Feeds

Indymedia seizures: a trawl for Genoa G8 trial cover-up?

Injunction sought to prevent export of journalists' data

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Updated Indymedia and other interested parties are to seek an injunction preventing the export of the contents of the servers that were seized last week. This content is thought to have included correspondence with lawyers involved in the case against Genoa police accused of grievous bodily harm, falsifying evidence, slander and abuse of police powers, during and subsequent to the 2001 G8 summit.

The servers housed data belonging to a number of Indymedia journalists, including Mark Covell, who was beaten close to death by Genoa police, and is now involved in actions against them. One demonstrator was shot dead by police. Covell told The Register that email to his lawyers in Italy is likely to have been on the servers, and that a number of separate challenges to the seizures were pending. The injunction is likely to be sought by human rights solicitor Gareth Peirce within the next 24 hours.

The seizures are understood to have been carried out on behalf of the Swiss and Italian governments, with some involvement on the part of the FBI. Swiss authorities have reportedly said the data could help its investigation of Indymedia's coverage of the 2003 G8 in Evian (which is of itself an interesting choice of investigation subject), and the most obvious Italian connection is Genoa G8. Here, however, the Italian government's most likely interest is not in pursuing G8 'information terrorists' (charges of this sort were thrown out some time ago), but in the defence of the Genoa police now in the dock.

But earlier today Indymedia Italy said it had confirmation that the seizure order originated with Judge Marina Plazzi in Bologna. Plazzi is in charge of investigations concerning the FAI (Informal Anarchist Federation) and bomb threats made to EU Commission president Romano Prodi, and the order was made regarding alleged posts published on Indymedia Italy in connection with these.

But, says Indymedia, there are two problems with this. Indymedia insists that FAI does not use its networks, and points out that Italian law could have been used to further the enquiry in the first instance. Indymedia would have been likely to cooperate over the alleged posts, but has had no direct approach from the Italian authorities concerning the matter, who appear to have chosen to seize entire servers in order to acquire small pieces of 'evidence' that quite possibly don't even exist.

The UK Home Office's approval and support was required for the raid, but these would have had to have been granted on the basis that it was a legitimate request for assistance in obtaining evidence, not a fishing expedition intended to provide support for a cover-up. If however the data is transferred to Italy it seems likely that the case against the Italian state over Genoa will have been seriously compromised.

Although it was at first thought that the seizures had been carried out under a US-UK Mutual Legal Assistance Treaty (MLAT), it now seems possible that the framework used was a European version to which the UK, Italy and Switzerland are signatories. The FBI's involvement therefore remains unclear, although it may have been approached initially because the hosting company, Rackspace, is US. MLATs, whose operation is cloaked by secrecy and gagging orders, are intended to provide a mechanism for signatories' security forces to obtain evidence and to make arrests internationally, and they are disturbingly dependent on the bona fides of the requesting party and the judgment of the requested one.

In this case, the latter is the Home Office, which is coming under pressure to explain itself. Richard Allan, Liberal Democrat MP for Sheffield Hallam, has tabled a written question for David Blunkett for answer tomorrow (Friday). ®

Related Links

Seized servers returned, but who wanted what?
Home Office in frame over FBI's London server seizures
Feds seize Indymedia servers

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.