Feeds

NetApp faces probe into Syrian spooks' use of its storage kit

FAS racks 'used to slurp email' despite export ban

Application security programs and practises

NetApp faces a grilling by US senators after its storage gear helped Syrian spooks to spy on anti-government protesters during a crackdown that resulted in more than 3,500 deaths.

Contrary to US sanctions, Italian surveillance biz Area used a load of NetApp's FAS storage kit to slurp emails sent by Syrian demonstrators, according to Bloomberg. NetApp says it had no idea its products had been deployed to aid the regime and will help investigators.

In Area's Asfador system, emails are detected by Qosmos probes scanning Syrian communications networks, transmitted to Area facilities by software built by Ultimaco (controlled by Sophos) and stored on NetApp arrays.

Area has set up a data centre in a Syrian Telecom exchange building in the Mouhajireen area of Damascus using this equipment exported from Italy, according to Bloomberg, and is testing it out. There are 30 racks of IT gear, with 4PB of NetApp storage, including a "NetApp Storage Cluster B", implying there is an "A" cluster as well.

On Thursday, senators called for NetApp and other companies involved in this affair to be investigated.

Apparently NetApp's Italian operation sold the kit to an intermediate company which then resold it to Area, thus subverting controls NetApp has on the export of its kit to countries such as Syria. The US banned most American exports to the Middle East nation since 2004.

NetApp's senior corporate communications director, Jodi Baumann, said: "NetApp does not condone the location or use of its products in Syria. We are engaged in a vigorous effort to determine what the true facts are. We have also notified the US government about the Bloomberg article and offered our full assistance.”

Area CEO Andrea Formenti said his firm complies with export laws but may pull out of the project anyway, and said Area has never dealt directly with Syrian's intelligence agencies. Ultimaco was also oblivious to the Syrian setup and said it relied on Area to deploy its products in accordance with the law. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.