back to article Youth jailed for not handing over encryption password

A 19-year old from Lancashire has been sentenced to 16 weeks in a young offenders institution for refusing to give police the password to an encrypted file on his computer. Oliver Drage, from Naze Lane, Freckleton, Lancashire was arrested in May as part of an investigation into child sexual abuse images. His computer was …

COMMENTS

This topic is closed for new posts.

Page:

  1. Sime

    Still trying to crack password..

    I'd love to be the consultant employed to give that a go!

    Free income for a year or more.. Then just tell them you couldn't do it and hand the disk back.. "That encryption is just too good!!".. No need to even plug the thing in! :-D

    1. Anonymous Coward
      Happy

      Insurance

      This is why I ALWAYS store my porn in the WikiLeaks download directory as a file called "insurance"

      1. Alan Firminger

        Boasting

        A similar post that could be read as a terrorist threat is before the courts now.

    2. Shady

      The consultant might have had a decent work ethic....

      aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa...

      aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaab...

      aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaac...

      aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaad...

      Although he may have to claim expenses for a new keyboard and treatment for carpal tunnel syndrome.

  2. Anonymous Coward
    Paris Hilton

    Question

    "50-character encryption password"

    How do they know the string length of the password??

  3. Anonymous Coward
    Anonymous Coward

    Just wondering

    How would they know it's 50 characters?

    1. This post has been deleted by its author

      1. C Yates
        Happy

        Spaceballs ftw!

        What's your password??

        1... 2... 3... 4...

        1234? that's the sort of password an IDIOT would have on his matched luggage!

        =D

      2. David 45

        Ho ho

        Like that.

        Might not be 50 characters. In fact, it's probably not. How do you remember that lot? Some password boxes automatically add more as a safeguard to baffle folks who might be observing your screen.

    2. Jinxter
      Joke

      50 char password...

      Wavehishands,thisisnotthepasswordyouarelookingfor!

    3. Richard Stubbs
      Joke

      Because he told them!

      Yes my password is "fiftycharacterslong" what? 16 weeks! but i've told you my password is "fiftycharacterslong"

    4. Tigra 07
      Thumb Up

      RE: AC

      The actual password is "50 characters"

      They just keep typing it in without the space so locked him up to cover their stupidity

  4. King Edward I
    Stop

    You have the right...

    ...to remain silent.

    Or not if we decide so,

    1. Pablo
      Badgers

      Wrong Country

      tvtropes.org/pmwiki/pmwiki.php/Main/EaglelandOsmosis

  5. Paul Smith

    Nostalgia

    This story just proves how old I am getting. I can still remember the days when a person was presumed innocent until proven guilty.

    That said, I am pretty sure that the European human rights charter includes the equivilent of the 5th, i.e. that you can not be forced to incriminate yourself.

    1. King Edward I
      Stop

      Technically...

      ...he was. He was considered innocent of not disclosing the password, and then they proved it. So he was guilty. The problem here is not convicting him for a crime they havent proved, it's them criminilising behaviour that *should* be a persons right, i.e not to self-incriminate.

    2. BristolBachelor Gold badge
      Black Helicopters

      Proven guilty

      It's easy, you just write the laws the right way. He has been proved guilty of not typing in his password; hence jail time.

      Other offences soon to hit the statute book to be used whenever they want:

      "Looking funny"

      "Taking a photograph"

      "Sitting on the tube, reading Metro"

      "Breathing"

      1. Annihilator
        Unhappy

        re: Proven guilty

        Unfortunately I'm pretty sure "Taking a photograph" is already there. Probably next to the unwritten one of "Looking a bit foreign", added at the request of the Daily Mail...

      2. Anonymous Coward
        Alert

        or...

        how about 'wearing a load shirt in a built-up area'?

        1. captain veg Silver badge

          Insufficient length

          That's only 39 characters.

          -A.

    3. The Original Ash

      I remember that too

      It was 1994, with the Criminal Justice and Public Order Act.

      http://en.wikipedia.org/wiki/Right_to_silence_in_England_and_Wales#Adverse_inferences_from_silence

  6. Anonymous Coward
    Anonymous Coward

    How would they know

    ...that the password is 50 characters long?

  7. Jim T
    WTF?

    50 character password

    How did they work out that it's 50 characters, exactly, if they don't know what it is?

    Unless he was bragging, of course.

  8. Anonymous Coward
    Flame

    Encryption right

    Encryption exists because there has been a need to safeguard certain information. It is used in a capacity to protect personal files just like it is used to protect say credit card information. However RIPA deems it a crime in circumstances they see fit. If they want to differentiate between what is acceptable and what is not then I suggest that encryption be made illegal in this country for non commercial use rather than jailing people because they will not cooperate. There is a clear distinction here between ones liberties and preventing people from covering up a crime.

    1. Nigel 11

      Other safeguards

      I'm not sure that there should be an absolute right to hide behind unbreakable encryption. One doesn't have a similar right with respect to paper documents. Provided the police have obtained a search warrant, they can legally break any physical lock if you won't provide them with the key. (There's no such thing as an unbreakable lock or safe).

