Feeds

Cops raid Gizmodo editor in pursuit of iPhone 4G 'felony'

Search warrant invalid, counters Gawker

Eight steps to building an HP BladeSystem

Gizmodo editor Jason Chen has been raided by Silicon Valley's computer crime force in hot pursuit of the case of the missing iPhone prototype. According to a bulletin published by Gizmodo today, they broke down the front door to gain entry, and departed some hours later with a truck containing Chen's computer equipment.

The inventory of the relocated kit is published alongside the Gizmodo story, and is possibly slightly smaller than one might have expected, although it's entirely unclear to us why they might have felt the need for a whole box of business cards belonging to "suspect chen".

The search - which was conducted partially in Chen's absence - was carried out under a warrant issued by the Superior Court of San Mateo. Chen disputed its validity when he arrived on the scene, and furnished the officers with a statement from Gaby Darbyshire, COO and chief legal officer of Gizmodo parent Gawker, claiming that both state and federal law state that a search warrant may not validly be issued to confiscate the property of a journalist.

Darbyshire quotes section 1524(g) of the CA Penal Code and section 1070 of the CA Evidence Code. The Penal Code states: "No warrant shall issue for any item or items described in Section 1070 of the Evidence Code", while the Evidence Code section quoted covers the protection of journalists and publishers from having to disclose information on sources, and unpublished information, including "all notes, outtakes, photographs, tapes or other data".

Darbyshire says it's "abundantly clear" that the search warrant was invalid, that a subpoena should have been issued instead, and that Chen should get all his gear back pronto.

And perhaps he should. The warrant however, invalid or not, gives a clear indication of the way the cops' minds are drifting. The warrant claims that there is probable cause that the seized property was lawfully seizable under Section 1524 in that "it was used as the means of committing a felony [and] it tends to show that a felony has been committed or that a particular person has committed a felony".

So they seem to think there's a felony case against Jason Chen: pays finder $5,000 for a lost iPhone prototype, knows who owner of lost iPhone prototype is, doesn't give it back to him or police, runs screamer exclusive instead? Hmm, wonder what gave them that idea? ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.