Routing cockup most likely explanation

Facebook traffic mysteriously passes through Chinese ISP

by Dan Goodi, theregister.co.uk
March 23rd 2011 3:44 AM

For a short time on Tuesday, internet traffic sent between Facebook and subscribers to AT&T’s internet service passed through hardware belonging to the state-owned China Telecom before reaching its final destination, a security researcher said.

An innocent routing error is the most likely explanation for the highly circuitous route, but it’s troubling nonetheless, said Barrett Lyon, the independent researcher who helped discover the anomaly and later blogged about it. Human rights groups have long accused China’s government of snooping on the internet communications of dissidents, and last year Google claimed it and dozens of other companies were on the receiving end of a sophisticated hacking campaign carried out by the Chinese.

During a window that lasted 30 minutes to an hour Tuesday morning, all unencrypted traffic passing between AT&T customers and Facebook might have been open to similar monitoring. Lyon said he has no evidence any data was in fact snarfed, but he said the potential for that is certainly there because the hardware belonged to China Telecom, which in turn is owned by the Chinese government.

“This kind of thing happens all the time, sometimes on accident and sometimes on purpose,” he told The Reg. “I think people should talk about it at the very least.”

It’s not the first time traffic has been diverted through Chinese networks under mysterious circumstances. In March and April of last year, traffic to as much as 15 percent of the world’s internet destinations was briefly diverted through China. Networks used by Dell, Apple, CNN, and Starbucks were all affected. At least one of those incidents was the result of erroneous BGP, or Border Gateway Protocol, routes that were quickly corrected.

Unlike those incidents, Tuesday’s diversion appeared to affect only traffic traveling between AT&T users and Facebook. Lyon discovered the anomaly by telnetting into AT&T’s IP Services Route Monitor (telnet://route-server.ip.att.net) and typing various commands, such as “show ip bgp 69.171.224.20/20.”

Traceroute commands executed during the brief window Tuesday morning on machines connected to AT&T’s network also verified that Facebook-bound traffic was traveling over AS4134, the Autonomous System belonging to China Telecom, Lyon said.

Facebook issued a statement that read:

We are investigating a situation today that resulted in a small amount of a single carrier’s traffic to Facebook being misdirected. We are working with the carrier to determine the cause of this error.

Our initial checks of the latency of the requests indicate that no traffic passed through China.

The statement left open the possibility that Facebook traffic passed through China Telecom hardware located in Europe or elsewhere.

The incident comes two months after Facebook started offering its users the option of using always-on SSL to encrypt their sessions from beginning to end. Previously, only logins and other select transactions were protected, leaving online chats, photo uploads and other activities wide open to anyone who had the ability to monitor the networks between the user and Facebook.

Facebook has said it hopes to turn on SSL by default in the future, but don’t count on that happening anytime soon. In the meantime, users must activate it manually, by going to Account Settings > Account Security and checking the box that says “Browse Facebook on a secure connection (https) whenever possible.” ®

Original Page: http://www.theregister.co.uk/2011/03/23/facebook_traffic_china_telecom/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

Chinese ISP hijacked US military, gov web traffic • The Register

Chinese ISP hijacked US military, gov web traffic

by Dan Goodin, theregister.co.uk
November 17th 2010 2:18 PM

Eight months after traffic to as much as 15 percent of the world’s internet destinations was mysteriously diverted through China, investigators for a US Congressional committee remain wary of the Asian superpower, even as they’re quick to say they have no evidence it’s the work of the Chinese government.

“Several incidents in early 2010 demonstrate that, regardless of whether Chinese actors actually intended to manipulate US and other foreign internet traffic, China’s internet engineers have the capability to do so,” they wrote in a report published on Wednesday.

“Although China is by no means alone in this regard, persistent reports of that nation’s use of malicious computer activities raise questions about whether China might seek intentionally to leverage these abilities to assert some level of control over the internet, even for a brief period.”

The assessment, released by the US-China Economic and Security Review Commission, claims that during two brief episodes in late March and early April, tainted network tables redirected huge amounts of internet traffic – some of it from the US military – through Chinese internet providers. In the April 8 incident, China Telecom advertised erroneous BGP, or Border Gateway Protocol, routes that funneled traffic through Chinese networks before it reached its intended destination.

