Feeds

Assange fights extradition in court

Charge me or release me

Internet Security Threat Report 2014

Julian Assange's lawyers are in court now to fight his extradition to Sweden by arguing that prosecutors have failed to follow correct procedures.

Swedish authorities want to question Assange in relation to alleged sex offences. But his defence solicitors claim that prosecutors must charge him with an offence, and therefore disclose the evidence against him, in order to qualify for extradition. Extradition is for people who have been charged with specific offences – Assange cannot be extradited simply in order to be questioned.

His lawyers claim that Swedish prosecutors must either disclose to Assange all the prosecution evidence, including text and Twitter messages sent by his two accusers, or admit that his extradition is not being sought for purposes of prosecution, in which case he should not be extradited anyway.

Lawyers for Swedish prosecutors told the court that the warrant had been issued for the purpose of prosecution, even if specific charges had yet to be made.

The defence team, including Geoffrey Robertson QC, argue that Marianne Ny, a public prosecutor in Gothenburg who issued the European Arrest Warrant, is not entitled to do so. Only the Swedish National Police Board may issue EWAs, says the defence.

Assange's lawyers also claim that his privacy rights have been breached because extracts of the prosecution file have been made available to the media.

They also question whether the alleged conduct, even if proved, would qualify as an offence in the UK.

Assange's defence team also said that his onward rendition from Sweden to the US would breach his human rights.

They claim there is a real risk that if sent to Sweden, Assange could be extradited or illegally rendered to Guatanomo Bay or elsewhere and "there is a real risk he could be made subject to the death penalty". Lawyers quoted comments from Sarah Palin and Mike Huckabee in support of this claim.

Assange's defence documents are available for download here.

The two-day trial continues. ®

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.