• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

FBI Raids and takes all equipment at datacenter

http://blog.wired.com/27bstrok...4/data-centers-ra.html

The FBI on Tuesday defended its raids on at least two data centers in Texas, in which agents carted out equipment and disrupted service to hundreds of businesses.

The raids were part of an investigation prompted by complaints from AT&T and Verizon about unpaid bills allegedly owed by some data center customers, according to court records. One data center owner charges that the telecoms are using the FBI to collect debts that should be resolved in civil court. But on Tuesday, an FBI spokesman disputed that charge.

"We wouldn?t be looking at it if it was a civil matter," says Mark White, spokesman for the FBI's Dallas office. "And a judge wouldn?t sign a federal search warrant if there wasn?t probable cause to believe that a fraud took place and that the equipment we asked to seize had evidence pertaining to the criminal violation."

In interviews with Threat Level, companies affected by the raids say they've lost millions of dollars in equipment and business after the FBI hauled off gear belonging to phone and VoIP providers, a credit card processing company and other businesses that housed equipment at the centers. Nobody has been charged in the FBI's investigation.

According to the owner of one co-location facility, Crydon Technology, which was raided on March 12, FBI agents seized about 220 servers belonging to him and his customers, as well as routers, switches, cabinets for storing servers and even power strips. Authorities also raided his home, where they seized eight iPods, some belonging to his three children, five XBoxes, a PlayStation3 system and a Wii gaming console, among other equipment. Agents also seized about $200,000 from the owner's business accounts, $1,000 from his teenage daughter's account and more than $10,000 in a personal bank account belonging to the elderly mother of his former comptroller.

Mike Faulkner, owner of Crydon, says the seizure has resulted in him losing millions of dollars in revenue. It's also put many of his customers out of business or at risk of closure.

The raids are the result of complaints filed by AT&T and Verizon about small VoIP service providers whom the telecoms say owe them money for connectivity services. But instead of focusing the raid on those companies, Faulkner and others say the FBI vacuumed up equipment and data belonging to hundreds of unrelated businesses.

In addition to Crydon, the data center of Core IP Networks was raided last week. Customers who went to Core IP to try to retrieve their equipment were threatened with arrest, according to an announcement posted online by the company's CEO, Matthew Simpson. According to Simpson, the FBI is investigating a company that purchased services from Core IP in the past but had never co-located equipment at Core IP's address. Simpson reported that 50 businesses lost access to their e-mail and data as a result of the raid. Some of those clients are phone companies, and the loss of their equipment has meant that some of their customers lost emergency 911 access.

"If you run a data center, please be aware that in our great country, the FBI can come into your place of business at any time and take whatever they want, with no reason," Simpson wrote.

Faulkner says the FBI seized about $2.5 million from Simpson's personal bank account. Simpson did not respond to a request for comment.

Faulkner and others say that the FBI agent who led the raid, Special Agent Allyn Lynd from the Dallas field office, warned them not to discuss the raid with each other or with the press.

But a 39-page affidavit (.pdf) related to the Crydon raid provides a convoluted account of the investigation. It alleges that a number of conspirators, some of who may have connections to Faulkner, conspired to obtain agreements from AT&T and Verizon to purchase connectivity services with the telecoms. Several documents used to provide proof of business ownership and financial stability were forged, according to the affidavit. For example, the affidavit claims that one of the conspirators named Ronald Northern sent AT&T a bill from Verizon to show that he had a history of paying for services on time. The bill was allegedly forged with Verizon's logo -- which the company is claiming is a trademark infringement -- and that the corporation number the conspirator used actually belonged to a different Verizon customer.

Northern could not be reached for comment.

The affidavit claims that Faulkner, Northern and others committed mail and wire fraud, criminal e-mail abuse (stemming from separate allegations of spamming), criminal copyright infringement and criminal use of fraudulent documents. The affidavit mentions several companies that Faulkner has been connected to including, Crydon, Premier Voice and Union Datacom.

But mixed in with these allegations is a separate tale that hints at the larger story behind the raid. AT&T and Verizon say they're owed about $6 million in fees from VoIP service providers who used servers that were co-located at Crydon and the other data centers. The telecoms claim that these VoIP providers used up more than 120 million "physical connectivity minutes" without paying for them, and that attempts by AT&T and Verizon to collect on the debts proved fruitless.