The hijacking, which lasted 18 minutes, affected email and web traffic traveling to and from .gov and .mil domains, including those for the US Senate, four branches of the military, the office of the secretary of defense, and NASA, among other US governmental agencies, according to the report. It also affected traffic for large businesses, including Dell, IBM, Microsoft and Yahoo.

The 328-page report makes references to other technological threats posed by China, including last year’s espionage attacks on Google and 33 other large companies, and recently enacted rules that require security vendors to share encryption information with the Chinese government.

The hijacking incidents weren’t that different from what researchers did at the 2008 Defcon hacker conference in Las Vegas. By advertising false BGP routes that in essence claimed their IP addresses mapped the most direct route to the conference network, they sent all conference traffic to a computer under their control before ultimately sending to its destination.

Over the past month, a Firefox extension known as Firesheep has demonstrated to the masses just how susceptible unencrypted traffic is to snooping. In many respects, the fragility of BGP, which relies on trust and has no intrinsic security protections, ought to cause more concern. Emails, web traffic and other data traveling over the internet is wide open to tampering if its senders don’t take proper precautions, a point that wasn’t lost in Wednesday’s report.

“Although the Commission has no way to determine what, if anything, Chinese telecommunications firms did to the hijacked data, incidents of this nature could have a number of serious implications,” it warned. “This level of access could enable surveillance of specific users or sites. It could disrupt a data transaction and prevent a user from establishing a connection with a site. It could even allow a diversion of data to somewhere that the user did not intend (for example, to a ‘spoofed’ site).”

Internet engineers have long known of the BGP weakness, but so far there’s been little done to fix it. That leaves the security of the global network in many ways reduced to the honor system.

“Although a lot of parties can redirect traffic, doing so is a very public act,” Bert Hubert, of Fox-IT and founder of PowerDNS told The Register. “Everyone can see the sign, and systems are in place that take a global view of internet routing, and report on whatever is odd. Rerouting traffic this way works, but everyone can see you do it.”

The report is here. ®

This article was updated to correct erroneous information about the magnitude of the hijacking. According to the report, it rerouted traffic to 15 percent of internet destinations, not 15 percent of the world’s traffic.

Original Page: http://www.theregister.co.uk/2010/11/17/bgp_hijacking_report/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

US bill would make concealing data breaches a crime • The Register

US bill would make concealing data breaches a crime

by Dan Goodin, theregister.co.uk
June 8th 2011 6:39 PM

US-based companies would be required to report data breaches that threaten consumer privacy and could face stiff penalties for concealing them under federal legislation that was introduced in the Senate on Tuesday.

The Personal Data Privacy and Security Act aims to set national standards for protecting the growing amount of personally identifiable information being stored online. Its approval by the Senate Judiciary Committee represents the fourth year the bill has been introduced, said its sponsor, Senator Patrick Leahy of Vermont.

The latest incarnation comes amid a glut of high-profile hack attacks on networks operated by Sony, email marketer Silverpop Systems, gossip publisher Gawker Media, and others, which have exposed sensitive data for hundreds of millions of Americans in the past six months.

“The many recent and troubling data breaches in the private sector and in our government are clear evidence that developing a comprehensive national strategy to protect data privacy and security is one of the most challenging and important issues facing our country,” Leahy said in a statement.  “The Personal Data Privacy and Security Act will help meet that challenge, by better protecting Americans from the growing threats of data breaches and identity theft.”

In addition to breaches affecting consumers, several high-profile attacks on networks operated by the US government and government contractors have potentially jeopardized national security by exposing confidential information related to the military, and government-funded research.

Examples include recent security breaches at contractors Lockheed Martin and L3 Communications, and at RSA Security, the latter which exposed confidential information that compromised the security of its widely used SecurID product, which some 40 million employees use to secure remote access to confidential networks.

Under the proposed legislation, companies that “intentionally or willfully” conceal breaches that cause economic damage to consumers would be subject to criminal penalties, including up to five years in prison. The bill also requires that companies that store consumer data implement internal policies to secure it. Government agencies that hire third-party contractors would be required ensure they are adequately protecting consumer data.

Last month the Obama Administration released a proposal that would imposed some of the same requirements.

