DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK cops tell suspect to hand over crypto keys in US hacking case

Posted on March 31, 2016 by Dissent

J. M. Porup reports:

At a court hearing earlier this month, the UK’s National Crime Authority (NCA) demanded that Lauri Love, a British computer scientist who allegedly broke into US government networks and caused “millions of dollars in damage,” decrypt his laptop and other devices impounded by the NCA in 2013, leading some experts to warn that a decision in the government’s favor could set a worrisome precedent for journalists and whistleblowers.

Arrested in 2013 for the alleged intrusions but subsequently released, Love was re-arrested in 2015 and is currently fighting extradition to the United States. He has so far refused to comply with a Section 49 RIPA notice to decrypt the devices, a refusal that carries potential jail time. However, British authorities have not charged Love with any crime, leading him to counter-sue in civil court for the return of his devices.

Read more on Ars Technica.

I think Love’s lawyer, Ekeland, is exactly right in what he told Ars and that any evidence the UK would obtain would be handed on a silver platter to the U.S. for our government’s prosecution of Love.

Category: Commentaries and AnalysesHackNon-U.S.Of Note

Post navigation

← Godiva workers’ IDs sold in Florida sting, feds say
Verizon Double-Take →

1 thought on “UK cops tell suspect to hand over crypto keys in US hacking case”

  1. IA Eng says:
    March 31, 2016 at 10:28 am

    The government has the evidence in hand. They have made as many duplicate copies of these devices as possible. he can sue for his property back, but in the end, it really does not matter. They are forcing his hand to cooperate in a judicial sort of way. They know he would fight any extradition leaving him to accrue a lot of lawyer fees and time in court. His name will be smeared over the internet showing potential ties with activities that at best – are not trustworthy.

    Even though he may walk away from all of this, the potential end result is basically the same. He’ll be watched, his property will probably never be deemed safe. If there is a technology out there that can compromise an encrypted drive and eventually pass the key/password/pass phrase back to the feds, it will be doomsday for him.

    Not allowing them to see what the electronic personal property has on it should show that he MAY have something to hide. It is very hard to strike a deal with the feds on allowing them to search a device and only take what is worded on the search warrant, right down to the very specific words. He is probably crowing his innocence through a privacy rant, looking for attention and news coverage. If he is completely innocent he should have given up all his info and then may have a leg to stand on when it comes to a suit. But as the mud continues to be collected by him, his chances of coming clean of this stench is pretty low.

    The government will get their way with clients who refuse to cooperate. Sure, they may have won the war in the courts – this time, but the tar, feathers, bad reputation and serious debt will linger for white some time.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.