Chink in the security armour
It is perhaps a cruel irony that the huge rise in physical data security measures has inadvertently triggered a new line of attack for criminals; phone correspondence. With traditional identity theft channels now closing, fraudsters are increasingly targeting unprotected voice conversations to obtain confidential insider information, passwords and PIN codes without detection. Voice correspondence is almost always uncharted territory for business security armour under the false assumption that phone hacking is a highly sophisticated and expensive means of attack.
Experts like Karsten Nohl, a German researcher and security specialist, have provided yet another harsh warning for organisations with lacklustre security measures, when demonstrating how easy it was to eavesdrop on GSM-based phone calls, including those used by AT&T and T-Mobile subscribers in the US.
An everyday threat
But when assessing the threat posed by phone fraudsters and criminals, we need look no further than the regular examples of celebrity phone eavesdropping that is becoming commonplace.
Even high profile national newspapers like the News of the World have become embroiled in the scandal, resulting in one of their reporters being jailed for listening in on calls between members of the royal family. Liberal Democrat Lembit Opik recently went public saying he was concerned his phone calls were being intercepted and PR guru Max Clifford settled a hacking dispute out of court for a six-figure sum.
And who can forget the case of Tiger Woods, who found himself in hot water after several voicemail and text messages fell in the lap of numerous national newspapers and celebrity magazines.
Increasingly, phone fraudsters are being hired or trained by rival businesses, getting insider information and critical data without ever being suspected. But it doesn’t have to be this way, tailored and unbreakable encrypted phones exist that can keep fraudsters out in the cold. These solutions provide end-to-end security, preventing criminals from illegally listening into conference calls, board-level correspondence and financial reports over the phone.
Cause for concern
In the light of this present and real threat, every CEO and board member should ensure they avoid using traditional GSM phones and stick to encrypted, safe and secure correspondence. Obviously, this is a steep learning curve for those in charge of managing security measures, but be under no illusion; the phone fraud threat is growing, not shrinking.
Phone correspondence simply cannot be overlooked in organisation’s wider security armour. With hacking technology getting cheaper and easier, CIOs should start addressing this problem now and ensure that in their organisations they are fully aware of the threats to unencrypted voice and SMS correspondence.
Turning up the volume on phone security threats
Most Popular Mobile Business Stories
- Best-selling ringtones in 2005
- The MVNO Challenge
- Mobile Distribution
- Nazir of Advanced Comms gets £20k fine and starves workers
- Keith Curran – Yes Telecom
- 3 offers free video downloads from April
- Moco has given every member of staff a new LG 8180 video pho...
- Nokia restructures for the converging marketplace
- Moto Splits
- Mystery Caller – June 2013
- The Forgotten “BYOD” Stakeholder – the Service Provider!...
- 5G – What is it good for?
- Mystery Caller – October 2016
- Fone Logistics Goes on the Road
- Palm aims for Europe
- LG’s JoY at New Smartphone
- New Unique Mobility Solution
- Motofone Clearvision
- Sony Ericsson K800i
- Dubai’s Carousel Co-operation