“Don’t have your own storage! Just put everything on the cloud! It’ll always be available!”
Yeah. About that.
The Amazon Web Services (AWS) Simple Storage Service (S3) was down for some four hours earlier today, causing chaos, consternation, and first-world problems as the various services that depend on it were unable to gain access to data and images stored in it.
As you may recall, AWS was also down in 2012 due to weather – not even a hurricane, just a thunderstorm – and in 2011 due to a configuration problem. There’s something to be said for the fact that it happens so seldom that people completely lose their minds when it does, but at the same time it forces us to realize how fragile this connected world really is. The whole point of using the cloud, after all, is so the information will continue to be there even if something goes down.
It’s not that Amazon’s cloud service is so much worse than that of its competitors. If anything, it’s that it’s so widely used that any sort of glitch tends to have really big ramifications. In this particular case, 148,213 sites use the S3 system, according to Elizabeth Weise in USA Today.
“Sites like Imgur, Medium, Expedia, Mailchimp, Buffer and even the U.S. Securities and Exchange Commission were all impacted, as were communication services like Slack,” writes WCMH. “Also ironically impacted, DownDetector.com, which is a website that tracks when other websites are down.”
“Some of the services affected included Amazon Prime Video and Amazon Music,” writes Janko Roettgers in Variety. “But the outage also affected numerous third-party websites, apps and services. A number of web publishers, including The Verge and Axios, were unable to load images for their articles. Other media sites, including Business Insider, weren’t able to publish any new stories at all for hours. The outage also affected phone support systems at a number of companies and public agencies, including Boston’s public transit agency and the app-based investment service Acorns. The secure messaging app Signal reported on Twitter that users weren’t able to attach images to their messages. And an outage of the cloud-based scripting and control service IFTTT even led to internet-connected light bulbs ceasing to function, according to user reports.”
In fact, so dependent is the world on this particular piece of AWS, based on the East Coast, that Amazon itself got burned by the outage. “Amazon wasn’t able to update its own service health dashboard for the first two hours of the outage because the dashboard itself was hosted on AWS,” Weise writes.
Maybe, for disaster recovery purposes, Amazon want to re-think that decision? Just a thought.
Why it was down, Amazon hasn’t yet said, other than blaming “high error rates,” though that is likely a symptom rather than a cause. Weise quoted Gartner analyst Lydia Leong as saying that the most common causes of this type of outage are software-related, either a bug in the code or human error. And the primary way to protect against it is to have multiple backups of the data, she adds. “Only the most paranoid, and very large companies, distribute their files across not just AWS but also Microsoft and Google, and replicate them geographically across regions — but that’s very, very expensive,” she tells Weise.
Variety notes, for example, that Netflix stayed up during the outage, likely because it had redundant storage on other services.
As far as what to do in the future, there’s really not much to add to what I wrote in 2011 when this happened:
“Organizations that use the cloud — anybody’s cloud, not just Amazon’s — should take this as a wake-up call. Even if you weren’t affected by this outage, you could be on the next one. Don’t just have a backup. Have a backup for the backup. Yes, it costs money. How much money does it cost for your business to be out for a day?”
As you may recall, a few weeks ago some researchers began copying freely available U.S. government data onto private servers and servers outside the U.S. out of concern that a Trump administration might make the data inaccessible or unavailable in the future. At the time, the people said they were doing it primarily as a precaution. But in recent days, there have been a number of incidents of disappearing government data with little or no warning.
Next, a U.S. Department of Agriculture (USDA) database called the Animal and Plant Health Inspection Service (APHIS) disappeared in early February. “The data consisted of inspection reports, enforcement actions, regulatory correspondence and other information related to APHIS’ investigations of animal welfare issues, ranging from puppy mills to abuse of animals in research labs,” writes Joshua New, a policy analyst at the Center for Data Innovation, in The Hill. “The USDA decided it should not be publicly available due to ill-conceived concerns about the privacy of animal abusers,” he explains.
Later, the USDA posted a message saying the data removal was related to ongoing litigation and that the removal had been planned since before the election. “In 2016, well before the change of Administration, APHIS decided to make adjustments to the posting of regulatory records,” the agency reports. “In addition, APHIS is currently involved in litigation concerning, among other issues, information posted on the agency’s website. While the agency is vigorously defending against this litigation, in an abundance of caution, the agency is taking additional measures to protect individual privacy. These decisions are not final. Adjustments may be made regarding information appropriate for release and posting.” On the other hand, people familiar with the material in the database said that personal information had already been redacted from it.
In the meantime, members of the public should file a Freedom of Information Act request to gain access to any of this data, the USDA writes. “Those seeking information from APHIS regarding inspection reports, research facility annual reports, regulatory correspondence, and enforcement records should submit Freedom of Information Act requests for that information,” the agency notes. “Records will be released when authorized and in a manner consistent with the FOIA and Privacy Act. If the same records are frequently requested via the Freedom of Information Act process, APHIS may post the appropriately redacted versions to its website.” FOIA requests can take years to be approved, notes Karin Brulliard in the Washington Post.
Then, on Valentine’s Day, it was reported that the White House open data portal had disappeared – as much as 9 gigabytes’ worth, according to some reports — though programmer Maxwell Ogden posted on Twitter that he had backed up all the data on January 20. The portal “served as a public clearinghouse for data on everything from federal budgets to climate change initiatives,” New writes.
Needless to say, researchers had kittens. “There is no definitive evidence that the Trump administration intends to roll back the valuable commitments to open data that Obama made during his administration, which require federal agencies to treat their data as open and machine-readable by default,” New writes. “However, the Trump administration has also failed to make any indication that it intends to honor or expand upon these commitments.”
In some cases, there was plausible deniability about where the data had gone. For example, the missing White House web pages were attributed to a reset of the website. “If you’ve ever been part of a website launch, you’ll know that nothing is perfect on the first day, no matter how much you try,” Tom Cochran, the White House’s director of digital platforms in 2011 and 2012, tells Georgia Frances King in Quartz. “Something always slips through the cracks. Given the magnitude and the scale of the migration of a White House website—probably one of the most prominent, if not the most prominent websites in the world—I would say it was a pretty wild success to not have anything really bad happen other than content not be there.”
With the USDA databases, organizations such as the Humane Society of the United States, PETA, the Physicians Committee For Responsible Medicine, and Born Free USA initiated legal action against the USDA, writes Natasha Daly in National Geographic. And after that, some of the missing data was put back, though agency representatives say it wasn’t related to the lawsuit. A large number of Congressional members also complained.
Some of the White House data is expected to be restored, but other parts – such as visitor logs – may not be, writes Nikita Buryokov for NBC News. “Based on timing of data releases by the Obama administration, White House visitors’ logs likely won’t be available until mid-April,” she writes. “However, because no law requires that such logs be made public, their release isn’t guaranteed. The logs can show who, exactly, is speaking with the president and other administration officials. While certain groups can be excluded — a potential Supreme Court nominee, say, or someone whose life might be placed at risk by identification — they have repeatedly cast light on lobbying activities within the White House.” Also, visitor logs are created by the Secret Service, a separate agency that is subject to FOIA requests, she notes.
With some of the screw-ups that have plagued the Trump administration since he took office, it’s certainly believable that the disappearing government data is attributable to human error. But whether the data’s absence could be chalked up to malice or stupidity, the operative fact is that data that people used to be able to see is no longer available, reinforcing the value of backing data up in other locations.
The issue of people entering the U.S. having their phones and laptops seized and searched at the border isn’t new, but it’s garnering new attention under the presidency of Donald Trump.
Since August 2009, civil libertarians have objected to a Department of Homeland Security that enables U.S. Customs and Border Patrol agents to search laptops and other electronic devices at the U.S. border, for large values of “at” – that is, within 100 miles of the border
100 miles might not sound like much, but according to the American Civil Liberties Union (ACLU), as of 2006, more than two-thirds of the U.S. population lived within 100 miles of the border. Altogether, it meant that anyone in that area with a laptop could have that laptop seized without a warrant, at any time, taken to a lab anywhere in the U.S., have its data copied, and searched for as long as Customs deemed necessary. And despite their objections, the policy has largely been upheld.
In 2015, a judge ruled that – following the lead of the Supreme Court ruling on the Riley case, which stated that law enforcement officials needed a warrant to search someone’s cell phone – customs officials needed to have probable cause before it could search someone’s laptop. The problem with that ruling is it applied just to that one case, not overall.
And that’s where things stood until recently, when a number of people have reported anecdotally that they have had their devices searched. In one case, a US-born NASA engineer who worked with the federal government and was also a part of the Customs and Border Protection Global Entry program was told he couldn’t re-enter the U.S. until he unlocked his encrypted NASA phone. Several other incidents have also happened over the summer, reports the Electronic Frontier Foundation. Even a Canadian journalist was denied entry to the U.S. for refusing to unlock his phone, and a Wall Street Journal reporter had the same experience, though customs agents backed down when she told them to call the paper. A BBC reporter also had to turn over his phone.
