<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
   <channel>
      <title>Making Light :: Nice datacenter you have there :: comments</title>
      <link>https://nielsenhayden.com/makinglight/archives/013086.html#comments </link>
      <description>Language, fraud, folly, truth, history, and knitting. Et cetera.</description>
      <language>en</language>
      <lastBuildDate>Fri, 24 Jun 2011 06:52:19 -0500</lastBuildDate>
      <generator>http://www.sixapart.com/movabletype/?v=4.34-en</generator>
      
      <item>
      <title>Nice datacenter you have there</title>
      <description>So. After a raid in which they seized equipment from DigitalOne, a Swiss-based hosting company with equipment in Reston, Virginia,...</description>
      <content:encoded>So. After a raid in which they seized equipment from DigitalOne, a Swiss-based hosting company with equipment in Reston, Virginia,...</content:encoded>
      <link>https://nielsenhayden.com/makinglight/archives/013086.html</link>
      </item>

      
      <item>
         <title>Nice datacenter you have there -- comment #1 from Teresa Nielsen Hayden</title>
         <description>comment from Teresa Nielsen Hayden on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>When I saw that story, my first thought was that it was clumsy procedure on the FBI's part. Thank you for pointing out the other implications.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  6:52 AM by Teresa Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560280</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560280</guid>
         <pubDate>Fri, 24 Jun 2011 06:52:19 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #2 from David Harmon</title>
         <description>comment from David Harmon on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>The thing is, that implication -- both shutdown and copying -- has been around as long as computer seizures were needed to take evidence.  Even before that, a full LEO investigation was known to be potentially disabling or deadly to a company, especially a records-heavy one.</p>

<p>And the flip side of the broad is a legitimate law-enforcement interest:  Unless they know <i>for sure</i> that the provider isn't in bed with the crooks, they can't afford to let said provider tell them which servers they "get to" take off the racks.  </p>

<p>Yes, this is an unusual position for me to take, but I'm very much in favor of shutting down spammers with extreme prejudice.</p>

<p>As for Washington <i>vs.</i> Amazon, there are far worse things Amazon could have been threatened with. Say, new rules imposing various liabilities on them, or a tax investigation....</p>]]>
	 &lt;p&gt;Posted June 24, 2011  7:21 AM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560281</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560281</guid>
         <pubDate>Fri, 24 Jun 2011 07:21:04 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #3 from Handslive</title>
         <description>comment from Handslive on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>This notion of walking in and seizing a single customer's server is not entirely reasonable if your server is hosted with a large provider, and it gets less reasonable if you're hosted by a cloud service similar to Amazon's.</p>

<p>The data associated with your server may not be on a single disk or even directly attached to the hardware that runs the operating system and applications for one thing.  If the provider is making use of a SAN (Storage Array Network), your data might be scattered across many disks used by hundreds of other customers.  If the server itself is a virtual machine, then your server may be running on a single physical blade server mounted in a blade chassis with several other blade servers.  You may be one of 10 or 20 other customers running on the same hardware, completely isolated from each other.</p>

<p>The hosting company might offer to halt the virtual machine that's of interest and make a copy of its image, but will the officer in front of them know what that means in terms of forensics?  Will it match what the wording of the warrant has told him they're obligated to provide?  His forensics specialists will probably be concerned that they can't look at deleted files that are potentially still on the physical disk somewhere.  Does the hosting company have its own forensic specialists who can work with the officer to extract something useful without shutting down a couple of racks of servers and storage?</p>

<p>Damn straight, Amazon was worried.  And short of paying for your own stand-alone hardware, something that is going to get less attractive to the hosting companies as time goes on, where do you think you can go that your business won't be part of the collateral damage?  Concentrated, shared storage and hardware makes sense to the hosting company because it's a more efficient use of power, space, cooling, and manpower to operate.  All of those things are at a premium now.</p>

<p>I don't imagine that the situation was simple here, nor is it likely to get simpler.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  9:26 AM by Handslive&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560296</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560296</guid>
         <pubDate>Fri, 24 Jun 2011 09:26:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #4 from abi</title>
         <description>comment from abi on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>Handslive @3:</strong></p>

<p>Either the reporting is hopelessly muddling the story, or virtualization and cloud-type services are not involved in this situation.  I note, for what it's worth, that the FBI took some, but not all, of DigitalOne's racks.  That makes me think that we're still talking physical machines allocated to specific customers, and the overreach was in taking whole racks rather than individual boxes.</p>

<p>But as you point out, the infrastructure is shifting to something that doesn't just fit the mental models badly, but <em>doesn't fit them at all</em>.  It will soon become like trying to get a warrant for the physical handset on which a telephone conversation took place, rather than the content of the conversation.</p>

<p>I don't think that will change the ways in which these kinds of intrusive and clumsy searches impact businesses.  And, although I don't know that the FBI <em>intended</em> to punish DigitalOne for having what they consider to be dodgy customers, I doubt they're crying into their beers about that side-effect of the whole affair.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 10:21 AM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560298</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560298</guid>
         <pubDate>Fri, 24 Jun 2011 10:21:14 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #5 from abi</title>
         <description>comment from abi on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>David Harmon @2:</strong></p>

<p><em>And the flip side of the broad is a legitimate law-enforcement interest: Unless they know for sure that the provider isn't in bed with the crooks, they can't afford to let said provider tell them which servers they "get to" take off the racks.</em></p>

<p>It's perfectly possible to get your own sysadmin in to look at the records and untangle which ones are which, either from the logs, billing, and usage records or working alongside the providor's staff.  I've been an external auditor.  I know how to make that thing work.</p>

<p><em>Yes, this is an unusual position for me to take, but I'm very much in favor of shutting down spammers with extreme prejudice.</em></p>

<p>There's always a crime bad enough to make us willing to elide a few rules and accept a little collateral damage when we fight it.</p>

<p>It's never, in my opinion, a good idea.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 10:24 AM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560299</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560299</guid>
         <pubDate>Fri, 24 Jun 2011 10:24:32 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #6 from Bruce Baugh</title>
         <description>comment from Bruce Baugh on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>David and Handslive: I think the situation is quite simple if you look at the situation of Instapaper and all the other people who aren't under investigation. The American constitution does say quite clearly that they shouldn't suffer this kind of loss. Period. If that means that the government will find it impractical to do some kinds of searches...that's tough. The whole point of rights...okay, not the whole point, but a big point, is that they make some things the government would like to do impractical. They are a limit on the exercise of power.</p>

<p>It is one of the first responsibilities of government to go about its business with an eye on the rights both of the accused and of everyone else who isn't accused. If they can't do that, then they shouldn't get to execute their warrants.<br />
</p>]]>
	 &lt;p&gt;Posted June 24, 2011 10:27 AM by Bruce Baugh&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560300</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560300</guid>
         <pubDate>Fri, 24 Jun 2011 10:27:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #7 from Martin Haywood</title>
         <description>comment from Martin Haywood on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>It's surely possible, given the certainty of collateral damage if they simply remove servers, for the FBI to copy the data and take away the copy. It would seem likely that this would give them more time to look into the matter without tipping off their interest to the people under investigation.</p>

<p>So why didn't they take an image of all the drives that were relevant? Because they're stuck in the G-Men mythos of the 1950s. Charge in waving a warrant and strike fear into the hearts of bad guys and commies everywhere. Nowdays that's just stupidly clumsy.</p>

<p>Like using drone missiles to kill militants in the Waziristan and hitting the wedding party. Or "kettling" hundreds of peaceful protestors to arrest the idiot kid with the brick.</p>

<p>*sigh*</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:01 AM by Martin Haywood&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560304</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560304</guid>
         <pubDate>Fri, 24 Jun 2011 11:01:11 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #8 from xeger</title>
         <description>comment from xeger on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Having just looked at what DigitalOne provides, the whole seizure suddenly makes a whole lot more sense.</p>

<p>They use <a href="http://h18004.www1.hp.com/products/blades/components/enclosures/c-class/index.html" rel="nofollow">HP BladeServers</a>, which means that there's <a href="http://1userverrack.net/wp-content/uploads/2011/04/hp-blade-server.jpg" rel="nofollow">a single chassis containing multiple blades, each of which is seen as a single server (or several virtual servers).</a></p>

<p>As such, I can absolutely understand the FBI having seized servers rented by more than one customer -- hard not to, when you're talking about more than a dozen "servers" in a single chassis.</p>

