
In 2008, someone hacked the website of British MP Harriet Harman.
Harman, who was deputy leader of the Labour Party at the time, had a spoof message posted on her blog claiming that she had resigned and was switching to the Conservatives:
To friends, foes and fans,
Below is a copy of the resignation letter that landed on Gordon’s desk this morning.
I couldn’t be bothered to type a completely new one, seeing as Quentin Davies (LO-SER!) had written a perfectly good one here, I thought I’d just change the relevant sections… a swap for a swap if you like.
In another update, the hacked website claimed that Harman was lending her support to Boris Johnson, the Conservative candidate for Mayor of London.

How did a hacker break into Harman’s website? Well, according to the Guido Fawkes blog, they discovered that Harriet Harman’s password was ummm.. rather weak.
Username: Harriet
Password: Harman
Oh dear oh dear. Of course, it wasn’t to be the last time that British parliamentarians were found to have a poor grasp of computer security.
So, why talk about this 2008 hack now? Well, we now know who hacked Harriet Harman’s website.
Last year, Kemi Badenoch was elected the conservative MP for Saffron Walden. Badenoch is perhaps not your typical Tory MP. She studied computer systems engineering at university, and has worked since as a software engineer and systems analyst.
And, when she starred in a video answering quirky questions, she revealed her naughty secret between giggles:
Interviewer: What’s the naughtiest thing you’ve ever done?
Kemi Badenoch: About 10 years ago I hacked into… a Labour MP’s website and I changed all the stuff in there to say nice things about Tories.
Breaking into someone else’s website is, of course, an offence under the Computer Misuse Act (unauthorised access), and changing its content is also an offence (unauthorised modification). No laughing matter.
It doesn’t matter a jot that Harriet Harman had such an appalling password.
The version of the video published on YouTube, perhaps sensibly, chose to edit out the naughty secret. But the Mail on Sunday managed to get its paws on a copy regardless last weekend.
This media interest motivated Badenoch to issue an apology, describing the incident as “a foolish prank over a decade ago, for which I apologise”.
With so much time having passed I don’t think Kemi Badenoch is going to find herself in any legal trouble, and Harriet Harman has forgiven her.
But regardless that Badenoch’s hack was motivated more by mischief than malice or money, I think it’s a pretty poor show. Badenoch was 28 years old at the time of the offence, and can hardly shrug off the incident as the result of a heady cocktail of political fervour and youthful exuberance.
To hear more about this incident, be sure to listen to this episode of the “Smashing Security” podcast:
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name is Graham Cluley.
LastPass Enterprise simplifies password management for companies of every size with the right tools to secure your business with centralized control of employee passwords and applications.
But LastPass isn't just for enterprises. It's an equally great solution for business teams, families, and single users.
Go to smashingsecurity.com/lastpass to see why LastPass is the trusted enterprise password manager of over 33,000 businesses.
They hacked into her account back in 2008 where she blogged, and they posted a spoof resignation letter. And the letter went like this.
It said, to friends, foes, and fans, below is a copy of the resignation letter that has landed on Gordon Brown's desk this morning.
I couldn't be bothered to type a completely new one, so I've used instead one from Quentin Davies. Loser, it said. Who's written a perfectly good one here.
So she linked to someone else's resignation. Anyway, it's a very bizarre thing for a senior politician, right, to post up.
And they also posted up a hoax blog post claiming that Harman, who was then Labour Minister for Women and Equality, that she was supporting BoJo, as Boris Johnson, Boris Johnson, in the Labour— now, Maria, do you know who Boris Johnson is.
I've got an image here which I'm sharing in our Google Doc so you can see what he looks like.
He led us into the glorious future, which is Brexit, almost became Prime Minister, although he rather fell over his own shoelaces on that one and tends to call games like table tennis whiff-waff.
He's not wrong though. He's quite— what about whiff-waff?
Now, back in 2008, on the Guido Fawkes blog, which is a politics blog, the hacker, at that time Anonymous, described how they managed to gain access to Harriet Harman's blog.
And they used a highly sophisticated technique, I can tell you. The technique was username Harriet, password Harman.
