Feeds

Crypto spares man who secretly video taped flatmates

Police can't crack code

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

An Australian man who set up an elaborate network of hidden cameras to spy on his flatmates has escaped jail time after police were unable to crack the encryption scheme protecting his computer.

When police raided the residence of Rohan James Wyllie, they found found a series of peepholes drilled into the walls and doors of rooms occupied by his two female and one male flatmates. Wires led to Wyllie's bedroom, and the names of files on his computer were consistent with video footage that would have been recorded onto the hard drive of his computer.

But the files were encrypted, and the 39-year-old Wyllie refused to divulge the password. The inability of police to review the files - combined with the fact that a camera he used was unplugged when the raid was commenced - meant prosecutors lacked the hard evidence they needed to prove the man had secretly taped his flatmates.

Wyllie eventually pleaded guilty in Southport District Court to one count of attempting to visually record a person without consent in a private place. His lawyer said his client suffered from paranoid schizophrenia and believed his mates were conspiring against him.

Given the lack of evidence and the 33 days Wyllie already spent in jail, the judge hearing the case accepted the guilty plea. He sentenced the man to two years of probation.

The legal status of encryption passwords remains unresolved in many parts of the world. There were no press reports suggesting prosecutors in Australia had the authority to compel Wyllie to reveal his code. But a US judge in Vermont earlier this year ordered a child porn suspect to decrypt his hard drive so investigators could inspect its contents.

More coverage is here and here. ®

Remote control for virtualized desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.