Vodafone Leaked Email on 'hacking' of Reporter

vodafone-ghana-slogan1.jpg

Vodafone Australia is facing mounting pressure over the potentially unlawful access of a journalist’s phone records, as more details of a leaked email emerged that alleged a manager in the company instructed investigators to “use any means available” to track down the journalist’s source.
 
The company has admitted that investigators accessed Fairfax journalist Natalie O’Brien’s call and text records in 2011 after she broke a story about a serious data breach within Vodafone.After it initially denied any improper behaviour, the company referred the allegations to the Australian federal police for investigation .

The company has maintained that Vodafone management did not ask the two investigators who were involved to access O’Brien’s phone records, and that a review commissioned by the company found management had not instructed them to take that action.

The leaked email was reported by the Australian following previous reports. It was written by a Vodafone Australia manager to a global manager in London in 2012 and relays a conversation with one of the investigators in which the investigator alleges he was instructed by another manager to take certain measures to determine the source of O’Brien’s story.
It says the investigator asked “if they really meant ‘any means available including call-charge records and text messages’, to which the manager said yes, he did not care how they did this,” the email said, according to the Australian.
It continues, saying that the investigator “asked if this included the reporter as well … [the manager] said yes.”

Vodafone has denied that the investigators were instructed to access O’Brien’s phone. A spokeswoman for the company said it commissioned KPMG to conduct a review into the circumstances around O’Brien’s phone being accessed in 2012, but the review found that Vodafone management had not instructed the two investigators involved.
The company has refused to release the report publicly. A spokeswoman said KPMG found “that there was no evidence VHA management instructed … [the investigators] to review customers’ text messages or that VHA management was aware they had been accessed.”

Greens senator Scott Ludlam has urged the AFP to take up an investigation into the circumstances of the case. The Media, Entertainment and Arts Alliance has described the breach as “unforgivable” and has written to the company asking it to make public documents concerning the breach.
Guardian: http://bit.ly/1MGqn8J

 

 

« UK’s Surveillance Dragnet Legal Challenge
Why Aren’t Companies Using Military Security? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Staris

Staris

Human based defense is dead. Staris is reinventing application security for an increasingly AI driven world.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.

Datacom

Datacom

Datacom design, build and run IT systems and processes across operations, cybersecurity, cloud, digital platforms, payroll and enterprise applications.

Strata Horizon

Strata Horizon

Strata Horizon is a leading cybersecurity solutions provider in the UAE, offering innovative and comprehensive services to safeguard your organization from evolving digital threats.

Ory Corp

Ory Corp

Ory's IAM/CIAM solutions are designed to empower businesses with the tools they need to protect their users, services and things, and maintain compliance.