Of course, we recently saw Nadine Dorries, another British MP, who was sharing her password left, right, and center and leaving her computer unlocked and was arguing this was acceptable.
And then ignored.
Her name is Kemi Badenoch, and she was a number of Conservative MPs, new Conservative MPs, who starred in a series of videos designed to present them with a human face by answering quirky questions.
But this week, the media managed to get hold of a copy of the original tape, and we are going to watch it right now, okay?
I'm just sharing the link with you so you can watch the video.
I, about 10 years ago, I hacked into— oh my God, this is about— I hacked into an MP's, another MP's, a Labour MP's website, and I changed all the stuff in there to say nice things about Tories.
Nice. Yeah, but I wouldn't name who.
So the Mail on Sunday grabbed hold of this, and Kemi Badenoch has now said, "Look, this was a foolish prank over a decade ago, for which I now apologize." Presumably she's not laughing quite so much now.
I find it quite giggling and sniggering about it.
But how do you feel about that? Is that hacking or not?
Just because someone guesses a password — now, we always warn about weak passwords all the time, but just because someone has a weak password and you happen to guess it doesn't mean you've not broken the law.
My view is that this is a breach under several areas of the Computer Misuse Act, because this was unauthorized access to a computer system and then unauthorized modification as well, because she was posting blog posts.
So this was a criminal act, it seems to me, which she's now admitted to on video and had a good snigger about.
I don't know, it's making me feel very nostalgic.
It's Margaret Thatcher, I'm keeping it current.
But I don't know, I just think they should do better.
I think there must be parts of the world where we have senior politicians who really represent a fine example for young people, people who they can look up to and say, "Yes, I want to be more like him or her when I get older." I can't think of any countries at the moment.
Let's go to Maria, who's based in America instead.
Because it had been rumored that they did. So, you know, that's kind of a good question. So she did what most of us would do. Nobody's going to bother calling customer service up.
We use Twitter. So she tweeted at them instead. And the answer she got from a rep named Kathy was, no, no, no, of course we don't do that.
We only store the first 4 characters in plain text.
So this is because customer service reps need to know that you know your own password to make sure you really are who you say you are and that they're talking to the real account owner when you come in to see them.
I think they're not a subsidiary, is my understanding. So they're a smaller shop than they might appear, is what I understand from this.
So when that answer came from the customer service rep, people said, well, okay, that's not good. So they responded to the customer service rep and said, you know, that's not great.
Maybe you should escalate that to somebody internally and say that that's not a great security practice.
And in fact, some helpful security pros on Twitter responded, and one by the name of Eric said, well, what if your infrastructure gets breached and everyone's password is published in plaintext to the whole wide world?
Eric, to his great credit, I think, is trying to help the rep out and says— he wants to do some educating and he says, "Well, the bad news for you is nobody's security is that good.
Not even yours. It's not that I say you are 100% getting hacked, but what if an employee accesses the database directly?" A really good question there.
The response, this is a digging the heels in moment. The response from the reps is, "Excuse me?
Do you have any idea how the telecommunication companies work?" Do you know anything about our systems? But I'm glad you have the time to share your view with us. Drama!
So many helpful Twitterers, tweeters, twits—
But saying, do you know anything about our systems, kind of reads like an invitation to a number of folks. And then the rather inevitable dogpiling began. And this is the ugly stuff.
So people are going, well, maybe the passwords are being encrypted. Oh no, wait, they're not. Maybe they're not being hashed, blah, blah, blah.
There's a lot of back and forth about what they are and aren't doing.
And the threads just kind of go super deep into, oh, if their password security is really lame, then maybe their website's terrible too, and, oh, look, it's really vulnerable to cross-site scripting attacks, and I'm going to post something on their site for the lulz.
It got really ugly, frankly.
You may want to not just encrypt these passwords, but have them hashed.
I was watching these threads and I was thinking it felt rather uncomfortable. And I must admit, I put my hands up, I'm sometimes hypocritical. Well, sometimes. Sometimes.
But on this occasion, it just did feel like everyone's kind of going, "Eh, nah, nah, nah, we know more about security than you." Clearly T-Mobile Austria, at least this customer service rep, doesn't know what they're talking about.
