Lawyers for a British computer hacker started an appeal in London High Court Tuesday to block their client’s extradition to the United States.Gary McKinnon of London is accused of deleting data and illegally accessing information on 97 U.S. military and NASA computers between February 2001 and March 2002. He’s been charged in U.S. District Court for the Eastern District of Virginia.McKinnon, who did not show up in court, could face up to 60 years in prison, said his attorney, Edmund Lawson.British authorities declined to prosecute McKinnon, and the United States sought to extradite him. He challenged the extradition order in Bow Street Magistrates Court in May 2006. His attorney contended that since U.S. authorities allege McKinnon disrupted critical military networks after the Sept. 11 terrorist attacks, he could be held as an enemy combatant and subjected to inhumane treatment. The judge rejected the argument, and U.K. Home Secretary John Reid subsequently approved an extradition order.The appeal hearing will continue Wednesday in London High Court. U.S. authorities allege one of McKinnon’s hacking sessions deleted files from computers at the U.S. Naval Weapons Station Earle in New Jersey, causing the shutdown of 300 computers at a critical time.McKinnon freely admits to hacking, but contends he never damaged the targeted computers and merely did research on UFOs. He used a program called “RemotelyAnywhere” to control other computers, accessing administrator accounts and gaining passwords, according to British court documents. Most of his hacking occurred before office hours in the United States. McKinnon’s undoing came after he mistimed one of his probes, and a user cut McKinnon’s connection after noticing the mouse pointer moving around on the screen. -Jeremy Kirk, IDG News Service Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe