Skip to content or view screen version

Police Seize UK Indymedia Server (Again)

imc-uk-features | 23.01.2009 00:09 | Indymedia Server Seizure | Animal Liberation | Indymedia | Repression

On 22 January 2009 an Indymedia server was seized by the Police in Manchester. This was related to postings about the recent Stop Huntingdon Animal Cruelty (SHAC) trial.

Kent Police had e-mailed imc-uk-contact in the morning requesting that personal information about the Judge from the recent SHAC trial in the UK be removed from the site. However this information had already been quickly removed in line with IMC UK policy. The e-mail also requested information relating to the poster be retained. Indymedia as an open posting news service does not log such information about its sources.

The machine was handed to the Police by the management of UK Grid, a Manchester based colocation facility, without a warrant being shown. It is believed that a warrant for this one server may exist and have been issued by a Chief Inspector. As the server was a mirror of the site, it can be concluded that the validity of the seizure wasn't checked, and the police attacked Indymedia infrastructure in the UK.

Other sites that have been affected as a result of this seizure include London Indymedia, the global Indymedia documentation project server, la Soja Mata – an anti-GM soya campaign focusing on South American development, Transition Sheffield and a Canadian campaign against the 2010 olympics.

For details see Indymedia Uk Server Seizure Info Page and Press Release #1

Indymedia Coverage: IMC Athens | IMC Barcelona [en] | IMC Brasil | IMC Germany | Indybay | IMC Ireland | IMC Nantes [fr] | IMC New York | IMC Poland | IMC Switzerland [it]

Other Coverage: The Register | SchNews | Gulli [de] | Annalist [de] | heise online [de] | slashdot | Global Integrity Commons

Previous Seizures: FBI seizure, London | British Transport Police seizure, Bristol 2005

Indymedia targeted
Indymedia targeted


IMC Server Seizure Info


On 22 January 2009, Kent Police seized an Indymedia server hosted by Manchester-based colocation facility UK Grid and run by the alternative news platform Indymedia UK. The server was taken in relation to comments on an article regarding the convictions in the recent Stop Huntingdon Animal Cruelty (SHAC) trial. Seven activists were sentenced to a total of 50 years in prison.

In the morning, Kent Police had emailed Indymedia UK, an independent online news platform, requesting that personal information about Justice Neil Butterfield, the trial judge, be removed from the Indymedia website and that details of the poster be retained.

Indymedia UK volunteers had already removed the information in line with the projects own privacy policy. Indymedia UK was unable to comply with Kent Police's request to retain data relating to poster. As an open publishing project, Indymedia UK has set up Apache to not log IP addresses. Furthermore, the Police had been informed that the server in question was a mirror server and therefore not the machine that the comments were posted to. Nevertheless, Police seized the machine which was handed over by the management of UK Grid. No warrant was shown.

Dr. Lee Salter, a senior lecturer in journalism at the University of the West of England, told Indymedia "Journalistic material is protected by law, and the police should not gather more information than is relevant for their investigation - by seizing this server they are not only getting information on Indymedia but also on wholly unrelated groups. The police should know that Indymedia does not hold personal information on its participants, so it is a concern is that the police are collecting random information on participants".

The loss of a server represents serious damage to the Indymedia infrastructure in the UK. Several websites including the global Indymedia documentation project, the new website of Indymedia London, la Soja Mata (an anti-GM soya campaign focusing on South American development), Transition Sheffield and a Canadian campaign against the 2010 Olympics were affected. Most of these websites could be restored.

The present case is not the first time that Indymedia servers were seized in the UK. Shortly before the opening of the European Social Forum in 2004 in London, a main Indymedia server was seized from the hosting company Rackspace in an operation which involved an Italian Judge, an American District Court and the FBI.

In 2005, the server of Indymedia Bristol was seized under a search warrant. One Indymedia Bristol volunteer was arrested on suspicion of incitement to criminal damage, but was never charged.

As with previous cases, Indymedia UK stayed online this time. This was possible due to a system of "mirrors", which was set up to protect the technical infrastructure of the alternative media project. Despite the resource intensive interruptions caused by server seizures, the DIY-media activists continue to provide a platform for "news straight from the streets".

