Yottabytes: Storage and Disaster Recovery

November 29, 2016  12:29 AM

What Will be the Trump Effect on Data Storage?

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
Encryption, government, privacy, Security, Storage

The election of Donald Trump as President of the United States could have some really interesting implications for data storage, data sovereignty, and encryption.

If by “interesting” you mean Really Scary and Bad.

The Internet Association, a group of about 40 Internet vendors including Amazon, Google, and Netflix, have already called on Trump to support Internet technologies. “Some of the policy goals stated in the letter may align with Trump’s priorities, including easing regulation on the sharing economy, lowering taxes on profits made from intellectual property and applying pressure on Europe to not erect too many barriers that restrict U.S. internet companies from growing in that market,” writes Reuters’ Dustin Volz. “Other goals are likely to clash with Trump, who offered numerous broadsides against the tech sector during his campaign.”

Here are some possible aspects of the Trump effect on data storage.

Storage manufacturing. Trump has proposed imposing a 35 percent tax on companies that manufacture their products outside the U.S. While he originally said this in the context of Apple making iPhones, he has since extended it to any company that lays people off in the U.S. to outsource manufacturing to other countries. Because the vast majority of storage hardware is manufactured outside the U.S., this could have a significant impact – either by raising prices, reducing availability, or, perhaps, having vendors move their manufacturing to the U.S. This is especially true because he has also said he intends to lower the U.S. corporate tax rate from 35 percent to 15 percent and provide a moratorium for companies like Apple, which have large offshore bank accounts, to bring their money back to the U.S.

Encryption. Remember when Apple refused to help the FBI break into an encrypted iPhone? At the time, Trump reportedly called for a boycott of Apple products, according to Reuters. But as President, and based on his Cabinet picks thus far, he could do much more. Reuters also pointed out that Senator Richard Burr – who spearheaded last year’s effort to mandate encryption “back doors” – had also been re-elected, and as chair of the Senate intelligence committee was likely to reintroduce his legislation next year.

Trump’s pick for Attorney General, Jeff Sessions, also argued that government must have access to the phone, writes Anita Balakrishnan for CNBC. “Rep. Mike Pompeo, nominated for new CIA director, has called the use of strong encryption in personal communications a ‘red flag,” she adds. “Michael Flynn, tapped as national security adviser, supported the Digital Security Commission Act, whose sponsors supported a commission to examine cases like Apple’s.”

In response, vendors of end-to-end encrypted messaging applications, such as Signal, have seen a 400 percent increase in their downloads since the election, write Stephanie Hughes and Ben Johnson for Marketplace. “Signal uses end-to-end encryption, so that no one — not even the people at Signal — can read the messages you send to others,” they write. “It’s not the only encrypted app that’s seen an uptick in use — another messaging app, Wickr, also told us they have also seen a noticeable increase in downloads.”

Data sovereignty. Trump campaigned against the Trans-Pacific Partnership (TPP), a trade deal with 11 Asian countries – in fact, he called it “rape” — and with his election it is assumed to be dead. However, it included a number of components having to do with exchanging data between countries.

For example, the TPP would have banned  forced localization –  “the discriminatory requirement that certain governments impose on U.S. businesses that they place their data, servers, research facilities, and other necessities overseas in order to access those markets,” according to the White House. Countries that have implemented these laws, such as Russia, have blocked social networking sites like LinkedInb for storing data on citizens outside the country.

It also would have reserved free international movement of data, “ensuring that individuals, small businesses, and families in all TPP countries can take advantage of online shopping, communicate efficiently at low cost, and access, move, and store data freely,” the White House writes. “On the most fundamental level, TPP grants data, for the first time, the same legal protections in international trade law as goods,” writes Carter Dougherty for the International Business Times. “If it’s from a TPP member country, it’s treated as data flowing within the country would be treated.”

Surveillance. Trump has already indicated his interest in setting up a registry or database of Muslims or Muslim immigrants. Some people are concerned that this presages a general increase in government surveillance, Reuters writes. And Trump said during the campaign that he was interested in restoring provisions of the Patriot Act to allow for bulk data collection, writes The Hill.

Trump’s inauguration is scheduled for January 20.

November 24, 2016  12:58 AM

Bumps in the Road to Self-Driving Car Storage

Sharon Fisher Sharon Fisher Profile: Sharon Fisher

Everybody’s all excited about self-driving cars, but not too many people are talking about self-driving cars’ data. What sort of data will be collected, how much will be stored on the car, where it will be sent from the car, and what sort of security that data will have from hackers, law enforcement, and the government are all open questions.

There isn’t any question that, one way or another, self-driving cars are going to generate and process a lot of data – on the order of 1 GBps, according to Intel, which is investing $250 million in self-driving car technology. That would be more than 4 TB an hour.

As someone who has trouble keeping up with the data collected by the dashboard cam, this seems like a lot of data. Where is the car going to put it?

“Some data will have to be stored online,” writes Paresh Dave in the Los Angeles Times. “That means automakers have to prepare for boosting spending on storage, said Intel’s Doug Davis, senior vice president and general manager of a division dealing with cutting-edge mobile devices.”

But the vast majority of it will be used in real time and then thrown away, automakers reassure us. The vehicle itself might store just a terabyte or so. Otherwise, it’ll be just like our phones — what’s kept will mostly go up in the cloud, according to Richard Barrett, senior product marketing engineer, automotive wireless technology at Cypress Semiconductor, writes Ann Steffora Mutschler in Semiconductor Engineering.

I don’t know about Barrett, but my phone has 54 gigabytes of storage, and I’ve used almost half of it.

But okay, fine. Most of the data will go into the cloud.

Hold on. Which data will go into the cloud? And who will get it, exactly? To what degree will you know, and how much can you limit this?

“Automakers already collect and store location and driving data from millions of cars on the road today,” writes Pete Bigelow in AutoBlog. “In the approaching era of self-driving vehicles, privacy advocates fear the data collection will grow more intrusive. The more sensitive the data, the more lucrative it might be for a company like Google, says John Simpson, an advocate with California-based Consumer Watchdog. ‘Once this technology is widely adopted, they’ll have all sorts of information on where you’re driving, how fast you’re going, and there’s no control over what Google might do with it,’ he said.”

In fact, automakers are reportedly salivating over the amount of data that self-driving cars could generate and how that data could be sold, Dave writes. “The $100-billion app economy built on data from smartphones would look small compared with the $750 billion in revenue produced around cars,” he writes – an estimate from McKinsey for 2030. “The forecast has automakers buzzing. As they accelerate spending on developing self-driving cars, they’re devoting enormous attention on what to do with data that those high-tech devices generate — beyond making the drive automated. Among the possibilities: selling details about driving patterns to real estate developers or using it in personalized insurance calculations.”

Oh goody.

Note that some of this data is already being collected now. A number of auto loan companies, insurance companies, and car rental agencies have GPS units on the vehicle that collect information ranging from location to acting as a “black box” about your driving. The Government Accountability Office did a report on this in 2013.

Similarly, the state of Oregon is piloting a program where, instead of paying a gas tax, you’d pay a “mileage tax” based on how many miles in the state you drive. This is important, the state explains, because as cars become more efficient and are more likely to use electricity, they use less gas, and the gas tax no longer adequately funds road maintenance, repair, and construction. Which makes sense, but it still means you have a little box attached to your car keeping track of where you’ve been.

Not to mention, how else might this data be used? Bigelow writes. “How often do you happen to drive your car to a liquor store, and will that information be provided to your insurance company?” he quotes Consumer Watchdog executive director Carmen Balber as saying. “Will information on where you spend your Saturday nights be subpoenaed in a divorce proceeding?”

Keep in mind that in 2011 people had conniptions because they realized their smartphones were saving their location data. Now we’re going to let cars do it?

And those are just the legitimate data users. Can your car get hacked to get a nice list of your past movements for blackmail purposes? Can the real-time data be monitored so the burglars know when to hit your house?

That brings us to the courthouse. Will the government have access to the data – with or without a warrant – to know if you’ve been visiting a house associated with terrorist activities, or a neighborhood associated with drugs or prostitution?

Self-driving cars offer a lot of potential – but a lot of potential problems as well.

November 18, 2016  6:21 PM

These 5 SMART Statistics Predict Disk Failure

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
Backblaze, Failure, SMART

When will a disk drive fail? The people at BackBlaze, who use 67,814 disk drives, have been looking at Self-Monitoring, Analysis and Reporting Technology  (SMART) disk drive statistics to try to predict this.

They’ve been looking at this for a while, at least since 2014. As I wrote then:

“SMART defines — and measures, for those vendors that support it — more than 70 characteristics of a particular disk drive. But while it’s great to know how many High Fly Writes or Free Fall Events a disk has undergone, these figures aren’t necessarily useful in any real sense of being able to predict a hard drive failure.

“Part of this is because of the typical problem with standards: Just because two vendors implement a standard, it doesn’t mean they’ve implemented it in the same way. So the way Seagate counts something might not be the same way as Hitachi counts something. In addition, vendors might not implement all of the standard. Finally, in some cases, even the standard itself is…unclear, as with Disk Shift, or the distance the disk has shifted relative to the spindle (usually due to shock or temperature), where Wikipedia notes, ‘Unit of measure is unknown.’”

At that point, BackBlaze had determined that out of the 70 statistics SMART tracked, there was really only one that mattered: SMART 187, or Reported_Uncorrectable_Errors. At the time, BackBlaze wrote: “Drives with 0 uncorrectable errors hardly ever fail. Once SMART 187 goes above 0, we schedule the drive for replacement.”

Since then, the company has been looking at the SMART statistics some more, and it’s now added four other statistics that it’s determined have a correlation to failed drives, writes senior marketing manager Andy Klein:

  • SMART 5 Reallocated Sectors Count
  • SMART 188 Command Timeout
  • SMART 197 Current Pending Sector Count
  • SMART 198 Uncorrectable Sector Count

The company didn’t say why it started looking at other SMART statistics if it had already determined that there was one statistic that was correlated with failure. (It also makes its raw statistics available in case you want to play with correlations yourself.) He also points out that not all vendors report all the statistics, or in the same way — an issue two years ago as well.

Another factor is the period of time in which the errors occur, Klein writes. “For example, let’s start with a hard drive that jumps from zero to 20 Reported Uncorrectable Errors (SMART 187) in one day,” he writes. “Compare that to a second drive which has a count of 60 SMART 187 errors, with one error occurring on average once a month over a five year period. Which drive is a better candidate for failure?” He doesn’t actually say, though he implies that it’s the first one.

Incidentally, BackBlaze has even started looking at High Fly Writes as a possible indicator of future disk failure. “This stat is the cumulative count of the number of times the recording head ‘flies’ outside its normal operating range,” Klein explains, noting that while 47 percent of failed drives have a SMART 189 value of greater than zero, so do 16.4 percent of drives that work. “The false positive percentage of operational drives having a greater than zero value may at first glance seem to render this stat meaningless. But what if I told you that for most of the operational drives with SMART 189 errors, that those errors were distributed fairly evenly over a long period of time?” he asks. “For example, there was one error a week on average for 52 weeks. In addition, what if I told you that many of the failed drives with this error had a similar number of errors, but they were distributed over a much shorter period of time, for example 52 errors over a one-week period. Suddenly SMART 189 looks very interesting in predicting failure by looking for clusters of High Fly Writes over a small period of time.”

That’s not to say that any of the statistics, or even a combination of them, is a perfect predictor of when a disk drive is going to fail – or when it isn’t. The organization points out, “Operational drives with one or more of our five SMART stats greater than zero – 4.2 percent. Failed drives with one or more of our five SMART stats greater than zero – 76.7 percent,” writes Klein. “That means that 23.3 percent of failed drives showed no warning from the SMART stats we record.” But if nothing else, it sounds like starting to see these particular SMART errors is a way to bet.

Disclaimer: I am a BackBlaze customer.

October 31, 2016  3:31 PM

Future of eDiscovery: ‘Things’

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
ediscovery, Internet of Things

Technology-assisted review electronic discovery products are growing more sophisticated. On the other hand, as with any other industry, big data is giving attorneys much more data to deal with, including the Internet of Things as everyday items such as televisions and refrigerators are collecting information about their users. That’s according to a recent session on the future of ediscovery, held partly to commemorate the tenth anniversary of ediscovery. The session was held in late October as part of the Masters Conference for Legal Professionals at the Capital Hilton in Washington, D.C.

For example, predictive coding enabled Sidley Austin partner Robert Keeling to determine that, in one particular Foreign Corrupt Practices Act investigation, participants used “chocolate” whenever they meant “cash” in the context of bribes, writes Zoe Tillman in Legaltech News.

(Apparently equating chocolate with cash in bribes isn’t even all that uncommon; it has happened with a Malaysian company as well as with the Mexican company Keeling was likely referring to. “A subsidiary paid routine bribes referred to as ‘chocolates’ to Mexican officials in order to obtain lucrative sales contracts with government hospitals,” wrote the Securities and Exchange Commission about the latter 2012 case. “The ‘chocolates” came in the form of cash, laptop computers, televisions, and appliances that were provided directly to Mexican government officials or indirectly through front companies that the officials owned. The bribery scheme lasted for several years and yielded nearly $5 million in illegal profits.”)

Such predictive coding tools fall in general into the realm of technology that can help attorneys more easily do their jobs, Tillman writes. Other examples include:

  • Programs that can analyze audio files and images, pieces of information that lawyers typically had to review manually
  • Tools that allow lawyers to more easily redact records
  • More sophisticated coding that goes beyond text and uses other internal data such as pixels to categorize data

In addition to finding ways to deal with the firehose of data from the Internet of Things, attorneys also have to pay attention to the security implications of using particular categories of data, Tillman writes. Whether the accumulation of such data is considered helpful or creepy depends on how convenient it is, panelists noted.

“It can be a bit off-putting, the panelists quipped, when a married couple is merely discussing the possibility of having children and coupons appear in the mail for diapers,” writes Tera Brostoff in Bloomberg BNA. “Your phone, your car or even your refrigerator is creating a ‘pattern of life’ on you. But the question of who is looking at that data and how it’s being stored is something you might not consider until you face litigation.”

IoT data is particularly useful in labor and employment law, Brostoff writes, including data collected from sensors such as the global-positioning system (GPS) in a car, a FitBit or other wearable technology, or the RFID chip in a employee’s ID card.  “For example, we now have your GPS data saying that you were at McDonald’s for four hours during the middle of the work day,” she writes.

But as always, the panelists said, the biggest challenge in ediscovery is convincing organizations to use the tools, Tillman writes. “A big challenge for practitioners continues to be convincing corporate clients to get on board with new [technology aided review] (TAR) products,” she writes. In particular, some are concerned about the security implications of sending data to the cloud, she adds. Vendors are looking to forestall these concerns by integrating ediscovery tools into their existing cloud-based products, she writes.

October 29, 2016  11:09 AM

LDiscovery Acquires Kroll

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
ediscovery, Kroll

Apparently OpenText’s June acquisition of Recommind has reminded everyone that the e-discovery M&A market is alive and well: LDiscovery has just acquired Kroll Ontrack for a reported $410 million.

The all-cash transaction is expected to close in the fourth quarter. The combined organization is said to have 12,000 clients worldwide, “including some of the world’s largest financial institutions, Fortune 1000 companies and Am Law 100 firms,” with offices in 19 countries comprising 1,300 employees. Kroll CEO Mark Williams will be CEO of the combined companies.

As you may recall, Kroll had been dropped from the Leaders to the Challengers quadrant in the 2015 Gartner E-discovery Magic Quadrant, due to what Gartner felt was a lack of vision.

And just who is LDiscovery? Identified as “a provider of eDiscovery and Information Governance solutions,” what’s interesting about it is that the company has typically been associated with e-discovery vendor kCura, which never fails to mention that it was named a Leader in the 2015 Magic Quadrant.

But if LDiscovery was in the market for an e-discovery vendor, what kept it from acquiring the one it already worked with? As recently as early this month, LDiscovery was named a finalist for the Relativity (kCura’s product) Innovation Awards for Best Service Provider Solution, adding that “LDiscovery is the only provider to be a finalist three years in a row.” So what will happen to its relationship with kCura? Especially after LDiscovery CEO Chris Weiler called OnTrack “best in class”?

(Incidentally, has anyone else noticed that Gartner hasn’t yet released its E-discovery Magic Quadrant for 2016? Typically it comes out in early summer. Could it be that they’re frantically rewriting it to accommodate these acquisitions?)

On the other hand, the acquisition may not be that weird, writes Gabe Friedman for Bloomberg Law. “Both companies operate in the review space, rather than the software space,” he writes. “Both companies are partners with kCura, and employ dozens of certified experts and administrators of its Relativity software review platform.”

And it’s not out of the question that LDiscovery – or, rather, its parent, the Carlyle Group – might pick up kCura in the future. “The Carlyle Group, working with Revolution Growth, purchased LDiscovery for $150 million this past January,” Friedman writes. “ LDiscovery itself had purchased six companies in the past two years. Will Darman, the managing director at Carlyle who led the purchase of LDiscovery, has predicted there will be continued consolidation in the e-Discovery review market.”

Weiler had noted during the January acquisition that it intended to use the money for further acquisitions, particularly in other geographic areas. Kroll is based in New York, while LDiscovery is based in Tysons Corner, Va.

Interestingly, Kroll’s parent company, Corporate Risk Holdings, was said by Moody’s to have “concerns regarding the company’s weak liquidity and the sustainability of its capital structure given its very high debt leverage.’ Moody’s plans to re-examine Corporate Risk’s ratings in light of the acquisition.

October 25, 2016  10:39 PM

DNA Data Storage Hopeful

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
research, Storage

Scientists and researchers love finding new and interesting ways to store data, especially as the traditional spinning disk and even flash drive technologies are starting to run into the laws of physics. The newest one? DNA data storage.

Actually, the notion started out as a joke, writes Andy Extance in Nature. In 2011, biological information scientists were trying to figure out how they could afford to store the amount of genome sequences they had, and were so frustrated by the expense and limitations of conventional computing technology that they started kidding about sci-fi alternatives like using DNA. “Then the laughter stopped,” he writes. “It was a lightbulb moment.”

Scientists at the European Bioinformatics Institute and at Harvard University each demonstrated a proof-of-concept of the idea in 2013, of just 0.74 megabytes. What’s different now is that Microsoft, which has been taking the lead in DNA storage research, was able to save 200 megabytes in DNA, or more than a 270 times improvement over 2013.

In fact, at one point, you could even buy a DNA storage device on Amazon, which stored 512 KB—enough for a small photograph or a document, according to the product description.

The downside? The cost, writes Tobi Ogunnaike in SingularityHub. “The current cost of DNA data storage is not attractive,” he writes. “Storing digital data in DNA involves both reading and writing DNA. While the price of reading DNA (DNA sequencing) has fallen sharply, the price of writing DNA (DNA synthesis) currently remains prohibitively high for data storage.”

The Microsoft experiment might have cost on the order of $150 million, writes Andrew Rosenblum in MIT Technology Review. “Microsoft won’t disclose details of what it spent to make its 200-megabyte DNA data store, which required about 1.5 billion bases,” he writes. “But Twist Bioscience, which synthesized the DNA, typically charges 10 cents for each base. Commercially available synthesis can cost as little as .04 cents per base. Reading out a million bases costs roughly a penny.” On the other hand, costs are dropping rapidly, he adds. “It would have cost about $10 million to sequence a human genome in 2007 but close to only $1,000 in 2015.”

Another downside? The speed, Extance writes. “DNA storage would be pathetically slow compared with the microsecond timescales for reading or writing bits in a silicon memory chip,” he writes. “It would take hours to encode data by synthesizing DNA strings with a specific pattern of bases, and still more hours to recover that information using a sequencing machine.”

But DNA storage offers one big advantage: Its density, or the amount of data it could store in a small space, Extance adds. “By 2040, if everything were stored for instant access in, say, the flash memory chips used in memory sticks, the archive would consume 10–100 times the expected supply of microchip-grade silicon,” he warns. Similarly, a data center holding an exabyte (one billion gigabytes) on tape drives would require $1 billion over 10 years to build and maintain, as well as hundreds of megawatts of power, he writes. “If information could be packaged as densely as it is in the genes of the bacterium Escherichia coli, the world’s storage needs could be met by about a kilogram of DNA.”

For example, the 200-megabyte Microsoft example occupied a spot in a test tube much smaller than the tip of a pencil, the company writes, which performed the experiment with the University of Washington.

DNA storage could also last longer and be more stable than existing data storage methods, writes John Markoff in the New York Times. “Magnetic disks, tape and even optical storage systems safely store information at most for only a handful of decades,” he writes. “The recent advances suggest there may be a new way to store the exploding amount of computer data for centuries rather than decades.” Keep in mind that readable DNA has been found in fossils thousands of years old.

Of course, DNA storage isn’t a panacea. There are a number of open questions about a new kind of storage system, Ogunnaike writes, such as what sort of security and user interface it will have. “Will we all have DNA sequencers, DNA synthesizers, and algorithms that translate digital data into biological data in our phones, our homes, or our local community biohacker spaces? Or will these capacities be restricted to companies?” he writes. “In either scenario, how easily we can interact with DNA data storage technology might affect how quickly we adopt this technology.”

Other complications include error correction, retrieving just portions of the data, and avoiding the sort of protein sequences that causes DNA strings to fold up, Extance writes.

And what if something you save accidentally creates life? Hmm. It could be the next Jurassic Park movie.

October 15, 2016  12:23 AM

Strange USB Sticks Zap PCs

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
Security, Storage, Thumb drive

We’ve written before about USB sticks that could set computers on fire. Now it’s not just a rumor – it’s something you can order now for less than 50 Euros. And it has free shipping!

Ostensibly for people to test how well PCs and other devices can handle power surge attacks, “the USB Kill collects power from the USB power lines (5V, 1 – 3A) until it reaches ~ -240V, upon which it discharges the stored voltage into the USB data lines, according to the product website. “This charge / discharge cycle is very rapid and happens multiple times per second. The process of rapid discharging will continue while the device is plugged in, or the device can no longer discharge – that is, the circuit in the host machine is broken.”

Companies that make electronic equipment need these devices to help ensure that their products can handle such attacks. “In our tests, over 95% of devices are affected by a USB power surge attack,” notes the website. “Almost all consumer-level hardware fails when tested against the USB Kill. The most frequent outcome is the complete destruction of the device (laptops, tv, telephones, etc).”

