Feeds

Operation Ore decision a 'serious miscarriage of justice' - lawyer

Judges ignored evidence, lacked expertise

SANS - Survey on application security programs

The solicitor who brought the Operation Ore appeal that was finally rejected today has questioned whether the British courts had the expertise to consider deeply technical cases.

Chris Saltrese, the solicitor who brought the case on behalf of Anthony O'Shea, told us today that in his view, the verdict was "not based on the evidence".

Speaking on the dismissal of O'Shea's appeal against his conviction for incitement to distribute an indecent photograph of a child, he told us: "This is a disappointing judgment but not unexpected.

"The Court of Appeal decided to hear a two week case in two days by not hearing the evidence," he claimed.

"As a result, the Court overlooked the key issues in the written submissions. It substituted its own version of the significant evidence."

"The Court's version did not include the core evidence on which the appeal was based.

The House of Lords Science and Technology Committee has recommended that the Government review the availability of independent specialist advice in court cases involving internet-related crime, Saltrese said. "The conduct of this case suggests that such a step may now be timely.

"Landslide [the database in which O'Shea's details were found] was not a child pornography portal. It was an internet vehicle through which criminal webmasters processed stolen credit-card information," Saltrese continued. "The evidence is clear but was overlooked by the Court.

"We would stress that we remain convinced that Operation Ore in general, and this case in particular, was seriously flawed and a miscarriage of justice."

O'Shea would now have to consider his next steps, Saltrese said.

From the authorities' point of view, the verdict vindicates Operation Ore. Jim Gamble, ACPO lead for child protection, told the Reg earlier today: “Today’s decision by the Court of Appeal draws a line under the efforts of a small number of individuals who, over the past ten years, have perpetuated conspiracy theories about Operation Ore." ®

3 Big data security analytics techniques

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.