Info Sheet 24.01.2009 by: imc-uk press group

imc-uk-features

Additions

A good reason to use Tor when posting controversial information

23.01.2009 13:08

We are told that Indymedia doesn't log IP addresses or other identifying information about posters, but I wouldn't rely on this - accidents do happen, and there may be other machines belonging to ISPs along the way logging things.

So if you are wanting to post controversial information, I would recommend using the Tor program to hide your IP address. It is totally free and fairly easy to install.  http://www.torproject.org/ It means that Indymedia, nor anyone else along the way, can link your computer with the visit to their website.

After you have installed it, check it is working by going to a site such as  http://www.whatismyip.com/ and seeing what IP address it sees you as coming from. It should be one different to your real IP address.

Ultimately though, anything of dubious legality is going to be removed by Indymedia fairly quickly, since like it or not, they are bound by the laws of the land, and if they don't, they get shut down.

So for absolute freedom of speech, you will need to post information on an anonymous network such as:

Tor - Tor has the ability to run "hidden" webservers as well as to mask your IP address on regular websites
I2P -  http://www.i2p2.de/ - you can run anonymous uncensorable websites on this.
Freenet -  http://freenetproject.org/ - this can host anonymous, uncensored websites too.

Note that these networks are only visible to other people on them, so your audience will be limited. But they are free to install and use, so the more people that are on them, the better.

@non


ARE YOU BEING SERVED? SchNews Repost

23.01.2009 15:45

ARE YOU BEING SERVED?

An Indymedia server was seized by police in Manchester yesterday (22nd). This comes after somebody had posted the address of the judge in the SHAC trial on Indymedia, leading to Kent Police requesting that the relevant posts be removed, and the IP address of their author be divulged (eg the unique number given to each internet connection, which can be used to trace the user). The posts had already been pulled, in line with IMC UK policy protecting privacy, but because Indymedia don’t log the IP addresses of people publishing on it, they couldn’t help police with their enquiries.

Indymedia is one of the few websites in the land of blogs and open posting that doesn’t log IP addresses, which puts it in contravention of the 2006 EU Directive about the retention of data, obliging sites to log who’s visiting and posting. Nearly all other sites do retain this data – something to think about when you blaze away in the comments section on sites by blogspot, wordpress, facebook and nearly all others.

The police gained a warrant to take this one server, presumably to sift through it to find IP addresses, but Indymedia already knew the police wouldn’t find what they’re looking for as they watched it go out the door. This EU Directive has never been tested in Britain, and it remains to be seen if this will be the first time. But it would be a major own-goal for the police to do so considering the publicity it would generate for Indymedia.

The seizure hasn’t affected the running of Indymedia as the server was one of several mirrors. It’s just an inconvenience and has been taken as a general attempt by police to attack IMC infrastructure. Several sites were temporarily affected including London Indy, and sites for an anti-GM group plus a Canadian campaign against the 2010 Olympics.

Indymedia continues to be a place to publish and read news which protects your online privacy – visit www.indymedia.org.uk

SchNews Repost


There was no warrant and the document left by the police

23.01.2009 16:02

Receipt the police left, UK Grid names blacked out
Receipt the police left, UK Grid names blacked out

The people at UK Grid say that they asked the police for a warrant, the police said they didn't have one but could get one after a phone call. It appears that the machine was handed over by UK Grid without a warrant being served.

IMC'er


Andy Robbins is the cop behind the SHAC prosecutions

23.01.2009 22:17

Andy Robbins, the cop whose name is on the document posted here, is the main person behind the repression of Stop Huntingdon Animal Cruelty (SHAC) over the past few years.

He is quoted in a lot of mainstream media articles about the SHAC trials.

anon


EU Data Retention Directive for internet not yet in force until March

24.01.2009 15:59

The reposted SchNews article is wrong about the EU Data Retention Directive

"2006 EU Directive about the retention of data, obliging sites to log who’s visiting and posting"

The implementation of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 (on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC) by the UK and many other EU countries is in two phases.

