back to article Lauri Love backdoor forced-decryption case goes to court in UK

Alleged hacktivist Lauri Love appeared in a London court on Tuesday in a case that could establish new powers for UK police to compel criminal suspects into handing over encryption keys. Love, 31, faces potential extradition to the US over his alleged involvement in #OpLastResort – the online protests that followed the …

  1. Adam 52 Silver badge

    ...and if he puts in a counter motion asking for all the NCA's passwords?

    1. Anonymous Coward
      Anonymous Coward

      Don't know about UK law

      But US legal rulings have been clear for years - trying to compel passwords is like trying to compel the combination to a lock, and that has been considered a violation of the 5th Amendment of the US Constitution for more than a century.

      1. Preston Munchensonton

        Re: Don't know about UK law

        But US legal rulings have been clear for years - trying to compel passwords is like trying to compel the combination to a lock, and that has been considered a violation of the 5th Amendment of the US Constitution for more than a century.

        How fortunate for the NCA that Mr. Love is being tried in Blighty and not the colonies.

        1. Eddy Ito

          Re: Don't know about UK law

          The question, should they succeed, will be whether any evidence found can then be used by the US court if he is extradited for trial over here.

          Given this is a civil case I can't imagine any reason why he should be compelled to hand over a password to his property. It's a bit like they impounded his car and in order for him to get it back he has to give them the keys so they can go on a joy ride first.

      2. Anonymous Coward
        Anonymous Coward

        Re: Don't know about UK law

        > "...trying to compel passwords is like trying to compel the combination to a lock, and that has been considered a violation of the 5th Amendment of the US Constitution for more than a century."

        A physical lock may be simply and quickly broken open, so it costs government and the courts nothing to protect combinations to said locks. Not so with encryption, where the government has no physical recourse to obtaining entry.

        1. Anonymous Coward
          Anonymous Coward

          Re: Don't know about UK law

          In the UK there's a law that can send you to prison for not revealing your passwords when compelled to do so. I seem to recall it being used in an animal liberation thingy a few years back?

          1. Anonymous Coward
            Anonymous Coward

            Re: Don't know about UK law

            In the UK there's a law that can send you to prison for not revealing your passwords when compelled to do so. I seem to recall it being used in an animal liberation thingy a few years back?

            That's the bit that confuses me a bit - what you're talking about is in criminal law, but for some reason this is a civil process where such does not apply.

            1. Anonymous Coward
              Anonymous Coward

              Re: Don't know about UK law

              This seems to be the NCA response to Love's civil action to get his computers returned. This may or may not be anything to do with the extradition request .. which would presumably be a criminal case.

              The NCA have already returned some of Love's equipment. They didn't return other items on the grounds that they contained encrypted files. It looks to me that Love can either give up the key, and presumably once files are examined get the equipment back, or not allowing the NCA to keep the equipment.

              The statement “There is a concern that the NCA is seeking in this application to access Mr Love's data by the back door rather than by the route sanctioned by parliament in Ripa,” by Love's brief is probably an attempt to conflate this case with the extradition request.

              1. Not That Andrew

                Re: Don't know about UK law

                They are not conflating it with the extradition request. This is an attempt by the UK government to expand it's ability to infringe on the privacy and right of it's citizen beyond even the overly generous boundaries provided by RIPA. Whether or not any evidence gained is admissible in the US is irrelevant.

        2. Anonymous Coward
          Anonymous Coward

          Re Big John: Don't know about UK law

          Irrelevant. The issue is that in the US, the courts cannot compel you to give evidence against yourself. That is the crux of the 5th Amendment to the US Constitution. They are completely entitled to try to get the evidence another way.

          “17. Azl Jan 26, 2012 4:34 PM CST” at the American Bar Association said it best:

          http://www.abajournal.com/news/article/judge_orders_mortgage_fraud_defendant_to_reveal_encrypted_contents_of_lapto/

          “Unlike files in a safe, the contents of an encrypted drive are entirely visible, just not understandable. A seized hard drive can have its contents examined right down the 1’s and 0’s of each bit, regardless of encryption.

          Thus, turning over the password does not hand them new information, like papers out of safe. Instead, it interprets the data they already have, but do not understand.

