Wednesday, April 14, 2010

FW: PHONE HACKING IS A SECURITY THREAT TO INDIVIDUALS, CORPORATIONS AND COUNTRY'S [SEC=UNCLASSIFIED]

UNCLASSIFIED

 
 
PHONE HACKING IS A SECURITY THREAT TO INDIVIDUALS, CORPORATIONS AND COUNTRY’S

 

In this edition we examine the threat that phone hacking poses to individuals, corporations and national security. The example of the UK newspaper, “News of the World” demonstrates the dangers. Here a prominent UK newspaper employed convicted criminals to hack into peoples emails and voicemails. The difference is that now we know that it affected 4,332 people and that the Police evidence including The Royal family and senior politicians:

 

“contained 4,332 names or partial names of people in whom the two men had an interest, 2,978 numbers or partial numbers for mobile phones and 30 audio tapes which appear to contain an unspecified number of recordings of voicemail messages.” The Guardian 9-15 April 2010-04-15

 

 

Police 'ignored News of the World phone hacking evidence'

Police who investigated the phone-hacking scandal at the News of the World obtained previously undisclosed telephone records which showed a vast number of public figures had had their voicemail accessed – and then decided not to pursue the evidence, according to official papers seen by the Guardian. http://www.guardian.co.uk/media/2010/apr/04/police-ignored-news-world-evidence

 

See timeline  http://www.guardian.co.uk/media/2009/nov/09/news-of-the-world-timeline

 

The point is that if criminals and journalists can find it so easy to hack into phones and emails what does it mean for national security and personal security.

 

What Can Be Done To Safeguard Your Phone?

  1. Download Anti-Virus and security software, install it and make sure you keep it up to date
  2. Don’t open emails that are unexpected or from people you don’t know
  3. Have Bluetooth turned off
  4. When you need to use Bluetooth have your device hidden
  5. Don’t call your device by your name
  6. Don’t use illegal software
  7. Don’t store personal details on your phone such as PINs and account numbers
  8. Use encryption software to encrypt any potentially sensitive material
 

IMPORTANT: This email remains the property of the Australian Defence Organisation and is subject to the jurisdiction of section 70 of the Crimes Act 1914. If you have received this email in error, you are requested to contact the sender and delete the email.

IMPORTANT: This email remains the property of the Australian Defence Organisation and is subject to the jurisdiction of section 70 of the Crimes Act 1914. If you have received this email in error, you are requested to contact the sender and delete the email.

No comments:

Post a Comment