<p>I'll absolutely agree that it sucks for the (innocent) companies affected -- and also suggests that the FBI need to update their seizure practices to take things like blades (and virtual machines) into account -- but seizing something like a complete blade enclosure is a different case from randomly grabbing an assortment of physically separate servers in different chassis from a rack.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:10 AM by xeger&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560307</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560307</guid>
         <pubDate>Fri, 24 Jun 2011 11:10:12 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #9 from David Harmon</title>
         <description>comment from David Harmon on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Abi #5:  Just <i>having an armed police force</i> produces "a little collateral damage"!  Others have discussed the technical issues; I'll just note that absolute moral positions can be dangerous.  It's one thing to <i>do your best</i> to minimize harm and inconvenience to bystanders.  But refusing to accept <i>any possible</i> harm to bystanders... that's a problem, because it's not in touch with reality.  Offhand, anyone with a <i>potential</i> hostage in reach gets a fee pass, likewise any gangster operating behind a legitimate business... or any cyber-criminal running off someone else's servers.</p>

<p>Law enforcement is a tradeoff, and just as we slam them when they <i>don't</i> do their jobs, or do them incompetently, we should praise them when they <i>do</i> do their jobs, in this case taking down a particularly noxious and hard-to-catch sort of cybercriminal.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:14 AM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560309</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560309</guid>
         <pubDate>Fri, 24 Jun 2011 11:14:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #10 from Handslive</title>
         <description>comment from Handslive on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>@abi<br />
Even if virtualization isn't involved here, my point is that finding a provider with all the features Instapaper might want is going to be difficult. And that's not going to get better for other customers concerned about this kind if impact.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:23 AM by Handslive&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560310</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560310</guid>
         <pubDate>Fri, 24 Jun 2011 11:23:14 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #11 from TrashedMyCookies</title>
         <description>comment from TrashedMyCookies on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>@David: I have a problem with the attitude that rights for which my forefathers put their lives and fortunes on the line are out of touch with reality.  It's reality that needs to change here, not the right to be secure in one's effects against unreasonable search and seizure.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:24 AM by TrashedMyCookies&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560313</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560313</guid>
         <pubDate>Fri, 24 Jun 2011 11:24:22 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #12 from abi</title>
         <description>comment from abi on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>David Harmon @9:</strong><br />
<em>Just having an armed police force produces "a little collateral damage"!</em></p>

<p>Many of my British friends would agree with that statement.</p>

<p><em>Others have discussed the technical issues; I'll just note that absolute moral positions can be dangerous. It's one thing to do your best to minimize harm and inconvenience to bystanders. But refusing to accept any possible harm to bystanders... </em></p>

<p>Absolute moral positions <em>can</em> be dangerous.  "Innocent until proven guilty in a court of law" is insanely dangerous.  And yet entire societies base their legal systems on it.</p>

<p>But exceptions and mitigations that depend on whether you happen to particularly dislike the crime under discussion are even more dangerous.  Because there's someone who will use that exception for some other misdeed, one that <em>you</em> don't take seriously, but <em>they</em> do.</p>

<p>Tell me.  How much collateral damage would you say is acceptable when fighting spammers?  Is it calculated as a proportion of the financial harm inflicted by said spammers, or do we go by percentage of annual income that the companies in question will lose?</p>

<p>Or is there no limit?  Can the FBI do the equivalent of "kill all; God will know His own" and take everything from a company hosting a suspected spammer?</p>

<p>And why should these innocent businesses pay that kind of cost, rather than insisting that the FBI use more efficient policing methods?</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:32 AM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560316</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560316</guid>
         <pubDate>Fri, 24 Jun 2011 11:32:57 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #13 from Douglas Henke</title>
         <description>comment from Douglas Henke on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>One response (which I'm surprised not to have seen mentioned in any of the 12 comments visible to me as I write this) is to avoid hosting in the US. On the Internet, the distance from New York to Brussels is 150ms.</p>

<p>There are still places which at least pay lip service to the notion of "rule of law", and where said law includes some passing nod to the idea of data protection as a thing which applies to individual human beings.</p>

<p>(Yeah, I know: So why does the URL in my post point to Hostmonster? I'm starting to think that's a really good question...)</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:35 AM by Douglas Henke&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560317</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560317</guid>
         <pubDate>Fri, 24 Jun 2011 11:35:07 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #14 from john</title>
         <description>comment from john on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Bruce Baugh #6 The US constitution says "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."</p>

<p>Nothing there says the "person or things" must be a suspected criminal or the property of a suspected criminal. Probable cause will cover all the places evidence of a specific crime might be, including plenty of places which - upon inspection - will turn out to be unrelated. I think this seizure is quite closely analogous to searching two or three or five separate back yards for a single crime weapon, which is clearly reasonable. (Householders are deprived of the use of their property for the time the search is going on, after all.)</p>

<p>For computer crime where remote access and remote wipe are possible, first you get physical custody of the server or servers (as laid out in the warrant and justified in court) and shut them down, then you take any data image, then you do the forensic audit on the static image. You can't either take an image or perform forensics on a running system because a) it changes the state of the system, destroying checksums and evidential value, and b) the software on the server may have a nonobvious data-destruction payload lurking somewhere.</p>

<p>Keeping material definitely known to be unrelated to the crime is, of course, unreasonable and illegal. Fortunately it doesn't seem to be happening.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:38 AM by john&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560318</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560318</guid>
         <pubDate>Fri, 24 Jun 2011 11:38:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #15 from abi</title>
         <description>comment from abi on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>Douglas Henke @13:</strong></p>

<p>I did point out in the original article that the FBI explicitly emphasized the international reach of its powers.  As Jones said,</p>

<blockquote>Their efforts demonstrate that no matter the country, Internet criminals will be pursued, caught and prosecuted.</blockquote>

<p>This is not to say that the FBI's claimed reach is its real reach.  Different legal systems may well offer better protections.  International hosting is certainly a good idea.  Perhaps one day there will be "offshore" hosting the way there's "offshore" banking.  Were I a small country with good infrastructure and a reasonably small latency to the US, I'd certainly consider whether it might be a new national industry.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:52 AM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560320</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560320</guid>
         <pubDate>Fri, 24 Jun 2011 11:52:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #16 from Columbina</title>
         <description>comment from Columbina on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>The Pinboard guy is planning to dump DigitalOne as well, judging from his Twitter feed since the event, and made a remark at one point in the process (which he may have backed away from since then): "Thinking very seriously about moving servers to the EU after I get everything set back up."</p>]]>
	 &lt;p&gt;Posted June 24, 2011 11:58 AM by Columbina&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560322</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560322</guid>
         <pubDate>Fri, 24 Jun 2011 11:58:37 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #17 from eric</title>
         <description>comment from eric on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>John @ 14: <blockquote>first you get physical custody of the server or servers (as laid out in the warrant and justified in court) and shut them down</blockquote></p>

<p>With the rise of on disk encryption, that's actually changing. There's equipment now that can piggyback on a power cord long enough to get it plugged into a portable UPS, and 'wigglers' that will keep the system thinking that there's someone actively working at it. All to keep the machine from going to sleep/shutting down and removing the encryption keys from memory. </p>

<p>Also, the Pinboard guy, Maciej Cegłowski, is a great writer, well worth reading. <a href="http://www.idlewords.com/2006/04/argentina_on_two_steaks_a_day.htm" rel="nofollow">Argentina on two steaks a day</a> is a good place to start. </p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:12 PM by eric&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560327</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560327</guid>
         <pubDate>Fri, 24 Jun 2011 12:12:09 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #18 from David Harmon</title>
         <description>comment from David Harmon on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>abi #12:  <br />
<i>"Innocent until proven guilty in a court of law" is insanely dangerous. And yet entire societies base their legal systems on it.</i></p>

<p>If you're talking about the USA courts, you're forgetting that only applies to the <i>criminal</i> justice system, for good reason, and specifically does not apply to the serving of warrants.  Also, you're strawmanning up here.</p>

<p>Which ends up with you responding to my "It's one thing to do your best to minimize harm and inconvenience to bystanders", by inflating to "Or is there no limit?".  Abi, that's uncalled for and beneath you.  </p>

<p>If you consider posts Handslive #3, xeger #8, and john #14, you can see that there <i>is</i> no "surgical strike" option for this sort of case.  </p>

