Feeds

Sealand dismisses McKinnon asylum offer as 'rumour'

Sanctuary at sea plan sunk

Secure remote control for conventional and virtual desktops

Gary McKinnon, the British hacker facing extradition over allegations he broke into US Military and NASA sites, will have to look elsewhere for salvation after the government of Sealand dismissed reports it was prepared to offer him asylum as "rumours".

Gary McKinnon at Infosec

Gary McKinnon at Infosec

A technician working for a hosting business operating from the former military platform off the coast of Suffolk turned "micronation", floated the idea to McKinnon and his supporters when the hacker appeared as a speaker at the Infosec conference in London last week. Postings on the Torrentfreak blog suggested Prince Michael Bates of Sealand was prepared to offer McKinnon bed and board on the 550 square metre platform.

But a representative for Sealand told El Reg that what started out as a suggestion by a worker was definitely not a runner, a move that presumably means US commandos on snatch-squad training can now stand down.

"Somebody lower down, who works on the platform, made the suggestion. The attitude of the government is that we're not going to get involved. It won't be issuing asylum to Gary McKinnon," he said, adding that a statement to that effect would be published on the principality's official site.

Since Sealand is recognised as part of the UK by other governments, it's tempting to think the idea was just a bit of light fun dreamt up in the pub at the end of a busy conference. Our man on Sealand denied it had floated the idea as a publicity exercise, maintaining it was above such things.

The Bates family has long claimed the former WWII fort - home of web hosting firm HavenCo - is an independent principality, a contention dismissed by legal experts.

Earlier this year, Swedish file sharing site The Pirate Bay mounted an unsuccessful campaign to purchase the self-proclaimed nation as a home for its torrents.

Meanwhile, McKinnon is continuing to fight against extradition to the US on hacking offences after losing an appeal last month. Only the Law Lords now stand between the Scot and a US trial for allegedly breaking into and damaging 97 US government computers between 2001 and 2002 and causing an estimated $700,000 worth of damage, in what US authorities have described as the "biggest military" computer hack ever. ®

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.