Written By: - Date published: 7:54 pm, October 28th, 2020 - 8 comments
Had to laugh, albeit with a resigned anger, when I saw this in my emails today. This afternoon, the official Trump campaign website was hacked and defaced.
Written By: - Date published: 8:26 am, August 21st, 2019 - 23 comments
I’ve just been reading the decision by the IPCA on their botched and blatantly political searches on Nicky Hager. But there is a more serious problem. The police appear to be technically and legally incapable of enforcing our 2002 legislation about computer crimes. Perhaps a specialist office like the SFO who can garner the skills to deal with it – without political linkages being an issue.
Written By: - Date published: 10:10 am, June 6th, 2017 - 28 comments
From The Intercept: “Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept.”
Written By: - Date published: 9:12 pm, July 31st, 2015 - 55 comments
Astonishing release late on a Friday afternoon (dump time!) that the police will not be pursuing any action against Slater/Ede for hacking Labour’s website. Given a whole year to investigate, they didn’t manage to find out how to spell Nicky Hager or Tim Barnett’s names.
Written By: - Date published: 8:48 pm, August 23rd, 2014 - 12 comments
National’s membership website had an open backdoor that’s just been closed. The hacker who found it didn’t do what John Key reckons anyone would do and take advantage; he reported. Careful John Key – your ethics are showing.
Written By: - Date published: 5:00 am, August 15th, 2014 - 277 comments
The intention of this post is to examine the similarities and differences between the hacking of Cameron Slater’s communications on the one hand, and the hacking of the Labour Party donor database on the other. There are two important issues to determine in both cases and I will cover them separately. The first is the legality of the hacking and the second is the ethics of using the resulting information regardless of whether the obtaining of the information in the first instance was unlawful.