<p>In such a context, to forbid any collateral damage whatsoever, means that cyberscammers, megaspammers, and other criminals operate with impunity, <i>forever</i> -- because they may be violating the laws of a dozen nations, but they'll have carefully arranged things so there's no way to touch them without affecting someone else.</p>

<p>If you declare "better that than than touch a single innocent customer", then you're just making the perfect the enemy of the good, and I can't argue with you.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:15 PM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560328</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560328</guid>
         <pubDate>Fri, 24 Jun 2011 12:15:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #19 from Serge</title>
         <description>comment from Serge on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Well, that thread sure didn't take long to get where I thought it would.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:21 PM by Serge&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560330</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560330</guid>
         <pubDate>Fri, 24 Jun 2011 12:21:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #20 from Serge</title>
         <description>comment from Serge on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><b>Abi</b> @ 15... <i>Were I a small country with good infrastructure and a reasonably small latency to the US, I'd certainly consider whether it might be a new national industry.</i></p>

<p>...at which point Prince Edward's Island secedes from Canada. <br />
Coming soon on the Skiffy Channel... "Ann of Green Servers"!!!</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:23 PM by Serge&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560332</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560332</guid>
         <pubDate>Fri, 24 Jun 2011 12:23:22 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #21 from abi</title>
         <description>comment from abi on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>OK, so given the technical situation, do the economic reasons that the FBI raid (and the possibility of others like it) has a chilling effect on freedom of speech matter less?</p>

<p>I still see "share a hosting provider with someone the FBI gets a search warrant for" being a road to to financial loss for an innocent business.  Assuming <em>arguendo</em> that there is no way that the FBI could mitigate that effect with better technical solutions, is this just something businesses have to suck up?  And, if they do, must we simply live with the damage that that will do to freedom of speech?</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:25 PM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560333</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560333</guid>
         <pubDate>Fri, 24 Jun 2011 12:25:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #22 from abi</title>
         <description>comment from abi on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>David @18:</strong></p>

<p>I used "innocent until proven guilty" as an example of an absolute that is (a) pretty damn crazy, and (b) utterly necessary.  It was a response to your assertion that moral absolutes can be dangerous, and your strong implication that they should not therefore be the basis of our beliefs or actions.  The fact that it does not apply to the serving of warrants makes it no less dangerous and no less important.</p>

<p>My reaction to you is substantially based on the way that your comment at 3 carves out an exception for spammers, whom you're for "shutting down" with "extreme prejudice", as though that crime is somehow special.  I have often seen that line of argument used to support the elision of rights and freedoms that we, as a society, value.  I've never been comfortable with it.</p>

<p><em>If you declare "better that than than touch a single innocent customer", then you're just making the perfect the enemy of the good, and I can't argue with you.</em></p>

<p>Well, I am a "though the heavens fall, let justice be done" kind of person, yes.  Perhaps that means you can't argue with me.</p>

<p>But it's worth understanding the mental model under which the law, as I understand it, operates.  Picture a boat in a canal, with ropes to the towpaths on the left and the right.  If the people on one side pull firmly and continuously, without opposition, the boat doesn't go forward.  It hits the side of the canal.  To go forward, it needs both sides to be pulling, in essential opposition to one another.</p>

<p>It is the job of law enforcement to go after crime, vigorously and energetically.  But it is also the job of the citizen body to set the limits of their actions and enforce them with a matching vigor and energy.  Because no one else is going to stick up for our rights if we don't.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:40 PM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560337</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560337</guid>
         <pubDate>Fri, 24 Jun 2011 12:40:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #23 from Kelley Wegeng</title>
         <description>comment from Kelley Wegeng on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>I hope some really brave hosting company decides to adopt a "bring it" policy wherein they pull a Cryptonomicon in the event of such. Or rather, I don't, but that's the only way I can imagine our freedoms remaining protected.</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:43 PM by Kelley Wegeng&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560338</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560338</guid>
         <pubDate>Fri, 24 Jun 2011 12:43:04 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #24 from Seth Breidbart</title>
         <description>comment from Seth Breidbart on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>David Harmon (#2), I agree with shutting down spammers with extreme prejudice.  I just don't see how seizing a handful of machines will do that.  Seizing the spammers and making them secure[0] is what's needed.</p>

<p>john (#14): If the search warrant didn't specify that the FBI could seize whatever it wanted no matter who owned or was using it (or at least any rack containing anything that might be related to the criminals), then the FBI violated the Constitution (and the agents involved committed felonies).</p>

<p>eric (#17): It isn't that difficult to ensure that a system steps on its in-memory encryption keys if it's seized.  Physical intrusion detection hardware (including motion sensor and GPS), plus requiring a crypto-secure heartbeat message over the Internet (with some tricks so that a different Internet connection fails the test) will at least add several orders of magnitude difficulty to the problem of acquiring encryption keys by seizing hardware.</p>

<p>abi (#21): The solution for a business is multi-hosting, in separate data centers (and, depending on paranoia level, countries).</p>

<p>0. The only way to make a system secure is to encase it in cement and sink it in the ocean.<br />
</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:47 PM by Seth Breidbart&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560340</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560340</guid>
         <pubDate>Fri, 24 Jun 2011 12:47:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #25 from David Harmon</title>
         <description>comment from David Harmon on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>abi #21:  Eventually, the smarter providers will be setting up to minimize the problems, as some already have.  That means that some options in cloud design and the like just won't be viable, or will need their own solutions, but that's how these things work.</p>

<p>In the meantime, yes, this falls into the category of "random shit the world can throw at your business", right along with having someone drive through your display window, or other improbable incidents.  I'll note that I'm increasingly jaded about "ultra-high-reliability" of services in general -- even the big boys can't seem to handle black swans.<br />
</p>]]>
	 &lt;p&gt;Posted June 24, 2011 12:54 PM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560347</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560347</guid>
         <pubDate>Fri, 24 Jun 2011 12:54:27 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #26 from Larry</title>
         <description>comment from Larry on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Marco of Instapaper has a podcast called "Build & Analyze" where he talks about this.  He tends to take defeatist attitudes when dealing with legal matters in general but his take on it was pretty interesting. - http://5by5.tv/buildanalyze/30</p>

<p>As xerger@8 said, they appear to be using a blade chassis.  I use them at work.  You can't just pull a single blade if it is basically a VM plant for the various hosted servers in some configurations.</p>

<p>If they are using something like ESX and it is setup what would happen is the server would simply move to another blade and startup.  Most of these chassis configurations are the same way.  You'd need to manually migrate it and shut it down.  But then you have a bunch of other issues.  I suspect Digital One has not been fully forthcoming in what happened.</p>

<p>The bigger thing here is the fact that the laws are lagging behind the tech.  Our current laws cannot handle virtual machines, or cloud computing.  which is where all hosting has been moving for the last few years.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  1:13 PM by Larry&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560351</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560351</guid>
         <pubDate>Fri, 24 Jun 2011 13:13:35 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #27 from Tom Whitmore</title>
         <description>comment from Tom Whitmore on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>A great deal of the constitutionality of this sort of seizure is whether it's reasonable or not. The discussion here about what hardware was involved is an attempt to tease out whether it was -- and there's a fair amount of evidence indicating that it might well have been. In some ways, it's as if the spammers are using civilian corporations as "human" shields, without the problem that they get actually killed (service interruptions are not the same as destroying the company, though there's a chance it'll have that effect -- some of the affected companies are certainly remaining well enough to change their servers). </p>

<p>I don't know enough to say whether the seizure falls in the "reasonable" category. I know more than when I started reading this thread, however.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  1:27 PM by Tom Whitmore&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560352</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560352</guid>
         <pubDate>Fri, 24 Jun 2011 13:27:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #28 from Bill Stewart</title>
         <description>comment from Bill Stewart on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Bruce@6 - <i>The American constitution does say quite clearly that they shouldn't suffer this kind of loss. Period.</i>  Furthermore, there are very specific protections in the law for journalistic works in progress, which were enacted in response to the Steve Jackson Games raid (or maybe one of the subsequent raids; it's been a while) that seized mail servers that were being used by people besides the target.  And there are also procedures that the Feds have published about copying suspect data from seized systems and returning the originals, though those may have fallen by the wayside and certainly aren't being used by the Customs laptop-seizers.  </p>

