SUPPORT THE WORK

GetWiki

phone hacking

ARTICLE SUBJECTS
aesthetics  →
being  →
complexity  →
database  →
enterprise  →
ethics  →
fiction  →
history  →
internet  →
knowledge  →
language  →
licensing  →
linux  →
logic  →
method  →
news  →
perception  →
philosophy  →
policy  →
purpose  →
religion  →
science  →
sociology  →
software  →
truth  →
unix  →
wiki  →
ARTICLE TYPES
essay  →
feed  →
help  →
system  →
wiki  →
ARTICLE ORIGINS
critical  →
discussion  →
forked  →
imported  →
original  →
phone hacking
[ temporary import ]
please note:
- the content below is remote from Wikipedia
- it has been imported raw for GetWiki
{{pp-semi-indef|small=yes}}{{Short description|Surveillance or computer investigation}}{{About|the use of telephone technology to steal information|the manipulation of telephone call routing|Phreaking}}Phone hacking is the practice of exploring a mobile device, often using computer exploits to analyze everything from the lowest memory and CPU levels up to the highest file system and process levels. Modern open source tooling has become fairly sophisticated as to be able to “hook” into individual functions within any running app on an unlocked device and allow deep inspection and modification of its functions.Phone hacking is a large branch of computer security that includes studying various situations exactly how attackers use security exploits to gain some level of access to a mobile device in a variety of situations and presumed access levels.The term came to prominence during the News International phone hacking scandal, in which it was alleged (and in some cases proved in court) that the British tabloid newspaper the News of the World had been involved in the interception of voicemail messages of the British royal family, other public figures, and murdered schoolgirl Milly Dowler.NEWS,www.theguardian.com/uk/2011/jul/04/milly-dowler-voicemail-hacked-news-of-world, Missing Milly Dowler’s voicemail was hacked by News of the World, Davies, Nick, Hill, Amelia, The Guardian, 4 July 2011, 13 July 2011,

Victims of phone hacking

Although any mobile phone users may be targeted, “for those who are famous, rich or powerful or whose prize is important enough (for whatever reason) to devote time and resources to make a concerted attack, it is usually more common, there are real risks to face.“NEWS, 1, 2, mdigitalera.com,www.mdigitalera.com/2018/11/how-to-secure-android-phone-from-hackers-viruses.html, Secure Mobile From Hackers, 3, Henry B, Wolfe, December 2018, 2018-12-12, 2019-04-02,web.archive.org/web/20190402151911/https://www.mdigitalera.com/2018/11/how-to-secure-android-phone-from-hackers-viruses.html, dead,

Techniques

Voicemail hacking

File:Motorola L71 on the China Mobile network 20100521.jpg|thumb|150px|alt=Motorola L7 mobile phone|Phone hacking often involves unauthorized access to the voicemail of a mobile phonemobile phoneThe unauthorized remote access to voicemail systems, such as exposed by the News International phone hacking scandal, is possible because of weaknesses in the implementations of these systems by telephone companies.WEB,blog.mobilephonesecurity.org/2011/07/voicemail-hacking-and-phone-hacking.html, Voicemail Hacking and the ‘Phone Hacking’ Scandal - How it Worked, Questions to be Asked and Improvements to be Made, 7 July 2011, 25 Jul 2012, David, Rogers, Copper Horse Solutions, Mobile phone voicemail messages may be accessed on a landline telephone with the entry of a personal identification number (PIN). Reporters for News International would call the number of an individual’s mobile phone, wait to be moved to voicemail, and then guess the PIN, which was often set at a simple default such as 0000 or 1234.NEWS, Waterson, Jim, 2021-07-10, News of the World: 10 years since phone-hacking scandal brought down tabloid, en-GB, The Guardian,www.theguardian.com/media/2021/jul/10/news-of-the-world-10-years-since-phone-hacking-scandal-brought-down-tabloid, 2023-05-08, 0261-3077, Even where the default PIN is not known, social engineering can be used to reset the voicemail PIN code to the default by impersonating the owner of the phone with a call to a call centre.Voicemail hacking: How Easy Is It?, New Scientist, 6 July 2011NEWS, Phone Hacking Can Extend Beyond Voice Mail,edition.cnn.com/2011/TECH/mobile/07/08/phone.hacking/index.html?&hpt=hp_c2, CNN, Milian, Mark, 8 July 2011, 9 July 2011, During the mid-2000s, calls originating from the handset registered to a voicemail account would be put straight through to voicemail without the need of a PIN. A hacker could use caller ID spoofing to impersonate a target’s handset caller ID and thereby gain access to the associated voicemail without a PIN.WEB,www.infoworld.com/article/2658949/security/paris-hilton-accused-of-voice-mail-hacking.html, Paris Hilton accused of voice-mail hacking, Robert McMillan, 25 August 2006, InfoWorld, 14 June 2015, Cell Phone Voicemail Easily Hacked, NBC News, 28 February 2005Kevin Mitnick Shows How Easy It Is to Hack a Phone, interview with Kevin Mitnick, CNET, 7 July 2011Following controversies over phone hacking and criticism of mobile service providers who allowed access to voicemail without a PIN, many mobile phone companies have strengthened the default security of their systems so that remote access to voicemail messages and other phone settings can no longer be achieved even via a default PIN.NEWS,www.bbc.co.uk/news/magazine-14044499, Who, What, Why: Can Phone Hackers Still Access Messages?, BBC News, 6 July 2011, For example, AT&T announced in August 2011 that all new wireless subscribers would be required to enter a PIN when checking their voicemail, even when checking it from their own phones.NEWS, Not an option: time for companies to embrace security by default,arstechnica.com/tech-policy/2011/08/not-an-option-time-for-companies-to-embrace-security-by-default/, Ars Technica, Soghoian, Christopher, 9 August 2011, 25 July 2012, To encourage password strength, some companies now disallow the use of consecutive or repeat digits in voicemail PINs.NEWS, Grubb, Ben, 8 July 2011, Vulnerable voicemail: telco-issued PINs insecure, The Sydney Morning Herald,www.smh.com.au/technology/security/vulnerable-voicemail-telcoissued-pins-insecure-20110708-1h5yz.html, 9 July 2011,

Handsets

An analysis of user-selected PIN codes suggested that ten numbers represent 15% of all iPhone passcodes, with “1234” and “0000” being the most common, with years of birth and graduation also being common choices.NEWS, Once Again, 1234 Is Not A Good Password,blogs.wsj.com/tech-europe/2011/06/15/once-again-1234-is-not-a-good-password/, The Wall Street Journal, Rooney, Ben, 15 June 2011, 8 July 2011, Even if a four-digit PIN is randomly selected, the key space is very small (10^{4} or 10,000 possibilities), making PINs significantly easier to brute force than most passwords; someone with physical access to a handset secured with a PIN can therefore feasibly determine the PIN in a short time.JOURNAL, Here’s How Law Enforcement Cracks Your iPhone’s Security Code,www.forbes.com/sites/andygreenberg/2012/03/27/heres-how-law-enforcement-cracks-your-iphones-security-code-video/, Forbes.com, 27 Mar 2012, Andy, Greenberg, 25 Jul 2012, Mobile phone microphones can be activated remotely by security agencies or telephone companies, without any need for physical access, as long as the battery has not been removed.WEB,www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html, Remotely Eavesdropping on Cell Phone Microphones, Schneier, Bruce, December 5, 2006, Schneier On Security, 13 December 2009, NEWS,news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html, FBI taps cell phone mic as eavesdropping tool, McCullagh, Declan, Anne Broache, December 1, 2006, CNet News, 2009-03-14, dead,news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html," title="web.archive.org/web/20131110182623news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html,">web.archive.org/web/20131110182623news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html, November 10, 2013, NEWS,news.ft.com/cms/s/7166b8a2-02cb-11da-84e5-00000e2511c8.html, Use of mobile helped police keep tabs on suspect, Odell, Mark, August 1, 2005, Financial Times, 2009-03-14, WEB,www.wrc.noaa.gov/wrso/security_guide/telephon.htm, Telephones, 2001, Western Regional Security Office (NOAA official site), 2009-03-22, NEWS,blogs.abcnews.com/theblotter/2006/12/can_you_hear_me.html, Can You Hear Me Now?, ABC News: The Blotter, 13 December 2009, dead,blogs.abcnews.com/theblotter/2006/12/can_you_hear_me.html," title="web.archive.org/web/20110825102123blogs.abcnews.com/theblotter/2006/12/can_you_hear_me.html,">web.archive.org/web/20110825102123blogs.abcnews.com/theblotter/2006/12/can_you_hear_me.html, 25 August 2011, NEWS,www.theregister.co.uk/2007/06/26/cell_hack_geek_spook_stalk/, Cell hack geek stalks pretty blonde shocker, Lewis Page, The Register, 2007-06-26, 2010-05-01, dead,web.archive.org/web/20131103193709/https://www.theregister.co.uk/2007/06/26/cell_hack_geek_spook_stalk/, 2013-11-03, This “roving bug” feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations.NEWS,news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm, This goes no further..., Brian Wheeler, BBC News Online Magazine, 2004-03-02, 2008-06-23, Other techniques for phone hacking include tricking a mobile phone user into downloading malware that monitors activity on the phone. Bluesnarfing is an unauthorized access to a phone via Bluetooth.How easy is it to hack a mobile?, BBC News, 7 September 2010