"Based on my investigation and that of AT&T and Verizon," writes Special Agent Lynd in the affidavit, "I believe individuals associated with Lonestar Power and Premier Voice defrauded AT&T and Verizon out of hundreds of millions of minutes of physical connectivity service and significant revenue by means of the submission of false/fraudulent credit information and other false representations."

Faulkner, who was a part owner of Premier Voice before selling it about a year ago, acknowledges that Premier owed money to AT&T at one time -- though he says he's not certain it was for interconnection. He says that debt was assumed by the new owner when he sold the company. Either way, he says, this would be categorized as corporate debt, not fraud.

"There's a big difference between stealing money and owing money," he says.

He says he often invests in troubled companies that are carrying debt when he buys them.

"Usually you settle the debt," he says. "But AT&T never contacted me about owing money. Verizon never contacted me."

Faulkner says the two telecoms have used the FBI to seize equipment to obtain evidence through a criminal investigation instead of pursuing the companies through civil litigation and the discovery process. And instead of targeting the investigation specifically at the VoIP companies, he says the FBI swept in everyone who had servers in the same place where the VoIP servers were located. As a result, all of Crydon Technology's equipment was seized, as was the equipment of numerous businesses that had the bad luck to own servers running out of Crydon's facility.

"They're destroying more and more customers and it just doesn't seem to make sense," Faulkner says. "They've done a horrible amount of damage and have been so barbaric in the way they've shut things down. If they just picked some random guy off the street to do this investigation, he could have done a better job than the FBI did."

Among more than 300 businesses affected by the raid on Crydon were Intelmate, which provides inmate calling services for prisons and jails and had about $100,000 in equipment seized in the raid; a credit card processing company that had just become PCI compliant and was in the process of signing on its first customers; Primary Target, a video game company that makes first-person shooters; a mortgage brokerage; and a number of VoIP companies and international telecoms that provided customers with service to the U.S. through servers belonging to a separate company Faulkner ran called Intelivox. These customers essentially lost connectivity to the U.S. after the raid, Faulkner says.

Faulkner says the FBI appears to have assumed that all the servers located at Crydon's address belonged to him, and didn't seem to understand the concept of co-location.

The seized data included transactional records for companies, which means the companies won't be able to bill customers for services already rendered before the raid.

"All of our clients will have to refund their customers, and we're in the hole now to refund our customers," says Faulkner. "I could tell the FBI agent had never even considered that. He just said, 'Well, that's your problem.'"

The owner of a credit card processing company who had servers at Crydon says he lost about $35,000 in equipment in the seizure, and that the survival of his company is at risk until he secures a new location. He asked that he and his company not be named because the company is in the process of securing business partners to launch its processing service. He fears that news about the disruption to his business operation could lead potential partners to avoid contracting with him. To keep his launch on track, he's had to purchase about $32,000 in new equipment.

He said when he tried to explain to an FBI agent that some of the servers that were seized belonged to him and not to Faulkner, the FBI agent implied he was lying.

"We were treated like we were criminals," he said. "They assumed there was no legitimate business in there."

In addition to the transaction servers taken from Crydon's facility, he also lost telephone service for his company after the FBI raided Core IP, which housed a business that was providing his company with VoIP.

FBI spokesman White says the equipment seizures were necessary.

"My understanding is that the way these things are hooked up is that they're interconnected to each other," he says. "Company A may be involved in some criminal activity and because of the interconnectivity of all these things, the information of what company A is doing may be sitting on company B or C or D's equipment."

White says the FBI is working with affected companies to provide them with copies of seized data they need to run their businesses.

"It's not that we're doing nothing to assist them," White says. "We've repeatedly asked the companies to call and provide us with the information we need so we can get the info they need back to them. It is a time-consuming process."

The owner of the card-processing company, however, says the FBI has been "completely unresponsive" to the needs of Crydon customers caught up in the raid. An agent gave him a fax number to send the FBI details about the equipment that belongs to him, but the fax number didn't work. Then, he says, the agent in charge took a vacation.

"They were all unavailable after they effectively seized all of our equipment," he says.

An agent told the customer that no equipment would be released until agents could determine if it was used in criminal activity. And if it was used for criminal activity, it wouldn't be released until after a trial.

"Our equipment could be there indefinitely," the customer said. "There's been no due process.... I consider this to be an issue for anyone owning a data center right now. That they have this much power and can take anyone just because your equipment is inside a facility.... They're supposed to limit their search and seizure to the owner of the equipment."