          It is precisely testifying against one’s self. It is the act of taking data the prosecution already has but does not understand and interpreting it for them so that they may use it against you.

          A better analogy would be a diary written in code. The government, which already HAS the diary, can see its contents clearly, but without your cooperation, cannot understand it.

          They are free to try and crack the diary code on their own [as they are free to try and brute-force your encryption] but to compel you to interpret it for them - to supply the meaning - is precisely the act of testifying against yourself. ”

        3. I am the liquor

          Re: Don't know about UK law

          "A physical lock may be simply and quickly broken open, so it costs government and the courts nothing to protect combinations to said locks. Not so with encryption, where the government has no physical recourse to obtaining entry."

          So it's fine for people to have rights, just as long as it doesn't incovenience the authorities?

        4. Crisp

          Re: "A physical lock may be simply and quickly broken open"

          If it can be simply and quickly broken open then it's a pretty shitty lock isn't it?

      3. Anonymous Coward
        Anonymous Coward

        Re: Don't know about UK law

        > Don't know about UK law

        Then don't bother commenting. We may have some strange laws, but at least we don't torture our prisoners like the USA.

        1. shovelDriver

          Re: Don't know about UK law

          "At least we don't . . ."

          That you know of.

          "Strange laws", such as the ones which prohibit anyone disclosing unlawful activities by government.

          1. jason 7

            Re: Don't know about UK law

            Well if we leave the EU lord knows what the powers that be will be able to do to us!

            Scrap the courts system completely? Take away our vote? Who knows.

            1. David Neil

              Re: Don't know about UK law

              ECHR has nothing to do with the EU

        2. David Neil

          Re: Don't know about UK law

          Plenty of anecdotal evidence of UK Security Services officers being present when prisoners were subject to "enhanced interrogation techniques" outside the UK.

    2. Anonymous Coward
      Anonymous Coward

      Some sort of push back is over due....

  2. Anonymous Blowhard

    "The NCA claimed officers saw evidence of hacking on Love’s computer screen at the time of his original arrest."

    So they've got all the evidence they need then? Unless, of course, this eye-witness evidence turns out to be less-than-concrete under cross examination in court.

    Sounds like the on screen "evidence" is just an excuse for getting access to the computers in the hope of finding actual evidence of a crime; but because the UK doesn't have a "fruit of the poisoned tree" law for illegally obtained evidence, they can use any old "honest guv', I saw him do XYZ" to justify fishing trips like this.

    1. Voland's right hand Silver badge

      Was the evidence like this?

      http://i1-news.softpedia-static.com/images/news2/Arnold-s-T-800-Terminator-Runs-Linux-Kernel-4-1-We-re-All-Doomed-473236-2.jpg

      1. John Brown (no body) Silver badge
        Windows

        Re: Was the evidence like this?

        Nah, more likely they saw this .

        Everyone "knows" that's what hackers use. It's in all the best films.

    2. nsld

      Sounds fishy to me

      So unless the plod doing the raid had the prerequite skills and knowledge to quickly understand what they were looking at this seems very dodgy.

      RIPA is fairly simple if they can see they need a password they can compel it.

      I suspect they got confused with a Matrix screensaver

    3. veti Silver badge

      Well, assuming the plod making the arrest had above a room-temperature IQ, they presumably took a photo of this "evidence of hacking on the guy's screen" at the time, yes?

      1. allthecoolshortnamesweretaken

        Re: Plod IQ

        Just to clarify - are we talking Fahrenheit, Celsius or Kelvin?

        1. Anonymous Coward
          Anonymous Coward

          Re: Plod IQ

          It would seem the evidence was described as "The NCA had taken screen shots which showed a list of file structures and a directory of employees from the US Department of Energy (DoE), he said. Other screen shots showed material from the US military.".

    4. Mark 65

      Hell would freeze over before I believed the testimony of those duplicitous pricks.

  3. Doctor Syntax Silver badge

    "The section 49 order expired without further consequences to Love."

    Why? Somebody forgot it was there? Didn't know what to do next? Or maybe there's a concern that there could be legal problems if they actually tried to enforce it.

