Vodafone Leaked Email on 'hacking' of Reporter

vodafone-ghana-slogan1.jpg

Vodafone Australia is facing mounting pressure over the potentially unlawful access of a journalist’s phone records, as more details of a leaked email emerged that alleged a manager in the company instructed investigators to “use any means available” to track down the journalist’s source.
 
The company has admitted that investigators accessed Fairfax journalist Natalie O’Brien’s call and text records in 2011 after she broke a story about a serious data breach within Vodafone.After it initially denied any improper behaviour, the company referred the allegations to the Australian federal police for investigation .

The company has maintained that Vodafone management did not ask the two investigators who were involved to access O’Brien’s phone records, and that a review commissioned by the company found management had not instructed them to take that action.

The leaked email was reported by the Australian following previous reports. It was written by a Vodafone Australia manager to a global manager in London in 2012 and relays a conversation with one of the investigators in which the investigator alleges he was instructed by another manager to take certain measures to determine the source of O’Brien’s story.
It says the investigator asked “if they really meant ‘any means available including call-charge records and text messages’, to which the manager said yes, he did not care how they did this,” the email said, according to the Australian.
It continues, saying that the investigator “asked if this included the reporter as well … [the manager] said yes.”

Vodafone has denied that the investigators were instructed to access O’Brien’s phone. A spokeswoman for the company said it commissioned KPMG to conduct a review into the circumstances around O’Brien’s phone being accessed in 2012, but the review found that Vodafone management had not instructed the two investigators involved.
The company has refused to release the report publicly. A spokeswoman said KPMG found “that there was no evidence VHA management instructed … [the investigators] to review customers’ text messages or that VHA management was aware they had been accessed.”

Greens senator Scott Ludlam has urged the AFP to take up an investigation into the circumstances of the case. The Media, Entertainment and Arts Alliance has described the breach as “unforgivable” and has written to the company asking it to make public documents concerning the breach.
Guardian: http://bit.ly/1MGqn8J

 

 

« UK’s Surveillance Dragnet Legal Challenge
Why Aren’t Companies Using Military Security? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

CyberForceHQ

CyberForceHQ

CyberForce helps cyber security professionals take real-world tests, get ranked and get paid better. It's that simple.