It is too soon to tell whether this policy is changing under President Trump, writes Daniel Victor in the New York Times, though he notes that inspection of electronic devices rose from 4764 in 2015 to 23,000 in 2016. But there are also proposals that people entering the U.S. – potentially including U.S. citizens – would have to provide browsing history and device or account passwords, reports Kaveh Waddell in the Atlantic. Customs also asks people to voluntarily provide social media passwords and it may become mandatory – particularly for the seven Muslim-majority countries currently under a travel ban. Similar incidents are happening in other countries as well.
The problem is that the whole issue of whether people are required to unlock or decrypt their phones is not yet settled case law, Orin Kerr, a law professor at George Washington University who specializes in computer crime law and digital evidence investigation, told the public radio show Here & Now. “You probably don’t have to comply. There are no court cases that have actually tested this, so we really don’t know what the legal limits are on the government getting people to unlock their phones,” he says. “We just don’t have those cases yet because these policies are new and encryption on iPhones is pretty new. And so we’re just starting to get these problems, and it takes the legal system a couple years for all the lawyers to get together and a lawsuit to be filed and a judge to make one decision and then the losing party is going to appeal. And it works its way up to the Supreme Court, and then five or ten years later the Supreme Court says, ‘OK, here’s the rule, here’s the law.’ And so, we just have a natural period of uncertainty until that happens.”
Indeed, the EFF – which has published a guide on border searches — would like to push for such a case to expand the provisions of the Riley case to border searches. “We are eager to further the law in this area—to make it clear that the Riley decision applies at the border,” the organization writes, urging people to let it know when they undergo a border search.
There are ways to protect your data, writes Jonathan Zdziarski in Blog of Things, who describes a number of techniques. “This is a classic security problem like any other and requires you think of a border crossing as a security boundary and the system as an adversary,” he writes. “The goal is to increase cost to exceed their investment of detaining you and diverting government resources away from going after real threats to the country – not you.”
Some people are going so far as to say they won’t take their own phone or laptop across a border at all. “I’ll never bring my phone on an international flight again. Neither should you,” writes Quincy Larson in Medium, noting that other countries are doing this as well. “If we do nothing to resist, pretty soon everyone will have to unlock their phone and hand it over to a customs agent while they’re getting their passport swiped. Over time, this unparalleled intrusion into your personal privacy may come to feel as routine as taking off your shoes and putting them on a conveyer belt.”
Instead, Larson suggests renting a phone at your destination or having a spare phone and laptop at a destination you visit frequently – or, at the very least, factory-resetting your phone before you fly. “Is all this inconvenient? Absolutely. But it’s the only sane course of action when you consider the gravity of your data falling into the wrong hands.”
It’s no secret that insurance companies, fraud departments, attorneys, and so on scout Facebook and other social media sites looking for evidence of malfeasance. And when such people do so by means of a warrant rather than simply Facebook-stalking someone, more power to them. But how many Facebook search warrants of stored data should such a perusal allow?
That’s the crux behind an ongoing case in New York, where Manhattan District Attorney Cyrus Vance Jr. filed 381 separate search warrants in 2013 for the Facebook records of police and fire department personnel who were suspected of fraudulently claiming disability from 9/11 and retiring.
Facebook complied, because it had to. As it happens, more than 130 people were convicted of fraudulently claiming Social Security disability, 62 of whom were on the list of 381. And prosecutors rightly pointed out that these people were ripping off New York taxpayers. “Resulting guilty pleas and convictions returned $25 million to the U.S. Social Security Administration,” writes Marlene Kennedy in Courthouse News.
“More than 100 people have already been convicted in the ruse,” writes Julia Marsh in the New York Post. “They claimed they were too sick to work in order to get the benefits — then posted photos of themselves on social media platforms like Facebook jet-skiing and sport-fishing.”
But at the same time, Facebook wants to nip this sort of bulk request in the bud. “The ‘carbon-copy’ warrants for 381 accounts placed Facebook in the awkward position of ‘being conscripted’ by law enforcement to invade the privacy of its users and turn over everything in their accounts,” Kennedy writes.
The company had several issues:
- The warrants were unlimited. A number of civil liberties organizations that filed amicus briefs with the court pointed this out. “The groups noted that of the accounts sought by Vance’s office, the holders of 319 of them were eventually never charged in connection with the disability benefit investigation,” writes Joel Stashenko in the New York Law Journal. “Yet, the civil liberties’ groups argued, the information about the account holders’ private messages, chat history, photographs, lists of friends, religious or political affiliations and other confidential information was subject to review by prosecutors without the account holders’ permission.”