Other

There are flaws in the implementation of the GSM encryption algorithm that allow passive interception.JOURNAL,csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf, Guidelines on Cell Phone and PDA Security, National Institute of Standards and Technology, October 2008, Wayne, Jansen, Karen, Scarfone, 10.6028/NIST.SP.800-124, 25 Jul 2012, The equipment needed is available to government agencies or can be built from freely available parts.NEWS,www.pcworld.com/article/185542/hackers_show_its_easy_to_snoop_on_a_gsm_call.html, Hackers Show It’s Easy to Snoop on a GSM Call, Robert, McMillan, IDG News Service, 2011-07-24, 2012-01-20,www.pcworld.com/article/185542/hackers_show_its_easy_to_snoop_on_a_gsm_call.html," title="web.archive.org/web/20120120095422www.pcworld.com/article/185542/hackers_show_its_easy_to_snoop_on_a_gsm_call.html,">web.archive.org/web/20120120095422www.pcworld.com/article/185542/hackers_show_its_easy_to_snoop_on_a_gsm_call.html, dead, In December 2011, German researcher Karsten Nohl revealed that it was possible to hack into mobile phone voice and text messages on many networks with free decryption software available on the Internet. He blamed the mobile phone companies for relying on outdated encryption techniques in the 2G system, and said that the problem could be fixed very easily.NEWS, Lax Security Exposes Voice Mail to Hacking, Study Says,www.nytimes.com/2011/12/26/technology/26iht-hack26.html?_r=1&ref=technology&pagewanted=all, The New York Times, O’Brien, Kevin J., 25 December 2011, 28 December 2011,

Legality

Phone hacking, being a form of surveillance, is illegal in many countries unless it is carried out as lawful interception by a government agency. In the News International phone hacking scandal, private investigator Glenn Mulcaire was found to have violated the Regulation of Investigatory Powers Act 2000. He was sentenced to six months in prison in January 2007.“Pair jailed over royal phone taps ”, BBC News, 26 January 2007 Renewed controversy over the phone-hacking claims led to the closure of the News of the World in July 2011.News of the World to close amid hacking scandal, BBC News, 7 July 2011In December 2010, the Truth in Caller ID Act was signed into United States law, making it illegal “to cause any caller identification service to knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value.“Truth in Caller ID Act of 2010, December 22, 2010, accessed 7 July 2017weblink {{Webarchive|url=https://web.archive.org/web/20171017093945myhacker.net/2017/09/android-tools-advance-hacking/|date=2017-10-17}}, 29 September 2017

See also

References

{{reflist}}

External links

{{2011 News Corporation scandal}}

- content above as imported from Wikipedia
- "phone hacking" does not exist on GetWiki (yet)
- time: 6:40am EDT - Wed, May 22 2024
[ this remote article is provided by Wikipedia ]
LATEST EDITS [ see all ]
GETWIKI 21 MAY 2024
GETWIKI 09 JUL 2019
Eastern Philosophy
History of Philosophy
GETWIKI 09 MAY 2016
GETWIKI 18 OCT 2015
M.R.M. Parrott
Biographies
GETWIKI 20 AUG 2014
CONNECT