Feeds

Only 'unlawful threats' would invalidate McKinnon extradition

Ordinary threats not enough

The essential guide to IT transformation

Lord Brown goes on to argue that McKinnon might be facing an equally serious offence even if he was tried in the UK, the outcome his legal team and campaigners are seeking:

As the Divisional Court itself pointed out, the gravity of the offences alleged against the appellant should not be understated: The equivalent domestic offences include an offence under section 12 of the Aviation and Maritime Security Act 1990 for which the maximum sentence is life imprisonment. True, the disparity between the consequences predicted by the US authorities dependent upon whether the appellant cooperated or not was very marked... But the discount would have to be very substantially more generous than anything promised here (as to the way the case would be put and the likely outcome) before it constituted unlawful pressure such as to vitiate [invalidate] the process. So too would the predicted consequences of non-cooperation need to go significantly beyond what could properly be regarded as the defendant’s just desserts on conviction for that to constitute unlawful pressure.

The Lords considered a Canadian Supreme Court case (USA v Cobb [2001]) where extradition proceedings against fraud suspects to the US were curtailed after a US prosecutor was found to have threatened suspects that they'd be placed in a situation where they could expect prison rape unless they agreed to voluntary deportation. A US judge in the same case vowed to hand down maximum sentences to anyone convicted after resisting deportation.

The offer made to McKinnon hardly deserves to be considered as anywhere near comparable, Lord Brown ruled:

The differences between this case and Cobb are striking. In Cobb it was the judge who stated that non-cooperation would result in "the absolute maximum jail sentence that the law permits me to give" and he, after all, unlike the prosecuting authority, had the power to pass sentence. And in Cobb the prosecutor, so far from forewarning the defendant of the differing consequences which could be expected to follow (perfectly properly) from his decision whether or not to cooperate, effectively threatened (and here I use the word advisedly) those not cooperating with homosexual rape.

Following the plea bargain talks between McKinnon, his legal team, and US prosecutors, other US legal officials have made undertakings that the threat to oppose repatriation will not be carried through. Lord Brown concludes nothing much less than threats of assault against McKinnon, or other extradition targets, would taint the extradition process:

In my judgment it would only be in a wholly extreme case like Cobb itself that the court should properly regard any encouragement to accused persons to surrender for trial and plead guilty, in particular if made by a prosecutor during a regulated process of plea bargaining, as so unconscionable as to constitute an abuse of process justifying the requested state’s refusal to extradite the accused. It is difficult, indeed, to think of anything other than the threat of unlawful action which could fairly be said so to imperil the integrity of the extradition process as to require the accused, notwithstanding his having resisted the undue pressure, to be discharged irrespective of the strength of the case against him.

McKinnon and his legal team have vowed to lodge an appeal at the European Court of Human Rights. The use of threats made by US authorities during the plea bargaining process and the concern that McKinnon may face a military tribunal, rather than a civil court, if he is extradited to the US, will be the two grounds of appeal.

Unless the European court intervenes with a stay in proceedings McKinnon faces the prospect of deportation in less than a month.

McKinnon (aka SOLO), a self-confessed computer hacker, was first arrested six and a half years ago after allegedly hacking into 97 computer systems run by the US armed forces and NASA in what prosecutors described as the biggest military hack ever. McKinnon claims to have broken into systems only to uncover confidential information about anti-gravity propulsion systems and UFO tech he reckoned the US military was hiding from the public. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
Pedals and wheel in that Google robo-car or it's off the road – Cali DMV
And insists on $5 million insurance per motor against accidents
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.