Feeds

GCHQ was called in to crack password in Watkins child abuse case

Not just battling terrorists, it hunts down online predators too

Security for virtualized datacentres

It was operatives at British intelligence agency GCHQ who cracked the password on the laptop of "determined paedophile" Ian Watkins, a court heard on Tuesday.

The evidence heard in court related to child abuse images held in cloud storage, whose password the GCHQ unit had to "crack" to gain access to them.

Ian Watkins, 36, from Pontypridd in Wales, pleaded guilty to 13 sexual offences, including two of attempting to rape a baby, at a hearing at Cardiff Crown Court. He denied a charge of rape.

He also pleaded guilty to three counts of sexual assault against children, seven involving possessing images of child abuse and one of possessing an extreme pornographic image involving a sex act on an animal.

Two women accused of facilitating the offences by Watkins, the former lead singer of alternative rock band Lostprophets, also made last-minute guilty pleas at the same hearing, after a jury had already been sworn in for a planned trial. Their pleas mean that a trial will not take place.

"You have been saved from having to watch extremely graphic and distressing material," the BBC reported Mr Justice Royce as telling the court.

The women cannot be named for legal reasons. The first woman, whom the court called "Woman A", admitted the attempted rape of a baby and two charges of sexual assault as well as taking and distributing an indecent photograph of a child. She denied a charge of rape.

The second, "Woman B", pleaded guilty to conspiring to rape a child, three sexual assault charges and four charges of taking, possessing or distributing indecent images.

He will be sentenced on 18 December.

The attempted rapes, which took place in a hotel room in London's Shepherds Bush in April 2012, were captured on video and uploaded to a cloud storage facility. Government security service GCHQ cracked the password to allow access to Watkins' files, according to court reports (Wales Online and The Guardian).

The National Technical Assistance Centre of ‪GCHQ‬ provides assistance to police in such cases, the privacy advocacy and government surveillance monitoring Spy Blog notes.

In a statement by South Wales Police, Detective Chief Inspector Peter Doyle, senior investigating officer, said two young children had already been removed from abuse as part of the ongoing investigation. He said investigators would continue to seek out other potential victims. The UK's specialist child protection police unit (CEOP), interpol and the US Department of Homeland Security have all contributed to the investigation, he added.

The investigation has been extremely complex and challenging with key information and evidence being identified from witnesses worldwide.

A significant amount of electronic data has been retrieved from computers and web based storage which has provided crucial evidence to support the case.

South Wales Police has worked in partnership with Interpol, other police forces, the National Crime Agency’s CEOP, local authorities in England and Wales, the Department of Homeland Security in the USA and the NSPCC.

Today’s outcome does not mark the end of our investigations and we will work tirelessly to identify any other victims or witnesses and seek the justice they deserve.

GCHQ's role in the investigation goes is not specifically noted in the police statement, although investigators from the agency, who were tasked with gaining access to Watkins' laptop, discovered that Watkins had "If***kids" set as his password.

GCHQ's assistance to the Child Exploitation & Online Protection Centre (CEOP) more generally was discussed by Sir Iain Lobban, director of the UK's eavesdropping nerve centre, during a high-profile public hearing before Parliament's Intelligence and Security Committee earlier this month.

During the hearing, Lobban acknowledged a previously unreported working relationship with CEOP and overseas partners in child abuse cases, as attested by an extract from the transcript. In the PDF, he explains that GCHQ's signals intelligence work extends beyond counter-terrorism.

It is not simply about terrorism; it is also about serious crime. I could mention some of the work we do with the Child Exploitation Online Protection Agency; in terms of working with them to uncover the identities and track down some of those who are involved in online sexual exploitation of children within the UK, including from overseas. There is a recent case where we managed to do that, where we used our intelligence capabilities to identify those and with the help of the foreign partner then to bring them to justice and two people are now in jail.

Google and Microsoft recently bowed to political pressure in the UK by agreeing to tweak their search engines to make it harder for perverts to find child abuse images online.

UK Prime Minister David Cameron told a recent meeting of ISPs at Downing Street that GCHQ would be brought in to fight child abuse images on the so-called "dark net". The prime minister also used the meeting as an opportunity talk up the "techniques, ability and brilliance of the people involved in the intelligence community, in GCHQ and the NSA in America".

The revelations about the spook agencies' work against crime – especially GCHQ's role in helping children under threat – comes at a time when the respective agencies sorely need a bit of good PR in the wake of disclosures about mass surveillance, fibre optic cable-tapping and weakened internet encryption supplied by ongoing leaks from the NSA's Edward Snowden. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.