<p>This strikes me as another of those cases of "Malice or incompetence?  Why not both!" </p>]]>
	 &lt;p&gt;Posted June 24, 2011  1:52 PM by Bill Stewart&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560356</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560356</guid>
         <pubDate>Fri, 24 Jun 2011 13:52:20 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #29 from Bill Stewart</title>
         <description>comment from Bill Stewart on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><i>Abi @ 15... Were I a small country with good infrastructure and a reasonably small latency to the US, I'd certainly consider whether it might be a new national industry.</i></p>

<p>Unfortunately, the Netherlands has been recently been buying into the "Data Retention Laws" for ISPs and similar surveillance concepts.  Before that they were a good location, and in general it makes sense to put facilities into multiple countries so you at least don't have all your stuff hit at the same time, whether the failure is from clumsy police or earthquakes.</p>

<p><i>Serge@20 ...at which point Prince Edward's Island secedes from Canada. Coming soon on the Skiffy Channel... "Ann of Green Servers"!!!</i></p>

<p>Arrgh, no!  Back in the 2000s Canada was trying to promote call center business as a way of providing employment to former fishing villages and similar locations.  On the surface it makes sense - literate work force that speak English well.  And then you look at the problems of providing enough physical diversity to the call centers to make your customers happy, and find that the facilities are designed to support the needs of a fishing village.  There does appear to be some cable diversity getting off of PEI, though we were never sure how real that was, and from there you can go down to Halifax or up to a railroad route to Montreal, but of course there's only one telco office in Charlottetown, so that's a single point of failure, and they'd have to build an access ring to the office building where the call centers were going to be, which didn't appear to have actually occurred to anybody.  And most of the areas they were trying to promote had issues like that (even if they weren't islands), and while some of them had service from the newer carriers, a lot of them had really old technology that Bell Canada had never bothered upgrading because there wasn't any demand.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  2:10 PM by Bill Stewart&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560357</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560357</guid>
         <pubDate>Fri, 24 Jun 2011 14:10:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #30 from heresiarch</title>
         <description>comment from heresiarch on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><b>David Harmon @ 2:</b> <i>"Yes, this is an unusual position for me to take, but I'm very much in favor of shutting down spammers with extreme prejudice."</i></p>

<p>Didn't we just have a thread about the extreme stupidity of declaring a crime so outre as to justify any legal response whatsoever, and how it all goes horribly wrong?</p>

<p><b>abi @ 4:</b> <i>"It will soon become like trying to get a warrant for the physical handset on which a telephone conversation took place, rather than the content of the conversation."</i></p>

<p>This is the most interesting facet of the story to me--technological change is clearly outpacing the law here. We can't even agree what the proper analogy is--is this case like law enforcement temporarily shutting down a legitimate business because it, through no fault of its own, was the site of a crime? Or is it like shutting down an entire floor of an apartment building, inconveniencing dozens of residents, because one apartment housed a criminal?</p>

<p>Law works by a combination of precedent and legislation, neither of which are particularly nimble. Computer technology is changing faster than legislatures can pass laws, and as it changes, analogies back to settled precedent become increasingly comical and misguided. The legal norms relating to technology increasingly mismatch the reality, and I feel they are entering a phase of constant asynchronicity. That means law enforcement is going to have to invent new standards as they go, and I'm rather sure they'll tend to maximize their own power. As you ask, who will tug the other way?</p>]]>
	 &lt;p&gt;Posted June 24, 2011  2:21 PM by heresiarch&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560360</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560360</guid>
         <pubDate>Fri, 24 Jun 2011 14:21:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #31 from Nancy Lebovitz</title>
         <description>comment from Nancy Lebovitz on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Iceland is a data haven. I don't have any idea how complete the protection is.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  2:28 PM by Nancy Lebovitz&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560361</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560361</guid>
         <pubDate>Fri, 24 Jun 2011 14:28:34 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #32 from Neil in Chicago</title>
         <description>comment from Neil in Chicago on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Bruce Baugh @ 6<br />
((cue laugh track))</p>

<p>&ldquo;The Constitution may have its problems, but it beats the hell out of what we have now.&rdquo;</p>]]>
	 &lt;p&gt;Posted June 24, 2011  3:07 PM by Neil in Chicago&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560369</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560369</guid>
         <pubDate>Fri, 24 Jun 2011 15:07:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #33 from Neil in Chicago</title>
         <description>comment from Neil in Chicago on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>If the cops had a warrant for a specific physical street address, and brought a squad to simultaneously kick in the doors of every house on the block, there would be repercussions.<br />
As soon as there is a case like this (I take it for granted that this is neither the first, nor will be the last, example of such imbecilic vandalism) that gets explained to the judge, there will be a cause celebre.<br />
</p>]]>
	 &lt;p&gt;Posted June 24, 2011  3:10 PM by Neil in Chicago&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560370</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560370</guid>
         <pubDate>Fri, 24 Jun 2011 15:10:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #34 from Kevin Riggle</title>
         <description>comment from Kevin Riggle on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>Nancy @31: The legal protections are interesting and fairly comprehensive, but the case of Bergitta Jonsdottír suggests that there are deeper problems.</p>

<p>Your data in the country can be as safe as you like, but as long as you host any of your data outside of the country (with eg. Google or Twitter or Yahoo), the US has potential access to it.</p>

<p>As long as Iceland wants to remain friendly with the US, the US will have leverage over them in ways that can be used to hurt you.  If Iceland becomes no longer friendly with the US, the US will have *different kinds of* leverage over them, of course.</p>

<p>Additionally, there are only $SMALLNUM cables off the island, so there are a small number of points of control, and the people (telcos) who run them may be (are) susceptible to US leverage.  And the TSA is another factor, as physical access is your last trump card, and they can make getting to your box exciting.</p>

<p>Iceland is better than other places, surely, as the Wikileaks people are demonstrating, but it's not the techno-anarchist utopia some people dream it is.  This is not <i>Islands in the Net</i>.  (Well, okay, maybe it is, at least the later bits of it where the data-havens' protections are shown to be... seriously flawed.)</p>]]>
	 &lt;p&gt;Posted June 24, 2011  3:15 PM by Kevin Riggle&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560371</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560371</guid>
         <pubDate>Fri, 24 Jun 2011 15:15:18 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #35 from Jacque</title>
         <description>comment from Jacque on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><b>Seth Breidbart @24:</b> <i>The only way to make a system secure is to encase it in <strike>cement</strike></i> adamantium <i>and sink it in the ocean.</i></p>

<p>FTFY. While the ocean floor location slows retrieval, the cement casing is vulnerable to anyone with a pickaxe and sufficient patience.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  4:35 PM by Jacque&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560386</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560386</guid>
         <pubDate>Fri, 24 Jun 2011 16:35:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #36 from Serge</title>
         <description>comment from Serge on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><b>Bill Stewart</b> @ 2... <i>the facilities are designed to support the needs of a fishing village</i></p>

<p>Hook, phone line and sinker?</p>

<p>This reminds me how my friend Elisabeth, up in Chicoutimi, never could send emails to my work address. Apparently there was a lot of spam originating from up there. Or maybe it came from a phishing village.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  5:27 PM by Serge&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560392</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560392</guid>
         <pubDate>Fri, 24 Jun 2011 17:27:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #37 from Charlie Stross</title>
         <description>comment from Charlie Stross on 24.Jun.11</description>
         <content:encoded><![CDATA[<p><em>Marco Arment, the founder of Instapaper, blogged today that they now have their server back. Logs indicate that its drives weren’t booted into the OS during its absence.</em></p>

<p>They wouldn't be.</p>

<p>My understanding is that law enforcement, to preserve the chain of evidence, don't boot computers they've seized. Instead, they pull the disks (and controllers) and image them, archive the images as evidence, then clone the imaged onto an identical hardware chassis and boot <em>that</em> for forensic examination if they need to watch it start up. </p>

<p>(More likely they don't even do that; they stick a copy of the image in one of their own machines, mount the filesystems, and use their own forensic tools to scan it for suspicious stuff.)</p>

<p>For all Marco knows the FBI have taken an exact copy of his server and are pulling it apart in their labs right now. But probably not. (He's not their target, and the whole point of Instapaper is that it digests web pages down into pure text and throws away the images and javascript -- the stuff the FBI is most interested in[*] is vanishingly unlikely to be there.)</p>

