Feeds

'Symbolic' Grauniad drive-smash was not just a storage fail

The whole thing was embarrassing, says Reg man Chris Mellor

Application security programs and practises

Blocks and Files The word "cabinet" can mean a piece of furniture in which you store something and the digital version of this is a disk drive or flash drive. Having said that, the idea that by destroying the drive you destroy the data is so far from reality in today's data centres that anyone professing it is profoundly idiotic.

Which brings us to the Guardian newspaper and the UK's Cabinet Secretary, Sir Jeremy Heywood. It's reported by the BBC that Prime Minister David Cameron ordered Hayward to contact the paper over its reporting of information leaked by US whistleblower Edward Snowden.

He did so and its editor Alan Rusbridger says the newspaper had to physically destroy computer hard drives as a result. The Graun reports:

On Saturday 20 July, in a deserted basement of the Guardian's King's Cross offices, a senior editor and a Guardian computer expert, David Blishen, used angle grinders and other tools to pulverise the hard drives and memory chips on which the encrypted files had been stored.

As they worked they were watched by technicians from Government Communications Headquarters (GCHQ) who took notes and photographs, but who left empty-handed.

The idea that the data on the hard drives hadn't been copied to backup systems in the offices or the cloud is so far beyond belief as to be risible. The GCHQ technicians must have been laughing up their sleeves, and the Guardian's computer expert chortling away up his. Both knew data copies existed, as the Guardian reports make clear:

The editor of the Guardian, Alan Rusbridger, had earlier informed government officials that other copies of the files existed outside the country and that the Guardian was neither the sole recipient nor steward of the files leaked by Snowden, a former National Security Agency (NSA) contractor. But the government insisted that the material be either destroyed or surrendered.

The destruction is described as a symbolic act, but all it symbolised was ignorance and face-saving. It was petty and stupid, the action of an ignorant and frightened bully, and that is how the UK government's behaviour in this affair seems: petty, ignorant and bullying. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.