    1. Sir Runcible Spoon

      Sir

      Well, I don't think he is actually accused of a crime in the UK, it's the US that's doing the prosecution.

      The US knows it can't compel the passwords out of him, and the UK has been asked to do it for them -but the UK doesn't have a legal way to do it, so they are trying to bully him into giving the passwords over.

      I might be wrong, but it sounds about right :)

  4. Cynic_999

    His computer was seized in 2013. That being the case, if he was now ordered to divulge the password, surely a reply of "I have forgotten," would have to be accepted? I certainly cannot remember passwords I last used 2.5 years ago.

    1. Sir Sham Cad

      Re: I have forgotten

      Unfortunately that's not how RIPA2000 works. You'd need to prove that you've forgotten. You'd need to prove that you do not have something that does not exist in a physical form.

      The nearest I can find in the Act section 49 is this:

      "2)If any person with the appropriate permission under Schedule 2 believes, on reasonable grounds—

      (a)that a key to the protected information is in the possession of any person,"

      I.E. if the rozzers think you can remember it you'd need to prove in court that you didn't. Good luck with that.

      1. splodge

        Re: I have forgotten

        Re: I have forgotten

        Just because you can't recall it, doesn't mean it's not in there ;)

        1. Anonymous Coward
          Anonymous Coward

          Re: I have forgotten

          Yeah, with Shergar. He should prove he doesn' t have him either.

      2. Adam 52 Silver badge

        Re: I have forgotten

        "believes, on reasonable grounds"

        This phrase has a very specific legal meaning. For it to apply there must be a logically consistent reasoning leading to a high probability that the information is in the person's posession.

        It can be challenged on that basis. See Court of Appeal decision from 2013.

      3. Anonymous Coward
        Anonymous Coward

        Re: I have forgotten

        > "Unfortunately that's not how RIPA2000 works."

        I thought the point of the article was that they weren't using the RIP Act in order to obtain disclosure of passwords ..?

    2. Mark 85
      Devil

      Simples then.... give him the PC back. If he logs into it, they own him. If he doesn't, than he probably did forget it.

      1. swarfega

        What if he looks at it mournfully and bangs his head off the table a few times?

      2. Anonymous Coward
        Anonymous Coward

        Well Duh!

        Any half decent hacker will probably have their system setup with two accounts.

        One that is ok and the other that does an auto hard erase of everything on the computer (or triggers a self destruct explosion like Mission Impossible)

        so he uses the second one and bingo, there is no data to see.

        1. imanidiot Silver badge

          Re: Well Duh!

          Any investigator worth his/her salt will duplicate the system before attempting to log into it. And if they then find you tried to get them to erase the data you'll get a nice obstruction and/or deatruction of evidence charge added to the list.

      3. YetAnotherLocksmith Silver badge

        *Simples then.... give him the PC back. If he logs into it, they own him. If he doesn't, than he probably did forget it.*

        After it has had whatever they've secretly done to them done? Plug it in, get password wrong a few times, then go smash them with a hammer. Then burn them.

        (Maybe scan with a microscope and publish photos of very subtle electronic tampering before you do?)

    3. phuzz Silver badge

      From TFA:

      Earlier attempts to obtain data from computers seized by using section 49 of the Regulation of Investigatory Powers Act to compel Love to hand over encryption keys and passwords had failed after Love refused and the NCA seemingly backed off. The section 49 order expired without further consequences to Love.

      They demanded his passwords under the law. He refused the hand them over. The government did nothing, even though presumably they could have prosecuted him.

  5. Cynic_999

    What encrytion was used?

    It would be nice to know what encryption application appears to be secure against government cracks & backdoors.

    1. Gordon 10

      Re: What encrytion was used?

      Standard plod cracks not government cracks.

      1. Anonymous Coward
        Anonymous Coward

        Re: What encrytion was used?

        "Standard plod cracks"

        hideous image .....

        1. Anonymous Coward
          Anonymous Coward

          Re: What encrytion was used?

          TrueCrypt maybe..the NCA seem interested in the files truecrypt1 and truecrypt2 on Love's computers.