“Brutally efficient!” the website proclaims. While the intention is not to destroy data on the target system, “depending on the hardware configuration (SSD vs Platter HDD), the drive controllers may be damaged to the point that data retrieval is impractical,” the website warns. A demonstration of the device basically looks like you’re hot-wiring a teeny-weeny car.

The first batch of stock – the company doesn’t say how many – was shipped on September 19, according to the company blog. “As you may have noticed, due to overwhelming demand, we are currently on backorder,” the blog notes. “Each delivery of stock is larger than the previous.” With weekly shipments, the company pledged to clear its backorders by early October.

Now, the company is aware of what people might want to use these devices for, and says in no uncertain terms that that would be a no-no.USBKill.com strongly condemns malicious use of its products,” notes the company’s FAQ. “A hammer used maliciously can permanently damage to a third party’s device. The USB Killer, used maliciously, can permanently damage a third party’s device. As with any tool, it is the individual, not the manufacturer of the tool, responsible for how the individual uses the tool.”

(The company also sells a tester device that lets users test their own devices without putting them at risk.)

Security experts were skeptical of the company’s claim for a use case. “Are there companies that hire security testers who say ‘Oh, please fry some electronics if you find an easy way to do so’? Are there security testers whose contracts say ‘We will cause property damage to show you your vulnerabilities, rather than telling you about them’?” scoffs one commenter on security expert Bruce Schneier’s blog, Schneier on Security. “For a security tester, you want something that highlights the vulnerability in a clear way, and causes no damage (or at least as little as possible consistent with finding the vulnerability). If I’m testing whether people will plug in random USB sticks, plugging it in should either report the information to me (probably using the 5V to power a transmitter, rather than trying to rely on a network connection that might not be there), or announces its presence to everyone nearby (how loud a siren can you power via USB?).”

At the same time, some also scoffed at the notion that disgruntled employees would buy these devices to get even with an employer. “A disgruntled employee can slip with his sports drink on someone’s desktop in front of a dozen people, say ‘Oh, my bad, I’m so sorry,’ and totally get away with it,” noted one. “A disgruntled employee who slaps one of these in someone’s desktop had better be doing it when there are no witnesses about, because otherwise there is going to be a really straightforward prosecution for criminal damage. Involving exhibits like ‘camouflaged criminal sabotage device purchased over the internet.’”

What was going to be more of a problem, they noted, would be people who found these devices scattered around and plugged them into systems to see what they did (or so they could return them to their owners). “It’s true that there are other ways to destroy a computer, but your average office worker is not going to destroy company property for no reason,” one wrote. “You can expect, however, that many will plug a USB device of unknown origin into their work computers. Destructive USB devices given away as ‘freebies’ can cause a lot damage.”

Even that, though, wasn’t as damaging as it could be, experts noted. “So you want to plug this into a target to fry it? You’re limited to whatever you physically had access to, and you might as well have poured a vial of who-cares-what-kind-of-goo into the port instead. No more nor less difficult to get away with on-camera,” noted one. “Why would you do that when you could use a USB that actually appears functional (so no immediate suspicion) but contains a pathogen that can reach beyond the mookstation into the deeper network?”

September 30, 2016  6:51 PM

JASTA: E-Discovery Story of the Year

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
E-discovery, government

Political and foreign policy ramifications aside, Congress’ recent override of President Barack Obama’s veto of a bill to let 9/11 victims’ families sue Saudi Arabia has the potential for some really interesting e-discovery implications.

In case you haven’t watched CNN lately, Congress put forth a bill, the Justice Against Sponsors of Terrorism Act (JASTA), that would allow citizens, such as family members of 9/11 victims, to sue the nation of Saudi Arabia for its role in the terrorist attack, 15 of the 19 leaders of which were Saudi nationals. President Obama vetoed the bill because of a sovereign immunity law that protects foreign governments from American lawsuits. However, in what appears to be the one thing that Democrats and Republicans could agree on in eight years, both houses of Congress had a decisive override vote of the President’s veto, meaning JASTA is in force.

Before the law, American victims of terrorist acts could only sue countries designated by the U.S. State Department as state-sponsors of terrorism, currently Iran, Syria and Sudan,” writes Mica Rosenberg for Reuters. “Now, any country can be sued if there are allegations of support for known terrorists that carry out attacks on U.S. soil.” More than 2000 family members sued Saudi Arabia in 2003, a suit that has been stalled due to the sovereign immunity law, he adds.

