[Infowarrior] - When the FBI Raids a Data Center: A Rare Danger
Richard Forno
rforno at infowarrior.org
Wed Apr 22 23:46:28 UTC 2009
(c/o KM)
When the FBI Raids a Data Center: A Rare Danger
By Robert Lemos
http://www.cio.com/article/490340/When_the_FBI_Raids_a_Data_Center_A_Rare_Danger
Wed, April 22, 2009 — CIO — As part of coordinated raids in early
April, FBI agents seized computers from a data center at 2323 Bryan
Street in Dallas, Texas, attempting to gather evidence in an ongoing
investigation of two men and their various companies accused of
defrauding AT&T and Verizon for more than $6 million.
The FBI's target in the data center raid—one of five seizures
conducted that day—is simply listed as Cabinet 24.02.900 in the
affidavit and search warrant.
Cabinet 24.02.900 allegedly held the computers and data used to serve
voice-over-IP clients for the companies at the center of the case.
Yet, it was also home to the digital presence of dozens of other
businesses, according to press reports. To LiquidMotors, a company
that provides inventory management to car dealers, the servers held
its client data and hosted its managed inventory services. The FBI
seizure of the servers in the data center rack effectively shut down
the company, which filed a lawsuit against the FBI the same day to get
the data back.
"Although the search warrant was not issued for the purpose of seizing
property belonging to Liquid Motors, the FBI seized all of the servers
and backup tapes belonging to Liquid Motors, Inc.," the company stated
in its court filing. "Since the FBI seized its computer equipment
earlier today, Liquid Motors has been unable to operate its business."
The court denied the company's attempt to get its data back, but the
FBI offered to copy the data to blank tapes to help the company
restart its services, according to a report in Wired.
The incident has worried IT managers, especially those with a stake in
cloud computing, where a company's data could be co-mingled with other
businesses' data on a collection of servers.
"The issue, I think, is one of how search and seizure laws are being
interpreted for assets hosted in third-party facilities," James
Urquhart, manager of Cisco Systems' Data Center 3.0 strategy, said in
a recent blog post. "If the court upholds that servers can be seized
despite no direct warrants being served on the owners of those servers—
or the owners of the software and data housed on those servers—then
imagine what that means for hosting your business in a cloud shared by
thousands or millions of other users."
Yet, a careful reading of the case suggest that such issues are
unlikely, says attorney and former Department of Justice prosecutor
James M. Aquilina, who argues that the FBI and the judges took the
correct actions.
"Probable cause to search is probable cause to search," says Aquilina,
who is the executive managing director and deputy general counsel for
Stroz Friedberg, a digital forensics and intellectual property
advisory firm. "That being said, federal law enforcement agents,
prosecutors, and magistrate judges alike remain sensitive to the
realities of co-mingled data encountered at hosting providers."
Typically, judges and law enforcement agents will attempt to work with
co-location and data center providers to hone a search to specific
data, he says. However, two factors in the current case changed that
policy. Most importantly, the co-location firm was a suspect in the
case. In addition, the firm's owner had stated that it "was
transitioning from the service provider business to the Venture
Capital business and they only had a handful of telecommunications
customers," according to the FBI's affidavit. Such an assertion could
make a judge less likely to limit a search and seizure, says Aquilina.
Such determinations will become more difficult as virtualization
technologies and cloud computing become more prevalent, says Scott
Gode, vice president of product management for Azaleos, a managed
service provider for Microsoft services. Virtual machines and nebulous
temporal instances of applications divorced from physical machines
could turn law enforcement's job into a game of whack-a-mole, he says.
Even today's state of partial progress toward cloud computing, with
dedicated machines running multi-tenant applications could still lead
to massive collateral damage, if the company operating the data center
is considered a suspect, Gode says.
"Even with that dedicated box, there are tons of shared components
within the data center," he says. "For a SAN storage unit, there is
still a lot of caching devices, a lot of those are used ubiquitously
by other components in the data center."
Yet for the most part, larger companies contracting with larger
providers are not the ones at the most risk, Gode says. Such firms
usually will usually not be hosted alongside fly-by-night firms and
will likely get more consideration from law enforcement. Smaller firms
are the ones that more often cut costs and corners, making them more
likely to use an unknown service provider and more ready to consider
cloud computing as a solution, he says.
"They are the ones who will take those risks," Gode says. "They will
take those risks around power, they will take those risks around
security and they will take those risks around FBI seizure, because
otherwise, it costs them money."
More information about the Infowarrior
mailing list