Feeds

Dotcom crypto keys not for the FBI: NZ High Court

Feds can't access data they shouldn't hold

Reducing the cost and complexity of web vulnerability management

A New Zealand court has ruled that data on Kim Dotcom's hard drives held by the FBI will remain encrypted, even if the Megaupload founder hands his encryption keys over to NZ police.

Dotcom has been in a long wrangle with authorities over the contents of the drives. During the 2012 raid in New Zealand that killed off Megaupload, the FBI and New Zealand police seized the drives, with copies handed over to the Feds.

Ever since then, Dotcom's legal team has been trying to get access to the drives, which they say are necessary to his defence. That's led to a to-and-fro argument over the encryption keys, as TorrentFreak outlines here.

On the one side, Dotcom had agreed to hand the keys over if they were only used by New Zealand Police, while on the prosecution side, the cops wanted to share the keys with the FBI.

Now, Radio New Zealand reports High Court justice Helen Winkelmann says the keys won't go to the FBI, because the copies should not have been given to it in the first place.

However, Dotcom said in a Tweet he believes the FBI has already accessed the drives.

In mid-June, Dotcom had a loss in a separate High Court case before the same judge. After a New Zealand Herald journalist published a book, The Secret Life of Kim Dotcom: Spies, Lies and the War for the Internet about the case which the newspaper states “makes extensive references to interviews with Dotcom about the raids in January 2012”.

New Zealand police and the country's Government Communications Security Bureau sought access to Fisher's source material, something that Dotcom was resisting on the basis that NZ privacy laws protected information gathered in the newsmaking process.

Justice Winkelmann said the book didn't count as news reporting, saying “the writing and publication of a book cannot, at least in this instance, be construed as news activity”.

The ruling has resulted in calls for the government to amend the Privacy Act to protect journalism in New Zealand. ®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.