      Do the police have to obtain a search warrant for your computer, before they can order you to decrypt? If so, that appears to be an appropriate safeguard, and an exact analogue to what has been the case for paperwork for many years.

      If they don't have to obtain a search warrant, then they should be required to.

      There should probably also be a provision that evidence obtained by requiring one to decrypt should be admissible only if it confirms the suspicions that led to the warrant being granted. In other words, if they are investigating money-laundering and they find only porn, they should not be able to charge one with posession thereof, because the grounds for the warrant have been proved false.

      1. Mephistro
        Thumb Down

        @Nigel11

        A problem with that approach is that the file in question might be obsolete and the password long forgotten. I'm an IT consultant, and whenever I have to store data from my customers, I use encryption. Most of those passwords are lost and forgotten only a few days after the work is completed, but I often forget to remove the encrypted files from my PC. After reading the article I made a quick search and found seven of those files, aged between three weeks and four and a half years. I just remember one of the passwords, from a file created in summer 2009. I remember it because the password was a funny word related to the owner of the data.

        And don't forget I'm an IT pro and use lots of passwords. I have seen people forgetting their passwords two HOURS after creating them.

        The thought police can jail you for forgetting something. Sounds really bad, doesn't it?

      2. Andrew the Invertebrate

        Nice in theory

        But how do you enforce a search warrant for the contents of someone's memory? How do you prove that you've forgotten a password or that you've never had the password in the first place.

        If you've downloaded the wiki-leaks insurance file how can you prove that you don't have the password, or that it isn't infact your secret stash of terrorist manuals that you've renamed to look like the wiki-leaks file and do really have the password for?

        Also if you followed the US system and had "Fruit of the poisonous tree" provisions in the warrants, the exceptions on the search being carried out in good faith would kick in and it would be a legal search.

        *Note to self - remember to use the "Reply to this post" button next time

        1. Nigel 11

          Refused, not forgotten

          The chap we are discussing "refused" to provide his password. I'm assuming that meant he said "No" rather than "I've forgotten it". The latter would have been a smarter answer and I'd hope it would lead to an acquittal - how can the prosecution possibly prove beyond reasonable doubt that this is not the truth? If it really is illegal to forget, I'd expect a jury nullification, or a successful appeal to the EU court of himan rights.

          I agree that the whole concept is stupid. Anyone competent with something to hide will combine steganography and plausible deniability (multiple encrypted volumes in one hidden container, one or two innocuous volumes that you're happy to reveal if they can work out where they are hiding, using software that always creates large amounts of random padding so they can't hope to prove that you're concealing more than you've shown them).

        2. Anonymous Coward
          FAIL

          Nice in Theory...

          re: Fruit of the poisonous tree... a former net acquaintance was under investigation for Social Security Fraud. Law enforcement was searching his house for proof that he was running several businesses while claiming SS Disability. One of them, I believe a USPS Postal Inspector, found some video tapes in the closet and tried to pop one in a VCR but couldn't because there was already one in the player... he turned the VCR and the TV on, and found to his surprise, not evidence of financial crimes, but porn, and specifically child porn. He stopped the tape, called the courts for another search warrant specifically related to porn and child porn, and then arrested Jack on federal child porn charges... Jack is now doing time in Arizona on some charges, and when he finishes his stay in the Arizona iron bar hotel, he has a date with a federal house of detention for another 5-10 years. He won't be free again until he's about 75 or older. I only "knew" him because we were on the same email list, but the owner of the list tried to hide the charges from the rest of the list, and in fact went to a moderated list and refused to allow anything negative to be posted about him. She also threw a number of people off the list because they tried to post the true story.

          Fail, because Jack had already been a guest in the pokey on several previous occasions, including once for murder.

          1. Marcus Aurelius
            Big Brother

            UK fruit of the poisonous tree

            If I recall, evidence discovered in this accidental way is acceptable in the UK, but it is up to the courts to rule on admissability depending on just how far the method of discovery has stretched relevant laws..

      3. Vic

        No safeguards

        > Do the police have to obtain a search warrant for your computer

        No.

        A Section 49 notice can be issued by a number of Authorised Persons. Many of these are not in the judiciary.

        There is no legal oversight. There should be.

        Vic.

      4. Ist alles doof

        They would have needed a warrant to take his computer away.

        Unlocking his computer's encryption system would be covered by the same warrant which legitimated the removal of his computer.

    2. John G Imrie

      Steam files

      Arn't all the files that Steam downloads encrypted. I'm sure I don't have the key for them. So hide all your encrypted files in plane sight in your Steam directories.

    3. Scorchio!!

      Right to security

      We have arrived at the point where citizens are only allowed to have security of information if the government they elect allows this. I can see the pros and the cons, having a number of TrueCrypt files for sound reasons that do not involve breaking laws of any sort, and having a dislike of the offences of which the individual has been accused. That leads me to ask, was this individual using an encrypted proxy? Is this why the enforcement agencies concerned are not trotting out the data here?

