Feeds

Only 'unlawful threats' would invalidate McKinnon extradition

Ordinary threats not enough

The essential guide to IT transformation

Lord Brown goes on to argue that McKinnon might be facing an equally serious offence even if he was tried in the UK, the outcome his legal team and campaigners are seeking:

As the Divisional Court itself pointed out, the gravity of the offences alleged against the appellant should not be understated: The equivalent domestic offences include an offence under section 12 of the Aviation and Maritime Security Act 1990 for which the maximum sentence is life imprisonment. True, the disparity between the consequences predicted by the US authorities dependent upon whether the appellant cooperated or not was very marked... But the discount would have to be very substantially more generous than anything promised here (as to the way the case would be put and the likely outcome) before it constituted unlawful pressure such as to vitiate [invalidate] the process. So too would the predicted consequences of non-cooperation need to go significantly beyond what could properly be regarded as the defendant’s just desserts on conviction for that to constitute unlawful pressure.

The Lords considered a Canadian Supreme Court case (USA v Cobb [2001]) where extradition proceedings against fraud suspects to the US were curtailed after a US prosecutor was found to have threatened suspects that they'd be placed in a situation where they could expect prison rape unless they agreed to voluntary deportation. A US judge in the same case vowed to hand down maximum sentences to anyone convicted after resisting deportation.

The offer made to McKinnon hardly deserves to be considered as anywhere near comparable, Lord Brown ruled:

The differences between this case and Cobb are striking. In Cobb it was the judge who stated that non-cooperation would result in "the absolute maximum jail sentence that the law permits me to give" and he, after all, unlike the prosecuting authority, had the power to pass sentence. And in Cobb the prosecutor, so far from forewarning the defendant of the differing consequences which could be expected to follow (perfectly properly) from his decision whether or not to cooperate, effectively threatened (and here I use the word advisedly) those not cooperating with homosexual rape.

Following the plea bargain talks between McKinnon, his legal team, and US prosecutors, other US legal officials have made undertakings that the threat to oppose repatriation will not be carried through. Lord Brown concludes nothing much less than threats of assault against McKinnon, or other extradition targets, would taint the extradition process:

In my judgment it would only be in a wholly extreme case like Cobb itself that the court should properly regard any encouragement to accused persons to surrender for trial and plead guilty, in particular if made by a prosecutor during a regulated process of plea bargaining, as so unconscionable as to constitute an abuse of process justifying the requested state’s refusal to extradite the accused. It is difficult, indeed, to think of anything other than the threat of unlawful action which could fairly be said so to imperil the integrity of the extradition process as to require the accused, notwithstanding his having resisted the undue pressure, to be discharged irrespective of the strength of the case against him.

McKinnon and his legal team have vowed to lodge an appeal at the European Court of Human Rights. The use of threats made by US authorities during the plea bargaining process and the concern that McKinnon may face a military tribunal, rather than a civil court, if he is extradited to the US, will be the two grounds of appeal.

Unless the European court intervenes with a stay in proceedings McKinnon faces the prospect of deportation in less than a month.

McKinnon (aka SOLO), a self-confessed computer hacker, was first arrested six and a half years ago after allegedly hacking into 97 computer systems run by the US armed forces and NASA in what prosecutors described as the biggest military hack ever. McKinnon claims to have broken into systems only to uncover confidential information about anti-gravity propulsion systems and UFO tech he reckoned the US military was hiding from the public. ®

The essential guide to IT transformation

More from The Register

next story
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.