The first one, dealing with telephone and mobile phone call and location records already came into force in October 2007.

The second phase, dealing with some but not all Internet activity, e.g. email addressees and recipients, "internet telephony" etc. only comes into force this 15th March 2009.

See the Home Office consultation document

Consultation: Transposition of Directive 2006/24/EC (.pdf)

Appendix B of which has the text of the proposed Draft Data Retention (EC Directive) Regulations 2008,

However these Regulations have not yet been signed by a Minister, or rubber stamped by Parliament, although they probably will be by March.

The Directive only applies to Telecommunications and Internet Service Providers, not to their customers, not even those hosting their own servers on a small scale. It may not even be applied to small or medium sized ISPs or co-location hosting companies like UK Grid, relying on the logfiles generated by their larger, upstream ISPs.

anonymous


some info

01.02.2009 02:55

i thought it was time to make a contribution.... just to clarify: the server was encrypted - is that not obvious by the fact we lost the passphrase to a partition just a few weeks before the server was seized? Consequently, the police now have a £2,500 lump of metal full of random ones and zeros. there is little or no chance that they will be able to figure out anything relevant to their investigation; additionally, even if they were to gain access to any of the data on that was on the server, they would be unable to find anything to help them. this is because, as stated before, indymedia does not log personal data, and even if it did, this machine was a mirror of the publish server. should the police really desire to know anything more that is already in the public domain, they know perfectly well how to contact the imc-uk collective and they will be able to be pointed in the right direction. should they desire to know anything that is not in the public domain, indymedia will most likely be unable to provide this as work is done in as open and transparent a manner as possible.

one final thing to add: @non was spot on with the post about tor.

imcista
- Homepage: http://www.indymedia.org.uk


The SHAC PGP "Mystery"

02.02.2009 22:06

The "evidence" didn't link them to organising or taking part in direct action, but for reporting that it had happened (as SHAC used to publicise ALF communiques before it became illegal - Terrorism Act 2006). This is where the "evidence came from the autosave function of documents.", because although anonymously sent communiques were deleted afterwards (from whom they were recieved by), auto-save would have left it on the computers in certain circumstances (for example a computer crashing).

But is this actually relevant? Not at all, they only needed to point at the SHAC website to prove that activists had anonymously recieved ALF communiques and released them. Forensic evidence is not in reality part of the picture when they openly and publicily released such statements, unless of course links are broken and the cops didn't get a screenshot.

Either way though, the "evidence" was based on receiving anonymous communiques, not sending them. Crime is essentially now based on one's curiosity over an encryped email, if you open it and read it, you then share an "association" with an unknown criminal (even if you completely disagree with them and don't bother to release the communique to others!)

All in all, the activists were guilty of an "association" with criminals, i.e. recieving anonymous communiques from unknown persons, or reposting them. They are not guilty, as anyone might believe, of an "association" with crime, which is an extreme difference to an "association" with those who committed crime. For example, newspapers can do a report from an anonymous criminal, and that is fine, but if they write an article about their 'personal' association with that crime, it is not. The irony being the former tactic is now also illegal.

For example, Smash EDO web-activists could easily be jailed under the same law, because the website reports regarding illegal direct action (even just reposting from indymedia), as a specific example; the quarter of a million pound damage earlier this year. The campaign would therefore have an "association" with the criminals, especially by financially supporting them, or pomoting such prisoner support for them. "Conspiring with unknown persons" basically means if you do anything (even vocally support an action/individual), you are conspiring with them to commit crime. If that crime is political, you are a terrorist. Isn't it now all so easy, even obvious?

Bottom line: Seven activists got fifty years for reporting on what the mainstream media aren't allowed to talk about freely - illegal direct action. Talking about PGP, or relating it to the SHAC trial, is quite obviously a "red herring".

