What we can learn from Jason Chen’s experience

Not too long ago, Jason Chen, a Gizmodo editor, had all the computer related materials in his residence seized by cops acting on a warrant in relation to Apple’s missing iPhone 4G prototype. If you recall, Jason Chen got hold of the pre-release iPhone from a guy who found it in a California bar. So Jason blogged about it (the iPhone), a move that rubbed Apple the wrong way. Steve Jobs, the CEO of Apple, then claimed that the phone was stolen.

To cut to the chase, a group from California’s Rapid Enforcement Allied Computer Team (REACT), acting on said warrant to seize any computer-related hardware, software and documentation, raided Jason Chen’s residence and confiscated at least eighteen items. Some of the items that the REACT group left with are:

  • 1 Apple MacBook
  • 2 Apple MacBook Pros
  • 1 Dell XPS410 desktop computer
  • 1 IBM Thinkpad
  • 1 iPad 32 GB
  • 1 Western Digital external HD
  • 2 Seagate external HDs (250 GB and 500 GB)
  • 2 USB flash drives

That’s a total of six computers and five external storage devices. That’s way fewer than what I have around me right now, but that’s beside the point. The point I want to get across with this article is the importance of encrypting your hard drives. Did Jason Chen encrypt those hard drives? I don’t know. My guess is that he did not, but that’s just my guess. If the hard drives in those computers, and the external ones were NOT encrypted, then access to Jason’s data is easy pickings. Picture a bunch of guys combing through your files and folders without your authorization. It’s digital rape.

Debating whether the warrant and seizure of Jason’s personal properties were illegal or not is, as far as Jason’s data is concerned, a waste of time. Fact is, a group of people can now access his data, that is, if he did not encrypt the drives. He has to be worried.

What if he had all the drives encrypted? What if he had taken appropriate steps to enhance the physical security posture of his computers and the external drives? He would have no need to worry knowing that nobody can access his data without first compelling him to divulge the passphrases used to encrypt the hard drives.

It’s a didactic experience for all who own and use a computer. Even if you think that you have nothing to hide, always encrypt your hard drives, always. You should try and give your computer the maximum physical security rating – PARANOID. Why? Because you never know when or whether you will be reliving Jason Chen’s experience.

Disk encryption capabilities is one of the most important features I look for on any Linux or BSD distribution that I review. That’s one of the reasons why I like Fedora’s implementation of disk encryption. No distro does it better or simpler. Take advantage of the security technologies built into the Linux/BSD kernels.

Related Posts

How the Swedish Pirate Party Platform Backfires on Free Software By Richard Stallman: The bullying of the copyright industry in Sweden inspired the launch of the first political party whose platform is to reduce cop...
Governments May Fake SSL Certificates Today two computer security researchers, Christopher Soghoian and Sid Stamm, released a draft of a forthcoming research paper in which they present ev...
Why I Will Not Sign the Public Domain Manifesto By Richard M. Stallman: The Public Domain Manifesto (http://www.publicdomainmanifesto.org/node/8) has its heart in the right place as it objects to so...
Google Superbowl Ad Explains The Need for Search Privacy Google's ad during yesterday's Superbowl explained in less than a minute how the story of someone's life can be pieced together from their search quer...
The Toyota recall and the case for open, auditable source code Public Safety is not a matter of Private Concern In a recent article, Slate's Farhad Manjoo attempts to play down fears of faulty software in car bra...
Privacy by Design: The 7 Foundational Principles Privacy by Design is a concept I developed back in the 90’s, to address the ever-growing and systemic effects of Information and Communication Technol...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.

Leave a Comment

Your email address will not be published. Required fields are marked *