Clearly there's a problem.
But people are like, I'm gonna go check out their servers now. I'm gonna go try and check and take down their production systems. It's like, come on, really?
Can't we use this sort of moment as a moment, as an opportunity to educate?
Many people actually did use this as an opportunity to go, hey, T-Mobile Austria, you guys could do better.
What you're currently doing with plaintext may be in violation of GDPR, so you may want to get on that ASAP.
And now, as of April 7th, which was some time ago, apparently customer passwords are being not only salted but also hashed.
So those passwords are now delicious, and they're doing much better by their customers' security. And they did that pretty quickly — the turnaround was pretty quick.
So, you know, we don't have to be assholes to people because they got something wrong.
For me, it felt like it was getting a little bit out of hand, and maybe there was a better way to communicate with the company.
They have confirmed that she is still with the company, and actually they've come to her defense saying people calling for her to be fired are kind of frightening.
So I want to say kudos to them for standing by their own employee because that's pretty great.
But that seems like overkill to say this person should be fired because she doesn't know how password encryption should work. I mean, that's just really?
So TL;DR, the passwords are now being apparently secured, so that's great.
Because researchers from security startup Bastille successfully proved that the emergency alert system used in San Francisco is vulnerable to being Rickrolled.
I mean, think about it — we had an accident that happened in Hawaii earlier this year where an emergency alert system went crazy because someone mistakenly pressed the button and it took 14 minutes for a correct alert to be sent out.
So that was very scary. Before that, in Dallas, the warning system was siren-jacked, which is the mot du jour at the moment.
This is where 156 emergency sirens went off in the early hours in the morning and blasted for 90-second durations around 15 individual times.
A security researcher from Bastille Security startup decided to take a look at his hometown's emergency alert siren system, which was in San Francisco, is where he lives.
And he found some rather shocking vulnerabilities. Now, before I get into this, these are proof of concept attacks, right?
So this is where a researcher demonstrates the proof of a never-seen-before vulnerability in a system. So by definition, it's a theoretical threat.
Okay, so he decides to look into this, and he discovers that the sirens get their orders via radio transmissions and that the signals were sent over an unencrypted channel.
So let me quote the Register here. So from this point, Bastille researchers were able to devise a way to intercept those signals and replicate emergency alert signals.
Effectively letting them activate the alarm sirens whenever they wanted.
Bastille estimated that in the wild, the hacker would be able to set off the alarms with little more than a PC and about $30 worth of handheld radio equipment, unquote. Oh my.
And the payload to prove this proof of concept was to blare Rik Astley's "Never Gonna Give You Up." Of course. This research came out on Monday.
Now this is quite a well-packaged piece of research. There's their own website called sirenjack.com. There's a lot of videos showing how it's all done. Have they got a logo?
They've got a logo. So they've done a lot of work on this.
And then this past Tuesday, the Industrial Control Systems Cyber Emergency Response Team, or ICS CERT, issued an advisory on the ATI vulnerability, citing improper authentication, missing encryption of sensitive data.
So these two vulnerabilities, they say, could allow an attacker to remotely trigger false alarms in ATI emergency mass notification systems.
The advice at the time of recording is that ATI are working on a patch and it will be available upon request. Okay, so don't expect to be contacted if you're running an ATI system.
You want to contact ATI, right?
And there's also this recommendation that maybe simple voice radios could be replaced with a digital P25 or APCO Project 25 radio, which provides more secure encrypted links.
There's gonna be some firmware and software updates required in some cases. So again, people are advised to get in touch with ATI and monitor ICS CERT reports for updates.
I couldn't see anything prominent in the website, and some mentions in the press suggested that they were playing this down a bit, saying highlighting the proof of concept theoretical aspect and saying that someone would need a lot of knowledge to pull this off.
And it made me wonder whether actually the disclosure was fully done responsibly.
The Bastille website FAQ says that they do indeed support the 90-day notice and they worked with certain, and it seems they did everything right, but there is a problem.
There's no patch. The patch is not ready. So is 90 days long enough to create and test certain patches?
