Feeds

Burmese cops in UN hard drive snatch kerfuffle

UN: It never happened. And we don't know any monks either

Maximizing your infrastructure through virtualization

Reports suggest that the Burmese military government has attempted to seize computer hard drives from UN offices in an attempt to root out pro-democracy activists.

According to the Times, Burmese police and diplomats entered UN agency premises at the Traders Hotel in Rangoon on Friday and demanded the hard drives from computers there. Officials made similar approaches to the Japan International Cooperation Agency - a Japanese government aid organisation - at the Sakura Tower.

The demands were rebuffed, and the local authorities departed. However, UN staffers in Rangoon were sufficiently worried about a return in force that they spent much of the weekend deleting files.

It is thought the Burmese government suspects foreign diplomats and aid workers of providing communications to the outside world for local dissidents. The government has made strenuous efforts in recent weeks to prevent any news leaking out about pro-democracy protests and the resulting crackdown, even going so far as to cut off the country's main internet links 12 days ago.

However, various foreign organisations in Burma have access to satellite communications which are not under government control, and it is understood that the military oligarchy suspects these have occasionally been placed at the protesters' disposal.

The Times quotes an unidentified Western diplomat in Rangoon: "It's part of this systematic, repressive response to the demonstrations.

"We've seen them focus on people who directly participated in the demonstrations by picking them up through the videos. Then they've arrested people with cameras containing images of the demos. And now they're trying to track down the means that were used to send them out."

When refusing the officials' demands, UN staffers suggested that an official request for information be submitted by the Burmese government. It appears that such a request has now been made, but it asks only to see the licences for the UN's satellite equipment.

It now appears to be the official diplomatic position that no demand was ever made for UN hard drives, only for details of satcomms gear. Similarly, no UN staff have provided communications to Burmese dissenters.

"All they asked was to see the permits for the [satellite telephones]," the UN's Burma co-ordinator told the Times, though this was apparently at odds with what other UN personnel had said.

"We told them that we will provide them through the appropriate channels."

More from the Times here. ®

Application security programs and practises

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.