- There were a lot of them. Facebook’s argument wasn’t that fulfilling all those requests was a lot of work, though it probably was, but simply that it was overbroad. “The ultimate chilling effect would be a similar request for all of the electronic accounts of every resident of New York City,” Kennedy writes. And it’s not like Facebook regularly turns down this sort of request — for the first half of 2016, it received more than 23,000 law-enforcement requests involving nearly 39,000 user accounts and produced some data for almost 81 percent of them, she adds.
- They were warrants, rather than subpoenas. “Vance’s office applied for the warrants under the federal Stored Communications Act, which governs the disclosure of electronic records held by third-party internet service providers,” Kennedy writes. “Facebook’s failed attempt to quash hinged on attempt to characterize the warrants as more akin to subpoenas.” The difference is that subpoenas can be challenged, while warrants can’t, she adds.
- Facebook wasn’t allowed to fight the warrants, because the Appellate Division’s First Department decided it didn’t have “standing,” or the legal right to object. Only the individuals – all 381 of them – had standing to object, meaning they each would have had to lawyer up and go through the ordeal of fighting the search warrant.
- Facebook wasn’t allowed to tell the people that the government was requesting their records. This sort of gag order isn’t unusual; there have been a number of times when companies were not allowed to say that a government agency had requested their records. (In fact, in a number of cases, companies have created what’s called a “warrant canary”on their website, where they note that the government has never asked for their records – and then, at some point, the sentence disappears and watchers can see that such a request must have occurred.) If Facebook had told the people, they would have deleted the records, Vance said.
All of this is critical because people – not just Facebook – are concerned about what it could mean for the future. For example, could the government get a warrant for everyone who posted on Facebook that they had attended the Women’s March so it could arrest them or put them in some sort of database? Could the government get a warrant for everyone who had posted something to Facebook indicating they were Muslim? In this day and age, one never knows.
Testimony on the suit was taken earlier this month to the New York Court of Appeals, with a decision expected to be rendered by the six-judge panel near the end of March, Stashenko writes.
As you may recall, in May we wrote about laws being enacted in Utah to require computer technicians to report child pornography they encounter in the course of their jobs to law enforcement authorities. Some computer technicians, as it turns out, were already doing that; the issue was whether it should be required by law. The Rettenmaier case is taking the question even further.
Reportedly, the FBI has cultivated eight “confidential human sources” in Best Buy’s Geek Squad over a four-year period, according to a judge’s order, with all of them receiving some payment, according to Tom Jackman in the Washington Post. The Geek Squad employees in question were specifically in Best Buy’s data recovery services in Brooks, Ky.
What makes this a problem? “Best Buy searching a computer is legal — the customer authorized it, and the law does not prohibit private searches,” Jackman explains. “But if Best Buy serves as an arm of the government, then a warrant or specific consent is needed.” And the fact that the FBI has cultivated the ongoing relationships and that there is a two-way conversation between the organization and the technicians makes it look more like the Geek Squad is serving as an arm of the government.
For its part, Best Buy contended that the organization had no such policy, that they’re only allowed to turn in pornography they find in the course of their jobs rather than going hunting for it, that it was inappropriate for technicians to be accepting payments, Jackman writes. “Any circumstances in which an employee received payment from the FBI is the result of extremely poor individual judgment, is not something we tolerate and is certainly not a part of our normal business behavior,” a Best Buy spokesman said in a statement.
The case started in November 2011, when Mark Rettenmaier, a gynecological oncologist in Orange County, Calif., took his HP Pavilion desktop to the Best Buy in Mission Viejo, Calif., because it wouldn’t boot up, Jackman explains. “The technicians at the store told him he had a faulty hard drive. If he wanted to retain information from the hard drive, he would need the Geek Squad’s data recovery services in Kentucky,” he writes.
In the process, Rettenmaier signed a form acknowledging that any child pornography found would be turned over to law enforcement authorities, which prosecutors said waived his right to a Fourth Amendment claim.
As it turns out, a Best Buy Geek Squad technician who had been paid by the FBI two months before did indeed find a piece of child pornography on the system – but in unallocated space, meaning the technician required special software to look for it. “In addition, a federal appeals court has ruled that pornography found on unallocated space is insufficient to prove that the user possessed it, since information about when it was accessed, altered or deleted is no longer available,” Jackman writes, because such a file could be put into a computer against the owner’s will or before they owned the system.
