Feeds

Servers seized by FBI returned - but who wanted what?

MPs push Blunkett for answers

  • alert
  • submit to reddit

High performance access to file storage

The Indymedia hardware seized in London last week were put back in place over the last 24 hours, but their return puts the UK Home Office even more on the spot. The original hard disks, apparently with the original data, have been returned, which suggests strongly that the authorities wanted sight of information that is on them.

Who these authorities are remains as open a question as what they wanted to see, but given the convoluted nature of the seizure process (the FBI apparently acting under a US-UK treaty on behalf of Switzerland and/or Italy to seize hardware in London), the British Home Office must surely have been presented with at least a flimsy pretext for its approval of the operation.

Further mystery is added by the circumstances of the return. Rackspace, the hosting company involved, alerted Indymedia to their return yesterday morning, saying: "I was just told that the court order is being complied with and your servers in London will be online at 5pm GMT." But what court order? And why is being complied with? The Orwellian nature of the powers likely to have been used in the case severely restrict Rackspace's ability to tell its customer, or anybody else, what's going on, and can also be used (on US request) to bind the Home Office to confidentiality. Not that any compulsion is usually necessary here.

Although the data on the drives appears intact, Indymedia is treating them as potentially compromised, and won't boot them or take the servers live until they've been verified. Depending on what was done to them when they were in the hands of, er, whoever, there may be some slight chance that the verification will throw up some clues. And if information was being sought as evidence in a pending court case, then information on how this evidence was obtained and by what process will also have to be produced. If the process turns out not to have been one that would be accepted by a court, then it will be likely that direct evidence-gathering was not the intent. Which would raise even more questions about the validity of the use of an MLAT, and the Home Office's involvement in it.

Richard Allan, Liberal Democrat MP for Sheffield Hallam, has tabled a Parliamentary question to the Home Office asking David Blunkett "what recent discussions he has had with US law enforcement agencies concerning the seizure of material from UK-based internet hosting providers; and if he will make a statement." This is to be dealt with tomorrow. MPs in the National Union of Journalists' Parliamentary Group are also tabling questions. ®

Related stories:

Home Office in frame over FBI's London server seizures
Feds seize Indymedia servers

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.