Hacker House shoved under UK Parliament's spotlight following Boris Johnson funding allegs

Half of government grant to infosec training biz suspended as MPs demand probe

Infosec training biz Hacker House has been catapulted to Parliamentary prominence after reports that co-founder Jennifer Arcuri secured UK government funding because of her personal relationship with now-Prime Minister Boris Johnson.

At today's first Parliamentary sitting since the Supreme Court overruled prorogation yesterday, Department for Digital, Culture, Media and Sport (DCMS) minister Matt Warman (a former tech editor of the Daily Telegraph) was sent in to bat on behalf of Johnson – and thus Hacker House.

Hacker House was promised £100,000 in January as part of a government fund to "help drive diversity in cybersecurity", as Labour party deputy leader Tom Watson MP noted in Parliament.

MPs were told that so far it has received £47,000, with the remaining £53k frozen until further notice.

The Sunday Times reported at the weekend that Johnson, when he was Mayor of London, was a personal friend of Arcuri's, took her on trade missions and helped secure a total of £126,000 in public funding for her business.

"We are of course aware of claims raised by The Sunday Times and the department is reviewing its decision," Warman told the House of Commons, following a febrile Q&A session with attorney-general Geoffrey Cox about Brexit.

Follow-up reporting claimed that a "friend" of Arcuri's said Johnson only visited her flat to "understand tech" and "get educated", with her stepfather stating: "No way would there have been a sexual relationship."

Money and funny business

A DCMS press release from January about Hacker House's funding stated: "The aim... is to boost not only the total number, but the diversity of those working in the UK's cybersecurity industry. It will help organisations develop and sustain projects that identify, train and place untapped talent from a range of backgrounds into cybersecurity roles quickly."

Break crypto to monitor jihadis in real time? Don't be ridiculous, say experts


A statement in Arcuri's name distributed as part of the same DCMS press release said: "The team of Hacker House are thrilled to be included in the funding of this grant as this allows us the opportunity to continue to develop content that trains and enable candidates to retain practical skills needed for roles within information security."

None of this cut much ice with Parliament today.

Doggedly, Warman, who was on his first ministerial outing at the despatch box, insisted there was "no undue lobbying to the best of my knowledge… there was no evidence that the prime minister intended to do anything improper whatsoever."

Lib Dem MP Layla Moran commented in Parliament that Hacker House "is not based in the UK", Arcuri having moved to the US in 2018, and said that the person living at the company's UK registered address "is in Cheshire where she used to rent", adding that the "current occupant sends post for Miss Arcuri back to sender."

"What steps," asked Moran, "did [DCMS] take to ensure Hacker House was based and operating in the UK? Why did officials waive the rule that the grant couldn't exceed 50 per cent of the company's income? Did the prime minister… make any representations to the department recommending Hacker House for this funding?"

Warman replied: "The prime minister and his staff have absolutely no role in the award of this grant and I suspect I'll be saying that a number of times."

502? Well, it's a bit wobbly

Deputy Labour Party leader Tom Watson chipped in later in the Parliamentary debate to say: "The minister [Warman] suggested that I try to register with Hacker House. I looked at social media and there are many people who tried to do that and they get an error message, 502 bad gateway. Can he explain why Hacker House seems to have disappeared?"

Put on the spot, Warman stuttered back: "It – it is of course a part of this department's processes to make sure the services we procure are properly delivered and we will continue to do so."

It appears to El Reg that Hacker House's website is loading, albeit very slowly, suggesting the sustained public interest is causing its servers to wobble rather than anything nefarious. Plenty of screenshots of HTTP 502 error messages for the hacker.house domain can be found on Twitter.

We have asked Hacker House – which is apparently based in California, USA, with some presence in the UK – whether the company wishes to comment and will update this article if we hear back. ®

Other stories you might like

  • Tencent admits to poisoned QR code attack on QQ chat platform
    Could it be Beijing was right about games being bad for China?

    Chinese web giant Tencent has admitted to a significant account hijack attack on its QQ.com messaging and social media platform.

    In a post to rival social media platform Sina Weibo – a rough analog of Twitter – Tencent apologized for the incident.

    The problem manifested on Sunday night and saw an unnamed number of QQ users complain their credentials no longer allowed them access to their accounts. Tencent has characterized that issue as representing "stolen" accounts.

    Continue reading
  • Carnival Cruises torpedoed by US states, agrees to pay $6m after waves of cyberattacks
    Now those are some phishing boats

    Carnival Cruise Lines will cough up more than $6 million to end two separate lawsuits filed by 46 states in the US after sensitive, personal information on customers and employees was accessed in a string of cyberattacks.

    A couple of years ago, as the coronavirus pandemic was taking hold, the Miami-based biz revealed intruders had not only encrypted some of its data but also downloaded a collection of names and addresses; Social Security info, driver's license, and passport numbers; and health and payment information of thousands of people in almost every American state.

    It all started to go wrong more than a year prior, as the cruise line became aware of suspicious activity in May 2019. This apparently wasn't disclosed until 10 months later, in March 2020.

    Continue reading
  • India extends deadline for compliance with infosec logging rules by 90 days
    Helpfully announced extension on deadline day

    India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.