A PDF of the bill is here. ®

Original Page: http://www.theregister.co.uk/2011/06/08/data_breach_bill/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

Web authentication authority suffers security breach • The Register

Web authentication authority suffers security breach

by Dan Goodin, theregister.co.uk
June 21st 2011 12:22 AM

Yet another web authentication authority has been attacked by hackers intent on minting counterfeit certificates that would allow them to spoof the authenticated pages of high-profile sites.

Israel-based StartCom, which operates StartSSL suffered a security breach that occurred last Wednesday, the company said in a tersely worded advisory. The certificate authority, which is trusted by the Microsoft Internet Explorer, Google Chrome, and Mozilla Firefox browsers to vouch for the authenticity of sensitive websites, has suspended issuance of digital certificates and related services until further notice.

Eddy Nigg, StartCom’s CTO and COO, told The Register that the attackers targeted many of the same websites targeted during a similar breach in March against certificate authority Comodo. The hackers in the earlier attack managed to forge certificates for seven addresses, including Google mail, www.google.com, login.yahoo.com, login.skype.com, addons.mozilla.com, and Microsoft’s login.live.com.

The earlier breach touched off a frantic effort by the world’s biggest browser makers to blacklist the counterfeit credentials before the hackers could use them to create spoof websites that contained a valid cryptographic stamp validating the sites’ authenticity. It took more than a week for the fraudulent credentials to be blocked in all browsers, and even then, many widely used email programs still weren’t updated.

The hackers behind the attack on StartCom failed to obtain any certificates that would allow them to spoof websites in a similar fashion, and they were also unsuccessful in generating an intermediate certificate that would allow them to act as their own certificate authority, Nigg said in an email. The private encryption key at the heart of the company’s operations isn’t stored on a computer that’s attached to the internet, so they didn’t get their hands on that sensitive document, either, he said.

Last week’s attack is at least the fifth time an entity that issues SSL, or secure sockets layer, certificates has been targeted. In all, four of Comodo’s resellers have suffered security breaches in the past three months.

The susceptibility of CAs to hackers represents one of the many significant vulnerabilities of the SSL system, which serves as the internet’s foundation of trust. Once a CA’s root certificate is included with a browser, it can be responsible for validating tens of thousands or hundreds of thousands of individual websites. That makes it impractical to remove the root certificate even if there is good reason to be wary of it.

Nigg declined to state how many certificates StartSSL has issued during its tenure, but he did say it is among the top 10 issuers. It is unclear when the CA will resume services. ®

Original Page: http://www.theregister.co.uk/2011/06/21/startssl_security_breach/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

UK Cyber Security Challenge renewal promises better prizes • The Register

UK Cyber Security Challenge renewal promises better prizes

by John Leyden, theregister.co.uk
April 20th 2011 11:14 AM

The UK’s Cyber Security Challenge is promising a renewal of the competition, with more competitions on a broader range of topics and better prizes.

The Challenge, successfully run last year as a way of promoting interest in information security as a career and unearthing hidden pools of talent, is once again backed by the UK government.

Last year’s exercises have involved one-off code-breaking puzzles as well as a more structured programme of network security exercises culminating in a grand final, which was won by Dan Summers, a postman from Wakefield.

This year’s event will include exercises involving penetration testing, malware forensics, and network defence among a total of eight competitions, each testing a different cyber-security skill.

Competitions will run more frequently throughout the year and some will offer multiple opportunities to play, allowing more people the chance to participate. Winners in each of the eight categories will compete in a semi-final before the most accomplished performers face off in a masterclass grand final, due to be held in HP Labs, near Bristol.

The Government’s Office of Cyber Security and Information Assurance is giving £180k in sponsorship to help the scheme along. Organisations providing logistical and financial support for the scheme include PWC, Sophos, the SANS Institute, HP Labs, Cassidian and QinetiQ, the US Department of Defense’s Cyber Crime Center is also getting on board by running and promoting the digital forensics strand of the competition.

Organisers of the scheme are seeking further sponsors ahead of the opening of competition to schools and members of the general public in May.

