DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK cops tell suspect to hand over crypto keys in US hacking case

Posted on March 31, 2016 by Dissent

J. M. Porup reports:

At a court hearing earlier this month, the UK’s National Crime Authority (NCA) demanded that Lauri Love, a British computer scientist who allegedly broke into US government networks and caused “millions of dollars in damage,” decrypt his laptop and other devices impounded by the NCA in 2013, leading some experts to warn that a decision in the government’s favor could set a worrisome precedent for journalists and whistleblowers.

Arrested in 2013 for the alleged intrusions but subsequently released, Love was re-arrested in 2015 and is currently fighting extradition to the United States. He has so far refused to comply with a Section 49 RIPA notice to decrypt the devices, a refusal that carries potential jail time. However, British authorities have not charged Love with any crime, leading him to counter-sue in civil court for the return of his devices.

Read more on Ars Technica.

I think Love’s lawyer, Ekeland, is exactly right in what he told Ars and that any evidence the UK would obtain would be handed on a silver platter to the U.S. for our government’s prosecution of Love.

Category: Commentaries and AnalysesHackNon-U.S.Of Note

Post navigation

← Godiva workers’ IDs sold in Florida sting, feds say
Verizon Double-Take →

1 thought on “UK cops tell suspect to hand over crypto keys in US hacking case”

  1. IA Eng says:
    March 31, 2016 at 10:28 am

    The government has the evidence in hand. They have made as many duplicate copies of these devices as possible. he can sue for his property back, but in the end, it really does not matter. They are forcing his hand to cooperate in a judicial sort of way. They know he would fight any extradition leaving him to accrue a lot of lawyer fees and time in court. His name will be smeared over the internet showing potential ties with activities that at best – are not trustworthy.

    Even though he may walk away from all of this, the potential end result is basically the same. He’ll be watched, his property will probably never be deemed safe. If there is a technology out there that can compromise an encrypted drive and eventually pass the key/password/pass phrase back to the feds, it will be doomsday for him.

    Not allowing them to see what the electronic personal property has on it should show that he MAY have something to hide. It is very hard to strike a deal with the feds on allowing them to search a device and only take what is worded on the search warrant, right down to the very specific words. He is probably crowing his innocence through a privacy rant, looking for attention and news coverage. If he is completely innocent he should have given up all his info and then may have a leg to stand on when it comes to a suit. But as the mud continues to be collected by him, his chances of coming clean of this stench is pretty low.

    The government will get their way with clients who refuse to cooperate. Sure, they may have won the war in the courts – this time, but the tar, feathers, bad reputation and serious debt will linger for white some time.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.