Vodafone Leaked Email on 'hacking' of Reporter

vodafone-ghana-slogan1.jpg

Vodafone Australia is facing mounting pressure over the potentially unlawful access of a journalist’s phone records, as more details of a leaked email emerged that alleged a manager in the company instructed investigators to “use any means available” to track down the journalist’s source.
 
The company has admitted that investigators accessed Fairfax journalist Natalie O’Brien’s call and text records in 2011 after she broke a story about a serious data breach within Vodafone.After it initially denied any improper behaviour, the company referred the allegations to the Australian federal police for investigation .

The company has maintained that Vodafone management did not ask the two investigators who were involved to access O’Brien’s phone records, and that a review commissioned by the company found management had not instructed them to take that action.

The leaked email was reported by the Australian following previous reports. It was written by a Vodafone Australia manager to a global manager in London in 2012 and relays a conversation with one of the investigators in which the investigator alleges he was instructed by another manager to take certain measures to determine the source of O’Brien’s story.
It says the investigator asked “if they really meant ‘any means available including call-charge records and text messages’, to which the manager said yes, he did not care how they did this,” the email said, according to the Australian.
It continues, saying that the investigator “asked if this included the reporter as well … [the manager] said yes.”

Vodafone has denied that the investigators were instructed to access O’Brien’s phone. A spokeswoman for the company said it commissioned KPMG to conduct a review into the circumstances around O’Brien’s phone being accessed in 2012, but the review found that Vodafone management had not instructed the two investigators involved.
The company has refused to release the report publicly. A spokeswoman said KPMG found “that there was no evidence VHA management instructed … [the investigators] to review customers’ text messages or that VHA management was aware they had been accessed.”

Greens senator Scott Ludlam has urged the AFP to take up an investigation into the circumstances of the case. The Media, Entertainment and Arts Alliance has described the breach as “unforgivable” and has written to the company asking it to make public documents concerning the breach.
Guardian: http://bit.ly/1MGqn8J

 

 

« UK’s Surveillance Dragnet Legal Challenge
Why Aren’t Companies Using Military Security? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.