Talking Stratfor hack on Perth radio 6PR

So there I was, having a quiet drink late on Friday night, chatting on Twitter with Crikey’s Bernard Keane and journalist Gabriella Lahti about the Stratfor hack, when who should poke his head over the parapet but Jason Jordan, who was about to present 6PR’s Nightline

Long story short, less than half an hour later I’m live on air chatting about the whole thing, including who Anonymous are and what their motives might be, and what might happen next.

Thanks to technical difficulties my end I couldn’t record 6PR’s audio stream, and there wasn’t time to sort that out before we went live. So this audio was recorded my end, and that means I sound just fine on my quality microphone and the radio station is at the other end of the phone.

I’ve left in a bit of my conversation with the producer before and after so you can experience The Magic of Radio. Technically that’s a breach of the NSW Surveillance Devices Act 2007 because I didn’t seek permission first but, like, shut up.

Yes, it really was just two seconds from me getting ready to being live on air.

The audio is ©2011 Radio 6PR Perth Pty Ltd, but since they don’t archive these interviews I reckon it’s fair enough putting it here provided you just listen to it and I link back to 6PR and encourage you to listen. If you’re in Perth. Or if you want to stream it.

Talking Stratfor hack on ABC TV’s “7.30”

I was interviewed for ABC TV’s current affairs program 7.30 yesterday about Anonymous’ hack of Stratfor. The story was Hack attack reveals Australians’ credit card details.

Interestingly, they chose to focus on the “liberation” of the credit card numbers and how it affected the Australian victims.

They didn’t use any of the material we recorded on who the various victims might be, what the still-to-come publication of some 2.7 million of Stratfor’s internal emails might reveal, and the effect that could have on both Stratfor and the individuals who’ve been feeding them information.

Indeed, this article by Barrett Brown makes it clear that those emails and other internal documents were the real target, not the credit card numbers. Anonymous is trying to give the impression that there’s some powerful stuff in there, but we’ll see.

I guess when you’ve only got six minutes and have to start with “Who is Anonymous?” and “Who is Stratfor?” then there’s not really enough time to get to “This is really a follow-up to Anonymous’ hack of HBGary Federal earlier in the year.”

Careful viewers will notice that reporter Sara Everingham described me as someone who “goes by the name Stilgherrian”, which is a bit of an oops but something that seemed to cause more distress to my Twitter followers than me.

Since some people have asked, I might as well tell you that the interview was shot in a spare office at the ABC’s Ultimo headquarters — rather different from the outdoor shot the last time I was on 7.30.

And despite the story being written and voiced by Sara Everingham, I was actually interviewed by Sarah Dingle. Ah, the Magic of Television!

The video in the story is Flash, so it won’t work on your iDevice. But there’s also an MP4 version of the video.

Talking Stratfor hack and more on 1395 FIVEaa Adelaide

I was scheduled to talk about the year 2011 in technology on 1395 FIVEaa Adelaide this morning, but with the news that Malcolm Turnbull’s credit card details were exposed in the Stratfor hack that too was on the agenda.

The original plan was to cover the kinds of issues raised in my 2011 tech wrap for Crikey and the Patch Monday podcast episodes 2011: the year in security and 2011: IT’s year of consolidation.

We also covered computer support for the electoral roll and computerised voting, since Senator Cory Bernardi had raised the subject of people casting multiple votes and how only a handful of alleged cases had been prosecuted.

While I supported the idea of an online electoral roll, I spoke against online voting. I’ve written about that before at ABC’s The Drum, Electronic voting a threat to democracy.

The regular presenters were on holidays, so the host was William Goodings.

The audio is ©2011 dmgRadio Australia, but here it is ‘cos it hasn’t been posted on the radio station’s website. Besides, this is a reasonable plug.

[Update 0910: Link added to article on electronic voting.]

Not hacked, bugs

It turns out that my technical difficulties the other day were in all likelihood not the result of being hacked but an arsehat software incompatibility.

The short version is that the weirdnesses I experienced were caused by:

  • OS X Lion has known problems dealing with certain PDF files. It appears that the problematic PDF, produced by OpenOffice.org and then emailed via a Mailman mailing list, was one of them. Hence Apple Mail and sometimes Preview would crash when dealing with this PDF.
  • Norton Internet Security for Mac version 4 is only for OS X up to Snow Leopard. OS X Lion requires Norton Internet Security for Mac version 5. It’s a shame neither NIS nor Lion knew this.
  • Norton Internet Security probably hadn’t updated its virus definitions in the previous week because I was travelling a fair bit and was probably offline at the scheduled time.

I determined all this while I was running backups. It’s always sensible to make sure your backups are in order before doing any significant technical work.

I discovered that:

  • Copying the 400GB of Time Machine backups of my old MacBook Pro from one external USB drive (pocket sized) to another (bulkier, for archiving) using the Finder took more than 7 hours.
  • Creating the initial Time Machine backup of my new MacBook Pro on the pocket USB drive, some 220GB of data, took a little over three hours.
  • Encrypting that 640GB USB drive took 14.5 hours.

In hindsight, I suppose I should have checked software compatibility when transferring everything from the dead Snow Leopard machine to Lion, but then it did flag other stuff as incompatible so I assumed… yeah, I know.

Live Blog: How pwned am I?

Uhoh. My MacBook Pro may have been hacked. I’ve already done a bit of troubleshooting, but this looks like it’s going to be A Thing, so I’ve decided to liveblog it. And here’s the liveblog.

The brief version is that Apple Mail crashed when it tried to open a particular email message dated 4 November, one containing a PDF file. Consistently. So I thought I’d do a virus scan on it.

That’s when Norton Internet Security reported that LiveUpdate was missing pieces, and I saw that it hadn’t checked for updates since… 4 November. Eek.

Now all the action would have happened on my battered old MacBook Pro running OS X 10.6 Snow Leopard. That computer finally died of motherboard failure on 11 November and I replaced it with a fresh OS X 10.7 Lion machine on 12 November.

However I did just transfer everything across using Apple’s migration tool, rather than freshly installing all the software and just copying the data, so… well… who knows what the hell is going on?

Deep in my heart I suspect that it was just bugginess and a dying computer, copied badly to a new computer. I hope.

If you want to follow or even help, the liveblog is over the jump.

[Update 11.20pm: Things may not be as bad as I thought. It turns out that Norton Internet Security for Mac version 4.x is only compatible for OS X up to version 10.6 Snow Leopard. There’s NIS version 5.x for OS X 10.7 Lion. It looks like it’s a straightforward software compatibility problem, and the lack of updates could be because I was travelling that week and the computer was offline when updates were scheduled. If this is all the case, I’m a bit disappointed that the software itself couldn’t figure this out.]

Continue reading “Live Blog: How pwned am I?”