  9. Paul Smith

    Nope. I was wrong

    I just checked and it seems that the European Charter does not protect you from having to incriminate yourself. Poor kid rightly screwed now.

    1. The Original Ash

      It's Blair's fault

      There is an "innocent until proven guilty" provision in there, but Blair excluded it before signing. There was talk before the election of the Tories / Lib Dems pulling out of the Charter, then re-signing it in its entirety. So far, no dice.

      1. Chris Fox

        until v unless

        As others have said, "innocent *unless* proven guilty" would be nicer; "innocent until proven guilty" seems to suggest that you are, inevitably, going to be found guilty, but that it has not yet been proven. (That particular phrasing sounds like it was drafted by someone who believes in the concept of "original sin"; we are all guilty.)

        1. John Smith 19 Gold badge
          Boffin

          @Chris Fox

          I think you'll find it's the police officers version.

  10. Anonymous Coward
    FAIL

    RIPA is flawed

    Crim thinks:

    x years for not disclosing password

    y years for disclosing password

    x < y

    I'll not disclose password.

    Police think:

    at least we got him for something.

    1. Andrew the Invertebrate
      FAIL

      Fail yourself

      Scene 1: a court room.

      Judge - What is the password ?

      Accused - Not sayin.

      Judge - Fair enough, have four months at Her Majesty's pleasure

      Scene 2: the same court room,four months later

      Judge - What is the password ?

      Accused - Not sayin.

      Judge - Fair enough, have four months at Her Majesty's pleasure

      Rinse and repeat Scene 2 until the accused hands over the password or dies of old age.

      1. Kelvari
        Black Helicopters

        Would be ironic...

        ... if "Not sayin" actually WAS the password. Or even something like "There is no encryption password," or anything else to that effect.

      2. Anonymous Coward
        Anonymous Coward

        after 4 months

        I'm pretty sure I'd have forgotten...

      3. Anonymous Coward
        Happy

        No Thats the password, its

        Not sayin

      4. Scorchio!!

        Time

        Memory erodes over time and it would be a very silly criminal who did not realise that the "I've been in prison for so long that I have forgotten" option is available.

        As someone observed indirectly, we are now at the gates of a new era of thought crime. "We know that you remember so we are going to send you back to prison until you unlock your thoughts".

    2. Neil Brown

      Jail time for not disclosing password expires

      Police request password again under s49.

      Password owner declines again.

      Police prosecute for failure to comply with (new) s49 order.

      Password owner goes back to prison.

      Repeat.

      1. The Original Ash

        @Neil Brown

        Double Jeopardy. He's refusing to give the password for the same encrypted volume he refused to before. Worst that can happen here is being found in contempt of court and being returned to jail every time he refuses to give the password, but that's not within the remit of s49.

        1. Neil Brown

          @TAO: Application of double jeopardy to s49

          To my mind, at least, it's not clear that the double jeopardy principle would apply. The crime, for which he was imprisoned, was failing to comply with a s49 order. I agree with you that he cannot be tried twice for the breach of a s49 order- the double jeopardy principle.

          However, there is nothing in ss49-51 of RIPA which prevent a law enforcement agency from issuing another s49 notice, seeking the same information - this is entirely different to charging someone again for the same crime. If he fails to provide the key, he is tried for the breach of the new order, and thus commits a new, triable, criminal offence. There is no double jeopardy issue here - it's breaching a separate s49 notice.

          There are two competing policy issues here - one is that someone should not be tried twice for the same offence (although under attack in some situations), and the other is that someone should not be entitled to obstruct the investigation of a larger crime by committing a smaller crime, and take the penalty for that smaller crime as a way of preventing the investigation.

          I'm not aware of any legal authority on this, so just going on the basis of what makes sense to me in terms of approach - I'd be very interested to see something which suggests a different approach.

        2. Oliver Mayes

          @The Original Ash

          Except double jeopardy prevents you being punished for the same crime twice, if you refuse to hand over a password and get prosecuted that's only once. If they ask you again and you refuse that's a second offence and you can be prosecuted for it.

        3. Andrew the Invertebrate

          @The Original Ash

          Hate to break it to you, but double jeopardy laws were shown the exit about 5 years ago

          http://news.bbc.co.uk/1/hi/uk/4406129.stm

          1. Neil Brown

            @ Andrew the Invertebrate

            "Double jeopardy" is not out completely - the Court of Appeal held that there can be a retrial where there is "new and compelling evidence". There's ambiguity as to what this means, for sure, but it does not mean a complete revocation of the principle.

            I meant to add in my previous response, that the principle of double jeopardy applies to someone who is tried and acquitted, not someone who is tried, found guilty, and serves their sentence - that someone cannot be tried again for the same offence after serving their sentence comes from the fact that the have done their penance - the slate is wiped clean. In the situation here, the slate is wiped clean only in as much as the breach of the previous s49 order has been remediated - another order, another breach, another slate to wipe.

Page:

This topic is closed for new posts.