Judge Rejects Attempt To Force Lauri Love To Decrypt His Computers, Despite Never Charging Him With A Crime
from the finally,-a-good-ruling dept
Back in March, we wrote about the troubling situation in the UK, in which the UK's National Crime Agency (NCA) was trying to force hacker/activist Lauri Love to decrypt his computers, despite never actually charging him with a crime. Back in 2014, US authorities sought to extradite Love for supposedly hacking into government computers. As part of that process, the government took all of his electronics and demanded he turn over his encryption keys. He refused. Under the RIPA (Regulation of Investigatory Powers Act) law in the UK, prosecutors could then charge him for failing to disclose his passwords... but, importantly, they did not do so.Last year, the NCA actually returned most of Love's stuff, but held onto six items: three computers, two hard drives and an SD card. Love sought to get them back, using a civil legal action against the NCA. The NCA then, somewhat ridiculously, sought to use that civil action to again force Love to decrypt the devices it held, in particular asking that he decrypt some TrueCrypt files on the SD card and hard drives. Thankfully, the court has flatly rejected the NCA's demand, noting that it appeared to be a clear attempt to do an endrun around RIPA, which has a variety of protections.
After reading the papers and hearing from the parties, I am not granting the application because in order to obtain the information sought the correct procedure to be used, as the NCA did 2 ½ years ago, is under section 49 RIPA, with the inherent HRA safeguards incorporated therein. Case management rules are necessary to fulfil their objectives which include the early identification of the real issues in the case and, as per the new CPR relating to applications under the PPA, the applicant to explain his interest in the property. The NCA submits this “lends some support to its submission that Mr Love should in this case be required to provide the encryption key or password as only thus will the court be able to adjudicate fairly upon the complete contents of the devices” (paragraph 3 of supplementary skeleton argument dated 5th April 2016). I am not persuaded by this argument. The case management powers of the court are not to be used to circumvent specific legislation that has been passed in order to deal with the disclosure sought.The court does note that the issue is not completely closed. But it appears that while Love will not have to disclose his key, that may be used against him in trying to regain control over his stuff:
Finally, I would also add that this court has already directed Mr Love to give particulars of the contents of his files as part of the evidence as to ownership in a witness statement. The NCA accepts the case can be heard in July and they will invite the court to draw interferencesStill, on the whole, not forcing him to disclose under these conditions is nice to see.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: decryption, encryption, forced decryption, lauri love, nca, ripa, uk
Reader Comments
Subscribe: RSS
View by: Time | Thread
Technically, it's evidence and until it goes to court, he won't get his equipment back. Love may eventually be forced to provide the encryption keys.
[ link to this | view in chronology ]
Ah judicial extortion...
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
... because the devices the NCA took from Mr Love, the devices that have been meticulously tracked and identified while going through the court system, might alternately belong to ... who, exactly?
That's already a fraud. There is no doubt where the devices came from. There's no claims that they were stolen (unless you count the taking by the NCA...).
And as for the contents, there can be no claim about the ownership of the contents separate from the device itself, without competing evidence. And no such evidence has been brought forth, because the contents of the devices is unknown!
Even decrypted, much of the contents will be under copyright (proprietary software, movies, MP3s, etc) and thus not belong to Mr Love (except via lease and license) in the normal course of operating a computer.
[ link to this | view in chronology ]
Wait, what?
Why does he need to prove he owns his own property that police files show are indeed his property in order to secure the return of his property?
[ link to this | view in chronology ]
"We shall make him an offer he can't refuse."
At this point they seem to have devolved into petty vindictiveness, doing anything they can think of to force him to cave, or at least suffer for refusing to do so.
[ link to this | view in chronology ]
Re: Wait, what?
[ link to this | view in chronology ]
Re: Wait, what?
[ link to this | view in chronology ]
So the physical devices are his, they know it's his, but until he decrypts them to 'prove' they are his, he can't them back?
[ link to this | view in chronology ]
Off-site backups
[ link to this | view in chronology ]
Re: Off-site backups
[ link to this | view in chronology ]