when he was arrested by officers from the UK's National High Tech Crime Unit. The case against him lay dormant until July 2005, when extradition proceedings were brought against him. His lawyers consistently argued that McKinnon ought to be tried in the UK over his alleged offences, rather than the US.

McKinnon (AKA Solo) admits he infiltrated computer systems without permission, but claims he did no harm. He got involved in hacking after reading Disclosure by Steven Greer, which convinced him that the US had harvested advanced technology from UFOs (such as anti-gravity propulsion systems) and kept this knowledge secret, to the detriment of the public.

He was caught after US authorities tracked system intrusions back to the UK. UK police identified McKinnon as the attacker after obtaining records of British sales of a software tool called RemotelyAnywhere to McKinnon, who'd unwisely used his real email address to purchase the software. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.