![]() ![]() ![]() ![]() |
|
Tinshed
Wellington, New Zealand
Tinshed: Does the PM or anyone in National think it's appropriate that Ede who was a senior staffer went through a Labour Party database?
Speaking for myself, there are a range of possible answers to this. They range from "charge him with theft now!" to "good on him!". My response was that it was unwise of him to do so. Not illegal, not firing material (unless as a sacrificial lamb). By doing so he has put his boss, the PM, in a embarrassing situation and that is never a good idea. But he did apologise to the Labour Party for doing so back in 2011 and gave assurances that there was no "misuse" of the information.
Do I think he is the first member of a Prime Minister's office to do something that can be regarded as unwise? No, I don't. That doesn't make his actions any less unwise but I do find the level of outrage overblown. All of this was three years ago...
The details of the plan were worked out between Slater and Ede in the final days before the launch. The computer logs show them both accessing the Labour site on 7 June, Ede (identifiable by his computer’s technical characteristics) arriving at 10.11 p.m. and Slater (who forgot to disguise his home IP address) two minutes later at 10.13 p.m. Then on 10 June, just two days before the attack was launched, they to-ed and fro-ed by e-mail, working out which bits of the Labour information Slater should emphasise.
But it had been a close shave. The next day, 14 June, Ede and Slater exchanged several e-mails expressing their relief that Labour had not discovered Ede’s role. Ede wrote: ‘An interesting sidebar in Pagani’s story is that they’re chasing us by matching IP neighbourhoods and the types of computer we use. You stand out like dogs balls because of your damn Mac!!!!!’ He continued, ‘In my case, I wish to offer a hearty sigh of relief and celebrate dynamic IP addresses.’ He meant his computer regularly changed its IP address, which ensured he could not be identified by its IP address. If Ede had had a static IP address like Slater, the Labour Party might have been able to prove he had been inside their computer system. He titled his e-mail, ‘Thank You for dynamic IP addresses.’
JWR:bazzer:ajobbins: Much better conduct from the Greens: [source]
Greens show they can be trusted - with foldersThe Green Party showed a nice side of politics when it returned a misplaced folder to Nikki Kaye. Spotting the folder on a flight, a party staffer contacted colleagues about what to do and was told to return it to the food safety minister unread. A spokesman for Kaye confirmed the folder was misplaced, but that it contained ‘‘no sensitive information’’, with only a few speaking notes and printed pages from her diary. ‘‘She is very grateful to the Green Party staffer for picking it up.’’
I have no doubt that this is simply because this was the best outcome for the Greens rather than for any altruistic reasons. By returning the folder that contained "no sensitive information" they can paint themselves as the good guys. I wonder what would've happened if the folder had contained something they could use?
bazzer:JWR:bazzer:ajobbins: Much better conduct from the Greens: [source]
Greens show they can be trusted - with foldersThe Green Party showed a nice side of politics when it returned a misplaced folder to Nikki Kaye. Spotting the folder on a flight, a party staffer contacted colleagues about what to do and was told to return it to the food safety minister unread. A spokesman for Kaye confirmed the folder was misplaced, but that it contained ‘‘no sensitive information’’, with only a few speaking notes and printed pages from her diary. ‘‘She is very grateful to the Green Party staffer for picking it up.’’
I have no doubt that this is simply because this was the best outcome for the Greens rather than for any altruistic reasons. By returning the folder that contained "no sensitive information" they can paint themselves as the good guys. I wonder what would've happened if the folder had contained something they could use?
A bit of reading comprehension called for here.
The Green Party staffer was told to return the folder unread!
It is irrelevant whether he information was sensitive or not.
Please support Geekzone by subscribing, or using one of our referral links: Quic Broadband (free setup code: R587125ERQ6VE) | Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync
freitasm:
It's not a political question for me. It's a moral and ethical question.
Galaxy S10
Garmin Fenix 5
freitasm: Ok, for those who think the "take the TV" analogy is bad, let's change it.
If you leave your credit card on your desk and go out for lunch, and someone comes in, copy the number and goes ordering things on Amazon, is it ok? No, it's fraud, not theft. And it is not ok.
Same thing: if someone sees the data and makes a copy of it to act on it, is it ok? Knowing names and credit card numbers were in that data would you feel the same if your information was part of the dump?
It's not a political question for me. It's a moral and ethical question.
6FIEND: the people who trawl the streets while the Auckland Inorganic Waste collections happen aren't engaging in illegal activity when they take things are they?
gzt: Leaving the analogy behind - in this 'hacking' (lol) it appears there was intent and there is some evidence for that. Aside from that, the applicable laws are a different matter.
Edit: I really do not want to extend this analogy or defend it lol. It's obviously not physical property and the laws are all different etc, etc. Just answering the question there.
gzt:CB_24: It was hardly 'hacking' was it?
It is not hacking unless there was a previous attack on the security permissions. Labour use of the 'H' word is just silly.
However, I do agree with the use of the word 'intrusion' if it used to describe the privacy context. The membership data and credit card donation data was private to the people that provided it and should not be used for any other purpose. If that occurred it is very bad.
There are other aspects also which seem more relevant to the overall Hager book topic so I posted them over there.
gzt:gzt:CB_24: It was hardly 'hacking' was it?
It is not hacking unless there was a previous attack on the security permissions. Labour use of the 'H' word is just silly.
However, I do agree with the use of the word 'intrusion' if it used to describe the privacy context. The membership data and credit card donation data was private to the people that provided it and should not be used for any other purpose. If that occurred it is very bad.
There are other aspects also which seem more relevant to the overall Hager book topic so I posted them over there.
I might have to revist some of these comments. But as before there are no indications this was hacking in the sense of breaking security or working around security restrictions.
But it is now a bit clearer that the information gained was not gained from simple documents. Additional technical sophistication was used to extract the information from the files obtained. This is much closer to 'hacking' in the sense of applying technical knowledge to gain access to information.
But like everyone else I'm just amazed (putting it politely) that the Labour Party did not pursue legal avenues for the return/destruction of these files containing information private to individuals that had donated to them or communicated with the Labour Party in some way. It's a serious matter I think the Labour Party have some responsibility for and I don't see any indications the party lived up to that responsibility to get that information returned.
I do think that overall this is like finding a bag on the street. Instead of just looking at the wallet to get an address or phone number to return it then to rifle through it and finding some sealed envelopes, open them and examine their contents.
6FIEND:freitasm: Ok, for those who think the "take the TV" analogy is bad, let's change it.
If you leave your credit card on your desk and go out for lunch, and someone comes in, copy the number and goes ordering things on Amazon, is it ok? No, it's fraud, not theft. And it is not ok.
Same thing: if someone sees the data and makes a copy of it to act on it, is it ok? Knowing names and credit card numbers were in that data would you feel the same if your information was part of the dump?
It's not a political question for me. It's a moral and ethical question.
Your example is still not analogous... The closest approximation to the "credit card on the desk" example is that someone came along and saw that it was left there and announced to all and sundry in the office, "Hey! Look what this dumbass left here on his desk!" And then teased them mercilessly about it when they returned and berated them for all the bad things that could have happened to them if it had been someone less scrupulous who had discovered it. Sure, someone copied down the "credit card number" (and used it as proof that it had been lying around unsecured) ...but nobody went "ordering things on Amazon" or acted in any way on the data other than to rub the negligent party's nose in it.
(edit: jumbled words)
Twitter: ajobbins
|
![]() ![]() ![]() ![]() |