    2. Anonymous Coward
      Anonymous Coward

      Re: What encrytion was used?

      last proper trucrypt 7.11a I believe without checking

      Only weakness was being able to pull decryption key if computer was resumed from standby or was confiscated whilst powered.

      But that weakness isn't unique to trucrypt.

  6. Richard Jones 1
    Stop

    Question

    If the data would clear him why not yield the point? If it could stop a one way ticket to the USA it would be worthwhile.

    1. m0rt

      Re: Question

      So the old 'If you have got nothing to hide, then you have nothing to fear.' cliche?

      1. Richard Jones 1

        Re: Question

        No simple straight personal choice issue for him but if political point scoring is more your bag, waltz on.

        Not my dance I am afraid, so it matters not one jot to me, but if I could prove my innocence, sorry to say this, I would try damned hard to do just that.

        1. Captain DaFt

          Re: Question

          So to prove you're not a criminal, you'd be happy with 24/7 camera surveillance in your home/car/office? After all, if you've nothing to hide...

          But aside from that, they want to find something to incriminate him, or at least cast the shadow of suspicion.

          So no matter how innocent it is, if they can find something to cast doubt, they will.

          Cardinal Richelieu - If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.

        2. scrubber

          Re: Question

          "if I could prove my innocence"

          Not my job. Cops have to prove non-innoncence otherwise they can fuck right off.

        3. badger31

          Re: Question

          @Richard Jones

          "if I could prove my innocence"

          Innocence need not be proven. It is guilt that must be proven. Please, let's keep it that way.

    2. Adam 52 Silver badge

      Re: Question

      " it could stop a one way ticket"

      It can't. That's not how the UK-US extradition treaty works. The US doesn't need to make a case. Ironically US law against unlawful arrest provides stronger protection to a British citizen than English law.

    3. Curtis

      Re: Question

      Because in the US, you're innocent until proven guilty. Therefore, if they are unable to prove a likelihood of guilt with the evidence, then the extradition should not take place.

      This is actually much more sinister. In the US, a suspect cannot be required to provide a password. In the UK, they can. They're using the UK to get the password to then use it as part of the US case.

      1. Sir Runcible Spoon

        Re: Question

        "Because in the US, you're innocent until proven guilty."

        No. This sentence presumes guilt, but you are classed as innocent until they can prove your guilt.

        The correct phrase is:

        Innocent unless proven guilty.

  7. Mike 16

    Evidence of Hacking

    I presume they mean he had a terminal window or two open.

    1. m0rt

      Re: Evidence of Hacking

      Yeah. I hear that a bash shell is a common hacking too.

      Mind you, so is a computer.

    2. hellwig

      Re: Evidence of Hacking

      No no no, he had DOZENS of terminal windows open. He probably had three or four keyboards hooked up as well and 8 different displays. I'm willing to bet his desktop wallpaper was a mix of topless women and the Jolly Roger. Lets not forget his punk-ish attire, probably a shirt reading "Talk to dev/null!". Ooohhh I hate him already!

      1. Not That Andrew

        Re: Evidence of Hacking

        Not to mention the BOFH mug

      2. Bluto Nash
        Pirate

        Re: Evidence of Hacking

        He had a window open that was flying through the 3 dimensional representation of the file system of the machine he was attacking, like all of the good hacks do in the movies, and a password prompt that took up a third of his screen with asterisks and made teletype sounds.

        And a dot matrix printer!

    3. Anonymous Coward
      Anonymous Coward

      Re: Evidence of Hacking

      Yeah unless he had reprogrammed Solitaire to do it.

    4. Sandtitz Silver badge

      Re: Evidence of Hacking

      One terminal window title was "Nethack" and it had suspicious room schematics open.

  8. Anonymous Coward
    Big Brother

    The important point about this court case is that the gubmint, actually the NCA acting on their behalf, is trying to compel key disclosure using a direction under a civil case instead of using the RIPA procedure under s49.

    The reason for this is because the RIPA method has built in legal and procedural safeguards whereas the civil direction does not. So they're using one law to get around another law that makes it too difficult for the NCA to get what it wants, Lauri Love is trying to get his computers back, this is the back strike from the NCA to try and get what they couldn't before. Note that the original order had expired with no apparent action by the NCA.