Faulkner says he's managed to replicate mail servers and some functionality for some customers and is building up new business resources elsewhere -- this time offshore in Panama, Mexico and Canada, where the FBI would have trouble seizing servers in the future. The Electronic Frontier Foundation has contacted him to investigate the FBI's possible violation of due process.

Faulkner says when he visited the FBI's office after the raid, he found numerous cubicles stacked full of servers seized in other raids that were waiting for someone to examine them. The irony, he says, is that in the case of his servers the data was all hardware encrypted.

"It would take a lot of NSA time to crack just one of them," Faulkner says.

Many of the allegations against Faulkner are based on claims from an unidentified informant who told the FBI that he used to work for Faulkner, and witnessed many criminal acts Faulkner committed. The witness told authorities he was "unaware of any legitimate business being run by Faulkner and that as far as he/she knew all of his income was derived from his illegal activities." The informant also claimed Faulkner used crack cocaine and methamphetamine and engaged in commercial spamming.

Faulkner says the unnamed informant is a former employee who was fired after failing to show up to work over an extended period.

"We paid him $70,000 to help us launch a VoIP business, and he never actually did anything," Faulkner says.

Faulkner says he doesn't do drugs and he's never conducted spamming nor been associated with spammers. He says when he has discovered spammers using ISP services he provided through companies he owned in the past, he would block their activities.

FBI spokesman White says the equipment seizures were necessary.

"My understanding is that the way these things are hooked up is that they're interconnected to each other," he says. "Company A may be involved in some criminal activity and because of the interconnectivity of all these things, the information of what company A is doing may be sitting on company B or C or D's equipment."

I searched but didnt find anything. WTF? This can't even be true. Anybody at the FBI involved with this should lose their jobs and go to jail.
 
Originally posted by: Ns1
WTF would you need the switches and routers and shit for?

no shit.. That'd be like suspecting a drug dealer was in a hotel, then taking all shit from all rooms in the hotel because its possible its all linked.
 
I can't see any legal reason for the FBI to take equipment because someone owes money . I suspect there is something being stored there that they have an interest in and we are not getting the whole story. I can see them taking the servers and maybe even the routers but down to the power strips ? Maybe they had agents that were computer illiterate and just took everything.


 
Originally posted by: Ns1
WTF would you need the switches and routers and shit for?

So they could listen to mp3s and play video games together at the office, duh.

they seized eight iPods, some belonging to his three children, five XBoxes, a PlayStation3 system and a Wii gaming console
 
Semi old news and there is a LOT more to the story then that. There's a reason why it seems so bad.... the FBI can't release information that would compromise the investigation, so when you only see the story from the POV of the person being arrested you don't get the whole picture.

I'm sure the FBI had a very valid reason, and fraud seems the most likely.
 
Originally posted by: Modelworks
I can't see any legal reason for the FBI to take equipment because someone owes money . I suspect there is something being stored there that they have an interest in and we are not getting the whole story. I can see them taking the servers and maybe even the routers but down to the power strips ? Maybe they had agents that were computer illiterate and just took everything.

It's not just taking related equipment, they took equipment of other, non-related, non accused customers, whom just so happened to be colocated in the same datacenter. The FBI seemed to think that since the stuff was all in the same datacenter, it was all related. They are putting hundreds of innocent companies out of business that had nothing to do with anything.

Seriously, someone needs to lose their job over this.
 
Originally posted by: Modelworks
I can't see any legal reason for the FBI to take equipment because someone owes money . I suspect there is something being stored there that they have an interest in and we are not getting the whole story. I can see them taking the servers and maybe even the routers but down to the power strips ? Maybe they had agents that were computer illiterate and just took everything.

Read the story. They forged documents and looks like stole from ATT by using these documents while using verzions name. That is why the FBI was there.

I got that and I only skimmed it.


"But a 39-page affidavit (.pdf) related to the Crydon raid provides a convoluted account of the investigation. It alleges that a number of conspirators, some of who may have connections to Faulkner, conspired to obtain agreements from AT&T and Verizon to purchase connectivity services with the telecoms. Several documents used to provide proof of business ownership and financial stability were forged, according to the affidavit. For example, the affidavit claims that one of the conspirators named Ronald Northern sent AT&T a bill from Verizon to show that he had a history of paying for services on time. The bill was allegedly forged with Verizon's logo -- which the company is claiming is a trademark infringement -- and that the corporation number the conspirator used actually belonged to a different Verizon customer."

Also this is one side of the story and I can still find reason for the raid.
 
