Feeds

Only 'unlawful threats' would invalidate McKinnon extradition

Ordinary threats not enough

The Power of One Brief: Top reasons to choose HP BladeSystem

Lord Brown goes on to argue that McKinnon might be facing an equally serious offence even if he was tried in the UK, the outcome his legal team and campaigners are seeking:

As the Divisional Court itself pointed out, the gravity of the offences alleged against the appellant should not be understated: The equivalent domestic offences include an offence under section 12 of the Aviation and Maritime Security Act 1990 for which the maximum sentence is life imprisonment. True, the disparity between the consequences predicted by the US authorities dependent upon whether the appellant cooperated or not was very marked... But the discount would have to be very substantially more generous than anything promised here (as to the way the case would be put and the likely outcome) before it constituted unlawful pressure such as to vitiate [invalidate] the process. So too would the predicted consequences of non-cooperation need to go significantly beyond what could properly be regarded as the defendant’s just desserts on conviction for that to constitute unlawful pressure.

The Lords considered a Canadian Supreme Court case (USA v Cobb [2001]) where extradition proceedings against fraud suspects to the US were curtailed after a US prosecutor was found to have threatened suspects that they'd be placed in a situation where they could expect prison rape unless they agreed to voluntary deportation. A US judge in the same case vowed to hand down maximum sentences to anyone convicted after resisting deportation.

The offer made to McKinnon hardly deserves to be considered as anywhere near comparable, Lord Brown ruled:

The differences between this case and Cobb are striking. In Cobb it was the judge who stated that non-cooperation would result in "the absolute maximum jail sentence that the law permits me to give" and he, after all, unlike the prosecuting authority, had the power to pass sentence. And in Cobb the prosecutor, so far from forewarning the defendant of the differing consequences which could be expected to follow (perfectly properly) from his decision whether or not to cooperate, effectively threatened (and here I use the word advisedly) those not cooperating with homosexual rape.

Following the plea bargain talks between McKinnon, his legal team, and US prosecutors, other US legal officials have made undertakings that the threat to oppose repatriation will not be carried through. Lord Brown concludes nothing much less than threats of assault against McKinnon, or other extradition targets, would taint the extradition process:

In my judgment it would only be in a wholly extreme case like Cobb itself that the court should properly regard any encouragement to accused persons to surrender for trial and plead guilty, in particular if made by a prosecutor during a regulated process of plea bargaining, as so unconscionable as to constitute an abuse of process justifying the requested state’s refusal to extradite the accused. It is difficult, indeed, to think of anything other than the threat of unlawful action which could fairly be said so to imperil the integrity of the extradition process as to require the accused, notwithstanding his having resisted the undue pressure, to be discharged irrespective of the strength of the case against him.

McKinnon and his legal team have vowed to lodge an appeal at the European Court of Human Rights. The use of threats made by US authorities during the plea bargaining process and the concern that McKinnon may face a military tribunal, rather than a civil court, if he is extradited to the US, will be the two grounds of appeal.

Unless the European court intervenes with a stay in proceedings McKinnon faces the prospect of deportation in less than a month.

McKinnon (aka SOLO), a self-confessed computer hacker, was first arrested six and a half years ago after allegedly hacking into 97 computer systems run by the US armed forces and NASA in what prosecutors described as the biggest military hack ever. McKinnon claims to have broken into systems only to uncover confidential information about anti-gravity propulsion systems and UFO tech he reckoned the US military was hiding from the public. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.