UK to decide on NASA hacker extradition by Oct. 16
If Gary McKinnon's extradition is approved, the case will proceed to the High Court in November
IDG News Service - The U.K.'s Home Office will decide by Oct. 16 whether to block the extradition to the U.S. of Gary McKinnon, who has admitted to hacking into U.S. government computers, McKinnon's attorney said on Thursday.
McKinnon, 46, of north London, was indicted in 2002 at the U.S. District Court in Virginia for hacking into 97 military and NASA computers between February 2001 and March 2002.
McKinnon's extradition, though approved by the British government in 2006, has been delayed by years of court reviews and legal maneuvering. His case stirred controversy over the fairness of the extradition treaty between the U.S. and U.K., although a legal review completed last October found it was not slanted against British defendants.
In 2010, Home Secretary Theresa May adjourned a judicial review of McKinnon's case that had been due to take place in the High Court. Since then, the U.K. government has been conducting an inquiry into McKinnon's medical record. He suffers from Asperger's syndrome, a neurological disorder related to autism characterized by deficiencies in social interaction, as well as depression.
If his extradition is approved the case will proceed to the U.K. High Court, which has scheduled hearings for Nov. 28 and 29, according to Karen Todner, McKinnon's lawyer.
McKinnon has admitted to hacking the computers but asked that his prosecution be conducted in the U.K. The Crown Prosecution Service has declined to prosecute, contending the U.S. wants jurisdiction and that most of the evidence is held by the U.S.
McKinnon, who went by the name "Solo," contends he was merely searching for proof that UFOs exist and that he didn't harm the systems he is accused of hacking. He used a program called "RemotelyAnywhere," a remote access tool, to access computers, many of which were protected by only default passwords.
The U.S. military alleges that McKinnon deleted critical files from its computers, causing up to US$800,000 in damages, and hampered its efforts after the Sept. 11, 2001, terrorist attacks.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cyberwarfare White Papers | Webcasts