    1. Anonymous Coward
      Anonymous Coward

      The Police are not representatives of the Government. They're representatives of the Crown, which most definitely is not Government. Hence also "Crown Prosecution Service", "Crown vs John Doe", etc. The government pays for it, but doesn't control it other than by passing law in Parliament.

      And the route being pursued by the NCA in this case still has safeguards; the Judge, and the appeals court system. They're far from powerless and generally well qualified when it comes to reaching justifiable decisions.

      1. Adam 52 Silver badge

        "The Police are not representatives of the Government. They're representatives of the Crown, which most definitely is not Government."

        "The government pays for it, but doesn't control it other than by passing law in Parliament."

        This is only true in theory these days. Government targets drastically affect how the police work; a "missing" child who is known to be safely at home with their parents will get a drop-everything response whereas an adult being mugged may only qualify for a phone call in a fortnight's time.

        Home Office guidelines, whilst not law, affect everything from crime recording to evidence gathering and not following them will render a prosecution futile.

        1. Anonymous Coward
          Anonymous Coward

          @Adam 52,

          You say it's only a theory, but then give a list of reasons showing how the government doesn't control individual cases but merely sets policy and targets (which is their job after all). We might not like the end result, but it doesn't amount to politicians directing individual criminal investigations. Care to remove the inconsistency in your statement and upgrade it to a full agreement?

          1. YetAnotherLocksmith Silver badge

            It's a subtle distinction in practise though. Extra-specially in rare cases.

            The government simply has you arrested due to a new policy of being tough on alleged hackers, then while you sweat they change policy to be tough on *whatever they find out about you*. (Which affects no-one else - you're the only person accused of hacking the DoD and this week we are being extra tough on hacking them.)

            For an example, look at the entirely disproportionate sentences handed out to the 2011 rioting kids! Far harsher than actual criminals ever get. Because policy was changed. But the government *didn't get involved in any individual case*.

  9. EddieD

    "Stephen Cragg QC, representing Love, told Westminster Magistrates' Court that the NCA application, if successful, would be a significant blow against individual privacy."

    Why the heck does he think that they're doing it this way? As with the Apple cases ongoing in the US, the case against Microsoft in Ireland, this case and many others, all government agencies are seeking legal precedents for invading our privacies. These cases will run and run until the governments and agencies get their way, they have deep pockets and the ability to amend laws.

  10. Adam 52 Silver badge

    A bit more background, because El Reg clearly copied the BBC without applying any understanding.

    He was arrested and his kit seized. At the time they got screenshots of some stuff that may or may not have been "stolen".

    They couldn't prove anything but didn't return the kit. The procedure to get kit back is to apply to the Mags, which he did, and got some stuff back but not everything.

    The US are now trying to extradite.

    He's still trying to get his kit back.

    My take is this:

    No doubt the computers would be useful evidence for the US. But US law wouldn't allow a password to be compelled. The NCA have either dropped the ball or can't RIPA, either way they're trying this new approach to make amends to their American friends.

    1. Adam 1

      Complain all you want about El Reg reporting on the issue but I read the BBC story and couldn't find any reference to DevOps. How can we take Aunty as a serious news source?

  11. Anonymous Coward
    Anonymous Coward

    More British justice

    aka the ends justify the means.

    The moral high ground: we've heard of it.

  12. Stevie

    Bah!

    "Love, who has been diagnosed with Asperger’s,"

    Naturally. Isn't everyone found in the US Military computers without permission eventually diagnosed with Asperger's?

    1. swarfega

      Re: Bah!

      Particularly when it is found they were using no, or default passwords in their systems. So any Joey could get in anyway.

    2. John Brown (no body) Silver badge

      Re: Bah!

      "Naturally. Isn't everyone found in the US Military computers without permission eventually diagnosed with Asperger's?"

      The bigger question really should be, are we looking at cause or effect here? More research needs to be done. Can I have a grant?

      1. Anonymous Coward
        Anonymous Coward

        Re: Bah!

        "are we looking at cause or effect here?"

        Cause: Gary McKinnon is diagnosed as having Asperger's.