<p><br />
[*] I would expect them to scan any seized filesystems for known child pornography images, malware distribution pages, lists of stolen credit card numbers, and possibly DVD disk images of top-grossing movies. Stuff they can prosecute for possession or distribution of, in other words.</p>]]>
	 &lt;p&gt;Posted June 24, 2011  5:57 PM by Charlie Stross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560393</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560393</guid>
         <pubDate>Fri, 24 Jun 2011 17:57:58 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #38 from David Harmon</title>
         <description>comment from David Harmon on 24.Jun.11</description>
         <content:encoded><![CDATA[<p>abi #22:  <i>Though the heavens fall, let justice be done</i></p>

<p>And what of justice for those victimized by these scareware scammers (<i>not</i> just spammers)?  Is that worthless because the investigation didn't magically extract the right data without inconveniencing anyone else?</p>]]>
	 &lt;p&gt;Posted June 24, 2011  6:29 PM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560399</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560399</guid>
         <pubDate>Fri, 24 Jun 2011 18:29:19 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #39 from Jules</title>
         <description>comment from Jules on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>Charlie @37: "My understanding is that law enforcement, to preserve the chain of evidence, don't boot computers they've seized. Instead, they pull the disks (and controllers) and image them, archive the images as evidence, then clone the imaged onto an identical hardware chassis and boot that for forensic examination if they need to watch it start up. "</p>

<p>Yep.  Which makes me wonder, why is it necessary to perform the seizure in the first place?  Why don't law enforcement turn up on site with digital forensics experts and independent witnesses, shut down the systems, make their cloned disk images, and then leave the original equipment in place?  Such a process would be less disruptive to everyone, and the evidence it provided would be just as good, as far as I can see.</p>]]>
	 &lt;p&gt;Posted June 25, 2011  2:35 AM by Jules&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560512</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560512</guid>
         <pubDate>Sat, 25 Jun 2011 02:35:10 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #40 from Damien Neil</title>
         <description>comment from Damien Neil on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>Jules @39: Transferring all the data off of a 2TB drive will take several hours under optimistic conditions, and there could be a lot of drives in a rack of servers.  There may well be better options available to the FBI, but I'm not surprised that they would want to move the hardware to their own facility for the operation.</p>]]>
	 &lt;p&gt;Posted June 25, 2011  3:20 AM by Damien Neil&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560516</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560516</guid>
         <pubDate>Sat, 25 Jun 2011 03:20:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #41 from abi</title>
         <description>comment from abi on 25.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>David @38:</strong><br />
<em>And what of justice for those victimized by these scareware scammers (*not* just spammers)? Is that worthless because the investigation didn't magically extract the right data without inconveniencing anyone else?</em></p>

<p>First off, "magically"?  On the subject of uncalled for and beneath the participants of this discussion...that is.</p>

<p>Secondly...it's worth being clear that I am not putting Instapaper above the victims of the scammers*.  I am putting the systems of justice by which the police operate above any particular set of victims.</p>

<p>I moved to the UK in the immediate aftermath of the Guildford Four acquittals.  I had not yet left when they shot de Menezes.  I know what happens when the police don't have to watch out for collateral damage or take good care how they collect evidence.  It's not pretty, and it's not good for either the police or the society the police are trying to protect.</p>

<p>The reason we have rules of evidence is because, without them, the police will do whatever they feel they have to to get the person they think is guilty.  Sometimes, as in both the Guildford Four and de Menendez, the damage is in "think is guilty".  But sometimes, it's in "whatever they feel they have to".  And the two clauses break in parallel; once it's OK to elide the rules, there's always a good and pressing reason for the next elision.  There's always an innocent victim <em>this time</em> whose needs are more important than the cold abstractions and absolutes on which the legal system is based.</p>

<p>Ever heard the saying <em>hard cases make bad law</em>?  That's a piece of the same thing.</p>

<p>Third of all, I think it's clear from the thread that the FBI had better develop some new techniques to deal with the new realities of hosting.  But pressure on the FBI to develop less disruptive techniques to extract data doesn't come from nowhere.  It comes from <em>attention being paid to the costs of their current methods</em>.  That's what I'm doing here: paying attention to those costs, highlighting the secondary and tertiary effects.</p>

<p>Secondary effects: Businesses go dark, lose money.  Some of them change web hosts.  Is that an acceptable cost?  Probably.  Power outages and technical failures happen, too.</p>

<p>Tertiary effects: Controversial businesses can't find web hosting, because neither the host nor the host's other customers want to suffer the secondary effects if they're avoidable.  Is that acceptable?</p>

<p>I don't think so.  Not because I worry about spammers and scammers, but because it's not just spammers and scammers who will be caught in that net.  And some of the people who <em>are</em> entangled, who go dark, are going to be important people with important but unpopular things to say.  And this isn't an abstraction.  I cited an example of an organization that struggled to get a web host.  I'm entirely confident that there are many more, smaller, quieter examples.</p>

<p>If those effects are wrong, and I believe they are, then the way to avert them is to push back against the thing that causes them and advocate that it be fixed.  That's what I'm doing.</p>

<p>----<br />
* There's potential here for an interesting and complicated narrative about the hipsters who use Instapaper, Pinboard and Curbed verses the more naïve people who are the stereotypical victims of these kinds of scams.  It's not true; quite ordinary people use the former service, and very sophisticated users can get end up in the latter group.  I don't think it's flavoring this discussion, but I'm declaring here so it doesn't start doing so.</p>]]>
	 &lt;p&gt;Posted June 25, 2011  4:56 AM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560523</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560523</guid>
         <pubDate>Sat, 25 Jun 2011 04:56:44 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #42 from John A Arkansawyer</title>
         <description>comment from John A Arkansawyer on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>I know the technology involved, having maintained several HP blade enclosures and put together the last one we bought.</p>

<p>abi is right, all down the line, from beginning to end. I'm going to join her in pushing back, to the extent that I can bear it.</p>

<p>But like the poor schmoe in <a href="http://steelydan.com/lyrpretzel.html#track2" rel="nofollow">Night by Night</a>, I don't know that I have the heart to lose another fight.</p>

<p>All my adult life, I've been watching the systematic destruction of the protections provided by the rules of evidence*, in cases and situations where the issues were clear and easily explicable, and it's been a consistently losing fight.</p>

<p>This one is a hard case and it is going to make bad law.</p>

<p>I'm not going to make that sort of downer prediction again. It's not good to dwell on if you're determined to fight anyway. Gramsci wrote from prison about pessimism of the intellect and optimism of the will, and I guess that's what I'm advocating.</p>

<p>*and by rule of law and by the constitution generally, in the sense of protections which bear on all people. The advances we've been making have been bringing classes of people formerly discriminated against under what protections remain.</p>]]>
	 &lt;p&gt;Posted June 25, 2011  9:09 AM by John A Arkansawyer&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560548</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560548</guid>
         <pubDate>Sat, 25 Jun 2011 09:09:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #43 from Charlie Stross</title>
         <description>comment from Charlie Stross on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>Jules @39: in addition to the aforementioned problem with copying terabytes of data, they can't allow the servers to shut down normally -- there may be panic scripts hidden on them by the unscrupulous that will scrub incriminating files if they're not shut down in just the right way.</p>

<p>SOP -- again, my understanding of it -- is to abruptly pull the power cable, then image the (not checked, possibly corrupt) filesystems. Fixing a modern journaling filesystem from such a "dirty" image isn't hard and avoids any risk of time bombs.</p>]]>
	 &lt;p&gt;Posted June 25, 2011 10:46 AM by Charlie Stross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560560</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560560</guid>
         <pubDate>Sat, 25 Jun 2011 10:46:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #44 from John A Arkansawyer</title>
         <description>comment from John A Arkansawyer on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>Charlie @ 43: In theory, I suppose they could pull every other drive out of a RAID 1 array and carry those off. That'd leave the system in a very dangerous but running state, plus the performance hit when you stick the blank drives in to restore the mirror.</p>]]>
	 &lt;p&gt;Posted June 25, 2011 11:26 AM by John A Arkansawyer&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560571</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560571</guid>
         <pubDate>Sat, 25 Jun 2011 11:26:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #45 from David Harmon</title>
         <description>comment from David Harmon on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>Abi #41:  Complaining about my "magically":  </p>

<p>Well,  how would <i>you</i> go about serving a warrant against the scammer's servers in a blade farm, without interrupting service for any other customer?  But also remembering that (1) the hosting provider may be a conspirator, and (2) the suspect may have booby-trapped the server?</p>

