Feeds

Terry Waite backs McKinnon

Beirut hostage joins 'pretty harmless' camp

Seven Steps to Software Security

Former Beirut hostage Terry Waite has spoken out against attempts to extradite self-confessed Pentagon hacker Gary McKinnon to face a US trial.

Waite, who since his release in 1991 has become a human rights and police campaigner, argues that the US military should thank McKinnon for exposing security holes in its systems. McKinnon's recent diagnosis of Aspberger's syndrome ought to prompt a decision by US authorities to drop the prosecution against McKinnon.

McKinnon claims he was only looking for suppressed information about anti-gravity propulsion systems and other UFO technology he reckons is being held from the public when he broke into US military systems. He admits hacking but denies doing any damage, against US claims that he was the "biggest military hacker of all time".

Waite said McKinnon's behaviour was "hardly that of a serious spy" and described his motives as "pretty harmless" adding "The Pentagon ought to thank him for exposing the vulnerability of their systems," the Press Association reports.

The former Church of England envoy urged common sense in the handling of the case, while emphasising that he supports law enforcement efforts to "track down and stop illegal activity" on the web, the BBC adds.

A judicial review on whether the Home Secretary was right to allow extradition proceedings against Gary McKinnon to proceed despite his health problems has been scheduled for 9 and 10 June. The hearing has become McKinnon's best hope of avoiding a US trial after failed appeals that went all the way to the House of Lords last year, and a more recent decision by UK prosecutors not to put McKinnon on trial on this side of the Atlantic.

McKinnon's long-running campaign against extradition has gained celebrity support over recent months. Alongside Waite other eminent sorts who have come out in support of McKinnon include the UK Government's independent reviewer of terrorism legislation, Lord Carlile of Berriew, former Police frontman Sting and London Mayor Boris Johnson. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.