DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK cops tell suspect to hand over crypto keys in US hacking case

Posted on March 31, 2016 by Dissent

J. M. Porup reports:

At a court hearing earlier this month, the UK’s National Crime Authority (NCA) demanded that Lauri Love, a British computer scientist who allegedly broke into US government networks and caused “millions of dollars in damage,” decrypt his laptop and other devices impounded by the NCA in 2013, leading some experts to warn that a decision in the government’s favor could set a worrisome precedent for journalists and whistleblowers.

Arrested in 2013 for the alleged intrusions but subsequently released, Love was re-arrested in 2015 and is currently fighting extradition to the United States. He has so far refused to comply with a Section 49 RIPA notice to decrypt the devices, a refusal that carries potential jail time. However, British authorities have not charged Love with any crime, leading him to counter-sue in civil court for the return of his devices.

Read more on Ars Technica.

I think Love’s lawyer, Ekeland, is exactly right in what he told Ars and that any evidence the UK would obtain would be handed on a silver platter to the U.S. for our government’s prosecution of Love.


Related:

  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
Category: Commentaries and AnalysesHackNon-U.S.Of Note

Post navigation

← Godiva workers’ IDs sold in Florida sting, feds say
Verizon Double-Take →

1 thought on “UK cops tell suspect to hand over crypto keys in US hacking case”

  1. IA Eng says:
    March 31, 2016 at 10:28 am

    The government has the evidence in hand. They have made as many duplicate copies of these devices as possible. he can sue for his property back, but in the end, it really does not matter. They are forcing his hand to cooperate in a judicial sort of way. They know he would fight any extradition leaving him to accrue a lot of lawyer fees and time in court. His name will be smeared over the internet showing potential ties with activities that at best – are not trustworthy.

    Even though he may walk away from all of this, the potential end result is basically the same. He’ll be watched, his property will probably never be deemed safe. If there is a technology out there that can compromise an encrypted drive and eventually pass the key/password/pass phrase back to the feds, it will be doomsday for him.

    Not allowing them to see what the electronic personal property has on it should show that he MAY have something to hide. It is very hard to strike a deal with the feds on allowing them to search a device and only take what is worded on the search warrant, right down to the very specific words. He is probably crowing his innocence through a privacy rant, looking for attention and news coverage. If he is completely innocent he should have given up all his info and then may have a leg to stand on when it comes to a suit. But as the mud continues to be collected by him, his chances of coming clean of this stench is pretty low.

    The government will get their way with clients who refuse to cooperate. Sure, they may have won the war in the courts – this time, but the tar, feathers, bad reputation and serious debt will linger for white some time.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.