<p><i>Third of all, I think it's clear from the thread that the FBI had better develop some new techniques to deal with the new realities of hosting.</i></p>

<p>Given both historical precedents and technical realities, the "new techniques" are likely to take the form of regulating the architecture of hosting providers, or at least demanding "easy-open" back doors.</p>]]>
	 &lt;p&gt;Posted June 25, 2011 11:52 AM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560578</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560578</guid>
         <pubDate>Sat, 25 Jun 2011 11:52:17 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #46 from John A Arkansawyer</title>
         <description>comment from John A Arkansawyer on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>David @ 45:</p>

<blockquote>Well, how would you go about serving a warrant against the scammer's servers in a blade farm, without interrupting service for any other customer?</blockquote>

<p>A fair question, but to put it differently, why isn't that the FBI's problem rather than the customers'?</p>]]>
	 &lt;p&gt;Posted June 25, 2011 11:57 AM by John A Arkansawyer&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560579</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560579</guid>
         <pubDate>Sat, 25 Jun 2011 11:57:04 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #47 from albatross</title>
         <description>comment from albatross on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>I think there are three related issues here:</p>

<p>a.  There's the collateral damage done by FBI raids.  How big a deal this is mainly is determined by how common the raids are, and how much damage is done to bystanders.  If the raids are rare and the damage is a day or two of unscheduled downtime, it's probably manageable.  If the raids are common and the damage is often wrecking the business, then there's a serious issue there.  </p>

<p>What we want here is for the FBI to take the likely collateral damage into account, and only do raids that result in a lot of it for serious crimes that can't be dealt with another way.  This is almost exactly the same concern I have with SWAT team raids.  I get that there are situations where the only sensible thing to do is send a whole bunch of armed, armored guys into every opening in the building, tossing flash-bangs and trying to quickly rescue hostages and disable or kill anyone threatening.  But there's enough chance of killing bystanders that this should only be done in very rare situations, not (as often happens) to search the homes of alleged small-time drug dealers.</p>

<p>b.  There's the chilling effect, if (for example) socially or politically unacceptable sites tend to get raided.  If the gay bondage porn site, the white supremacist site, or the Wikileaks mirror are subject to raids that involve shutting down everything else in the datacenter, that becomes a practical force for making it harder for those sites to get hosting.  </p>

<p>c.  There's the use of the inconvenience as a method of punishment or retaliation.  For example, if I can seize all your computers for months or years, I can cost you several thousand dollars, can shut down your business and deprive you of a livelihood.  This can be and has been done as a form of harassment, notably to some Wikileaks supporters in the US when crossing borders.  It can be useful not only in harassing people you don't like, but also in silencing critics and in applying pressure to get people or companies to cooperate with you.  All those things have happened with existing tools available to police, prosecutors, and the US federal government at different times.  </p>]]>
	 &lt;p&gt;Posted June 25, 2011 12:23 PM by albatross&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560585</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560585</guid>
         <pubDate>Sat, 25 Jun 2011 12:23:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #48 from abi</title>
         <description>comment from abi on 25.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>David Harmon @45:</strong></p>

<p>"Magically" was still inappropriately snarky.  There are plenty of civil ways to say what you wanted to say.  But <strong>John @46</strong> is correct.  The FBI has many people with much more technical expertise than I do.  And the burden is very much on them to provide a solution.</p>

<p>But one approach would be to fail the other servers in the enclosure&mdash;those not suspect&mdash;onto blades in a separate frame, and then take away the targeted one.  (This assumes a heck of a lot about the hardware and the OS, which I don't know, but it's not rocket science or a bleeding-edge technical problem.)</p>

<p>I do also think that you overstate the likelihood of collusion both in reality and in the FBI's thought processes.  Do they assume that the telephone company is in league with a criminal when they wiretap his phone?  Not so much.</p>

<p>If the FBI have probable cause enough to include the host in their warrant, then they should be casting the net very differently than if they do not.</p>]]>
	 &lt;p&gt;Posted June 25, 2011 12:27 PM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560586</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560586</guid>
         <pubDate>Sat, 25 Jun 2011 12:27:37 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #49 from Ingvar M</title>
         <description>comment from Ingvar M on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>Martin Haywood @ #7:</p>

<p>They do make copies. Most of the forensic process is done using (verified true) copies of the hard disks. That is, however, not evidence, merely artifacts of evidence. The true evidence is the original hard disk, but you take copies to work on, because (some) steps in the investigation MAY modify the bits.</p>

<p>So, taking the whole hardware does make sense from the way the case law is (or, at least, to the best of my understanding of the case law).</p>

<p>No, I am not in any legal profession, nor am I a forensic investigator. I do, however, read up on the matter once in a while, as I find it interesting (and it has occasionally given me ideas for recovering data off broken servers and thus saved an awful lot of hassle).</p>

<p>Jules @ #39:</p>

<p>Fore "purposes of analyzing", yes. For the purpose of providing evidence in court, they need to be able to provide the original seized hardware (or, at least, that is how I've understood things; see discussion above).</p>]]>
	 &lt;p&gt;Posted June 25, 2011  3:04 PM by Ingvar M&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560619</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560619</guid>
         <pubDate>Sat, 25 Jun 2011 15:04:16 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #50 from Dave Bell</title>
         <description>comment from Dave Bell on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>While I'm all for individual law enforcement officers having personal liability for their misfeasance and malfeasance, it sometimes feels as though these persons are scapegoats for the organisation. </p>]]>
	 &lt;p&gt;Posted June 25, 2011  3:41 PM by Dave Bell&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560627</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560627</guid>
         <pubDate>Sat, 25 Jun 2011 15:41:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #51 from abi</title>
         <description>comment from abi on 25.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>Dave Bell @50:</strong></p>

<p>Out of curiosity, whom are you responding to?</p>]]>
	 &lt;p&gt;Posted June 25, 2011  3:55 PM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560630</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560630</guid>
         <pubDate>Sat, 25 Jun 2011 15:55:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #52 from David Harmon</title>
         <description>comment from David Harmon on 25.Jun.11</description>
         <content:encoded><![CDATA[<p>abi #48:  I'll cop to on the snarkiness charge, especially since you did respond to my challenge.</p>

<p>You yourself note that your method implies a lot about the provider's architecture; I suspect that <i>any</i> such method will have such implications, different for each method.  It still seems to come down to mandating that hosts use an architecture that can support LEO seizures.  They did it with the old and new telecoms, I see no practical barrier to doing it with cloud providers.  </p>

<p>Albatross #47 said a lot of what I've been too inarticulate to assemble; I'll add that downtiming a company for a few hours balances a lot lighter than risking someone's life in a shootout.</p>]]>
	 &lt;p&gt;Posted June 25, 2011  7:19 PM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560676</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560676</guid>
         <pubDate>Sat, 25 Jun 2011 19:19:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #53 from Antongarou</title>
         <description>comment from Antongarou on 26.Jun.11</description>
         <content:encoded><![CDATA[<p>One way I can think to easily pressure the FBI about collateral damage is suing them for damages. I know next to nothing about US law, so I don't know if it's a viable option, but if the FBI has to pay each time they create such collateral damage without being able to show good cause, I suspect they will be very motivated to lower that damage to minimum.</p>]]>
	 &lt;p&gt;Posted June 26, 2011  1:24 AM by Antongarou&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560749</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560749</guid>
         <pubDate>Sun, 26 Jun 2011 01:24:44 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #54 from Heather K</title>
         <description>comment from Heather K on 26.Jun.11</description>
         <content:encoded><![CDATA[<p>Well, I suppose <a href="https://w2.eff.org/legal/cases/SJG/" rel="nofollow">Steve Jackson Games v. United States Secret Service</a> might serve as a precedent. </p>]]>
	 &lt;p&gt;Posted June 26, 2011  5:31 AM by Heather K&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560784</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560784</guid>
         <pubDate>Sun, 26 Jun 2011 05:31:47 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #55 from David Harmon</title>
         <description>comment from David Harmon on 26.Jun.11</description>
         <content:encoded><![CDATA[<p>Antongarou #53: And yes, I'd say that suing law-enforcement for damages is entirely fair.  That, after the raid, is when there's time and a hope of balance, for asking "hey, did they really need to take servers B and C?"<br />
</p>]]>
	 &lt;p&gt;Posted June 26, 2011  7:45 AM by David Harmon&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560821</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560821</guid>
         <pubDate>Sun, 26 Jun 2011 07:45:20 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #56 from Nancy Lebovitz</title>
         <description>comment from Nancy Lebovitz on 26.Jun.11</description>
         <content:encoded><![CDATA[<p>#53 ::: Antongarou:</p>