Originally posted by: TechBoyJK


It's not just taking related equipment, they took equipment of other, non-related, non accused customers, whom just so happened to be colocated in the same datacenter. The FBI seemed to think that since the stuff was all in the same datacenter, it was all related. They are putting hundreds of innocent companies out of business that had nothing to do with anything.

Seriously, someone needs to lose their job over this.


Anything that has a flash chip can be used to store information. I have stored information in a routers flash before that nobody would even know was there unless they specifically downloaded the firmware from the router . Routers often have a small amount of flash that is not used .

There is more to this than just a bad debt.
 
Originally posted by: Modelworks
Originally posted by: TechBoyJK


It's not just taking related equipment, they took equipment of other, non-related, non accused customers, whom just so happened to be colocated in the same datacenter. The FBI seemed to think that since the stuff was all in the same datacenter, it was all related. They are putting hundreds of innocent companies out of business that had nothing to do with anything.

Seriously, someone needs to lose their job over this.


Anything that has a flash chip can be used to store information. I have stored information in a routers flash before that nobody would even know was there unless they specifically downloaded the firmware from the router . Routers often have a small amount of flash that is not used .

There is more to this than just a bad debt.

I understand that. I work in a datacenter. What is claimed in the article is that equipment from non-related customers was taken from the datacenter just because it was in the same datacenter.

 
Originally posted by: TechBoyJK
FBI spokesman White says the equipment seizures were necessary.

"My understanding is that the way these things are hooked up is that they're interconnected to each other," he says. "Company A may be involved in some criminal activity and because of the interconnectivity of all these things, the information of what company A is doing may be sitting on company B or C or D's equipment."

I searched but didnt find anything. WTF? This can't even be true. Anybody at the FBI involved with this should lose their jobs and go to jail.

Technically, MY computer is connected to those ones...
 
Originally posted by: TechBoyJK
Originally posted by: Ns1
WTF would you need the switches and routers and shit for?

no shit.. That'd be like suspecting a drug dealer was in a hotel, then taking all shit from all rooms in the hotel because its possible its all linked.

They always take that shit, claiming they could have been purchased with proceeds from a criminal enterprise.

I bought my BIL a Zune30 a while ago. But when he was arrested, the police confiscated it as evidence. I haven't really followed up on it (as the case is still pending), but I'm sure it will somehow become "lost"
 
Originally posted by: Marlin1975
Originally posted by: Modelworks
I can't see any legal reason for the FBI to take equipment because someone owes money . I suspect there is something being stored there that they have an interest in and we are not getting the whole story. I can see them taking the servers and maybe even the routers but down to the power strips ? Maybe they had agents that were computer illiterate and just took everything.

Read the story. They forged documents and looks like stole from ATT by using these documents while using verzions name. That is why the FBI was there.

I got that and I only skimmed it.


"But a 39-page affidavit (.pdf) related to the Crydon raid provides a convoluted account of the investigation. It alleges that a number of conspirators, some of who may have connections to Faulkner, conspired to obtain agreements from AT&T and Verizon to purchase connectivity services with the telecoms. Several documents used to provide proof of business ownership and financial stability were forged, according to the affidavit. For example, the affidavit claims that one of the conspirators named Ronald Northern sent AT&T a bill from Verizon to show that he had a history of paying for services on time. The bill was allegedly forged with Verizon's logo -- which the company is claiming is a trademark infringement -- and that the corporation number the conspirator used actually belonged to a different Verizon customer."

Also this is one side of the story and I can still find reason for the raid.

I understand why there was a raid. My problem is with the scope of the raid. They hauled off equipment from innocent customers whose company's life is dependant on.

 
Originally posted by: TechBoyJK

I understand why there was a raid. My problem is with the scope of the raid. They hauled off equipment from innocent customers whose company's life is dependant on.


I think the problem is that the FBI agents are not that computer literate. They did not know how to separate what was and was not part of the investigation . They probably should have just arrested everyone involved and then gotten some qualified people to go in and work out what was and was not hardware that should be taken. I'm guessing they thought that if they did it that way it might give the targets time to destroy evidence, so they just seized everything.
 
Originally posted by: TechBoyJK
Originally posted by: Marlin1975
Originally posted by: Modelworks
I can't see any legal reason for the FBI to take equipment because someone owes money . I suspect there is something being stored there that they have an interest in and we are not getting the whole story. I can see them taking the servers and maybe even the routers but down to the power strips ? Maybe they had agents that were computer illiterate and just took everything.

