Avalon Senior Member
Join Date: Sep 2008
Posts: 182
|
Re: Poor Gary Mckinnon
Quote:
Originally Posted by murnut
Gary has been charged with a crime.
He has admitted he hacked the computers
But the evidence has not yet been presented.
Gary was offered 6 mos in US prison and the balance to be serve in the UK.
=============================================
10. With those few introductory paragraphs it is necessary to turn in a little detail to the facts of the case.
The appellant’s alleged criminality
11. Using his home computer the appellant, through the internet, identified US Government network computers with an open Microsoft Windows connection and from those extracted the identities of certain administrative accounts and associated passwords. Having gained access to those accounts he installed unauthorised remote access and administrative software called “remotely anywhere” that enabled him to access and alter data upon the American computers at any time and without detection by virtue of the programme masquerading as a Windows operating system. Once “remotely anywhere” was installed, he then installed software facilitating both further compromises to the computers and also the concealment of his own activities. Using this software he was able to scan over 73,000 US Government computers for other computers and networks susceptible to similar compromise. He was thus able to lever himself from network to network and into a number of significant Government computers in different parts of the USA.
12. The 97 computers the appellant accessed were: 53 army computers, including computers based in Virginia and Washington that control the army’s military district of Washington network and are used in furtherance of national defence and security; 26 navy computers, including US Naval Weapons Station Earle, New Jersey, which was responsible for replenishing munitions and supplies for the deployed Atlantic fleet; 16 NASA computers; one Department of Defense computer; and one US Air Force computer.
13. Having gained access to these computers the appellant deleted data from them including critical operating system files from nine computers, the deletion of which shut down the entire US Army’s Military District of Washington network of over 2000 computers for 24 hours, significantly disrupting Governmental functions; 2,455 user accounts on a US Army computer that controlled access to an Army computer network, causing these computers to reboot and become inoperable; and logs from computers at US Naval Weapons Station Earle, one of which was used for monitoring the identity, location, physical condition, staffing and battle readiness of Navy ships, deletion of these files rendering the Base’s entire network of over 300 computers inoperable at a critical time immediately following 11 September 2001 and thereafter leaving the network vulnerable to other intruders.
14. The appellant also copied data and files onto his own computers, including operating system files containing account names and encrypted passwords from 22 computers comprising: 189 files from US Army computers, 35 files from US Navy computers (including some 950 passwords from server computers at Naval Weapons Station Earle); and six files from NASA computers.
15. The appellant’s conduct was alleged to be intentional and calculated to influence the US Government by intimidation and coercion. It damaged computers by impairing their integrity, availability and operation of programmes, systems, information and data, rendering them unreliable. The cost of repair was alleged to total over $700,000.
16. Analysis of the appellant’s home computer confirmed these allegations. During his interviews under caution, moreover, he admitted responsibility (although not that he had actually caused damage). He stated that his targets were high level US Army, Navy and Air Force computers and that his ultimate goal was to gain access to the US military classified information network. He admitted leaving a note on one army computer reading:
“US foreign policy is akin to government-sponsored terrorism these days . . . It was not a mistake that there was a huge security stand down on September 11 last year . . . I am SOLO. I will continue to disrupt at the highest levels . . .”
The plea-bargaining process (including discussion of repatriation)
17. In August 2002 the appellant instructed Ms Karen Todner, senior partner of Kaim Todner, to act as his solicitor. In November 2002 Ms Todner learned that an American prosecutor, Scott Stein, had applied for a formal indictment against the appellant and telephoned him to register her interest. There followed a number of communications during which Mr Stein indicated how much better a deal would be available to the appellant if he went voluntarily to the United States and pleaded guilty than if he contested extradition and denied the charges. Some of these communications were by telephone, some in writing, others at meetings with Mr Ed Gibson, the FBI legal attaché at the American Embassy in London. It is sufficient to set out the substance of what was said at the final such meeting on 14 April 2003, attended by Ms Todner and Mr Edmund Lawson QC for the appellant, and by Mr Stein, his superior Mr Hanly, and Mr Gibson as representatives of the US Government. I take this from a recent witness statement made by Mr Lawson dated 6 June 2008. (A broadly similar account taken from statements made by Ms Todner is set out in the Divisional Court’s judgment which also contains a detailed account of the earlier communications.)
