Weekly Wrap 9

A weekly summary of what I’ve been doing elsewhere on the internets — and this week there’s been a lot of it!

Articles

  • Gay marriage an irrelevant sideshow, for ABC Unleashed. I reckon the way “the gay and lesbian community” abused Senator Penny Wong for simply re-stating Labor policy was disgusting. Did they really expect her to break ranks and criticise her party’s policy just because some random punter asked her a question on Q&A?
  • AFACT didn’t explain notices to iiNet for ZDNet.com.au. On Wednesday I covered day three of the Federal Court appeal by the Australian Federation Against Copyright Theft in their case against Australia’s third-largest ISP. This is straight reportage of the morning’s proceedings.
  • Will AFACT’s appeal solve anything? for ZDNet.com.au. On Thursday, I wrote this op-ed piece, picking up on one of the appeal judge’s comments about this appeal not necessarily solving anything long-term.

Podcasts

  • Patch Monday episode 51, “Data breaches: it’s criminals again” with guest Brad Arkin, who Mark Goudie, who heads up the forensics practice for Verizon Business Asia-Pacific in Melbourne. We discuss Verizon’s 2010 Data Breach Investigations Report [PDF].
  • A Series of Tubes episode 114. Host Richard Chirgwin talks with APNIC Chief Scientist Geoff Houston about the impending exhaustion of IPv4 internet addresses, and me about the AFACT v iiNet appeal, the demise of Google Wave, and a few political things.

Media Appearances

[Photo: The view from Courtroom 1, Federal Court of Australia, Sydney, photographed on 4 August 2010. The brown smudges are not on your screen: the windows need cleaning from the outside.]

Alastair MacGibbon on the Cyber Crime report

While I’ve already given my opinion of the federal parliament’s Cyber Crime report, why not listen to an actual expert opinion?

Last night I spoke with Alastair MacGibbon (pictured) for today’s Patch Monday podcast. We recorded way too much material for the podcast, so here’s the full conversation.

MacGibbon was the founding Director of the Australian High Tech Crime Centre, was with the Australian Federal Police for 15 years, he graduated from the FBI’s National Academy in the US, was Head of Trust, Safety & Customer Support for eBay Asia Pacific for four years — in short, he knows his way around this stuff.

We talk through some of the recommendations of the report Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime released last Monday — including MacGibbon’s own somewhat controversial view that we should actively block people’s computers from accessing the internet if their security software isn’t up to scratch.

If you’d like to grab all of these Conversations in the future, subscribe to the RSS feed.

[Photo: Alastair MacGibbon speaking at the recent Intelligence Squared debate, Governments should not censor the internet, in a frame grab taken from the ABC TV broadcast.]

Weekly Wrap 3

A weekly summary of what I’ve been doing elsewhere on the internets.

Articles

  • NBN not over the line yet for Crikey, which outlines last weekend’s agreement between Telstra and the National Broadband Network Company (NBN Co). If this non-binding Heads of Agreement makes it all the way to a final deal, NBN Co pays an estimated $9 billion over coming years in exchange for access to Telstra’s “passive network assets” such as cable pits and ducts and exchanges, and to compensate Telstra for losing customers from its copper network to NBN fibre.
  • No wonder the cyber criminals are winning for ABC Unleashed, my commentary on the House of Representatives report on cyber crime, Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime.

Podcasts

  • Patch Monday episode 45 is about the future, near and far. The near future of business priorities for the coming financial year — cloud computing, collaboration and mobility — and the further future of the Telstra / NBN Co agreement.

Media Appearances

[Photo: “Samsung Space”, taken at the launch of Samsung’s Galaxy S Android-based smartphone at the Royal Hall of Industries, The Entertainment Quarter, Sydney on 23 June 2010. Click to embiggen. As we entered this UV-lit space, Mike Oldfield’s “Tubular Bells” played. Of course.]

Weekly Wrap 1

Starting today, each Saturday or Sunday I’ll post a list of the stuff that I’ve had published elsewhere in the previous week.

  • Patch Monday podcast #44: Microsoft versus the cybercriminals. A look at some of the less-well-known work Microsoft is doing in this field — including Microsoft’s Digital Crimes Unit sponsoring a pop song in Nigeria, a legal tactic for taking down botnets, and how they identify malware through reputation analysis.
  • How evil is Google, exactly? for ABC Unleashed. My argument is that Google’s collection of random Wi-Fi data isn’t the massive privacy breach some people are making out, but that it does raise serious questions about whether Google can be trusted. The comment stream is fascinating.
  • Turks hack Israeli Facebook accounts over Gaza blockade incident for Crikey. This appears to be the first time that individual Facebook users’ accounts have been the target of political hacking, as opposed to those taking an active part in the propaganda war.

I also did a radio spot on 891 ABC Adelaide early on Monday morning, but I wasn’t quite awake and I forgot to record it. If I recall correctly, I spoke about my visit to Microsoft’s Redmond campus.

If you’re still short of reading for this long weekend, you can always dig back further into my media output.

Visiting Microsoft HQ to talk security: what should I ask?

I’m off to America! Some tin-pot little IT start-up called Microsoft has invited me to visit their headquarters in Redmond, Washington (pictured) to find out what they’re doing about security, and in particular their Trustworthy Computing initiatives.

Now if you’re a crusty old network administrator like me, you may think that “Microsoft” and “security” in the same sentence is an oxymoron. A decade ago I was building Linux-based firewalls and, like so many people doing the same, I referred to Windows-based computers as “the targets”. And certainly the vast majority of the world’s malware is targeted at Windows.

But I’ve always though that the simplistic “Windows is bad, m’kay” was a bit, well, simplistic. Information security isn’t just about the technology, it’s also about people. Human factors are also the weakest link. And over the years I’ve found that people who throw around those tired platform-wars slogans usually aren’t up to date when it comes to the things they love to hate.

So, I’m off to Redmond later this month to spend three days with some of Microsoft’s engineers and developers, including briefing sessions with senior executives from Microsoft’s Trustworthy Computing Group.

Continue reading “Visiting Microsoft HQ to talk security: what should I ask?”