On the basis of the file, the FBI got a search warrant and seized Rettenmaier’s cell phone, on which the FBI reportedly found more than 800 other such files, writes Jeremiah Dobruck in the Los Angeles Times. However, in requesting the search warrant, the FBI did not tell the judge that the picture was found in unallocated space, which might have made it more difficult to get the warrant, writes R. Scott Moxley in OC Weekly. There’s also an issue about whether the file would even be considered child pornography at all, Moxley writes in a different OC Weekly article (which also includes some interesting reporting on testimony about just how easily porn can be injected into a computer).
Dobruck notes that taking payments from a law enforcement organization doesn’t necessarily make them an agent of the government. In fact, two Geek Squad employees who said they had received payments also said they had donated the money to charity, writes Andrea Eldredge in the Record Searchlight.
“The problem, from a privacy perspective, is that such rewards create incentives for technicians to start searching people’s perspective rather than just fix them,” writes Jeff John Roberts in Fortune. “Also troubling is that any arrangement between the FBI computer repair services like Best Buy could expand and that, in the future, employees could begin tipping of the agency about other things they find on people’s devices.”
The current status of the case? The judge took two days of testimony earlier this month, after which Rettenmaier’s attorneys had 45 days to file briefs, after which the judge will rule on whether any evidence should be excluded, writes Hannah Fry in the Los Angeles Times.
It should go without saying that child pornography is a heinous crime. But in a day and age where people are concerned about the rule of law and the increased surveillance in our society, it will be interesting to see the outcome of this case. Not to mention, it’s worth keeping in mind if you’re planning to send your hard disk in for repair.
As you may recall, in July the United States and the European Union finally came to an agreement modifying the “Safe Harbor” provisions, which allows companies in the countries to exchange personal data about citizens without having to go through laborious agreements.
The agreement had been in jeopardy since the previous fall, when the European Court of Justice found that, in reaction to the Edward Snowden revelations, the United States did not ensure adequate protection of personal data against surveillance by public authorities for European citizens. Without the Safe Harbor provision, companies that wanted to exchange data between the U.S. and the E.U. about European citizens – such as Google wanting browsing history – would have to individually negotiate elaborate legal agreements. As many as 1500 companies were involved, writes A.J. Dellinger in the International Business Times. So revising it to the Court’s satisfaction was really important.
It took President Donald Trump less than a week to put it in jeopardy again.
On Wednesday, Trump signed an executive order ostensibly to “enhance public safety in the interior of the United States.” But that order also included a provision noting that “Agencies shall, to the extent consistent with applicable law, ensure that their privacy policies exclude persons who are not United States citizens or lawful permanent residents from the protections of the Privacy Act regarding personally identifiable information.” Some experts believe that will mean the E.U. will suspend the agreement.
“While the action may not have been specifically targeting the agreement with the EU, it very well may apply to it by excluding ‘persons who are not United States citizens or lawful permanent residents,’” Dellinger writes. “The phrase would apply to European citizens whose data is traveling across the Atlantic. The executive order puts the U.S. at risk of being sanctioned by the EU for violating its privacy laws and could lead to the suspension of the agreement entirely—a possibility that would be especially troubling for tech companies based in the U.S. who do business overseas.”
It’s also an issue with Canada, writes Michael Geist, a Canadian law professor, in his personal blog. “The decision requires an immediate review by the Privacy Commissioner of Canada on the effect of Canadian personal information and data sharing agreements and a potential re-assessment of what personal information is made available to U.S. agencies,” he recommends.
In response to the executive order, a number of legal professionals are raising the alarm, but it isn’t yet clear what can be done to rescind or modify the executive order to remove the offending paragraph.
In fact, some people in the E.U. had already felt that the protections in the revised Safe Harbor provision were inadequate, and were filing lawsuits, meaning that the Safe Harbor provision was already being threatened without Trump’s action, writes Hogan Lovells in Lexology. “In reality, the future of the Privacy Shield will be linked to the direction of travel of the new Trump administration and the extent to which the assurances given by the previous government on data access controls will stand,” he wrote presciently earlier this week.
If you’re a politics fan and have some time on your hands, there’s some new rabbit holes to go down that give you a great opportunity to compare two Presidents.
First, the Internet Archive has set up an archive of more than 500 hours of Trump footage dating back almost ten years. Think that what he’s saying doesn’t mesh with what he’s said before? Afraid he’s going to pull a 1984 and say we’ve always been at war with Eastasia? Well, the Internet Archive has saved it all.