    The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.

    The Directions were roundly criticized by tech lobby groups that pointed out requirements such as compelling clouds to store logs of customers' activities was futile, since clouds don't log what goes on inside resources rented by their customers. VPN providers quit India and moved their servers offshore, citing the impossibility of storing user logs when their entire business model rests on not logging user activities. VPN operators going offshore means India's government is therefore less able to influence such outfits.

    Continue reading
  • LGBTQ+ folks warned of dating app extortion scams
    Uncle Sam tells of crooks exploiting Pride Month

    The FTC is warning members of the LGBTQ+ community about online extortion via dating apps such as Grindr and Feeld.

    According to the American watchdog, a common scam involves a fraudster posing as a potential romantic partner on one of the apps. The cybercriminal sends explicit of a stranger photos while posing as them, and asks for similar ones in return from the mark. If the victim sends photos, the extortionist demands a payment – usually in the form of gift cards – or threatens to share the photos on the chat to the victim's family members, friends, or employer.

    Such sextortion scams have been going on for years in one form or another, even attempting to hit Reg hacks, and has led to suicides.

    Continue reading
  • 5G C-band rollout at US airports slowed over radio altimeter safety fears
    Well, they did say from July, now they really mean from July 2023

    America's aviation watchdog has said the rollout of 5G C-band coverage near US airports won't fully start until next year, delaying some travelers' access to better cellular broadband at crowded terminals.

    Acting FAA Administrator Billy Nolen said in a statement this month that its discussions with wireless carriers "have identified a path that will continue to enable aviation and 5G C-band wireless to safely co-exist."

    5G C-band operates between 3.7-3.98GHz, near the 4.2-4.4GHz band used by radio altimeters that are jolly useful for landing planes in limited visibility. There is or was a fear that these cellular signals, such as from cell towers close to airports, could bleed into the frequencies used by aircraft and cause radio altimeters to display an incorrect reading. C-band technology, which promises faster mobile broadband, was supposed to roll out nationwide on Verizon, AT&T and T-Mobile US's networks, but some deployments have been paused near airports due to these concerns. 

    Continue reading
  • IBM settles age discrimination case that sought top execs' emails
    Just days after being ordered to provide messages, Big Blue opts out of public trial

    Less than a week after IBM was ordered in an age discrimination lawsuit to produce internal emails in which its former CEO and former SVP of human resources discuss reducing the number of older workers, the IT giant chose to settle the case for an undisclosed sum rather than proceed to trial next month.

    The order, issued on June 9, in Schenfeld v. IBM, describes Exhibit 10, which "contains emails that discuss the effort taken by IBM to increase the number of 'millennial' employees."

    Plaintiff Eugene Schenfeld, who worked as an IBM research scientist when current CEO Arvind Krishna ran IBM's research group, sued IBM for age discrimination in November, 2018. His claim is one of many that followed a March 2018 report by ProPublica and Mother Jones about a concerted effort to de-age IBM and a 2020 finding by the US Equal Employment Opportunity Commission (EEOC) that IBM executives had directed managers to get rid of older workers to make room for younger ones.

    Continue reading
  • FTC urged to probe Apple, Google for enabling ‘intense system of surveillance’
    Ad tracking poses a privacy and security risk in post-Roe America, lawmakers warn

    Democrat lawmakers want the FTC to investigate Apple and Google's online ad trackers, which they say amount to unfair and deceptive business practices and pose a privacy and security risk to people using the tech giants' mobile devices.

    US Senators Ron Wyden (D-OR), Elizabeth Warren (D-MA), and Cory Booker (D-NJ) and House Representative Sara Jacobs (D-CA) requested on Friday that the watchdog launch a probe into Apple and Google, hours before the US Supreme Court overturned Roe v. Wade, clearing the way for individual states to ban access to abortions. 

    In the days leading up to the court's action, some of these same lawmakers had also introduced data privacy bills, including a proposal that would make it illegal for data brokers to sell sensitive location and health information of individuals' medical treatment.

    Continue reading
  • Behold this drone-dropping rifle with two-mile range
    Confuses rather than destroys unmanned aerials to better bring back intel, says Ukrainian designer

    What's said to be a Ukrainian-made long-range anti-drone rifle is one of the latest weapons to emerge from Russia's ongoing invasion of its neighbor.

    The Antidron KVS G-6 is manufactured by Kvertus Technology, in the western Ukraine region of Ivano-Frankivsk, whose capital of the same name has twice been subjected to Russian bombings during the war. Like other drone-dropping equipment, we're told it uses radio signals to interrupt control, remotely disabling them, and it reportedly has an impressive 3.5 km (2.17 miles) range.

    "We are not damaging the drone. With communication lost, it just loses coordination and doesn't know where to go. The drone lands where it is jammed, or can be carried away by the wind because it's uncontrollable,"  Kvertus' director of technology Yaroslav Filimonov said. Because the downed drones are unharmed, they give Ukrainian soldiers recovering them a wealth of potential intelligence, he added.  

    Continue reading

Biting the hand that feeds IT © 1998–2022