Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Murdoch chief’s phone ‘hacked by private eye’

Rebekah Brooks.

Rebekah Brooks. Photo: Reuters

THE chief executive of Rupert Murdoch’s News International has been shown police evidence revealing that her voicemail was repeatedly hacked by a private investigator employed by one of the company’s newspapers.

The Independent last night reported that News International confirmed the 43-year-old media executive Rebekah Brooks met Metropolitan Police detectives last week to see records showing she was targeted by Glenn Mulcaire, the private detective employed by News International’s Sunday tabloid News of the World to eavesdrop on the voicemails of numerous public figures.

According to The Independent, the alleged hacking took place between 2005 and 2006, when Ms Brooks, who is also a former editor of the News of the World, was in charge of The Sun.

She became the subject of media interest in her personal life in November 2005 when she was arrested for an alleged assault on her then husband, actor Ross Kemp. She was released without charge.

The revelation that Ms Brooks was a likely repeated target for Mr Mulcaire was first made by Sky News, whose largest shareholder is Mr Murdoch’s News Corporation. Mr Murdoch is in London to attend a company board meeting.

The company’s shareholders and non-executive directors are believed to be concerned about the way the hacking affair has been handled by Mr Murdoch’s London lieutenants.

Three News of the World journalists have been arrested since the Metropolitan Police reopened its inquiry into the claims.

The Met’s original inquiry into the practice led to the conviction of NOTW royal editor Clive Goodman and Glenn Mulcaire in 2007.

A Manchester United footballer is the latest high-profile figure to sue the Murdoch tabloid for breach of privacy, claiming that his mobile phone messages were intercepted by journalists working for the paper.

Ryan Giggs has begun legal proceedings against the tabloid and Mulcaire over the phone hacking.

Scotland Yard, which is investigating multiple claims that NOTW staff hacked into the voicemail messages of celebrities and politicians, would not comment on the cases of either Ms Brooks or Giggs.

Actress Sienna Miller was last week awarded £100,000 ($A153,810) damages at London’s High Court after bringing a privacy and harassment claim in connection with the NOTW‘s phone-hacking action.

Other well-known figures said to have been victims of mobile phone message hacking include actor Jude Law, former prime minister Gordon Brown, ex-footballer Paul Gascoigne and comedian Steve Coogan.

PA, GUARDIAN, AGENCIES


WhatsApp leaks Telephone numbers, conversations

It’s easy to eavesdrop on people using the popular mobile messenger WhatsApp. The application sends user names, telephone numbers and even complete instant messages unencrypted over the internet. Adversaries can intercept this information by using a simple network sniffer like the popular Wireshark.

A reader of the Dutch IDG publication Webwereld discovered this vulnerability. He was able to intercept all unencrypted traffic on a network and Webwereld was able to reproduce his findings. At first sight, it looks like WhatsApp is using an SSL secured HTTPS connection to their servers. But this can be falsified on closer inspection. Although all usernames, telephone numbers and all instant messages are transferred via port 443, which is reserved for encrypted traffic, they are sent to WhatsApp’s servers in plain text.

Because of this it’s easy to ascertain private information by using a man-in-the-middle attack. The attack can only be carried out when a smartphone using WhatsApp is connected to an unsecured wireless network, like for instance WiFi hotspots offered at train stations or airports.

Adversaries could also setup a wifi access point with a common SSID of an unencrypted wireless network. This is know as an evil twin network. If the malicious user forwards the requests of the app to the internet, it’s even easier to capture private information. People using only trusted or secured WiFi networks are probably less vulnerable to this attack.

In a statement, WhatsApp says that it “strongly believes in network freedom and privacy” of their users. The company is studying this issue closely but does not wish to comment at this time.

To the discoverer of the vulnerability the company tells a different story. In this comment, WhatsApp states it trusts on 3G and WiFi to protect the traffic. “We do not save or store address book data or your conversations, so there is nothing to encrypt,” a spokeswoman said.


Cisco Accused Of Helping Chinese Police Track Dissidents

Networking equipment maker Cisco and its top executives were sued last week in San Jose, Calif., for allegedly providing censorship and surveillance technology to China in violation of the Alien Torts Statute.

The Alien Torts Statute allows individuals to file claims in U.S. courts over violations of the law of nations or a U.S. treaty. It has become a tool by which victims of torture seek redress for human rights abuses, particularly those alleged to have occurred outside the U.S.

The lawsuit was filed on behalf of Chinese practitioners of Falun Gong, a religious group that faces ongoing persecution by Chinese authorities. In addition to Cisco, the complaint names CEO John Chambers, and two Cisco China executives, as well as other unspecified defendants.

The complaint charges that Cisco “designed, supplied, and helped maintain a censorship and surveillance network known as the Golden Shield in collaboration with Chinese Community Party and Chinese Public Security officials, knowing and intending that it would be utilized [by authorities] to eavesdrop, tap, and intercept communications, identify and track Plaintiffs as Falun Gong members for the specific purpose of subjecting them to gross human rights abuses.”

 

Cisco disputes these claims. “There is no basis for these allegations against Cisco, and we intend to vigorously defend against them,” a company spokesperson said in an email statement. “Cisco does not operate networks in China or elsewhere, nor does Cisco customize our products in any way that would facilitate censorship or repression. Cisco builds equipment to global standards which facilitate free exchange of information, and we sell the same equipment in China that we sell in other nations worldwide in strict compliance with U.S. government regulations.”

China has proven to be a problematic market for many foreign companies, particularly those in the U.S. In 2005, a Chinese court sentenced Chinese journalist Shi Tao to 10 years in prison for revealing state secrets. Yahoo provided Chinese authorities with critical evidence about Shi Tao’s email communication. The incident prompted a widespread outcry against Yahoo and tarnished the company’s reputation. Two years later, Yahoo offered financial support to the families of Shi Tao and Wang Xiaoning, another jailed dissident, and then-CEO Jerry Yang delivered a public apology to Shi Tao’s mother at a Congressional hearing.

Google in 2006 acknowledged how difficult it was to provide adequate service to users in China, but insisted the compromises it had to make to do business there would lead to a more open China in the years ahead. Then in early 2010, the company changed course and severely curtailed its operations in China, citing “a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google” and attempts to hack into the Gmail accounts of Chinese human rights activists.

This is not the first time Cisco has had to justify its business with in China. Cisco was among several Internet companies that testified on Feb. 15, 2006, before a U.S. House of Representatives International Relations subcommittee on the issue of censorship in China. During the hearing, Mark Chandler, Cisco’s SVP and general counsel, defended his company, asserting, “Cisco does not customize, or develop specialized or unique filtering capabilities, in order to enable different regimes to block access to information.”

Yet the company’s claim that it merely provides neutral technology without being aware of how its products will be used was rebutted two months later in a hearing before the same subcommittee on April 19, 2006, when author Ethan Gutmann cited Cisco brochures from the Shanghai Gold Shield trade show in December 2002 as evidence of the company’s effort to cater to the needs of police authorities.

“Newly translated documents explicitly show Cisco was training the Chinese police in surveillance techniques as early as 2001,” Gutmann claimed.

The lawsuit cites internal Cisco marketing material as part of its evidence, but those documents aren’t public yet and there is no way of knowing if they are the same material cited by Gutmann in his testimony. If such marketing material exists and gets introduced as evidence, it’s likely to play a central role in determining the outcome of the lawsuit.

 


Are your co-workers killing you?

LEON GETTLER OPINION:

You may deal with all types at work, but those irritating co-workers who drive you crazy might even be killing you.

According to this Israeli study, your chances of surviving is higher if you work with people you actually like, while the risk of premature death is reduced for people who report high levels of social support at their job.

The study also had some bad news for women in management roles.

According to the researchers, higher levels of control and decision making that come with working as a manager actually increased the risk of early death for women.

With men, it went the other way, but one assumes much of that fits in with the pressures of having to work with people who are not that supportive lower down the food chain.

Here’s a list of some of the most annoying habits our co-workers may demonstrate.

It includes flogging stuff for their children like lollies and chocolates, brown-nosers who are forever sucking up to the boss, people who fill the office with the stench from lunches eaten at the desk, loud mouths who broadcast their conversations all over the office, and the ones who have annoying mobile phone ring tones (especially those that leave their phones sitting on their desk while they’re off doing something else).

Those who smelled like ash trays and the people with annoying nervous habits like forever clicking their pens also got a mention.

According to HR reporter, other annoying habits include sloppy work, gossiping or engaging in office politics, missing deadlines, being constantly late, and presenting others’ ideas as your own.

Then there are the ones who keep interrupting conversations, who eavesdrop when you’re talking to someone or who suddenly have too much work to do when there is a crisis and everyone has to pitch in.

Add to that, the know it all, the attention seeker, the microwave monopolisers, and the people who talk your ear off.

Then there are the ones who spend all their time updating their status on Facebook or tweeting some inanity. And don’t forget those who yell across cubicles and the people who keep coming in to work when they’re sick, spreading their disease.

This is a long list, and office relationships seem to be under more strain than ever before as open plan offices  become the norm and people put in longer hours.

So how do we deal with these problems?  Some experts suggest talking it through or, if that fails, putting on a set of headphones to drown it out. You might also ask your boss for help, or establish some sort of paper trail.

Wallace Immen at Canada’s Globe and Mail, recommends being patient and only raising it as an issue if the problem persists, choosing your words carefully (“you mightn’t be aware of this but….”), or asking for a desk relocation. He says you shouldn’t hold grudges, assume its a deliberate, or raise it with them when you are angry.

– BusinessDay.com.au


Police: Smart Phone App Used In Foiled Robbery

Getaway Driver Listened To Police Traffic, Police Say

MUNCIE, Ind. — A man accused of being a getaway driver in a foiled pharmacy robbery used a smart phone application to eavesdrop on emergency radio transmissions as he waited in his car, police said.

Muncie detective Jim Johnson told The Star Press newspapers that investigators wonder whether 29-year-old Matthew Hale knew to leave the scene by eavesdropping on their conversations.

He said officers believe Hale fled after hearing radio calls saying a security guard in the store had captured his alleged cohort, 23-year-old Brian Franklin.

Johnson said Hale used his smart phone to download an application that allowed him to eavesdrop on police radio transmissions.

Franklin faces a preliminary charge of attempted armed robbery, while Hale faces preliminary charges of attempted armed robbery and unlawful use of a police radio.