<p>Suing for monetary damages does happen-- I've read about it in regards to police and court bad behavior. I haven't heard of anyone suing the FBI, but it may well be possible.</p>

<p>However, there are cities that pay out large sums per year in court awards, and it doesn't change institutional behavior.</p>

<p>I'm pretty sure that the only thing which does that is politics, and so far as I know, outrage at abuses can drive politics, but the money doesn't.</p>]]>
	 &lt;p&gt;Posted June 26, 2011  8:08 AM by Nancy Lebovitz&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560825</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560825</guid>
         <pubDate>Sun, 26 Jun 2011 08:08:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #57 from Prefer to keep this slightly tricky to trace</title>
         <description>comment from Prefer to keep this slightly tricky to trace on 26.Jun.11</description>
         <content:encoded><![CDATA[<p>I work (in IT) for a law firm.  Much of the data we possess is subject to attorney-client privilege.</p>

<p>Because such privilege is absolute, even with a warrant, the FBI or other police would not be entitled to access that data without the consent of the relevant client.</p>

<p>Every time I've spoken to a cloud service provider, I've asked them to make a clear statement that they would tell an FBI agent with a warrant to get lost.  Not one has ever been prepared to say so.</p>

<p>There is a pretty good chance for a lot of hosts that they have got privileged data - either emails from a client to their attorney or vice versa, for example - on their systems, and that they are therefore under a legal obligation to resist any warrant.</p>

<p>We prefer to keep the data under our direct control to ensure that our lawyers don't get struck off for breach of privilege and so that we can resist a warrant.</p>]]>
	 &lt;p&gt;Posted June 26, 2011  1:28 PM by Prefer to keep this slightly tricky to trace&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560910</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560910</guid>
         <pubDate>Sun, 26 Jun 2011 13:28:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #58 from Devin</title>
         <description>comment from Devin on 26.Jun.11</description>
         <content:encoded><![CDATA[<p>@57</p>

<p>Well, you guys also have a much better chance at resisting a warrant successfully.</p>

<p>I don't think Blades'R'Us is going to get very far with the FBI arguing that there's privileged data somewhere in that datacenter and they can't let the FBI in (maybe if it seems likely that the warrant covers privileged data, but I don't see the feds listening if they have a warrant for non-privileged data, y'know? Seems like a good way to lose a door.) Knocking on a law firm's door, on the other hand...</p>]]>
	 &lt;p&gt;Posted June 26, 2011  2:14 PM by Devin&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560914</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560914</guid>
         <pubDate>Sun, 26 Jun 2011 14:14:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #59 from Dave Bell</title>
         <description>comment from Dave Bell on 26.Jun.11</description>
         <content:encoded><![CDATA[<p>Abi @51</p>

<p>Yes, Heather K. does point out one instance that came to my mind. Here in the UK, several major accidents/disasters have developed the idea of Corporate Manslaughter: there's some of the same issue of personal and collective responsibility there. Entangled with this is the workplace safety law. It helps if you at least try to get employees to work safely and use the right equipment.<br />
</p>]]>
	 &lt;p&gt;Posted June 26, 2011  4:48 PM by Dave Bell&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560934</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560934</guid>
         <pubDate>Sun, 26 Jun 2011 16:48:11 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #60 from Jacque</title>
         <description>comment from Jacque on 26.Jun.11</description>
         <content:encoded><![CDATA[<p><b>Prefer @57:</b> Heh. That actually suggests a useful sideline for law firms as data hosting service.</p>

<p>Actually, I wonder if a data hosting specialization has/will evolve specifically and explicitly catering to privileged data. </p>]]>
	 &lt;p&gt;Posted June 26, 2011  6:27 PM by Jacque&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#560953</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#560953</guid>
         <pubDate>Sun, 26 Jun 2011 18:27:27 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #61 from bryan</title>
         <description>comment from bryan on 27.Jun.11</description>
         <content:encoded><![CDATA[<p>'Absolute moral positions can be dangerous. "Innocent until proven guilty in a court of law" is insanely dangerous. And yet entire societies base their legal systems on it.'</p>

<p>When you say entire societies base their legal systems on it do you mean that entire societies claim to base their legal systems on it or that entire societies actually practice it, if the latter which societies do you believe actually do this? I suppose at this late date that nobody really believes that the U.S practices what it preaches?</p>]]>
	 &lt;p&gt;Posted June 27, 2011 10:26 AM by bryan&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561126</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561126</guid>
         <pubDate>Mon, 27 Jun 2011 10:26:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #62 from abi</title>
         <description>comment from abi on 27.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>bryan @61:</strong></p>

<p>There's a distinction between the legal <em>system</em>, in the sense of the body of laws which govern the society, and the real-world choices around the enforcement of those laws.</p>

<p>US <em>laws</em>, along with the laws of many other countries, are based on the idea that you can't punish anyone until you've figured out that they're guilty.  Those laws are the reason that Guantanamo Bay has such a population of gentlemen in natty orange one-piece garments.  (Those laws are under assault, as Messrs Manning and Reid, <em>intra alia</em> can testify.)</p>

<p>In other words, American practice varies from its principles.  I think this is a bad thing.  Indeed, that's why I reacted so strongly to the implication that the police should be able to be a little casual about their search procedures if the crime (email scamming) were sufficiently vexatious.  Because that's how we get from the principle to current practice.</p>

<p>But to shrug it off cynically and say, "Meh, that's what you get in America" pretty much robs one of the moral force to demand that the US <em>do it better</em>.</p>]]>
	 &lt;p&gt;Posted June 27, 2011 11:55 AM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561149</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561149</guid>
         <pubDate>Mon, 27 Jun 2011 11:55:28 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #63 from Terry Karney</title>
         <description>comment from Terry Karney on 27.Jun.11</description>
         <content:encoded><![CDATA[<p>john (@14)<i>. I think this seizure is quite closely analogous to searching two or three or five separate back yards for a single crime weapon, which is clearly reasonable. (Householders are deprived of the use of their property for the time the search is going on, after all.)</i></p>

<p>It may be commonsense reasonable, but if a warrant was issued, and didn't list all the properties, it's not a legal search.</p>

<p>Moreover, there are parallels in the present. If I rent a room, and the police have a warrant to search my landlord's property... the portion I rent is <i>not covered</i> in the warrant.  If they intrude to my private spaces (which may include defined areas of open space, such as a shed or garage) they are in violation of the warrant.</p>

<p>David Harmon:  I don't know that I'd describe this as improbable.  Given the broad scope of warrants for electronic search, and the ways in which data moves/gets stored, the specific odds may be small, but the repercussive effects are huge.  The coffee shop in my plaza had a car plow through the window/wall. It cost them about three hours of business.</p>

<p>That's a whole lot different from the effect of a police agency having all of one's client's data in their offices; and depending on their good faith to do nothing with it.</p>

<p>The tech vs. law question isn't new (the first "roving" wiretap was meant to deal with the use of public telephones, and allowed the police to tap the calls a person was on, not the phone in question).  The question of tracing counterfeit monies has always been a game of pre-emptive catch-up, with almost all of the features of our coinage being vestiigal aspects of the time when coins were valuable; in their own right.</p>

<p>re suing for damages:  If the FBI had a facially valid warrant the are immune to lawsuits under the, "acting in good faith" protections of the caselaw interpretations of the doctrine of sovereign immunity.</p>]]>
	 &lt;p&gt;Posted June 27, 2011  4:46 PM by Terry Karney&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561256</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561256</guid>
         <pubDate>Mon, 27 Jun 2011 16:46:56 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #64 from bryan</title>
         <description>comment from bryan on 28.Jun.11</description>
         <content:encoded><![CDATA[<p>'But to shrug it off cynically and say, "Meh, that's what you get in America" pretty much robs one of the moral force to demand that the US do it better' </p>

