Feeds

Government defeats Tories in 'McKinnon' extradition vote

Labour political hacks fail to back hacker

Next gen security for virtualised datacentres

An opposition motion calling for a review of the extradition treaty between the US and UK failed in Parliament on Wednesday after Labour supporters of US extradition target Gary McKinnon fell behind the party whip.

A total of 82 Labour MPs have supported McKinnon's campaign against extradition in three Commons motions tabled since 2005. But only eight defied the whips and backed a Tory motion calling for an "immediate review" of the extradition treaty. The treaty is widely criticised as one-sided because the US can request extradition from the UK without providing evidence while evidence is required in the opposite case.

Another 15 abstained, while 59 Labour MPS who previously supported McKinnon voted with the government.

As a result the motion was defeated by 290 votes to 236. The plight of McKinnon, diagnosed with Asperger's Syndrome last year, and staring down the barrel of US trial followed by a lengthy spell in Federal prison, was central to the debate.

The Daily Mail, which has latterly started an an energetic campaign on McKinnon's behalf, is characteristically indignant at what it describes as the hypocrisy of "spineless" Labour MPs who deserted McKinnon's cause. It fails to note that Tory supporters of McKinnon would have likely opposed the same motion had it hypothetically been tabled by the government, and that many Conservative supporters of the motion were not necessarily backers of the UFO truthseeker turned military hacker.

This was not anything like a free vote.

Labour MPs who did cross the floor to support the Conservative motion included Keith Vaz, chairman of the Home Affairs Select Committee, and Kate Hoey, a former minister. The other six Labour supporters were Jeremy Corbyn, Jim Devine, Lynne Jones, John McDonnell, Mohammad Sarwar and Alan Simpson.

During the debate, recently-appointed Home Secretary Alan Johnson claimed that he was only to intervene in extradition cases in a very limited set of circumstances, such as where an extradition target faces a possible death penalty sentence. He also rejected criticism that extradition procedures between the US and UK were "somehow unbalanced", the Daily Mail adds. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.