More details on the renewal can be found on the official Cybersecurity challenge website here. ®

Original Page: http://www.theregister.co.uk/2011/04/20/cyber_security_challenge_reloaded/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

No waiting list for admin passwords

Lulz warns NHS of sick security

by John Oates, theregister.co.uk
June 10th 2011 8:45 AM

LulzSec, the security collective which claimed credit for hacking Sony, has taken to Twitter to warn the NHS that it stumbled across several admin passwords.

The Department of Health claimed the breach was nothing more serious than “a very small number of website administrators”. It said no national systems were hit – given the slow progress of creating such national systems this might not be a surprise.

Lulz published an email sent to the NHS with the relevant passwords blacked out.

It said:

We’re a somewhat known band of pirate-ninjas that go by LulzSec.

Some time ago, we were traversing the Internets for signs of enemy fleets.

While you aren’t considered an enemy – your work is of course brilliant – we did stumble upon several of your admin passwords, which are as follows….

We mean you no harm and only want to help you fix your tech issues. Also, we hope that little girls feasts on the bones of many giving souls. All the best.

Lulz Security

And no, we don’t have any idea what “little girls feasts” means either.

At least the breach is not quite as embarrassing as the recent failure by FBI partner Infraguard which was hacked this week.

Original Page: http://www.theregister.co.uk/2011/06/10/lulz_nhs_hack/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

8m health records go walkabout • The Register

8m health records go walkabout

by John Oates, theregister.co.uk
June 15th 2011 9:11 AM

A London health authority has admitted losing a laptop which contains 8.6 million health records.

The machine was lost three weeks ago, but has only just been reported missing to police and the Information Commissioner’s Office.

We’ve asked North Central London health board why it needed to store 8.63 million health records on an unsecure laptop in the first place.

They sent us the following: “NHS North Central London is investigating the loss of a number of laptops. One of the machines was used for analysing health needs requiring access to elements of unnamed patient data. All the laptops were password protected and our policy is to manually delete the data from laptops after the records have been processed. NHS North Central London operates under strict data protection guidance and is taking the matter extremely seriously. We have started an investigation into the issues raised by the loss. We are liaising with the office of the Information Commissioner.”

The machine was one of 20 lost from a storeroom at London Health Programmes – a research body based at NHS North Central London, reports. Eight of the 20 have been recovered, but the authority is still looking for the other 12.

The records contain no names but do include other identifying information like age, gender, postcode, medical history, hospital visits, HIV status and mental illnesses.

An ICO spokesperson said: “Any allegation that sensitive personal information has been compromised is concerning and we will now make enquiries to establish the full facts of this alleged data breach.”

A Department of Health spokesman later sent us this statement:

“All NHS organisations are legally required to comply with Data Protection legislation and are expected to take data loss extremely seriously, be open about incidents and about the action taken as a result.

“We have set clear standards for NHS organisations to adhere to on data handling, and have issued guidance that sets out the steps they must take to ensure records are kept secure and confidential.

“Local NHS organisations are responsible for implementing these data handling processes, including which staff need to have access to health records, and for compliance with Information Governance standards.” ®

Original Page: http://www.theregister.co.uk/2011/06/15/eight_million_health_records/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

Daily Mail launches McKinnon campaign • The Register

Daily Mail launches McKinnon campaign

by John Leyden, theregister.co.uk
July 3rd 2009 2:17 PM

The Daily Mail has launched a high-profile campaign supporting Gary McKinnon’s fight against extradition to the USA.

The red-baiting, Romany-hating paper criticises US authorities for treating a “naive hacker” interested in uncovering evidence of extraterrestrial life on poorly-secured Pentagon systems as a dangerous cyber-saboteur.

The paper also lambasts UK politicians for meekly going along with US demands in a front-page article. An associated online petition to the new Home Secretary, Alan Johnson, calls on him to use his discretion in order to block extradition proceedings against McKinnon, a recently diagnosed sufferer of Asperger’s Syndrome.

Such a move would allow for McKinnon to be tried in the UK, avoiding the trauma of a US trial followed by the likelihood of an extended spell behind bars.

The wholehearted support of the influential daily paper is a major fillip to the McKinnon campaign, which has already attracted high-profile supporters including Pink Floyd’s David Gilmour, London mayor Boris Johnson and former Beirut hostage Terry Waite.

Lord Carlile, the independent reviewer of anti-terror laws, and Oscar-winning actress Julie Christie have also voiced support for McKinnon’s fight against extradition.