---

What you might be thinking now is; but they wouldn't send away the EDO 9 for 50+ years, because they can would they? Of course not, yet. A look at history always reveals the answers - always. The reason SHAC received such harsh sentences is because the militant animal liberation movement has been receiving them for decades, and no offence to anyone, but the militant anti-militarist movement hasn't experienced the reality of repression through the courts as of yet, let alone built up an illegal direct action movement (actions: yes, movement: no). It took illegal liberation after liberation before the courts successfully demonised those rescuing non-humans in the 80s, sending them to prison for years by the 90s, in the same way they will begin to demonise individuals taking illegal actions to rescue humans from wars, climate change etc. If you think this is a warped vegan-imagination, then wonder where the prisoner lists are to support all these anti-militarist direct action warriors; that have long term sentences for the actions legal or otherwise. They don't exist, yet.

All in all, illegally saving lives will only be praised for so long within each issue, then it will be swiftly repressed. Smash EDO will be at the frontlines of the repression of the anti-militarist movement, clearly, as are SHAC to the animal liberation movement. But this is barely the beginning for smash edo, as I'm sure those within the campaign are well aware of, the vegans especially I hope ;) Governments don't roll over and die, and more importantly, they don't let their businesses suffer in the same way - just look at the support for the banking system and you'll realise how its going to take a while to shut down the Brighton bomb makers! But this far from mean its pointless and the campaign shouldn't be happening, the opposite is true. Just like G8 and the WTO, EDO are just like HLS, a meeting engagement between the people and the state, with everything at stake; the lives of the innocent. It might take 10 years, 20 or 100, but the fact remains - direct action the only way forward, and it works.

clarity


Comments

Display the following 58 comments

  1. Next trial — Lynn Sawyer
  2. Free Speech — anon
  3. Hosting — Anonii
  4. Suspicous Minds — Metabolically-challenged Elvis
  5. Being a bit of a luddite.... — Lynn Sawyer
  6. Hosting outside the UK — olive
  7. Olive & Lynne — Metabolically-challenged Elvis
  8. re: Suspicious Minds — v3g4n
  9. the problem is not the judge... — comment
  10. Indybay article — reposter
  11. Free Speech — Mike
  12. v3gan — Metabolically-challenged Elvis
  13. Translation in italian — leo
  14. v3g4n — anon
  15. From IMC Barcelona — ImcBarcelona
  16. re: Suspicious Minds — alwaysshariff
  17. responses to some comments — v3g4n
  18. Why was the machine given without a friggin' warrant ? — unbelievable
  19. This is a non-event better forgotten — unbelieveable
  20. Actually "unbelieveable"... — IMC'er
  21. Warrants not always needed! — Warrant?
  22. No need for a warrant — terror(ized)
  23. Warrant — Fred
  24. How so? — also anon
  25. So many people talking poo — i dispair
  26. The accident theory — imcer
  27. Disproportionate Response — collateral damage
  28. I mentioned all that in another topic — dude
  29. You think GCHQ can break https? — anon
  30. anon — dude
  31. As well — dude
  32. The security page and 256-bit AES — IMC Techie
  33. Further more... — IMC Techie
  34. Shut your eyes and trust in me — xMCSE
  35. Haha ouch — xMCSE
  36. The truth about encryption and the law — Hugh
  37. Hugh's Confused? — Cypher
  38. Plausible deniability — Yaysus Fuckin Christus
  39. I have looked into AES-256 a bit — dude
  40. The encryption key — Indy Techy
  41. Implausible — Weird son of angry bastard
  42. "if that partition is hidden"... — Indy Techy
  43. problems and solutions — i hate the state
  44. Techy? Techie? — xMCSE
  45. Politics more important than technicalities here — collateral damage
  46. E for Encrypt — xMCSE
  47. Isn't this the same as the SHAC PGP mystery — SHAC PGP
  48. Who, me? — xMCSE
  49. responses to some of the technical points — g33k
  50. Geek on g33k action — xMCSE
  51. @IMCista — xMSCE
  52. encrypting a remote server — g33k
  53. Trial n Error — xMCSE
  54. re - xMCSE — clarity
  55. Judge Dread — xMCSE
  56. encrypted servers vulnerable via Firewire ports — g33k
  57. HTTPS encryption does not hide IP addresses — worried about comms data retention
  58. re: HTTPS encryption does not hide IP addresses — g33k