The National Court has ruled on the US extradition request for a 23-year-old British citizen accused of a series of computer-related offenses, alleged to have taken place around July 2020. The case centers on the purported hacking of more than 130 Twitter accounts, including those associated with high-profile figures such as the sitting US president and former president, as well as a prominent tech founder. The individual is also accused of online extortion and robbery conducted over the Internet.
In a decision issued by the Second Criminal Division, judges determined that the necessary conditions were met to proceed with surrender. The defendant, Joseph James O’Connor, also known as “Plugwalk Joe,” faces 14 charges in the United States that align with offenses recognized in Spain, including disclosure of secrets, membership in a criminal organization, extortion, illegal access to computer systems, computer fraud, and money laundering.
The court rejects all arguments raised by the defense, including assertions about disproportionate penalties in either jurisdiction. The Spanish court states that jurisdiction rests with Spanish courts because the computer servers involved are located in Spain.
better situation
The judges point out that no criminal proceedings had been initiated against the accused in Spain and that the United States is better positioned to prosecute the alleged facts. They emphasize that the evidentiary materials were gathered there, and that is where the alleged harm occurred. They also indicate no grounds to oppose the penalties already imposed by the plaintiff State.
Documentation submitted by American authorities outlines numerous computer attacks in which the defendant allegedly participated. Arrest records indicate a July 2021 arrest in Estepona (Málaga) for actions described earlier, including the hacking of high-profile Twitter accounts tied to Biden, Obama, and Gates. The records also detail an incident involving a well-known person’s Snapchat account, which was allegedly exploited to extort and threaten the victim by promising the publication of intimate images.
The defendant is connected to several “swatting” incidents, which involve making false emergency reports to law enforcement to trigger a rapid response. In these cases, the defendant allegedly informed police of baseless threats that could lead to officers responding to the scene with force, including alleged threats to public safety and to the defendant’s family.
US authorities sought additional time to pursue charges tied to additional computer intrusions, the illicit acquisition of money and cryptocurrency, and subsequent laundering through various transfers. The court’s order notes that the United States has asserted that the alleged misconduct involved harassment with intent to commit a crime, affecting individuals across states and causing substantial emotional distress. The actions were carried out using interstate and foreign communications networks, including digital platforms and electronic messaging services, and were designed to inflict fear or financial harm on the victims.
Throughout the proceedings, Canadian and American readers may see parallels with cross-border enforcement efforts that rely on shared digital forensics and the practical realities of prosecuting cybercrime where the infrastructure and evidence are located. The decision reflects ongoing debates about which jurisdiction should hear complex cases involving online wrongdoing that spans multiple countries and legal systems. The parties involved are urged to consider the evolving landscape of international cyber law and the role of collaboration in delivering accountability for online offenses.