DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK cops tell suspect to hand over crypto keys in US hacking case

Posted on March 31, 2016 by Dissent

J. M. Porup reports:

At a court hearing earlier this month, the UK’s National Crime Authority (NCA) demanded that Lauri Love, a British computer scientist who allegedly broke into US government networks and caused “millions of dollars in damage,” decrypt his laptop and other devices impounded by the NCA in 2013, leading some experts to warn that a decision in the government’s favor could set a worrisome precedent for journalists and whistleblowers.

Arrested in 2013 for the alleged intrusions but subsequently released, Love was re-arrested in 2015 and is currently fighting extradition to the United States. He has so far refused to comply with a Section 49 RIPA notice to decrypt the devices, a refusal that carries potential jail time. However, British authorities have not charged Love with any crime, leading him to counter-sue in civil court for the return of his devices.

Read more on Ars Technica.

I think Love’s lawyer, Ekeland, is exactly right in what he told Ars and that any evidence the UK would obtain would be handed on a silver platter to the U.S. for our government’s prosecution of Love.

Category: Commentaries and AnalysesHackNon-U.S.Of Note

Post navigation

← Godiva workers’ IDs sold in Florida sting, feds say
Verizon Double-Take →

1 thought on “UK cops tell suspect to hand over crypto keys in US hacking case”

  1. IA Eng says:
    March 31, 2016 at 10:28 am

    The government has the evidence in hand. They have made as many duplicate copies of these devices as possible. he can sue for his property back, but in the end, it really does not matter. They are forcing his hand to cooperate in a judicial sort of way. They know he would fight any extradition leaving him to accrue a lot of lawyer fees and time in court. His name will be smeared over the internet showing potential ties with activities that at best – are not trustworthy.

    Even though he may walk away from all of this, the potential end result is basically the same. He’ll be watched, his property will probably never be deemed safe. If there is a technology out there that can compromise an encrypted drive and eventually pass the key/password/pass phrase back to the feds, it will be doomsday for him.

    Not allowing them to see what the electronic personal property has on it should show that he MAY have something to hide. It is very hard to strike a deal with the feds on allowing them to search a device and only take what is worded on the search warrant, right down to the very specific words. He is probably crowing his innocence through a privacy rant, looking for attention and news coverage. If he is completely innocent he should have given up all his info and then may have a leg to stand on when it comes to a suit. But as the mud continues to be collected by him, his chances of coming clean of this stench is pretty low.

    The government will get their way with clients who refuse to cooperate. Sure, they may have won the war in the courts – this time, but the tar, feathers, bad reputation and serious debt will linger for white some time.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news
  • Tonga’s health system hit by cyberattack
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation
  • Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay
  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report