If nothing else, the law will likely become the Attorneys’ Full Employment Act of 2016. “The legal battle could last for years, and would be waged using thousands of pages of documents, deposition transcripts and official government investigations,” writes Mark Mazzetti in the New York Times. “It could end in millions – or billions – of dollars’ worth of Saudi assets being seized in a court settlement, or a judgment that largely vindicates the Saudi government, which for years has insisted it had no role in the deadly plot.”

Aside from this specific case, there is also the question of precedence, both for other countries, U.S. allies, and for the U.S. itself, if foreign countries pass similar laws and decide that U.S. actions could be considered terrorism, such as drone strikes and abuses committed by U.S.-trained police units or U.S.-backed militias, writes the Associated Press.

“If JASTA were enacted, courts could potentially consider even minimal allegations accusing U.S. allies or partners of complicity in a particular terrorist attack in the United States to be sufficient to open the door to litigation and wide-ranging discovery against a foreign country — for example, the country where an individual who later committed a terrorist act traveled from or became radicalized,” the President wrote in his veto message.

Defense Secretary Ash Carter wrote Rep. Mac Thornberry of Texas, the Republican chairman of the House Armed Services Committee and an opponent of the legislation, before the vote, warning him of the discovery implications.

In the letter, Carter described the potential for litigants to seek classified intelligence data and analysis and sensitive operational information to establish their cases in what could be an ‘intrusive discovery process,’” writes Richard Lardner for the Associated Press. “If the U.S. were sued overseas, a foreign court would decide whether the information should be protected from disclosure, he said. Paradoxically, the information could be central to a defense against the accusations.”

“Disclosure could put the United States in the difficult position of choosing between disclosing classified or otherwise sensitive information or suffering adverse rulings and potentially large damage awards for our refusal to do so,” Carter wrote, according to Lardner.

Conceivably, lawsuits could be filed that have no hope of succeeding, just for the discovery they could involve.  “Whether or not a case has merit, the U.S. would still have to defend itself or its troops against private litigants in foreign courts,” Lardner writes. “That raises the possibility of service members who refuse to appear or to divulge classified information being held in civil or criminal contempt by the foreign court, according to Carter.”

Meanwhile, after realizing the implications of its bill, now law, Congress is considering rewriting it – though not until after its election recess. “Both House Speaker Paul Ryan and Senate Majority Leader Mitch McConnell said that the measure could have unintended consequences — including the fact that it could leave U.S. soldiers open to retaliation by foreign governments,” write Steven Dennis and Billy House for Bloomberg. “But Republicans said the White House didn’t make a forceful case, putting themselves in the awkward position of blaming the president for a bill they enacted into law over Obama’s veto.”

“So, basically, Congress’s excuse is that they didn’t realize that the president was seriously opposed to JASTA despite the fact that he vetoed it, publicly articulated why he vetoed it and personally warned congressional leaders about the implications,” explains Daniel Drezner in the Washington Post.

For now, attorneys are already gearing up, with action leading to discovery likely as early as next week, writes Aliyah Frumin for NBC News.

September 29, 2016  12:39 PM

Archivists Dealing With Born-Digital Data

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
government, history, museum, Storage

When former Texas Governor Rick Perry left office in 2014, the records he left to the State Library and Archives Commission included more than 7 terabytes of data, writes Isabelle Taft in the Texas Tribune. But there weren’t any digital archives to put it.

“While the governor’s 4,000 cubic feet of paper could be sorted, itemized, boxed and shelved alongside other state records dating back centuries, [state archivist Jelain ] Chubb and her staff had no system in place to store thousands of gigabytes of photos, emails and audio and video recordings, much less make them available to the public,” Taft writes. “The Perry collection presented a Texas-sized challenge for a commission that had no capacity to manage the ‘born-digital’ records — those with no paper or analog footprint.”

Consequently, the commission needed to set up the Texas Digital Archive for the material, a project that so far has cost $700,000. The data is stored in the Amazon cloud.

In many ways electronics records are safer and more durable than paper ones—they can easily be backed up, replicated, and sent elsewhere to prevent a Library of Alexandria-type conflagration. Moreover, electronic records are typically easier to gain access to than paper records because people don’t have to travel to where the records are. That also helps make government more transparent. But that’s all predicated on the data still being readable electronically.

“Ancient hieroglyphics and scrolls have survived centuries, but digital storage is fragile, the files easily swept away or locked up in encryption,” writes Arielle Pardes in Vice.com. “The technology we use to store things today might not be around tomorrow, and many of the platforms we use to store information are owned by private companies, which makes it harder for archival institutions to save them. And how much of what we upload online is worth saving at all?”

