Feeds

Spain grovels to penguins over 'Linux' anti-terror plot

Violent separatist IT genius crackdown in codename kerfuffle

Intelligent flash storage arrays

The Spanish Ministry of the Interior has expressed its regret that an international crackdown on IT masterminds inside the violent Basque separatist group ETA was dubbed "Operation Linux".

Apparently, penguin-loving outfits are complaining that the antiterrorist operation sullies their good name.

"The Ministry of Home Affairs regrets the coincidence [involving] the trade name of some companies and other organizations and the damage it may cause," the Ministry statement reads, according to Google Translate.

"The Home Office is grateful for the free development of technology based on the Linux operating system, driven by users, organizations, and businesses, and [it believes Linux] is an extremely useful tool for research by the ... State Security Forces to ensure the safety of citizens."

In fact, the State Security Forces are currently running Linux. That's why they, um, called it Operation Linux.

On Tuesday, Operation Linux – which teamed the Guardia Civil with French anti-terrorism services – led to the arrest of Iraitz Gesalaga Fernández, believed to be ETA's encryption expert. Fernández, 27, was arrested in the southern French town of Ciboure, according to a separate statement from the Spanish government, and his righthand woman, Itxaso Uritiaga Valderrama, 21, was cuffed in the Basque city of Zarautz.

According to police investigations, Fernández was responsible for the ETA's latest efforts to encrypt its communications, and the arrests were hailed as an "important blow" to the separatist group.

Operation Linux is ongoing, and it may yield more arrests. And it would appear the authorities have no intention of changing the codename – which must make some people very unhappy.

Others may find it odd that penguin lovers have complained that a crackdown on Basque separatist IT geniuses uses the Linux name. But the news is hardly surprising. Penguin lovers have been known to complain about things that are ultimately of no consequence whatsoever. ®

Internet Security Threat Report 2014

More from The Register

next story
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.