London mayor asks Obama to drop case against British hacker
Boris Johnson calls efforts to extradite UFO hacker example of "American bullying"
Computerworld - In a column published today in London's Telegraph newspaper, the mayor of London called upon President Barack Obama to call off the U.S. effort to extradite and prosecute the British hacker who in 2001 broke into computer systems in the Department of Defense, NASA and the U.S. Army.
"To listen to the ravings of the U.S. military, you would think that Mr. McKinnon is a threat to national security on a par with Osama bin Laden," Johnson wrote. "According to the Americans, this mild-mannered computer programmer has done more damage to their war-fighting capabilities than all the orange-pyjama-clad suspects of Guantanamo combined."
Johnson then said it would be "brutal, mad and wrong" to send McKinnon to the U.S. for prosecution and then asked Obama to call the U.S. Department of Justice off the case.
McKinnon, who was an unemployed system administrator in the U.K. at the time of the 2001 hack, has been using a series of legal maneuvers and appeals over the past seven years to fight extradition to the United States. McKinnon, now 43, was indicted in November 2002 in the U.S. District Court for the Eastern District of Virginia. He has said he broke into U.S. military computers hoping to uncover evidence of UFOs.
McKinnon has admitted to hacking the computers and described how he did it in detail at computer security conferences in London.
The U.S. government alleges that McKinnon caused $900,000 in damages to computers in 14 states, and that he caused the shutdown of critical military networks shortly after the Sept. 11, 2001, terrorist attacks. He faces a sentence of 60 years or more in the U.S.
Late last week, McKinnon got yet another chance to avoid extradition when The High Court in London ruled that the case can be reviewed by Keir Starmer, director of public prosecutions for England and Wales.
Johnson, a high-profile politician in the U.K., contends in his column that McKinnon meant no harm to the U.S. and was only looking through government and military files for evidence of UFOs.
"It is a comment on American bullying and British spinelessness that this farce is continuing, because Gary McKinnon is not and never has been any kind of threat to American security," he wrote. "It is time for Barack Obama to show the new leadership the world has been crying out for. It is time for the Commander in Chief to tell the U.S. military to stop being so utterly wet, dry their eyes, and invest in some passwords that are slightly more difficult to crack."
Investigators and prosecutors in the U.S. didn't take the hack as lightly, though.
The hack, which started just a few weeks after the terrorist attacks of Sept. 11, 2001, had investigators working around the clock to figure out who had been in and out of key military systems, according to Scott Christie, who at the time was an assistant U.S. attorney in New Jersey and was the first prosecutor brought into the case.
Christie said in a previous interview that because of the seriousness of the attack and the possibility that it could have been linked to a terrorist organization, the government was forced to throw a lot of resources at the problem -- resources that could have been used in the 9/11 investigation.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- Gartner Magic Quadrant for Application Security The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cybercrime and Hacking White Papers | Webcasts