“The Trump Archive launches today with 700+ televised speeches, interviews, debates, and other news broadcasts related to President-elect Donald Trump, created using the Internet Archive’s TV News Archive,” writes Nancy Watzman in the Internet Archive blog. “A work in progress, the growing collection now includes more than 520 hours of Trump video. The earliest excerpt dates from December 2009, and the collection continues through the present. It includes more than 500 video statements fact checked by FactCheck.org, PolitiFact, and The Washington Post’s Fact Checker covering such controversial topics as immigration, Trump’s tax returns, Hillary Clinton’s emails, and health care.”
What’s more, it’s all freely available. “Reporters, researchers, Wikipedians, and the general public are invited to quote, compare and contrast televised statements made by Trump,” Watzman writes, offering suggestions such as using clips in articles and videos and creating supercuts on topics like Trump’s perspectives of the US press. Moreover, she asked technical people to “help us enhance search and discovery by collaborating in experiments to apply artificial intelligence-driven facial recognition, voice identification, and other video content analysis approaches.”
Doesn’t that sound fun.
This is just a start, Watzman notes. “We’ll explore the idea of creating curated collections for Trump’s nominees to head federal agencies; members of Congress of both parties (for example, perhaps the Senate and House majority and minority leadership); Supreme Court nominees, and so on.”
The whole effort is similar to Politwoops, an effort that started in 2012 to keep track of politicians’ deleted Tweets – including those of President-Elect Trump.
At the same time, much of the content created under President Barack Obama’s administration has also been archived. “The Obama White House website – which includes press articles, blog posts, videos, and photos – will be available at ObamaWhiteHouse.gov, a site maintained by the National Archives and Records Administration (NARA), beginning on January 20, 2017,” according to a post on the aforementioned site. “If you are looking for a post or page on the Obama administration’s WhiteHouse.gov from 2009 through 2017, you can find it by changing the URL to ObamaWhiteHouse.gov.”
Given that President Trump’s administration is already removing content from the White House web pages, this is likely to be useful going forward.
That link also lists all the social media archives from the Obama administration, as well as new social media links for many former White House officials. “From tweets to snaps, all of the material we’ve published online will be preserved with NARA just as previous administrations have done with records ranging from handwritten notes to faxes to emails,” wrote Kori Schulman, Special Assistant to the President and Deputy Chief Digital Officer, in October, explaining how the digital transition would work. “Second, wherever possible, we are working to ensure these materials continue to be accessible on the platforms where they were created, allowing for real time access to the content we’ve developed.
While this is a laudable goal, they kind of had to, writes Lisa Vaas in Naked Security. “The White House didn’t have much choice, given that accessibility of federal government communications is required by the Freedom of Information Act (FOIA),” she writes. “All those tweets and Facebook posts need to be retained and available to the public on request, in a ‘future-proof’ format.” In other words, the material will continue to be available even if one of the platforms goes belly-up, she writes (as, for example, Vine already has).
In addition, there is also a searchable archive of social media posts spanning eight platforms, writes Alex Byer in Politico. While timing was certainly a factor, notes Ian Bogost at The Atlantic, Obama certainly embraced social media.
As well as giving heartsick Democrats something to cry over during the dark days moving forward, the archive will also be studied by researchers, such as the University of Texas School of Information.
Like it or not, social media and the Internet will be an indelible part of the Presidency going forward, just as radio and television were.
This is January, and you know what that means: Trend stories. Specifically, storage trends.
Yes, for some reason a completely arbitrary line on a calendar turns everyone into prognosticators. Actually, the reason is pretty simple: Nobody announces anything in December and early January, and we’ve got to write about something.
Actually, with the consolidation and commoditization of the storage and e-discovery industries, there haven’t been as many predictions and retrospectives as there used to be. Other than worrying about what the Donald Trump administration is going to do, of course.
That’s what was interesting about a recent report from Kroll Ontrack about 2017 storage and security trends. While it was largely based on what the staff was seeing its own business, it still provided a useful snapshot as to what was going on.
The use of flash/solid state drives is increasing. Hold the presses. But Kroll’s evidence for this was interesting: “We have seen a 239 percent increase in the number of hybrid drives needing data recovery since 2014,” the company reports. That’s certainly one indication of, if nothing else, the reliability of such drives – or, perhaps, the lack of it.
The downside of hyper-converged storage. Vendors have been pushing hyper-converged storage and networking recently, billing it as easier to use. While that’s true, it comes with a downside: Vendor lock-in. And Kroll is running into similar issues.
“We are seeing that recovery from these complex systems often requires a custom solution because data is fully integrated into the unit making it difficult to gain sector-level access to the disks,” Kroll reports. Moreover, because hyper-converged devices are simpler, simpler people are using them, which runs into problems. “Organizations are employing less specialized individuals to operate hyper-converged storage systems – employees who may not have the depth of knowledge needed to solve more complex problems,” the company writes. “This presents new challenges when backups need to be verified or when data loss occurs.”