18. Mr Stein confirmed that he was authorised to offer the appellant a deal in return for not contesting extradition and for agreeing to plead guilty to two of the counts laid against him of “fraud and related activity in connection with computers". On this basis it was likely that a sentence of 3-4 years (more precisely 37-46 months), probably at the shorter end of that bracket, would be passed and that after serving 6-12 months in the US, the appellant would be repatriated to complete his sentence in the UK. In this event his release date would be determined by reference to the UK’s remission rules namely, in the case of a sentence not exceeding four years, release at the discretion of the parole board after serving half the nominal sentence, release as of right at the two-thirds point. On that basis, he might serve a total of only some eighteen months to two years.
19. The predicted sentence of 3-4 years was based upon sentencing guidelines themselves based upon a points system. The prosecution would recommend to the court a particular points level which the court would be likely to accept. Similarly the prosecutor would recommend to the section of the US Department of Justice responsible for administering the Convention on the Transfer of Sentenced Persons that the appellant be transferred and this recommendation too was in practice likely to be accepted.
20. If, however, the appellant chose not to cooperate, and were then extradited and convicted, he might expect to receive a sentence of 8-10 years, possibly longer, and would not be repatriated to the UK for any part of it. He would accordingly serve the whole sentence in a US prison (possibly high security) with at best some 15% remission.
21. Mr Lawson clearly recalls the prospect of repatriation being stated to depend upon the appellant’s application for transfer being supported by the prosecution. If the support were withheld as it would be if extradition was contested, there was said to be no prospect of repatriation, a refusal by the Department of Justice being unreviewable in the US courts.
22. The proposed “deal” was conditional upon the appellant entering into a form of Plea Agreement, a lengthy document including the provision in para 4 that:
“the defendant is aware that the defendant’s sentence will be imposed in accordance with the Sentencing Guidelines and Policy Statements. The defendant is aware that the Court has jurisdiction and authority to impose any sentence within the statutory maximum set for the offense (s) to which the defendant pleads guilty. The defendant is aware that the Court has not yet determined a sentence. The defendant is also aware that any estimate of the probable sentencing range under the sentencing guidelines that the defendant may have received from the defendant’s counsel, the United States, or the probation office, is a prediction, not a promise, and is not binding on the United States, the probation office, or the Court. The United States makes no promise or representation concerning what sentence the defendant will receive, and the defendant cannot withdraw a guilty plea based upon the actual sentence.”
The Plea Agreement included a further term in para 12 that the US Attorney’s Offices respectively for the Eastern District of Virginia and the District of New Jersey “will not oppose the defendant’s application to transfer any sentence imposed by the Court made pursuant to the Council of Europe Convention".
23. Subsequent to the Divisional Court’s judgment but prior to Mr Lawson’s statement an affidavit was sworn by Robert Wiechering on behalf of the US Attorney’s Offices for both districts stating that they “will not oppose any prisoner transfer application that may be made by Gary McKinnon (if extradited and convicted) based, in whole or in part, on his refusal to waive or consent to extradition from the United Kingdom.”
24. Following the meeting of 14 April 2003 Ms Todner took advice from an American defense lawyer and, subsequently, the appellant declined the “deal".
http://www.publications.parliament.u...0/mckinn-1.htm
Now whose fault is this?
Gary refused the deal.
At what point is Gary responsible for his own actions?
|
Maybe it is not a matter of fault. Maybe it is not as black and white as we think. There are several levels of grey here.
Is it possible that Gary is holding out in the hopes that eventually more will be revealed about what is on those computers and what the controllers are upto.
|