Feeds

Assange assault accusers sought 'revenge,' attorneys say

Financial motive also alleged

Internet Security Threat Report 2014

Text messages sent by the two women who accuse Julian Assange of sexually assaulting them refer to revenge and financial gain in messages that undercut the veracity of their claims, attorneys for the WikiLeaks founder said on Tuesday.

Testifying in Belmarsh Magistrates' Court in east London, defense witness Björn Hurtig said he was permitted to review hundreds of messages under police supervision, but was not allowed to copy them. Hurtig, Assange's Sweden-based attorney, said he read messages that spoke of "revenge" and taking “economic advantage" of his client, according to IDG News and other outlets.

Dozens of messages sent by one of the alleged victims, identified only as Miss W, go against her claim that Assange raped her while she slept during his 10-day visit to Stockholm in August, and suggest she has a “hidden agenda,” Hurtig said.

Assange has denied any wrongdoing, and said sexual relations with both women were entirely consensual.

Claims about the text messages came to light during the second day of hearings into whether Assange should be extradited to Sweden. Prosecutors there have said they want him available for questioning. They have issued a warrant for Assange's arrest but haven't filed charges in the case. The hearing is scheduled to resume on Friday.

Assange's attorneys also presented testimony from former Swedish prosecutor Sven-Erik Alhem, who said prosecutors should have questioned Assange sooner after deciding to reopen their investigation. The case was initially closed shortly after the assault allegations were made. Prosecutor Marianne Ny later reversed that decision.

“In my opinion [Ny] should then have made sure Assange was given the opportunity to give his version of the events in detail,” Alhem said. Defense witness Geoffrey Robertson testified on Monday that it was improper for prosecutors to issue an extradition request without first charging the suspect. Clare Montgomery, representing the British government, countered that authorities in Sweden have “sufficient intention” to prosecute.

Defense attorneys have also argued that if Assange is extradited, he could end up being forcibly transferred to the US, detained at Guantanamo Bay, and eventually executed.

Additional coverage from The Independent and The Telegraph are here and here. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.