Tape is still around. In a separate survey of 819 IT administrators, Kroll found that many of them still haven’t gotten tape backup working right. “Nearly half of the companies surveyed (49 percent) confirmed they run two or three different backup solutions, with an additional seven percent running four or more parallel solutions,” the company reports. “Nearly one third (27 percent) of all participating companies reported they do not have clear insight into what specific information is stored on their legacy tapes.” In addition, more than half of respondents (56 percent) of respondents said they use different versions of their backup solutions (for example, different versions of the same backup format at each company site).
Consequently, the cost of keeping legacy data accessible, depending on company size, ranges from $10,000 to over $1 million annually. The primary costs are due to storage (70%), maintenance (69%), staff (52%), security (42%), and licenses (38%). And in an ominous sign, up to 40 percent of companies said they intend to terminate their maintenance contracts due to cost.
Security is hard. Kroll notes that stories of ransomware and associated data loss were rampant in 2016. “Hospitals, corporations, individuals and government entities were all exposed or lost data in these attacks,” the company writes. “Wearable technology is especially vulnerable as there can be little to no real security on your device.” For that reason, Kroll predicts a wider use of encryption – assuming a Trump administration will allow us to use it.
Here’s to 2017 and our new Soviet overlords.
Prosecutors investigating a murder have submitted a warrant to Amazon, trying to get data that the suspect’s Amazon Echo smart home assistant might have recorded at the time.
If you don’t have an Echo (introduced in November, 2014) or similar device, it works like this: Unless the mike is shut off, the device is constantly “on,” listening for its name. Once it hears it, it records a snippet of audio so that the statement can be sent to the cloud, analyzed by servers, and then responded to.
In this particular case, on November 22, 2015, James Bates had several people over to watch a football game, including Victor Collins. Collins’ body was found in the hot tub the next day, and Bates was accused of killing him. Bates’ next hearing is scheduled for March 17.
But because Bates owns an Amazon Echo, and reportedly was using it the night of the murder to play music, prosecutors wanted to know if it had heard anything. “The search warrant, signed by a judge in August, requests all ‘audio recordings, transcribed records, text records and other data’ from Bates’ Echo speaker,” writes Jill Bleed for the Associated Press. “So far, authorities have obtained only basic subscriber and account information.”
Not to say the recordings might not be there. “Amazon keeps all of the recordings of you asking Alexa to play WNYC or of you setting a timer for 20 minutes. You can jump into the Alexa companion app and hear all of your requests again if you want to see just how bored you sound when talking to your home voice robot,” writes Jake Swearingen in New York. “I’ve heard from a professor who works in voice research that Amazon deletes all voice data after six months — but Amazon has no stated policy about how long it holds onto that data. Still, if any of this has you feeling uneasy about your Amazon Echo, you can always head to amazon.com/myx, find your Echo, and delete out all of your old voice recordings.”
This isn’t the first time the subject of what listening devices can hear has come up. A couple of years back, when voice-activated devices first started becoming more widely available, some people started freaking out that their voice-activated TVs might be “listening” to them. Some people were also concerned about children’s toys that had intelligent recording devices in them.
Nobody appears to be suggesting that the suspect asked, “Alexa, how do I hide a body?” or anything along those lines. It appears that prosecutors hope that someone giving Alexa a command might have caused the system to record some background noises relevant to the case. “Police did not specify what data they expected to find on Bates’s Echo — nor is it clear what the device could have captured that would have been relevant to the case,” writes Amy Wang in the Washington Post. “Only if someone happened to have triggered his device with its wake word would it have begun recording any audio. Even then, it seems unlikely that audio would be conclusive evidence of an alleged murder.”
And, frankly, it’s possible that prosecutors don’t exactly understand how Amazon Echo works, and are assuming that it’s always on and always recording, Wang writes. “At least part of the search warrant indicated police may not have had a full understanding of how the Echo worked,” she writes. “That allegation — that the Echo is possibly recording at all times without the “wake word” being issued — is incorrect, according to an Amazon spokesperson. The device is constantly listening but not recording, and nothing is streamed to or stored in the cloud without the wake word being detected.”
The search warrant gives some evidence of this, “The Amazon Echo device is constantly listening for the ‘wake’ command of ‘Alexa’ or ‘Amazon,’ and records any command, inquiry, or verbal gesture given after that point, or possibly at all times without the ‘wake word’ being issued,” notes the report.
