Feeds

Assange assault accusers sought 'revenge,' attorneys say

Financial motive also alleged

The essential guide to IT transformation

Text messages sent by the two women who accuse Julian Assange of sexually assaulting them refer to revenge and financial gain in messages that undercut the veracity of their claims, attorneys for the WikiLeaks founder said on Tuesday.

Testifying in Belmarsh Magistrates' Court in east London, defense witness Björn Hurtig said he was permitted to review hundreds of messages under police supervision, but was not allowed to copy them. Hurtig, Assange's Sweden-based attorney, said he read messages that spoke of "revenge" and taking “economic advantage" of his client, according to IDG News and other outlets.

Dozens of messages sent by one of the alleged victims, identified only as Miss W, go against her claim that Assange raped her while she slept during his 10-day visit to Stockholm in August, and suggest she has a “hidden agenda,” Hurtig said.

Assange has denied any wrongdoing, and said sexual relations with both women were entirely consensual.

Claims about the text messages came to light during the second day of hearings into whether Assange should be extradited to Sweden. Prosecutors there have said they want him available for questioning. They have issued a warrant for Assange's arrest but haven't filed charges in the case. The hearing is scheduled to resume on Friday.

Assange's attorneys also presented testimony from former Swedish prosecutor Sven-Erik Alhem, who said prosecutors should have questioned Assange sooner after deciding to reopen their investigation. The case was initially closed shortly after the assault allegations were made. Prosecutor Marianne Ny later reversed that decision.

“In my opinion [Ny] should then have made sure Assange was given the opportunity to give his version of the events in detail,” Alhem said. Defense witness Geoffrey Robertson testified on Monday that it was improper for prosecutors to issue an extradition request without first charging the suspect. Clare Montgomery, representing the British government, countered that authorities in Sweden have “sufficient intention” to prosecute.

Defense attorneys have also argued that if Assange is extradited, he could end up being forcibly transferred to the US, detained at Guantanamo Bay, and eventually executed.

Additional coverage from The Independent and The Telegraph are here and here. ®

The essential guide to IT transformation

More from The Register

next story
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.