McKinnon admits taking advantage of weak password security to root around US military and NASA systems back in 2001 and 2002 but denies claims that he caused $700,000 in damage in the process. He was first arrested and questioned by UK cops in 2002, but it wasn’t until 2005 that the US began extradition proceedings.

The long-running campaign against extradition included failed appeals to the House of Lords and the European Court of Human Rights last summer. These legal actions happened before McKinnon was diagnosed with Asperger’s Syndrome.

McKinnon’s last hope against avoiding extradition rests with two judges who are due to review the decision by UK prosecutors not to prosecute McKinnon in the UK during a hearing scheduled for Tuesday, 14 July. The same two judges – Lord Justice Stanley Burnton and Mr Justice Wilkie – heard arguments that the then Home Secretary Jacqui Smith was wrong to allow McKinnon’s extradition to proceed following his diagnosis with a mild form of autism at an earlier hearing.

A decision on the first hearing was “reserved” pending consideration of the other judicial review. ®

Original Page: http://www.theregister.co.uk/2009/07/03/mail_mckinnon_campaign/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

DEC ‘hacker’ questions McKinnon political bandwagon • The Register

DEC ‘hacker’ questions McKinnon political bandwagon

by John Leyden, theregister.co.uk
January 30th 2009 2:19 PM

Boris Johnson’s outspoken defence of Gary McKinnon in his extradition fight has been criticised by a former security consultant, who complains he was denied such support when he himself was charged with hacking offences.

Daniel Cuthbert was convicted in October 2005 of breaking the Computer Misuse Act by “hacking” into a tsunami appeal website in December 2004, and fined £400 plus £600 in costs. He was subsequently forced to change career after the prosecution, which was widely seen by his peers as misguided. Cuthbert now wants to know why he wasn’t shown any support from politicians of the kind lent to McKinnon by Johnson.

The London mayor wrote a barbed critique of attempts by US authorities to drag McKinnon over to the US to answer for charges of hacking into US military systems, rather than be tried in the UK for his admitted offences, in an opinion piece in The Daily Telegraph on Monday. Johnson argues that treating McKinnon as a “cyberterrorist” rather than a hacker with out-there beliefs is itself lunacy.

McKinnon is far from the first Brit to face high-profile computer charges, but the degree of political support he’s received – a motion on his behalf was signed by 80 MPs, to say nothing of the lampooning of extradition proceedings by the London mayor – is unprecedented, and a tribute to the long-running campaign fought by McKinnon’s lawyers and supporters.

Cuthbert’s woes began when he made a donation through the DEC (Disasters Emergency Committee) site. After failing to get a confirmation email, he became suspicious and carried out two tests to check its security. These actions triggered a warning on the intrusion detection system behind the site, maintained by BT, who reported the matter to police. This ultimately led to Cuthbert’s arrest, conviction and inability to continue his career as an IT security consultant.

After a spell in Thailand, Cuthbert is back in the UK and studying for an MA in documentary and photojournalism at the London College of Communication. Cuthbert – who has repeatedly spoken out against the extradition proceedings against McKinnon in the past – ruefully notes that he didn’t enjoy the benefit of support from political figures, such as the London mayor.

“Whilst it would be lovely if Boris could talk about my conviction, the chance of that happening is slim,” Cuthbert told El Reg.

Cuthbert criticised Johnson’s argument that McKinnon ought to be given special consideration because of his motives.

“Gary committed a crime, end of story,” Cuthbert said. “The issue has always been where he would be tried for that crime. In all honesty, the fact he was searching for UFOs doesn’t make what he did right, he did break into computers and the intent was always to break in to find information. What Boris is saying is that he should be given special consideration, and I don’t believe in that at all.

“I personally think he should be tried in the UK. The UK is wrong to bow down to the whims of the US, especially since the extradition treaty between the two countries is hardly fair and equal.”

Cuthbert’s sense of injustice is supported in a response to Johnson’s original piece by Ira Winkler, president of the Internet Security Advisors Group and an ex-NSA officer who’s become a cybercrime guru. Winkler argues that McKinnon caused real damage, so arguments that he was only rooting around systems looking for evidence of UFOs are neither here nor there. He goes on to say that Johnson would do better to look into cases of injusice closer to home, such as the Cuthbert case.