Read the story. They forged documents and looks like stole from ATT by using these documents while using verzions name. That is why the FBI was there.

I got that and I only skimmed it.


"But a 39-page affidavit (.pdf) related to the Crydon raid provides a convoluted account of the investigation. It alleges that a number of conspirators, some of who may have connections to Faulkner, conspired to obtain agreements from AT&T and Verizon to purchase connectivity services with the telecoms. Several documents used to provide proof of business ownership and financial stability were forged, according to the affidavit. For example, the affidavit claims that one of the conspirators named Ronald Northern sent AT&T a bill from Verizon to show that he had a history of paying for services on time. The bill was allegedly forged with Verizon's logo -- which the company is claiming is a trademark infringement -- and that the corporation number the conspirator used actually belonged to a different Verizon customer."

Also this is one side of the story and I can still find reason for the raid.

I understand why there was a raid. My problem is with the scope of the raid. They hauled off equipment from innocent customers whose company's life is dependant on.

Sorta-similar recent case in Colorado involving the scope of a warrant and the collateral damage to innocent clients. Wonder if it could serve as a precedent if anyone decides to enlist the ACLU in a class-action suit.

http://www.aclu-co.org/docket/...00821_description.html
http://www.nytimes.com/2009/04...l?_r=2&ref=global-home
 
We must be missing details. If this story is true and the people are exonerated, AT&T and Verizon should get blamed in addition to the FBI folks losing their jobs and going to jail.

Do these guys not understand co-location?
 
I think you guys are missing who got raided. It wasn't a customer of Core IP, it was Core IP themselves. They only had 1-2 cages at the datacenter and were being hosted by Telx. Telx didn't get raided, Core IP did, therefore all of Core IP's equipment gets taken. This is no different then any other raid on any other data center. If the FBI knows who you are involved in the fraud they will take your shit, if I happen to be a customer of the person involved in the fraud then so be it.
 
There just has to be more to this story. I refuse to believe that they are just ripping servers out of racks for the hell of it.

Both sides aren't saying something.
 
Originally posted by: Ns1
Originally posted by: Crusty
if I happen to be a customer of the person involved in the fraud then so be it.

Easy to say when it's not your shit getting jacked

It wouldn't affect me if one of my providers got raided by the FBI. That's why you have redundancy, emergency recovery plans, and backups. Don't forget the backups of the backups too.
 
can't say I've ever had any problems with the FBI at my data center... they've come around a couple times over the years to confiscate individual servers or setup I guess taps on other boxes.
 
Originally posted by: Crusty
Originally posted by: Ns1
Originally posted by: Crusty
if I happen to be a customer of the person involved in the fraud then so be it.

Easy to say when it's not your shit getting jacked

It wouldn't affect me if one of my providers got raided by the FBI. That's why you have redundancy, emergency recovery plans, and backups. Don't forget the backups of the backups too.


Yup, I bet those you could restore those backups instantaneously too

Oh wait, you don't any servers to restore them to

Or any routers to connect said servers to

Unless, of course, you have an alternate location housing your backup servers AND backup tapes, in which case the OP doesn't apply to you anyway.


Please spare me. If the situation like the OP WON'T affect you, then you are an outlier
 
Originally posted by: Ns1
Originally posted by: Crusty
Originally posted by: Ns1
Originally posted by: Crusty
if I happen to be a customer of the person involved in the fraud then so be it.

Easy to say when it's not your shit getting jacked

It wouldn't affect me if one of my providers got raided by the FBI. That's why you have redundancy, emergency recovery plans, and backups. Don't forget the backups of the backups too.


Yup, I bet those you could restore those backups instantaneously too

Oh wait, you don't any servers to restore them to

Or any routers to connect said servers to

Unless, of course, you have an alternate location housing your backup servers AND backup tapes, in which case the OP doesn't apply to you anyway.

First of all, you are a complete idiot if you trust your business operations to ONE location with ONE provider. Having an entire data center go offline will not affect our day to day operations one bit.

Second of all, if you only have on-site backups you are even MORE of an idiot.

 
Originally posted by: Ns1

Unless, of course, you have an alternate location housing your backup servers AND backup tapes, in which case the OP doesn't apply to you anyway.


I would never keep the only backup where the servers are located. Even at home I do not keep the only backup at home. If there is a fire, flood, tornado, whatever I would lose everything. Actually use a bank safe deposit box for that.

$32 a year , well worth it.
 
Back
Top