Feeds

A year on the run: El Reg tracks 2012’s techno-fugitives

Svartholm, Dotcom, McAfee, Assange … Whitman and Ballmer?

Beginner's guide to SSL certificates

Kim Dotcom

As 2012 opened, Dotcom was just a flamboyant cloud storage operator with a business model Hollywood found very interesting indeed.

Then, on 19 January, police kicked in Dotcom's door and hauled him off to chokey on charges of piracy. A video of the raid later emerged.

The case has been rather less visceral since, despite Dotcom's attempts to stir controversy at every point. He's had some wins, notably the New Zealand government's admission that the raid should never have been allowed as Dotcom was a resident of the nation at the time. That status made spying on Dotcom a no-no, but Kiwi spooks forgot to ask about his immigration status. Dotcom's now suing all sorts of people.

The meat of the case against Dotcom - which alleged that megaupload was a haven for pirates - is also in trouble after revelations that the FBI had asked the website to hang onto some pirated files to assist it with other investigations. Megaupload did so, but it turns out some of the files in question were then cited by the FBI as pirated material the outfit was hosting.

A poster for Kim Dotcom's Christmas Panto

Kim Dotcom has also found time to appear in a Christmas panto, for which this is a poster

Dotcom will face extradition proceedings in March 2013, months after he launches the new mega.co.nz service he's already started talking up.

John McAfee

Which brings us to the late-breaking story of John McAfee, the billionaire founder of the Intel-absorbed security software outfit bearing his surname.

McAfee had dropped out of sight in balmy Belize until, around 12 November, a neighbour died in mysterious circumstances. McAfee was wanted for questioning by local authorities but said the Belizean authorities were out to get him for unspecified reasons.

McAfee fled, pausing only to blog about how much of a hassle it was to flee.

In a move celebrated by journalists everywhere, McAfee then fibbed in his blog, saying he had been arrested on the Belize/Mexico border but actually managed to find his way to Guatemala - whereupon he apologised for the success of his misdirection.

He was actually in Guatemala, where he was locked up, hospitalised for a suspected heart attack and eventually deported in a cruel and unusual manner: an economy class flight on American Airlines.

That flight touched down in Miami, where McAfee was able to breathe the sweet air of freedom... and start spending shedloads of cash on lawyers to prevent Belize from dragging him back.

2013 will see the Assange and Dotcom sagas continue and it is to be hoped that other tech headliners go on the run to make headlines of their own. We quite like the idea of Larry Ellison taking to one of his yachts to avoid pursuit, or Huawei execs "disappearing" before US authorities ask more questions about their kit. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.