Feeds

Day dawns for Pentagon hacker Lords appeal

Last chance saloon

Next gen security for virtualised datacentres

It's D-Day for accused Pentagon hacker Gary McKinnon. Five law Lords are due to consider his appeal against extradition to the US in a hearing due to commence at 1100 BST on Monday.

Lord Phillips of Worth Matravers, Master of the Rolls and third most senior judge in the UK, along with four other law Lords will hear arguments that the US authorities stepped over the mark during plea bargaining negotiations with McKinnon.

In particular, McKinnon was allegedly threatened with a longer spell in jail if convicted and opposition against repatriation that would allow him to serve part of any possible sentence in the UK unless he agreed to voluntary extradition.

Other Lords sitting in on the appeal, McKinnon's final chance at avoiding extradition, include Lord Brown of Eaton-under-Heywood, former Intelligence Services Commissioner.

Although the hearing may be over today a decision is not expected for some weeks.

Gary McKinnon at Infosec

Gary McKinnon at Infosec 2007

The hearing is all that stands between McKinnon and a US trial for allegedly hacking into 97 US government computers between 2001 and 2002 in what US authorities described at the time as the "biggest military" computer hack ever.

The former sys admin admits he gained access to weakly secured computers but describes himself as a bumbling amateur searching for suppressed evidence that the US military has supposedly harvested advanced technology from UFOs rather than the black-hat ninja hacker described in the US case against him.

The 42-year-old said he obtained access to military networks using a Perl script to hunt for default passwords. He was traced via his purchase of remote control software used to carry out the hack.

McKinnon and his legal team have consistently argued the case that he ought to be tried in the UK during his long-running fight against extradition. He was arrested and questioned by UK police over the alleged offences in November 2002 but US extradition proceedings didn't get going until June 2005. ®

The essential guide to IT transformation

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.