Extradition appeal for British hacker dismissed
Gary McKinnon most likely headed to U.S.
IDG News Service - A British hacker who admitted breaking into U.S. military computers hoping to uncover evidence of UFOs looks set to be extradited to the U.S. after the highest British court today dismissed his appeal against the extradition.
Gary McKinnon, 42, of London, will be the first person to be extradited to the U.S. for computer-related crimes. He could face up to 60 years in prison.
McKinnon said he plans to appeal the decision to the European Court of Human Rights, the last appeal he can file, according to his attorney, Karen Todner. That appeal will be lodged today in Strasbourg, France, she said.
"He's devastated and so is his family," Todner said.
McKinnon will also request that his extradition be delayed until his last appeal can be heard, Todner said. He has 14 days to file that request. If it is denied, McKinnon would be extradited to the U.S. while his European appeal proceeds, Todner said.
The European Court of Justice has a "massive backlog" of cases, and it could take up to two years for the appeal to be heard, Todner said.
In his appeal, McKinnon argued that when U.S. prosecutors offered him a shorter sentence in return for a guilty plea, that offer put disproportionate pressure on him to surrender his legal rights and particularly his right to contest extradition. Pressure of that kind, he argued, runs counter to English law.
But in their judgment, the Lords of Appeal said "the difference between the American system and our own is not perhaps as stark so stark as the appellant's argument suggests. In this country too, there is a clearly recognized discount for a plea of guilty."
U.S. prosecutors had said that in return for pleading guilty to two counts of fraud and related activity in connection with computers, McKinnon could be sentenced to as little as three years in prison, of which he would likely serve only six to 12 months in a U.S. prison before returning to the U.K. to serve the rest of the sentence.
An equivalent offense committed against a target in the U.K. could have gotten him life imprisonment, the Lords of Appeal said. "The gravity of the offenses alleged against the appellant should not be understated."
McKinnon had admitted to using a program called "RemotelyAnywhere" to hack into PCs in the U.S. late at night when employees were gone. His hacking exploits started to unravel after McKinnon miscalculated the time difference between the U.S. and the U.K., and one employee noticed a PC acting oddly.
The U.S. pursued extradition for the offenses, which McKinnon sought to block. Then-U.K. Home Secretary John Reid approved the extradition order, but McKinnon appealed. He lost that appeal in London's High Court in April 2007.
McKinnon then turned to the House of Lords, the final court of appeal for points of law in the U.K., which dismissed his appeal.
McKinnon maintains that his hacking never caused any harm, and that he only probed the computers looking for evidence that the U.S. government has knowledge of UFOs.
However, the U.S. said that the intrusions disrupted computer networks used by the military that were critical to operations conducted after the Sept. 11, 2001, terrorist attacks. The U.S. estimates the damage caused by McKinnon at $700,000.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts