Google
 

Aardvark Daily

The world's longest-running online daily news and commentary publication, now in its 30th year. The opinion pieces presented here are not purported to be fact but reasonable effort is made to ensure accuracy.

Content copyright © 1995 - 2025 to Bruce Simpson (aka Aardvark), the logo was kindly created for Aardvark Daily by the folks at aardvark.co.uk



Please visit the sponsor!
Please visit the sponsor!

Who's (ir)responsible for this?

11 September 2007

According SIS director Warren Tucker, NZ government computer systems have been "hacked into" by foreign governments.

What the?

As a taxpayer who (as someone living in NZ) might well be affected by such security lapses, I'd like a little more information than this vague admission.

What computer systems?

What information was accessed?

Who was (ir)responsible for supposedly ensuring these systems were secure and what has been done to avoid a recurrence?

I don't think it's too much to ask to have these questions answered promptly and honestly by those charged with such responsbilities and paid accordingly.

Now we know that there's no such thing as a 100% secure computer system but I'd really love to know which were the most often or severely compromised systems and what OS/applications they were running.

Anyone care to bet that there's some Microsoft code in there somewhere?

And, if that's the case, then whoever recommended an MS environment for anything that could remotely be considered "important" or worthy protecting from unauthorised access ought to have their backside kicked all the way to the dole queue.

OurRegion - Manawatu
Please visit the sponsor!
Although MS's code has gotten a lot better of late (could it have actually gotten any worse?), it's still far from what any informed person would consider "secure".

One only has to look at the number of zero-day exploits that pop up with monotonous regularity and the way that the ELS (evil little sods) out there are now hawking shrink-wrapped hacking systems that will exploit every known weakness of this ubiquitous code.

And where are the security audits that would have detected compromised systems, allowing them to be shut down or "cleansed" straight away?

According to news reports on the matter, "in some cases, departments did not even realise their computer systems had been breached" -- which means any ELS could have popped trojans, spyware or whatever on those machines resulting in goodness knows how much additional data-loss.

According to a story running on Stuff.co.nz, "in one attack, a department had been penetrated and a programme had been inserted to generate bogus but genuine looking e-mails".

Hello... is *anyone* keeping an eye on these systems?

"Sensitive information had been stolen and attempts had been made to gain access to classified information". What? Why on earth is "sensitive information" being placed on publicly accessible computer systems in the first place??

Securing a computer system isn't the easiest task in the world but the basics are pretty fundamental -- hell, even the banking industry have a handle on that.

First up -- don't use a mainstream OS with more holes than your granny's colander.

There are plenty of *very* secure OSes out there such as NetBSD, OpenBSD or (even) FreeBSD that make a hacker's job far more difficult -- so difficult in fact that the "average" ELS will simply take a look and move on to easier pastures.

Secondly, the logs of all systems should be inspected every day to ensure that there are no unauthorised accesses or even potentially dangerous attempts to breach security. Such attempted breaches can represent the prelude to a full-on attack and should tricker a heightened sense of awareness.

Thirdly, if you can't guarantee the strength of your security, don't put "sensitive" or "classified" information on publicly accessible systems -- that's just commonsense!

Now I know there are a lot of very savvy computer security people who read this column, perhaps they'd care to chip in with their 2-cents worth.

And what do you think?

Is our government computing infrastructure being adequately protected?

Are the right OSes, practices and disciplines being used?

Or does the NZ government have a great big "kick me" sign hanging on their computer systems?

Have your say on this...

PERMALINK to this column

Oh, and don't forget today's sci/tech news headlines


Rank This Aardvark Page

 

Change Font

Sci-Tech headlines

 


Features:

The EZ Battery Reconditioning scam

Beware The Alternative Energy Scammers

The Great "Run Your Car On Water" Scam

 

Recent Columns

What the hell is going on?
This will be my last column for 2025, unless something really interesting or dramatic happens between now and the 5th of January 2026...

Should we really have commercialised AI?
It's fitting that one of my final columns of the year is (once again) on the topic of artificial intelligence...

Fun comes with penalties
There was a time when any enterprising young lad who had taken geekdom into their heart could experiment and tinker with technology without fear...

Back to the future for Christmas 2025
As a grumpy old man, I miss the computers we all loved back in the late 1970s and early 1980s...

New Zealand misses the AI bus
Every few years, Rio Tinto makes a big noise about how hard-done-by they are and how they need cheaper electricity prices...

Is AI the pocket calculator of comprehension?
I was still at school when the pocket calculator became a thing...

Next step, a surveillance state
Digital ID is on the horizon and some say it's inevitable...

Let's see how this flies
No, despite the title, we're not talking drones today... we're talking about an attempt to sidestep and usurp...

The end begins - age-gating
I kind of miss the old days... a time when the internet was reserved for us geeks and a few academics...

Did we just prove panspermia?
Analysis of samples from a couple of asteroids visited by robotic craft has just provided a substantial boost to the theory of panspermia...