<p>To say that the U.S is immoral does not rob one of moral force. However as I have no rights in America I expect that I do not have any force whatsoever to demand that it does better. What pointing out that the U.S does not have any moral stature provides one is the moral force to demand that one's own government not bow to American demands.</p>]]>
	 &lt;p&gt;Posted June 28, 2011  4:52 AM by bryan&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561735</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561735</guid>
         <pubDate>Tue, 28 Jun 2011 04:52:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #65 from Serge Broom</title>
         <description>comment from Serge Broom on 28.Jun.11</description>
         <content:encoded><![CDATA[<p><b>bryan</b> @ 61... <i>I suppose at this late date that nobody really believes that the U.S practices what it preaches</i></p>

<p>My America should indeed do better, but need I ask if other countries are themselves without this flaw?</p>]]>
	 &lt;p&gt;Posted June 28, 2011  7:11 AM by Serge Broom&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561772</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561772</guid>
         <pubDate>Tue, 28 Jun 2011 07:11:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #66 from john</title>
         <description>comment from john on 28.Jun.11</description>
         <content:encoded><![CDATA[<p>Terry Karney @ 63 Yes, my analogy was imperfect (I think I was confusing the concepts of hot pursuits and/or reasonable cause with those of the search warrant and probable cause). </p>

<p>Would a better analogy be a valid search warrant served on an accountancy firm, or other business service firm, for printed records relating to a specific business and/or person? To serve such a warrant will involve a) suspending the accountant's normal business in at least one office for some period of time, however short, and b) a police examination, however brief and cursory, of the other records present in the office - I see no way to exclude records unrelated to the warrant without examining them!</p>

<p>(Incidentally I think courts willing to treat police claims sceptically, robust investigative journalism, and other social contexts are at least as important as the written law to prevent police and executive abuses. This does not necessarily fill me with optimism. On the other hand I have just learned that the UK's Independent Custody Visitors - like prison visitors but for police cells between arrest and charge - have a remit which explicitly includes all terrorist suspects, and multiple people currently have full security clearance to visit any such suspects. So hopefully there'll be no more "falling down stairs".)</p>]]>
	 &lt;p&gt;Posted June 28, 2011  8:02 AM by john&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561790</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561790</guid>
         <pubDate>Tue, 28 Jun 2011 08:02:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #67 from Paul A.</title>
         <description>comment from Paul A. on 28.Jun.11</description>
         <content:encoded><![CDATA[<p>Bill Stewart @ #29:</p>

<p>In other words, before we can have Serge's "Ann of Green Servers", we need the intervention of Ann of Green Cables.</p>]]>
	 &lt;p&gt;Posted June 28, 2011  9:30 AM by Paul A.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561810</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561810</guid>
         <pubDate>Tue, 28 Jun 2011 09:30:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #68 from abi</title>
         <description>comment from abi on 28.Jun.11</description>
         <content:encoded><![CDATA[<p><strong>john @66:</strong></p>

<p>The problem with your analogy is that the FBI also stopped <em>other</em> clients of the accountancy firm from doing business, or at least materially hampered their ability to do business, for the duration of the search.</p>]]>
	 &lt;p&gt;Posted June 28, 2011  9:47 AM by abi&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561816</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561816</guid>
         <pubDate>Tue, 28 Jun 2011 09:47:06 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #69 from SamChevre</title>
         <description>comment from SamChevre on 28.Jun.11</description>
         <content:encoded><![CDATA[<p><i>The problem with your analogy is that the FBI also stopped other clients of the accountancy firm from doing business, or at least materially hampered their ability to do business, for the duration of the search.</i></p>

<p></p>

<p>Which is, I will note, the way that the investigative agencies generally pressure accounting firms--"you can co-operate, or we'll investigate ALL your clients and publicize that we're doing so."  It's been a really effective way of keeping accounting firms from, for example, letting their (former) employees have access to the materials they relied on in their work so they can use them in their own defense.</p>

<p>I will note that I consider this abusive behaviour in both cases.  Tom Kirkendall has done a great deal of writing on this subject under his category <a href="http://blog.kir.com/archives/cat_legal_-_criminalizing_business.asp" rel="nofollow">criminalization of business</a>  </p>]]>
	 &lt;p&gt;Posted June 28, 2011  9:57 AM by SamChevre&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561819</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561819</guid>
         <pubDate>Tue, 28 Jun 2011 09:57:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #70 from Jacque</title>
         <description>comment from Jacque on 28.Jun.11</description>
         <content:encoded><![CDATA[<p><b>john @66:</b> <i>robust investigative journalism</i></p>

<p>I've heard The Press (back in the days before the oligarchical take-over) referred to as The Fourth Branch of government. (Separate from, but in its way as important as, Executive, Judicial, and Legislative.)</p>

<p>I think we could do very well to return to this idea. (In fact, I kind of feel this is the function the blogosphere is serving these days.)</p>]]>
	 &lt;p&gt;Posted June 28, 2011 12:38 PM by Jacque&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#561864</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#561864</guid>
         <pubDate>Tue, 28 Jun 2011 12:38:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #71 from bryan</title>
         <description>comment from bryan on  1.Jul.11</description>
         <content:encoded><![CDATA[<p>"My America should indeed do better, but need I ask if other countries are themselves without this flaw?"</p>

<p>I am of the opinion that the bigger and more important a country becomes the less likely it is to follow the noble words that supposedly guide it.</p>

<p>I live in a small country, but not one that is small enough that I would feel confident it practices what it preaches. </p>]]>
	 &lt;p&gt;Posted July  1, 2011  1:16 AM by bryan&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#562571</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#562571</guid>
         <pubDate>Fri, 01 Jul 2011 01:16:57 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #72 from Mycroft W</title>
         <description>comment from Mycroft W on  4.Jul.11</description>
         <content:encoded><![CDATA[<p>Well, America Should Do Better, and it's becoming clear that ideals make very handy words to kill discussion, and that's about it - here and in other places.</p>

<p>That doesn't mean that I'm discouraging "fight the good fight", not at all.  But I think that's the fight that needs to be made, first, in addition to the real good fight.</p>

<p>But I really hit send to say it's "'Anne of Green Cables' with an E", #20, #67.</p>]]>
	 &lt;p&gt;Posted July  4, 2011  1:26 PM by Mycroft W&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#563434</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#563434</guid>
         <pubDate>Mon, 04 Jul 2011 13:26:36 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #73 from P J Evans</title>
         <description>comment from P J Evans on  4.Jul.11</description>
         <content:encoded><![CDATA[<p>One other issue here is that the FBI is notoriously bad at anything involving computers and higher tech; I suspect it's left over from the days of J Edgar Hoover, but not understanding the technology we live with is now a liability for them.</p>]]>
	 &lt;p&gt;Posted July  4, 2011  1:40 PM by P J Evans&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#563436</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#563436</guid>
         <pubDate>Mon, 04 Jul 2011 13:40:36 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #74 from Paul A.</title>
         <description>comment from Paul A. on  6.Jul.11</description>
         <content:encoded><![CDATA[<p>Mycroft W @ #72:</p>

<p>I'm going to take the coward's way out and blame it all on Serge. "I <em>thought</em> it was Anne-with-an-E, but I assumed Serge would know what he was talking about! You can't pin any E thing on me!"</p>]]>
	 &lt;p&gt;Posted July  6, 2011  8:32 AM by Paul A.&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#564022</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#564022</guid>
         <pubDate>Wed, 06 Jul 2011 08:32:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #75 from Serg(with an E) Broom</title>
         <description>comment from Serg(with an E) Broom on  6.Jul.11</description>
         <content:encoded><![CDATA[<p><b>Paul A</b> @ 74... <i>I assumed Serge would know what he was talking about</i></p>

<p>What fools these mortals be.</p>]]>
	 &lt;p&gt;Posted July  6, 2011  9:01 AM by Serg(with an E) Broom&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#564029</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#564029</guid>
         <pubDate>Wed, 06 Jul 2011 09:01:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Nice datacenter you have there -- comment #76 from Tracie sees spam</title>
         <description>comment from Tracie sees spam on  8.Jul.14</description>
         <content:encoded><![CDATA[<p>From "someone" who spells "her" name differently.</p>]]>
	 &lt;p&gt;Posted July  8, 2014 12:05 PM by Tracie sees spam&lt;/p&gt;</content:encoded>
         <link>https://nielsenhayden.com/makinglight/archives/013086.html#2838456</link>
         <guid isPermaLink="true">https://nielsenhayden.com/makinglight/archives/013086.html#2838456</guid>
         <pubDate>Tue, 08 Jul 2014 12:05:08 -0500</pubDate>
      </item>
      
   </channel>
</rss>