Vodafone Leaked Email on 'hacking' of Reporter

vodafone-ghana-slogan1.jpg

Vodafone Australia is facing mounting pressure over the potentially unlawful access of a journalist’s phone records, as more details of a leaked email emerged that alleged a manager in the company instructed investigators to “use any means available” to track down the journalist’s source.
 
The company has admitted that investigators accessed Fairfax journalist Natalie O’Brien’s call and text records in 2011 after she broke a story about a serious data breach within Vodafone.After it initially denied any improper behaviour, the company referred the allegations to the Australian federal police for investigation .

The company has maintained that Vodafone management did not ask the two investigators who were involved to access O’Brien’s phone records, and that a review commissioned by the company found management had not instructed them to take that action.

The leaked email was reported by the Australian following previous reports. It was written by a Vodafone Australia manager to a global manager in London in 2012 and relays a conversation with one of the investigators in which the investigator alleges he was instructed by another manager to take certain measures to determine the source of O’Brien’s story.
It says the investigator asked “if they really meant ‘any means available including call-charge records and text messages’, to which the manager said yes, he did not care how they did this,” the email said, according to the Australian.
It continues, saying that the investigator “asked if this included the reporter as well … [the manager] said yes.”

Vodafone has denied that the investigators were instructed to access O’Brien’s phone. A spokeswoman for the company said it commissioned KPMG to conduct a review into the circumstances around O’Brien’s phone being accessed in 2012, but the review found that Vodafone management had not instructed the two investigators involved.
The company has refused to release the report publicly. A spokeswoman said KPMG found “that there was no evidence VHA management instructed … [the investigators] to review customers’ text messages or that VHA management was aware they had been accessed.”

Greens senator Scott Ludlam has urged the AFP to take up an investigation into the circumstances of the case. The Media, Entertainment and Arts Alliance has described the breach as “unforgivable” and has written to the company asking it to make public documents concerning the breach.
Guardian: http://bit.ly/1MGqn8J

 

 

« UK’s Surveillance Dragnet Legal Challenge
Why Aren’t Companies Using Military Security? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.