London mayor asks Obama to drop case against British hacker
Boris Johnson calls efforts to extradite UFO hacker example of "American bullying"
Computerworld - In a column published today in London's Telegraph newspaper, the mayor of London called upon President Barack Obama to call off the U.S. effort to extradite and prosecute the British hacker who in 2001 broke into computer systems in the Department of Defense, NASA and the U.S. Army.
"To listen to the ravings of the U.S. military, you would think that Mr. McKinnon is a threat to national security on a par with Osama bin Laden," Johnson wrote. "According to the Americans, this mild-mannered computer programmer has done more damage to their war-fighting capabilities than all the orange-pyjama-clad suspects of Guantanamo combined."
Johnson then said it would be "brutal, mad and wrong" to send McKinnon to the U.S. for prosecution and then asked Obama to call the U.S. Department of Justice off the case.
McKinnon, who was an unemployed system administrator in the U.K. at the time of the 2001 hack, has been using a series of legal maneuvers and appeals over the past seven years to fight extradition to the United States. McKinnon, now 43, was indicted in November 2002 in the U.S. District Court for the Eastern District of Virginia. He has said he broke into U.S. military computers hoping to uncover evidence of UFOs.
McKinnon has admitted to hacking the computers and described how he did it in detail at computer security conferences in London.
The U.S. government alleges that McKinnon caused $900,000 in damages to computers in 14 states, and that he caused the shutdown of critical military networks shortly after the Sept. 11, 2001, terrorist attacks. He faces a sentence of 60 years or more in the U.S.
Late last week, McKinnon got yet another chance to avoid extradition when The High Court in London ruled that the case can be reviewed by Keir Starmer, director of public prosecutions for England and Wales.
Johnson, a high-profile politician in the U.K., contends in his column that McKinnon meant no harm to the U.S. and was only looking through government and military files for evidence of UFOs.
"It is a comment on American bullying and British spinelessness that this farce is continuing, because Gary McKinnon is not and never has been any kind of threat to American security," he wrote. "It is time for Barack Obama to show the new leadership the world has been crying out for. It is time for the Commander in Chief to tell the U.S. military to stop being so utterly wet, dry their eyes, and invest in some passwords that are slightly more difficult to crack."
Investigators and prosecutors in the U.S. didn't take the hack as lightly, though.
The hack, which started just a few weeks after the terrorist attacks of Sept. 11, 2001, had investigators working around the clock to figure out who had been in and out of key military systems, according to Scott Christie, who at the time was an assistant U.S. attorney in New Jersey and was the first prosecutor brought into the case.
Christie said in a previous interview that because of the seriousness of the attack and the possibility that it could have been linked to a terrorist organization, the government was forced to throw a lot of resources at the problem -- resources that could have been used in the 9/11 investigation.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center... All Cybercrime and Hacking White Papers | Webcasts