        Effect: Every chancer lawyer now uses it as an excuse for their client's bad behaviour.

        1. Anonymous Coward
          Anonymous Coward

          Re: Bah!

          To be fair, I've never been officially diagnosed with Aspergers, but I'm pretty sure I have it.

          If I was arrested and on trial you can be damn sure the first thing I'd do is get a confirmed diagnosis on the offchance it might help.

          1. Anonymous Coward
            Anonymous Coward

            Re: Bah!

            Ah yes he had the bible ... "For his latest extradition hearing, Love appears in Westminster Magistrates’ Court wearing a green hat with a bear on it while carrying a copy of the book ‘Saving Gary McKinnon: A Mother’s Story’.".

            Although it would seem his extradition request is now scheduled for the 28 - 29th of June. This would be his appearance at the hearing of his own civil case for return of equipment.

  13. anniemouse

    control freaks going nuts because they are Stupids & Lazies (S&L's)

    This is what happens when you put people in position of power and authority who are S&L's. S&L's do not exercise proper control of their resources and seek to blame others for their failure. Did Love try to break into something or was he just knocking on the door to see if anyone would answer? Either way, not a good idea. But to break the social compacts of the relationships of life on earth by seeking total control of everything is worse and the S&L's either fail to recognize that or don't care, and they don't mind abusing others (cough invade iraq, spy on everyone, rendition and torture). The real breakin criminals are them.

  14. Anonymous Coward
    Anonymous Coward

    I spose we shouldn't Google the phrase "Laurie Love backdoor" then?

    1. Likkie

      "Laurie Love backdoor"

      That was perfectly good cup of tea, now its all over the wall!

      1. Anonymous Coward
        Anonymous Coward

        Re: "Laurie Love backdoor"

        Likkie? You're not one of Rimmer's Z shift by any chance?

        1. Likkie

          Re: "Laurie Love backdoor"

          LOL. It's my childhood nickname.

          I'm Australian and, as you may know, we tend to shorten people's names and add an EE or an OH sound to the end. e.g. Johnno, Stevie or Jonesey.

          Also, I'm into rimming! ;)

  15. Andrew Jones 2

    So what exactly are they trying to get access to? if it's just his computer - HirensBoot CD will reset the Windows password - or..... use the well known and well publicised windows bug pre WIndows 10, rename the accessibility app, copy the cmd app and name it the same as the accessibility app and then reboot, on the login screen click the accessibility button which will launch a command prompt, but because Microsoft are not wonderful about security, for some reason it launches as the SYSTEM user, and then net user <username> <new password> and you have reset the users password and can access the account. It's been known about since Windows XP, has has persisted through Vista and Windows 7 - showing that Microsoft really aren't bothered about it. But the point is - if the FBI can gain access to a locked and encrypted iPhone, then there is no reason basic plod can't get access to a Windows machine.

    1. The Vociferous Time Waster

      Re:

      It's a little more complicated than that where full disk encryption is used.

  16. John Tserkezis

    Smells like another Snowden adventure to me. Looks like the US GovCo got caught with its pants down yet again, and they don't seem to like that...

  17. The Vociferous Time Waster

    Evidence?

    They saw evidence of hacking on the screen - that could mean an open terminal window in Linux for all we know.

    1. Adam 52 Silver badge

      Re: Evidence?

      From the new reports they say what looks like US government org charts and a Police Oracle login rhat wasn't his. Police Oracle is essentially a news site.

  18. Anonymous Coward
    Anonymous Coward

    So is this the US trying to circumvent the 5th

    By getting to the UK courts to do extract encryption keys for them, prior to extradition? If a conviction is dependent on what the encryption keys are hiding, Love might be better off getting on the next plane to NYC and speaking directly to the prosecutors*. Ultimately, he can fight in the UK, until the bitter end, or bargain for less severe penalties.

    * Yes, it's as dirty as dirty can be, but that's how the US works - the prosecutors hold all the cards (including where and when the trial is held, which, I understand, can be delayed as for as long as they choose while the defendant bleeds cash).

    1. kain preacher

      Re: So is this the US trying to circumvent the 5th

      I understand, can be delayed as for as long as they choose while the defendant bleeds cash)..

