Feeds

Julian Assange sets out bid to appeal extradition to Sweden

Life is so unfair

Secure remote control for conventional and virtual desktops

Lawyers representing WikiLeaks founder Julian Assange lodged papers at the UK's High Court this morning, in an effort to appeal against his extradition to Sweden.

A spokeswoman told The Register that the High Court had received the papers but added that "no date was set, and no guidance has been issued."

Last week it was recommended by a judge at South East London's Belmarsh magistrates court that Assange should be extradited to Sweden to face questions regarding two alleged sexual assaults in the country.

The 39-year-old Australia-born WikiLeaker-in-chief was given seven days to bring an appeal against extradition.

Judge Howard Riddle said during the ruling that the allegations of rape and sexual molestation brought by two women against Assange were extraditable offences.

Assange was granted bail, following the ruling, after his lawyers secured funds understood to total £200,000.

The WikiLeaks founder said the decision was "the result of a European arrest warrant system run amok". ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.