Feeds

McKinnon: The longest ever game of pass the parcel

After eight years, the music may finally be stopping

Securing Web Applications Made Simple and Scalable

Six years before McKinnon, reformed British computer hacker turned hypnotherapist Mathew Bevan was also charged with breaking into insecure US military computer systems, again motivated by a desire to uncover suppressed UFO-related evidence. Bevan's alleged crimes were cited as examples of cyberterrorism at Senate hearings in 1996.

Bevan, unlike McKinnon, was prosecuted in the UK and no attempt was made to extradite him to the US. The case against Bevan eventually collapsed after 18 months, when prosecutors decided not to proceed. Bevan's alleged accomplice Richard Pryce, then 16 years old, pleaded guilty to hacking offences and received a fine.

Aaron Caffrey was found not guilty by a jury in 2003 of launching a major electronic attack that floored the computer systems of the Port of Houston. The unsuccessful outcome of both cases arguably played a big part in the US decision to seek extradition in the McKinnon case.

Scores of people have pleaded guilty to Computer Misuse Act offences but no one has actually been convicted of hacking offences by a jury in the 20 years since the now amended CMA first became law. This may perhaps have been one reason why the US authorities have pursued extradition so doggedly.

All this still leaves the question of why years of protracted legal procrastinating, that have taken a severe toll on McKinnon's health, have accompanied the case. The reason seems to be that while some New Labour minsters and element of the judiciary are keen to accede to American requests and sympathetic to their law enforcement concerns, others in British society regard the US stance as taking a very large hammer to a small nut.

Feelings that McKinnon has been treated unfairly, and perhaps that he has suffered enough, have grown strongly after he was diagnosed with Asperger's Syndrome back in 2008.

Some reckoned that the departure of the Bush administration would signal the end of the US extradition bid against McKinnon.

That hasn't happened, but Obama's justice team has been noticeably less noisy about the issue.

And whereas President Obama has not intervened directly in what's a little known case in the US, at least, Conservative leader and PM in waiting (if opinion polls are to be believed) David Cameron has publicly backed McKinnon. A future Conservative Home Secretary is likely to finally suspend extradition proceedings against McKinnon, eight years after he was first arrested and five years after the first attempts to haul him over to the US.

So, one might speculate that when we have new justice teams either side of the Atlantic, it will become easier for them to - more or less quietly - bury the case.

It's normally said that justice delayed is justice denied, and McKinnon's exceptionally long wait arguably proves the rule. ®

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.