Why doesn’t Johnson turn to the case of Daniel Cuthbert? In that case prosecuted in London, a real security expert and security community volunteer was prosecuted and convicted for what essentially amounted to typing “cd ..”. The Cuthbert case demonstrates absurdity of at least one computer crime prosecution in London. Until Johnson speaks out on Cuthbert, he shouldn’t have the gall to waste any time on a person who actually caused significant damage to a government system.

We’ve dropped the Mayor an email asking what position he might have on the Cuthbert case. We’ve received an automated reply confirming the safe delivery of this message and saying that, while busy, “the Mayor is committed to responding to all appropriate correspondence and everything is being done to reply to your query as quickly as possible”. We await further correspondence with interest.

Meanwhile, a former US prosecutor involved at the start of the McKinnon prosecution has defended the US handling of the case. Scott Christie, an assistant US attorney in New Jersey in 2002 at the time McKinnon was first indicted in the case, criticised Johnson’s critique as badly misinformed.

“[McKinnon] has created this cause celebre status in order to appeal to folks who will beat the drum on his behalf and they conveniently ignore the facts of the situation and the entire nature of his conduct,” Christie said, Computerworld reports. Christie, who heads the IT group at attorneys McCarter & English LLP, added that Johnson’s public support “lends some credence to the individuals who are painting McKinnon as a victim” rather than a criminal hacker. ®

Original Page: http://www.theregister.co.uk/2009/01/30/cuthbert_mckinnon/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone

Pink Floyd frontman backs McKinnon musical protest • The Register

Pink Floyd frontman backs McKinnon musical protest

by John Leyden, theregister.co.uk
April 6th 2009 4:30 AM

A small group of protesters held a successful musical protest against attempts to extradite UFO enthusiast turned hacker Gary McKinnon to the US on Thursday.

Janis Sharp, McKinnon’s mum, organised the sing-in protest outside the US embassy on Thursday to coincide with President Barack Obama’s visit to London for the G20 conference and UN World Autism Awareness Day.

Sharp rewrote the lyrics (but not the tune) of Graham Nash’s “Chicago” as a protest against long-running attempts to wrench her son over to the US to face trial and probable incarceration for hacking into US government and military systems. The protests also sought to highlight concerns with the lop-sided UK-US extradition treaty more generally.

These efforts gained a massive publicity boost when David Gilmour, legendary singer and guitarist with Pink Floyd, agreed to sing on the backing track of the song. Gilmour wasn’t able to attend the event himself, but he did post a message of support for McKinnon on his website, adding his name to those who oppose McKinnon’s extradition.

Crank up the volume

Music has been a feature in McKinnon’s long-running campaign against extradition. Celebrity supporters of McKinnon’s include former Police frontman Sting and wife Trudie Styler.

Nash, famous as a member of Crosby, Stills, & Nash, gave permission for his song “Chicago” to be rewritten to reflect McKinnon’s plight. He, along with Gilmour, also number themselves among McKinnon’s supporters.

McKinnon’s friends and family hope to produce a music track/compilation CD – involving some famous musicians – in support of Gary McKinnon’s legal fight against extradition, the Free Gary support blog reports.

Other high-profile supporters outside the world of music include London mayor Boris Johnson, Lord Carlile, the independent reviewer of anti-terror laws, and former Beirut hostage Terry Waite.

The ‘sit-in’ musical protests took place two months before a judicial review on whether Home Secretary Jacqui Smith was correct to allow extradition proceedings against McKinnon to continue in spite of his recent diagnosis with Asperger’s Syndrome. This hearing represents McKinnon’s best hopes of avoiding extradition after the failure of earlier appeal to the House of Lords and elsewhere last year, prior to McKinnon’s diagnosis with a mild form of autism. ®

Bootnote

A big Reg thank you to Janis Smith for use of the photographs. Janis and her husband Wilson are both musicians, which is why they came to live and work in London when Gary was a child. “Gary is a gentle musician but unfortunately that’s not how he’s portrayed in the media,” she said.

Original Page: http://www.theregister.co.uk/2009/04/06/mckinnon_extradition_musical_protest/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 
Forgive typos! iBLAME iPhone