Feeds

GCHQ was called in to crack password in Watkins child abuse case

Not just battling terrorists, it hunts down online predators too

Using blade systems to cut costs and sharpen efficiencies

It was operatives at British intelligence agency GCHQ who cracked the password on the laptop of "determined paedophile" Ian Watkins, a court heard on Tuesday.

The evidence heard in court related to child abuse images held in cloud storage, whose password the GCHQ unit had to "crack" to gain access to them.

Ian Watkins, 36, from Pontypridd in Wales, pleaded guilty to 13 sexual offences, including two of attempting to rape a baby, at a hearing at Cardiff Crown Court. He denied a charge of rape.

He also pleaded guilty to three counts of sexual assault against children, seven involving possessing images of child abuse and one of possessing an extreme pornographic image involving a sex act on an animal.

Two women accused of facilitating the offences by Watkins, the former lead singer of alternative rock band Lostprophets, also made last-minute guilty pleas at the same hearing, after a jury had already been sworn in for a planned trial. Their pleas mean that a trial will not take place.

"You have been saved from having to watch extremely graphic and distressing material," the BBC reported Mr Justice Royce as telling the court.

The women cannot be named for legal reasons. The first woman, whom the court called "Woman A", admitted the attempted rape of a baby and two charges of sexual assault as well as taking and distributing an indecent photograph of a child. She denied a charge of rape.

The second, "Woman B", pleaded guilty to conspiring to rape a child, three sexual assault charges and four charges of taking, possessing or distributing indecent images.

He will be sentenced on 18 December.

The attempted rapes, which took place in a hotel room in London's Shepherds Bush in April 2012, were captured on video and uploaded to a cloud storage facility. Government security service GCHQ cracked the password to allow access to Watkins' files, according to court reports (Wales Online and The Guardian).

The National Technical Assistance Centre of ‪GCHQ‬ provides assistance to police in such cases, the privacy advocacy and government surveillance monitoring Spy Blog notes.

In a statement by South Wales Police, Detective Chief Inspector Peter Doyle, senior investigating officer, said two young children had already been removed from abuse as part of the ongoing investigation. He said investigators would continue to seek out other potential victims. The UK's specialist child protection police unit (CEOP), interpol and the US Department of Homeland Security have all contributed to the investigation, he added.

The investigation has been extremely complex and challenging with key information and evidence being identified from witnesses worldwide.

A significant amount of electronic data has been retrieved from computers and web based storage which has provided crucial evidence to support the case.

South Wales Police has worked in partnership with Interpol, other police forces, the National Crime Agency’s CEOP, local authorities in England and Wales, the Department of Homeland Security in the USA and the NSPCC.

Today’s outcome does not mark the end of our investigations and we will work tirelessly to identify any other victims or witnesses and seek the justice they deserve.

GCHQ's role in the investigation goes is not specifically noted in the police statement, although investigators from the agency, who were tasked with gaining access to Watkins' laptop, discovered that Watkins had "If***kids" set as his password.

GCHQ's assistance to the Child Exploitation & Online Protection Centre (CEOP) more generally was discussed by Sir Iain Lobban, director of the UK's eavesdropping nerve centre, during a high-profile public hearing before Parliament's Intelligence and Security Committee earlier this month.

During the hearing, Lobban acknowledged a previously unreported working relationship with CEOP and overseas partners in child abuse cases, as attested by an extract from the transcript. In the PDF, he explains that GCHQ's signals intelligence work extends beyond counter-terrorism.

It is not simply about terrorism; it is also about serious crime. I could mention some of the work we do with the Child Exploitation Online Protection Agency; in terms of working with them to uncover the identities and track down some of those who are involved in online sexual exploitation of children within the UK, including from overseas. There is a recent case where we managed to do that, where we used our intelligence capabilities to identify those and with the help of the foreign partner then to bring them to justice and two people are now in jail.

Google and Microsoft recently bowed to political pressure in the UK by agreeing to tweak their search engines to make it harder for perverts to find child abuse images online.

UK Prime Minister David Cameron told a recent meeting of ISPs at Downing Street that GCHQ would be brought in to fight child abuse images on the so-called "dark net". The prime minister also used the meeting as an opportunity talk up the "techniques, ability and brilliance of the people involved in the intelligence community, in GCHQ and the NSA in America".

The revelations about the spook agencies' work against crime – especially GCHQ's role in helping children under threat – comes at a time when the respective agencies sorely need a bit of good PR in the wake of disclosures about mass surveillance, fibre optic cable-tapping and weakened internet encryption supplied by ongoing leaks from the NSA's Edward Snowden. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.