Julian Assange will NOT be extradited to the US over WikiLeaks hacking and spy charges, rules British judge

But it's not over yet: Next step is Uncle Sam's appeal to London's High Court

Accused hacker and WikiLeaks founder Julian Assange should not be extradited to the US to stand trial, Westminster Magistrates' Court has ruled.

District Judge Vanessa Baraitser told Assange this morning that there was no legal obstacle to his being sent to the US, where he faces multiple criminal charges under America's Espionage Act and Computer Fraud and Abuse Act over his WikiLeaks website.

Assange is a suicide risk and the judge decided not to order his extradition to the US, despite giving a ruling in which she demolished all of his legal team's other arguments against extradition.

"I am satisfied that the risk that Mr Assange will commit suicide is a substantial one," said the judge, sitting at the Old Bailey, in this morning's ruling. Adopting the conclusions of medical expert Professor Michael Kopelman, an emeritus professor of neuropsychiatry at King's College London, Judge Baraitser continued:

Taking account of all of the information available to him, he considered Mr Assange's risk of suicide to be very high should extradition become imminent. This was a well-informed opinion carefully supported by evidence and explained over two detailed reports.

WikiLeaks published, among many other things, a quarter of a million US diplomatic cables in plain text. It has been variously alleged that these contained the unredacted names of US spies and informants in hostile countries, and that some efforts were made to warn the US prior to publication of these.

Assange, an Australian citizen, had been admitted to HM Prison Belmarsh's medical unit in May 2019 after expressing suicidal thoughts. Half a razor blade was also found hidden in his cell, while prison medics concluded he was "finding it hard to control the thoughts of self-harm and suicide."

Assange appeared in the dock wearing a navy blue suit and dark green facemask, according to courtroom reports.

The US government will appeal against the judgment which means the case will move to the High Court of England and Wales. Legal arguments are likely to focus on US prison conditions both pre and post-trial.

All other legal arguments against extradition rejected

Judge Baraitser heard from Assange's lawyers during this case that he was set to be extradited because he had politically embarrassed the US, rather than committed any genuine criminal offence.

Nonetheless, US lawyers successfully argued that Assange's actions were outside journalistic norms, with the judge approvingly quoting news articles from The Guardian and New York Times that condemned him for dumping about 250,000 stolen US diplomatic cables online in clear text.

"Free speech does not comprise a 'trump card' even where matters of serious public concern are disclosed," said the judge in a passage that will be alien to American readers, whose country's First Amendment reverses that position.

Assange obtained those diplomatic cables from former US Army intelligence operative Chelsea Manning, with the court's judgment today recounting:

On 8 March 2010, it is alleged that Mr Assange agreed to assist Ms Manning in cracking a password hash stored on a DoD computer. Mr Assange indicated that he was "good" at "hash-cracking" and that he had rainbow tools (a tool used to crack Microsoft password hashes). Ms Manning provided him with an alphanumeric string. This was identical to an encrypted password hash stored on the Systems Account Manager (SAMS) registry file of a SIPRNet* computer, used by Ms Manning, and associated with an account that was not assigned to any specific user. Mr Assange later told her that he had no luck yet and asked for more "hints". It is alleged that, had they succeeded in cracking the encrypted password hash, Ms Manning might have been able to log on to computers connected to the classified SIPRNet network under a username that did not belong to her, making it more difficult for investigators to identify her as the source of the disclosures. It is specifically alleged that Mr Assange entered into this agreement to assist Ms Manning's ongoing efforts to steal classified material.

The judge also found that the one-time WikiLeaker-in-chief had directly commissioned a range of people to hack into various Western countries' governments, banks and commercial businesses, including the Gnosis hacking crew that was active in the early 2010s.

Judge Baraitser also dismissed Assange's legal arguments that publishing stolen US government documents on WikiLeaks was not a crime in the UK, ruling that had he been charged in the UK, he would have been guilty of offences under the Official Secrets Acts 1911-1989. Had his conduct not been a crime in the UK, that would have been a powerful blow against extradition.

Assange spent years hiding from British justice in Ecuador's London embassy, entering in 2012 before eventually outstaying his welcome and being thrown out in 2019 – right into the hands of waiting police. He then served a year in prison for jumping bail and was remanded straight back into custody for the extradition hearing.

Legal commentator Joshua Rozenberg, tweeting from the Old Bailey, speculated that Assange would return to HMP Belmarsh today pending a formal bail application later this week. It is unlikely he will be granted bail ahead of the US appeal, not least because he is regarded as a flight risk.

Summing up the thoughts of most if not all people following Assange's case when the verdict was given, NSA whistleblower Edward Snowden took to Twitter:

Having had all of his substantive legal arguments dismissed, there isn't much for Assange and his supporters to cheer about today. It is certain that the US will throw as much legal muscle at the appeal as it possibly can. With some British prisoners successfully avoiding extradition by expressing suicidal thoughts, it is likely American prosecutors will want to set a UK precedent that overturns the suicide barrier. ®

* The so-called Secret Internet Protocol Router Network, for securely transmitting information classified up to the Secret level.

Other stories you might like

  • Lonestar plans to put datacenters in the Moon's lava tubes
    How? Founder tells The Register 'Robots… lots of robots'

    Imagine a future where racks of computer servers hum quietly in darkness below the surface of the Moon.

    Here is where some of the most important data is stored, to be left untouched for as long as can be. The idea sounds like something from science-fiction, but one startup that recently emerged from stealth is trying to turn it into a reality. Lonestar Data Holdings has a unique mission unlike any other cloud provider: to build datacenters on the Moon backing up the world's data.

    "It's inconceivable to me that we are keeping our most precious assets, our knowledge and our data, on Earth, where we're setting off bombs and burning things," Christopher Stott, founder and CEO of Lonestar, told The Register. "We need to put our assets in place off our planet, where we can keep it safe."

    Continue reading
  • Conti: Russian-backed rulers of Costa Rican hacktocracy?
    Also, Chinese IT admin jailed for deleting database, and the NSA promises no more backdoors

    In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it doesn't pay a $20 million ransom. 

    Costa Rican president Rodrigo Chaves said that the country is effectively at war with the gang, who in April infiltrated the government's computer systems, gaining a foothold in 27 agencies at various government levels. The US State Department has offered a $15 million reward leading to the capture of Conti's leaders, who it said have made more than $150 million from 1,000+ victims.

    Conti claimed this week that it has insiders in the Costa Rican government, the AP reported, warning that "We are determined to overthrow the government by means of a cyber attack, we have already shown you all the strength and power, you have introduced an emergency." 

    Continue reading
  • China-linked Twisted Panda caught spying on Russian defense R&D
    Because Beijing isn't above covert ops to accomplish its five-year goals

    Chinese cyberspies targeted two Russian defense institutes and possibly another research facility in Belarus, according to Check Point Research.

    The new campaign, dubbed Twisted Panda, is part of a larger, state-sponsored espionage operation that has been ongoing for several months, if not nearly a year, according to the security shop.

    In a technical analysis, the researchers detail the various malicious stages and payloads of the campaign that used sanctions-related phishing emails to attack Russian entities, which are part of the state-owned defense conglomerate Rostec Corporation.

    Continue reading

Biting the hand that feeds IT © 1998–2022