This seems to be sort of de facto standard. And that's clearly the policy which Bastille have followed on this particular case.
And I think it's very hard sometimes to know whether 90 days is enough because you don't know the ins and outs of the software.
You don't know what other priorities the developers may be working on, what other security patches they may be fixing as well.
And you really need to work alongside the vendor to get a decent estimate as to when the thing can be fixed.
And these systems currently could be vulnerable and they could be active in a school, in a city, in a hospital, in a government office, in a military base.
So Bastille have done a big full-on media push with dedicated websites, white papers, technical explainers and how-tos, videos showing everything.
So they're really banging the drum on this.
Yeah, but Maria, they'd set up the website and they'd got the video already and they'd done a logo and they needed to get that out there. You know, they've invested a lot into this.
It is very slick.
So they're very specifically in the business and have been for, I don't know, maybe 30 or 40 years of producing these sort of solutions for businesses.
I mean, it is obviously an important thing to fix.
And, you know, it would be good to think that organizations are updating their systems and asking where's the patch if one hasn't been made available.
But yeah, it leaves a slight taste.
You think, oh, if only they had waited and worked with ATI to publicize it when fix was ready, I would have been much more hat-tippy.
And then create a script.
And I'm just thinking that these systems themselves are— I'm sure not that long ago, they were almost entirely mechanical systems.
So the whole idea of now we're trying to get all this sophistication in terms of getting them on software update cycles and that kind of thing.
I'm just wondering, the people maintaining this day to day, are they aware of stuff like this? I'm not trying to say, you know, they can't do it.
I mean, it's just a lot of these— I would say this is probably a critical infrastructure kind of thing.
There's a lot of vulnerabilities in a lot of these systems that people are really frantically trying to catch up on and just they're not ready for it.
The problem is not only that they did this, but it's critical systems that are under threat in this situation.
And whether this— the threat is no longer theoretical since they've now proved it works, right?
If we just relied upon siren systems, which revolved around, I don't know, hamsters or something running around very quickly inside a hamster wheel, and that would trigger a siren, that would power it all into operation.
I could make this happen. Hey, some shit's going down. Ding, ding, ding, ding, ding, ding, ding.
It's equally a great solution for business teams, families, and single users. Learn more at smashingsecurity.com/lastpass.
Could be a funny story, a book they've read, a TV show, a movie, a record, an app, a website, podcast, whatever you like. Doesn't have to be security related necessarily.
My pick of the week this week is a game which I've been playing on the Nintendo Switch with my son, but it is also available for iOS, Android, and Steam, and it's called The Adventures of Bertram Fiddle.
So if you've ever played something like, I don't know, The Secret of Monkey Island or Day of the Tentacle, Puzzle or one of those fantastic old games, you'll know what this is all about.
You're moving around the screen solving puzzles. And Bertram Fiddle is a Victorian adventurer.
And with his trusty one-eyed Peruvian manservant called Gavin, he is on the trail of Geoff the Murderer, who shouldn't be mixed up with Jack the Ripper at all.
It's so pretty and funny and a bit rude, but not rude. It is a bit rude. It does it on both levels, where it's rude for an adult but very literal for a kid.
He was enjoying it greatly for the puzzle solving. And I was sort of chortling away in the background at some of the things that were being said. Here's the problem with it.
I've actually already finished it. I finished it on the day that I bought it. Only cost about £4 in the Switch store.
It's supposed to be a series of adventures, so it does end on a sort of cliffhanger and you're sort of dying to play part 2.
Now, from what I've read, part 2 is already available on some platforms, but apparently it's a bit buggy and it's got some bad reviews.
Part 1, Episode 1: A Dreadly Business, of The Adventures of Bertram Fiddle is a lot of fun.
So I'd suggest waiting a little bit before going for part 2, make sure they've ironed out the bugs. It's very much an independent game.
It feels by a very small group of guys who've been crowdfunding it, but very, very amusing.
So support episode 1 at the very least, because you'll certainly get a few hours of fun out of it.
It's a really tiny little website that's awesome.
And if you've got, if you're starting from zero, security-wise at your company, if you're a startup or something, this is a great place to go to.
But there's not much else I can say about that. So I was going to change my pick of the week from that, or maybe I'll do an and pick of the week.
I'm going to suggest a documentary that I just saw on Netflix that is getting a lot of press, and I'm going to opine on it briefly. It's called Wild Wild Country.
It's— it is about the Rajneeshi cult that was— that made its own compound out in Oregon, and they basically took over an entire little town in Oregon, and all sorts of shenanigans happen.
And if I literally say anything more about that, if you don't remember what happened, or didn't hear about it in the '80s when it happened, I don't want to give it away because it's a really— it's a wild ride.
It's actually— it's 6 episodes long, it's extremely long. It could have done with a lot of editing, I thought. And it is a bit problematic in my opinion.
Not a flawless documentary, but it's a very interesting watch.
And everybody's— at least in the media I'm reading, everybody's talking about it right now because it just came out a few weeks ago, very bingeable.
It seemed like in the news, this is a big one, so it takes me back.
She has a following of people throwing rose leaves in front of her all the time, I'm sure, but I wasn't actually thinking of Maria, lovely and fragrant as she is.
And Graham, you know what it is because I hinted to it last week, and then I saw you at the weekend and I gave you one of these, didn't I?
And before we tell everyone what it is, do you have anything to say about it? Do you have anything, do you want to—
And if I tap it, if I put it— if I stretch out my finger and just stroke the very top of the head, something magical happens. No.
It's the shape of a small dog, it's made entirely of ash wood, and the legs and head are movable, so you can kind of place your wooden dog lamp into any posture, just like a real dog.
And the touch-sensitive on-off switch on the crown of the head is quite cute, it's like you're kind of patting your dog, and that's how you turn on the light.
I'll leave you, I'll let you finish the show because I shouldn't be— I'm taking off my headphones. I'm going, I'm going, all right, I'm off.
That just about wraps it up for this week. Thank you very much, Maria, for joining us once again.
And you can buy stickers and mugs and t-shirts and things like that at smashingsecurity.com/store. And thanks for tuning in. If you like the show, rate it on Apple Podcast.
It really does help new listeners discover the show, and you can check out past episodes at smashingsecurity.com. And until next time, toodle-oo, bye-bye.
Update July 2022:
Kemi Badenoch, who has previously admitted hacking into a Labour politican's website and defacing it to promote Boris Johnson, wants to be the UK's next Prime Minister.https://t.co/V34nJ6Z4Hy pic.twitter.com/7g0wfadM7G
— Graham Cluley ???????? (@gcluley) July 9, 2022


She has spent the past few weeks talking in parliament on the need to firm up and enforce laws against cyber crime, so one may say that she has double standards.
Or maybe she understands thr risk of MP’s using poir security? She seems ideal to lead the charge on cyber defences. At least she has a clue.
I don't think there is any legal basis for ignoring computer crime, even if it happened ten years ago. At the very least this MP should be interviewed under caution; if it had happened in the US it is likely that she would have been arrested.
Only if she were a Republican.
Or that she learned from her experiences. Graham needs to grow a sense of humor. He is always saying stuff that borders on the offensive, but let someone else do something a little bit off and Bob's your Uncle.
Your handle is an extremely ironic name… though you probably don't realise just how much so (I won't even try and tell you).
But Graham does have a sense of humour. The fact you've missed it doesn't mean it doesn't exist. And his punning is excellent too (and very often funny – the two go together well). I question how any of what he wrote is bad enough to even come close to cause offence. With one exception: those wanting to be offended; and sadly there are many people who want to be offended. Of course they complain when they're offended which really means they enjoy whining; they should just close their mouths or sod off. Besides that he was only saying her behaviour/character was rather poor. And it was. It was poor and for her age she should have known better. There isn't anything funny about people performing poorly unless of course you like to take advantage of them and/or find humour out of other people's failures (etc.).
There is probably no way to prosecute her successfully. The only evidence against her is her public confession, which is probably both inadmissible and insufficient. She can't be made to repeat it under oath and was not under oath in the TV interview.
"a heady cocktail or political fervour and youthful exuberance."
I wonder if you meant a cocktail "of"?