Either Facebook is building yet another massive bit barn in Iowa, and doesn't want you to know about it....

... or this is a massive, massive coincidence. What's a Zuckerberg? We're Siculus!


A legal entity called Siculus Inc plans to build a data centre covering 1 million square foot (c 92,900m2) next door to Facebook's 2.5 million square feet (c 232,257m2) infrastructure campus in Altoona, Iowa.

The undertaking, codenamed Project Sequelant, has already been approved by the Altoona Planning and Zoning Commission.

Is the legal entity working on behalf of Facebook? Altoona city officials told the Des Moines Register they could neither confirm nor deny – even though Facebook has built data centres in the region through Siculus before, in 2013.

Oh, and there's also this 2017 document from the US Securities and Exchange Commission that clearly lists Siculus Inc as a subsidiary of Facebook, along with Greater Kudu LLC – another alias used by Facebook to secure data centre properties in New Mexico.

"We're very excited to see another approximately 1 million-square-foot data centre come to the community," waffled Altoona City administrator Jeff Mark, without naming any names. "It provides a lot of good jobs in the community, both from the contractors and the operations of the data centre."

Major American data centre operators often use shell companies to obscure their identities during negotiations with local authorities and businesses. For example, Google used Sharka LLC when it was planning a campus in Midlothian, Texas, and Jasmine Development LLC in Henderson, Nevada. Facebook previously contracted space as Raven Northbrook in Nebraska.

wave

Amazon throws toys out of pram, ditches plans for New York HQ2 after big trouble in Big Apple

READ MORE

One of the reasons for the smoke and mirrors is the fact that, as soon as locals find out that a big online business comes to town, they lose their shit. Residents start demanding actual benefits for their community, rather than empty platitudes about the transformative power of the digital economy and jobs for out-of-town engineers – something at least partially responsible for bringing down Amazon's HQ2 plans in New York.

The relative anonymity of shell companies enables hyperscalers to lean on local government to change laws. Facebook did this in Iowa with its demand for wind energy production tax credits, but most importantly it permits companies the size of Facebook to negotiate their generous tax breaks in peace.

Facebook started working through Siculus in 2013, when it was developing a $1bn data centre campus called Project Catapult, looking to choose between Iowa and Nebraska. The company pitted the state governments against each other to see which offered more in tax rebates.

Iowa won after palming Facebook approximately $18m in taxpayer development incentives. In return, the state got 30 full-time jobs. Today, after several major expansions, this number is closer to 300.

The same happened when Facebook operated through Greater Kudu on Project Discus in 2016. The biz approached both New Mexico and Utah and essentially thrust the two states into a bidding war over who could throw more money at one of the richest corporations in the world (number 77, to be exact).

Utah was planning to offer up to $240m, but vetoed the decision at the last moment, so Los Lunas in New Mexico won (if you call this winning) after agreeing to forgo any property taxes for the next 30 years, and throwing in tax breaks on the cost of computer equipment.

In 2016, US policy think tank Good Jobs First calculated that tax breaks and other incentives for hyperscale data centres meant that state and local governments ended up paying around $2m per every new job.

Meanwhile, Facebook's own study published in 2018 claimed that the company's data centres in the US, including those in Altoona, added $5.8bn to the country's GDP since 2010, and that for every data centre job, there were five jobs supported elsewhere in the economy. ®

Narrower topics


Other stories you might like

  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading
  • UK government having hard time complying with its own IR35 tax rules
    This shouldn't come as much of a surprise if you've been reading the headlines at all

    Government departments are guilty of high levels of non-compliance with the UK's off-payroll tax regime, according to a report by MPs.

    Difficulties meeting the IR35 rules, which apply to many IT contractors, in central government reflect poor implementation by Her Majesty's Revenue & Customs (HMRC) and other government bodies, the Public Accounts Committee (PAC) said.

    "Central government is spending hundreds of millions of pounds to cover tax owed for individuals wrongly assessed as self-employed. Government departments and agencies owed, or expected to owe, HMRC £263 million in 2020–21 due to incorrect administration of the rules," the report said.

    Continue reading
  • Internet went offline in Pakistan as protestors marched for ousted prime minister
    Two hour outage 'consistent with an intentional disruption to service' said NetBlocks

    Internet interruption-watcher NetBlocks has reported internet outages across Pakistan on Wednesday, perhaps timed to coincide with large public protests over the ousting of Prime Minister Imran Khan.

    The watchdog organisation asserted that outages started after 5:00PM and lasted for about two hours. NetBlocks referred to them as “consistent with an intentional disruption to service.”

    Continue reading
  • Suspected phishing email crime boss cuffed in Nigeria
    Interpol, cops swoop with intel from cybersecurity bods

    Interpol and cops in Africa have arrested a Nigerian man suspected of running a multi-continent cybercrime ring that specialized in phishing emails targeting businesses.

    His alleged operation was responsible for so-called business email compromise (BEC), a mix of fraud and social engineering in which staff at targeted companies are hoodwinked into, for example, wiring funds to scammers or sending out sensitive information. This can be done by sending messages that impersonate executives or suppliers, with instructions on where to send payments or data, sometimes by breaking into an employee's work email account to do so.

    The 37-year-old's detention is part of a year-long, counter-BEC initiative code-named Operation Delilah that involved international law enforcement, and started with intelligence from cybersecurity companies Group-IB, Palo Alto Networks Unit 42, and Trend Micro.

    Continue reading

Biting the hand that feeds IT © 1998–2022