Feeds

NZ spooks acted unlawfully in Megaupload wiretap

Court informed of wrongdoing as PM orders inquiry

Secure remote control for conventional and virtual desktops

New Zealand authorities have informed the nation's High Court that individuals at the Government Communications Security Bureau (GCSB) “acted unlawfully while assisting the Police to locate certain individuals subject to arrest warrants” in the case of Kim Dotcom's Megaupload service.

New Zealand Prime Minister John Key issued a statement saying, in part, that “The Bureau had acquired communications in some instances without statutory authority.” That information is said to have led to the arrests of some involved in the case.

Key has also announced an inquiry into the GCSB's role. The statement says the inquiry will be conducted by New Zealand's Inspector-General of Intelligence and Security, Paul Neazor, whose role is spelled out here.

Key says that as the Megaupload case is before the High Court there is not much he can say, other than the canned quotes from the statement to the effect that:

“I expect our intelligence agencies to operate always within the law. Their operations depend on public trust.”

“I look forward to the Inspector-General’s inquiry getting to the heart of what took place and what can be done about it.”

Kim Dotcom responded quickly to the news, tweeting “The NZ equivalent of the CIA has spied on me UNLAWFULLY," and then adding that “I welcome the inquiry by @JohnKeyPM into unlawful acts by the GCSB. Please extend the inquiry to cover the entire Crown Law Mega case.”

He's also likened his life to a movie, saying :

I'm now a real life James Bond villain in a real life political copyright thriller scripted by Hollywood & the White House.

He's also tweeted that a new version of his service is imminent.

“Quick update on the new Mega,” he emitted over the weekend. “Code 90% done. Servers on the way. Lawyers, Partners & Investors ready. Be patient. It's coming.” ®

Beginner's guide to SSL certificates

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.