      Psst there is a thing called the 6th amendment (right to a speed trial)

      Speedy Trial Act.

      charge is pending, whichever is later.[3]

      Moreover, in order to ensure that defendants are not rushed to trial without an adequate opportunity to prepare, Congress amended the Act in 1979 to provide a minimum time period during which trial may not commence.[4] Thus, the Act provides that trial may not begin less than 30 days from the date the defendant first appears in court, unless the defendant agrees in writing to an earlier date.[5] In United States v. Rojas-Contreras, 474 U.S. 231 (1985), the Supreme Court held that this 30-day trial preparation period is not restarted upon the filing of a substantially similar superseding indictment.

  19. Anonymous Coward
    Anonymous Coward

    "Love, who has been diagnosed with Asperger’s..." - and the relevance of that is?

    Getting a bit fed up of that "excuse" being trotted out every time someone does something they shouldn't. It's getting to the point when the public will start to think that everyone who has been diagnosed with Aspergers cannot control themselves or doesn't know right from wrong.

    It's insulting to those of us who are on the spectrum. Bloody lawyers, mutter, mutter, mutter.....

  20. Daz555

    I invariably forget my network logon after 2 weeks on holiday. After 2.5 years I would probably forget the names of my own children.

  21. Sir Alien

    Just don't use disk encryption...

    Okay okay, before I get a million down votes first hear me out.

    Logically, if you wanted to do something suspicious you would use a completely disk-less computer. The moment the machine turns off, everything is gone. I remember hearing about a Linux distro built specifically for this where you traffic only goes over TOR and only in encrypted form. Though the distro was intended for privacy advocates, just like a knife it can be used for doing both good and bad.

    So listening into such traffic would be extremely difficult though not impossible. Anyway, since laws can compel you to reveal a key, if there is no data stored in the first place there is no key to disclose and the device is merely a blank piece of hardware.

    Don't have any persistent storage in the machine present, even unused and use a write-once optical disc so that it provides a sure measure nothing is persistently being stored.

    -S.A

    1. Cynic_999

      Re: Just don't use disk encryption...

      "

      I remember hearing about a Linux distro built specifically for this where you traffic only goes over TOR and only in encrypted form.

      "

      Also held only on a USB memory stick that is used in read-only mode.

      https://tails.boum.org/

      HTH

    2. YetAnotherLocksmith Silver badge

      Re: Just don't use disk encryption...

      Yes, TAILS. The Amnesiac Incognito Live System. Designed to leave no trace of booting and routes everything through TOR.

      Still leaves certain clues behind but a great starter for ten.

      1. YetAnotherLocksmith Silver badge

        Re: Just don't use disk encryption...

        (How do I edit? Never figured that out!)

        However, when downloading 55 million voters' data from the Philippines (apparently including fingerprint data!) with terabytes of data (which is what would get you done as proof of the crime!) TAILS can't help you. Because you have to store it somewhere.

  22. Asterix the Gaul

    The NCA have the hardware that contains the data they seek.

    This individual owns the hardware,unless the NCA back up their line that there is actvity related to hacking when they seized the hardware,they should be compelled to return that hardware.

    If they have taken screenshots,let them produce them in court,along with uncontestable proof that they came from that computer's hard drive & that it wasn't planted there by the NCA.

    They cannot do so,that's for sure,for doing so would likely have caused a change to the current state of that computer at the time,thus invalidating such evidence in court & there are very strict rules governing admissibility of such 'evidence'.

    'Cloning' the data by the NCA is 'theft' , that is something that cannot,or should not be used to seek extradition of a UK national.

    It's time that the ECHR ruled that 'extradition' for any alleged crime committed in any EU country is illegal,that any EU citizen should have protection from extradition in such cases & that any country wanting to try any EU citizen must do so on EU territory.

  23. Asterix the Gaul

    It's funny how some young naive folks believe that,"If you have 'nothing' to hide,you have nothing to fear".

    Well, the FACT is,"The NSA\GCHQ have EVERYTHING to hide & NOTHING to fear" .

    Their grandfathers\mothers fought two world wars to avoid the situation's that these people are now subject to.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like