Amazon, for its part, appears to regard the whole thing as a fishing expedition, and has thus far refused to comply with the warrant. “In a statement, Amazon said it ‘objects to overbroad or otherwise inappropriate demands as a matter of course,’” writes Kathryn Varn in the Tampa Bay Times.
One thing is clear: This isn’t over. “As we connect more things to the Internet in our houses, these devices will become involved in more crime investigations,” predicts Alina Selyukh, a tech blogger for National Public Radio. She points out, for example, that prosecutors used information from a smart meter to note that Bates had used a lot of water that evening, potentially to wash away evidence of a murder.
Moreover, it’s not out of the question that manufacturers of devices such as the Amazon Echo could become obliged to making, keeping, and providing such audio records to law enforcement.
And the case could also become a precedent for the Internet of Things. “’The Arkansas slaying could be a test case for how evidence rules apply to information from home appliances connected to the internet such as water meters, thermostats and lighting systems, said Nuala O’Connor, president of the Center for Democracy & Technology, a nonprofit group that works on privacy and civil-liberties issues,” Bleed writes.
The problem with being a storage nerd is it makes it pretty difficult to enjoy the movies. In this day and age, too many movie plots hinge on computers and data, and moviemakers typically aren’t geeks, so it’s way too easy to lose your suspension of disbelief based on bonehead errors.
Take Rogue One. And yes, here be spoilers; as a good nerd, I saw it opening night, but waited til after Christmas to write this so that most reasonable people had already seen it.
Sneakernet is alive and well. Yes, here we are in a galaxy far, far away, with space travel and holograms and planet destroyers, and we still are exchanging data using tape cartridges, CD-ROMs, USB sticks, and watching a meter as we upload data? And tape cartridges have a handy-dandy loop on them so you can hook them to your belt? Not to mention the fact that, although all the plans are in electronic data storage, there’s no way to gain access to the file other than flying out to that base.
Encryption isn’t a thing? Okay, maybe the reason you couldn’t gain access to the file other than by flying out to the base was for physical security. I’ll buy that. But then they have that entire library stored out there, with all the seeekrit plans for the Death Star, in unencrypted files? See what happens, FBI, when you outlaw encryption?
Data centers powered by renewable energy. Perhaps the Scarif data center was also protected by a moat. With a waterfall. But perhaps the waterfall was there to power the library using renewable energy. It’s nice to know that even the Empire wants to be green.
User interfaces still need work. Okay, it’s not “It’s Unix! I know this!” but apparently all the user interface designers got killed off early in the war because all the technology seems incredibly hard to use. That tape library is pretty snazzy – but there’s no instructions or intuitive interface, and access to the tapes needs to be done manually? And uploading data means you need to walk out on a catwalk to manually adjust the satellite dish? Or hook up a manual data transmission with a big, fat (yet, still incredibly flexible) cable that nonetheless requires you to walk out to a control panel to flip a master switch? (And has a port that just anybody can walk up and plug said cable into?) Not to mention, how screwed are you if, while using those instructionless mechanical hands, you happen to drop the tape cartridge down twenty stories?
We still don’t have a good system for filenames. Admittedly, Erso couldn’t call the blueprints Secret_Plan_to_Destroy_Death_Star, but really, we’re reduced to having Jyn read the filenames manually until she finds the one that’s her nickname? So if Jyn hadn’t been around, the Alliance never would have stumbled on the plan? Knowing a secret about the designer worked to find the back door in Wargames, but shouldn’t we have advanced beyond that by now?
Back doors don’t work. If nothing else, perhaps Rogue One will point out to law enforcement and the federal government why encryption back doors are a bad idea. Erso’s back door allows a couple of rebels with bombs and teeny planes to destroy an $852 quadrillion investment. At least it’s reassuring to find out, after almost 40 years, that someone had created that flaw in the design on purpose.
We still don’t have backups? Rebels are at the Scarif archive? No problem, says Governor Tarkin; we’ll just blow it up – a decision that caused no small amount of hand-wringing among librarians. “Did the Empire have a data backup plan?” worries Gabriel McKee, librarian for collections and services for New York University’s Institute for the Study of the Ancient World, who still hasn’t gotten over the destruction of the library at Alexandria. “What else was stored there, and was any of that data backed up elsewhere? Did Tarkin have authorization to, for lack of a better word, deaccession the entire archive? And could anything of Scarif’s archive have survived such apocalyptic weeding?”
If nothing else, perhaps Rogue One can be used as a cautionary tale of how not to set up a storage archive.