There are three main problems with maintaining archives of born-digital material, Pardes writes:

  1. It requires the hardware to read it.
  2. It requires power for the hardware.
  3. It requires software—often proprietary, and sometimes copyrighted—to read it.

This is particularly true as data storage goes to private companies in the cloud—such as Facebook—rather than on software that we own, Pardes warns. “Many of the sites we use that are free, or that you rent space on, like a wedding site, they’re private companies,” she quotes historian Abby Smith Rumsey as saying. “You don’t have ownership of it.”

That was the problem with some of Perry’s data, which dated back to 2000 and in some cases used formats that are no longer around, such as WordPerfect, Adobe Pagemaker, VHS tapes, CDs and raw camera files, Taft writes. “Many files had to be reformatted so the public could view them with contemporary software.”

To help in this effort, the Library of Congress has created a list of recommended formats for archiving digital data, and has an ongoing discussion about the sustainability of digital formats.

After the Perry project, the Texas data archive staff is now working on a similar project for Texas state agencies. “Arguably the most important function of the digital archive, however, is still under development: the ability to ingest and display the born-digital archives of state agencies,” Taft writes. “Archivists are currently working with three pilot agencies — the Texas Historical Commission, the Office of the Attorney General and the Railroad Commission — to get their electronic records from the late 1990s and early 2000s on the digital archive.”

Unfortunately, the group is running into the same problem as with Perry’s data. “Texas requires state agencies to preserve records if the state archives can’t yet take them,” Taft writes. “But floppy disks loaded with files can decay until they’re unreadable. Emails are often deleted to free up expensive storage space. And some formats are already obsolete.”

September 25, 2016  2:02 PM

6 Dell-EMC Shoes Yet to Drop

Sharon Fisher Sharon Fisher Profile: Sharon Fisher
Dell, EMC, Storage

EMC is dead. Long live Dell Technologies. With Dell’s acquisition of EMC finalized earlier this month, it may seem like the end to a very long, long, long story. But although the merger is complete, there are still a quantity of potential Dell-EMC fallout to occur.

Layoffs. Reports are that 2,000 to 3,000 people are slated to be laid off from the combined companies.A lot of them are going to be administrative people – HR, finance, all the various business functions that are more or less duplicated by the two companies. This will also be a good time to see, however, what users can expect from Dell Technologies products going forward, if developers start getting laid off as well. And what methodology is Dell going to use? If there’s two competing products, will the Dell product naturally survive and the EMC product get the ax? Vice versa? Will they just pick the biggest product? A look at who gets laid off will reveal a lot of the merged companies’ philosophy.

Executives. Yes, all of this was an elaborate way for EMC CEO Joe Tucci to get out of formally naming a successor. But what will happen to all those former EMC executives? EMC was known for having a deep, if unexciting but businesslike, bench of potential managers. Are they going to stick around? Former VMWare and Pivotal CEO Paul Maritz has already retired. Will people like VMWare CEO Pat Gelsinger join him? Are they going to get buyouts? Will they start spinning off companies? It will be interesting to see.

Ancillary pieces. Individually, EMC and Dell were so big that there were pieces of them that people completely forgot about. (For instance, did you remember EMC bought RSA Security in 2006? I had it in my head that they’d been owned by Symantec. Nope.) As the two companies merge, there’s going to be all sorts of things they find in the back of closets as they set up housekeeping together. Dell has already offloaded its software group (Dell had a software group?) EMC has already offloaded poor, sad Documentum to Open Text; it remains to be seen to what degree Open Text continues to support it, or simply expects all the Documentum users to migrate to the OpenText software. And what will happen to RSA? Data Domain? Virtustream? Pivotal Labs?

VMWare. Of course, the biggest ancillary piece – and the source of a lot of EMC’s profit – is VMWare. (There was even talk that VMWare might acquire EMC, though it was just a rumor that the merged company would have been called Ouroboros.) The companies insist they don’t plan to sell it, but some financial analysts say the acquisition might not pencil out unless they do. What sort of support will a software company get from its parent hardware company? And how will VMWare’s independent reputation among users change when it is owned by a server company?

Culture. Austin and Boston may rhyme, and may both be tech hubs, but their cultures are pretty different. How well barbecue is going to mix with baked beans, only time will tell. One area they do have in common? Both companies have been outspoken in their support of equal rights for gay people, such as opposing the so-called religious freedom bills in Indiana and Georgia.

And finally. What will Elliott Management Co. — having now withdrawn its dripping scimitar from the still-writhing corpse of EMC – be looking at it as its next activist investment target? As it turns out, speaking of Symantec, looks like it’s on the radar: The other EMC more than doubled its holding in the most recent quarter and now owns on the order of 3 percent of the company.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: