It is possible that *you* are not being investigated directly even if your assets are the ones taken.
What about a situation where your assets have been infiltrated via hacker or botnet, and some subset of your systems are conducting illegal activities on behalf of someone else? What about a situation where an incorrectly configured wireless network is being used by someone else to conduct illegal activities which *appear* to be coming from your equipment? What about a mistaken identity situation like the ones in real life? (For instance, they get the right building, but they go for the data center on the 4th floor which is not the only one on that floor, or they get the wrong floor) The real issue here is how much power they have, and how much warning they give, and how many options you have once they start doing what they have done. Some other points on this issue can be found here: http://www.focus.com/questions/information-technology/what-are-implications-fbi-raids-texas-data-centers-cloud/#post *ASB *(Professional Bio <http://about.me/Andrew.S.Baker/bio>) Harnessing the Advantages of Technology for the SMB market... On Thu, Jun 23, 2011 at 10:33 AM, Michael B. Smith <[email protected]>wrote: > Call it a "private cloud" if you wish. But if you connect to it over the > Internet - I consider it "a cloud thing". > > The DIFFERENCE is in your last sentence. If your property is seized from > your physical location, then "you" (the corporate "you") are the one being > investigated. If your property (whether by rental, lease, or ownership) is > seized at a data-center, "you" are not necessarily the one being > investigated. I believe the term is "collateral damage". > > Regards, > > Michael B. Smith > Consultant and Exchange MVP > http://TheEssentialExchange.com > > > -----Original Message----- > From: Ken Schaefer [mailto:[email protected]] > Sent: Thursday, June 23, 2011 10:29 AM > To: NT System Admin Issues > Subject: RE: Be Very Wary of "The Cloud"... > > How is "co-lo" a "cloud" thing? You have a specific box, in a specific > rack, in a specific location. There is no amorphous unknown involved. > > Hmm, it could even happen to servers you have sitting in your own corporate > data centre - law enforcement turns up and seizes some servers and then some > of your apps are offline. > > Law enforcement seizing too much stuff is the problem. Not so much where > you put it (which has its own considerations - including jurisdictional > issues) > > -----Original Message----- > From: Michael B. Smith [mailto:[email protected]] > Sent: Thursday, 23 June 2011 9:55 PM > To: NT System Admin Issues > Subject: RE: Be Very Wary of "The Cloud"... > > I would suggest that every example you mentioned is, indeed, "a cloud > thing". Shared web hosting, VPS, colocation - all of those are cloud > solutions - we just didn't used to call them that. :-) > > Regards, > > Michael B. Smith > Consultant and Exchange MVP > http://TheEssentialExchange.com > > > -----Original Message----- > From: Ken Schaefer [mailto:[email protected]] > Sent: Thursday, June 23, 2011 9:49 AM > To: NT System Admin Issues > Subject: RE: Be Very Wary of "The Cloud"... > > Hmm - is this a "cloud" thing? > > I mean, people have been paying for shared web hosting for years. Or more > recently Virtual Private Servers, or even dedicated servers. If law > enforcement turns up and seizes 'x' racks of equipment, chances are that > there are going to be innocent bystanders who are going to be affected. > > Cheers > Ken > > -----Original Message----- > From: Michael B. Smith [mailto:[email protected]] > Sent: Thursday, 23 June 2011 9:08 PM > To: NT System Admin Issues > Subject: Be Very Wary of "The Cloud"... > > This is how the FBI treats something in the cloud. > > Remember that when you trust your important data to the cloud. > > > http://bits.blogs.nytimes.com/2011/06/21/f-b-i-seizes-web-servers-knocking-sites-offline/ > > Note: I don't support the activities of any hacking group. I just think > this was wrong. > > Regards, > > Michael B. Smith > Consultant and Exchange MVP > http://TheEssentialExchange.com > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
