London mayor asks Obama to drop case against British hacker
Boris Johnson calls efforts to extradite UFO hacker example of "American bullying"
Computerworld - In a column published today in London's Telegraph newspaper, the mayor of London called upon President Barack Obama to call off the U.S. effort to extradite and prosecute the British hacker who in 2001 broke into computer systems in the Department of Defense, NASA and the U.S. Army.
"To listen to the ravings of the U.S. military, you would think that Mr. McKinnon is a threat to national security on a par with Osama bin Laden," Johnson wrote. "According to the Americans, this mild-mannered computer programmer has done more damage to their war-fighting capabilities than all the orange-pyjama-clad suspects of Guantanamo combined."
Johnson then said it would be "brutal, mad and wrong" to send McKinnon to the U.S. for prosecution and then asked Obama to call the U.S. Department of Justice off the case.
McKinnon, who was an unemployed system administrator in the U.K. at the time of the 2001 hack, has been using a series of legal maneuvers and appeals over the past seven years to fight extradition to the United States. McKinnon, now 43, was indicted in November 2002 in the U.S. District Court for the Eastern District of Virginia. He has said he broke into U.S. military computers hoping to uncover evidence of UFOs.
McKinnon has admitted to hacking the computers and described how he did it in detail at computer security conferences in London.
The U.S. government alleges that McKinnon caused $900,000 in damages to computers in 14 states, and that he caused the shutdown of critical military networks shortly after the Sept. 11, 2001, terrorist attacks. He faces a sentence of 60 years or more in the U.S.
Late last week, McKinnon got yet another chance to avoid extradition when The High Court in London ruled that the case can be reviewed by Keir Starmer, director of public prosecutions for England and Wales.
Johnson, a high-profile politician in the U.K., contends in his column that McKinnon meant no harm to the U.S. and was only looking through government and military files for evidence of UFOs.
"It is a comment on American bullying and British spinelessness that this farce is continuing, because Gary McKinnon is not and never has been any kind of threat to American security," he wrote. "It is time for Barack Obama to show the new leadership the world has been crying out for. It is time for the Commander in Chief to tell the U.S. military to stop being so utterly wet, dry their eyes, and invest in some passwords that are slightly more difficult to crack."
Investigators and prosecutors in the U.S. didn't take the hack as lightly, though.
The hack, which started just a few weeks after the terrorist attacks of Sept. 11, 2001, had investigators working around the clock to figure out who had been in and out of key military systems, according to Scott Christie, who at the time was an assistant U.S. attorney in New Jersey and was the first prosecutor brought into the case.
Christie said in a previous interview that because of the seriousness of the attack and the possibility that it could have been linked to a terrorist organization, the government was forced to throw a lot of resources at the problem -- resources that could have been used in the 9/11 investigation.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts