Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Why IT distributors need a smarter relationship with resellers

      18 May 2025

      Is Google overspending on AI?

      18 May 2025

      Cell C may list on the JSE as Blue Label eyes big restructuring

      16 May 2025

      Nvidia shares roar back to life

      16 May 2025

      5 000 fake DStv chargers seized, destroyed in Durban port bust

      16 May 2025
    • World

      Microsoft to lay off 3% of workforce in organisation-wide cuts

      14 May 2025

      AI-voiced audiobooks are coming to Audible

      13 May 2025

      Apple turns to AI to tackle iPhone battery woes

      13 May 2025

      Vodafone CFO to step down

      7 May 2025

      Lights, camera, tariffs: Trump declares war on foreign flicks

      5 May 2025
    • In-depth

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025

      Social media’s Big Tobacco moment is coming

      13 April 2025

      This is Europe’s shot to emerge from Silicon Valley’s shadow

      10 April 2025

      Microsoft turns 50

      4 April 2025
    • TCS

      Meet the CIO | Schalk Visser on Cell C’s big tech pivot

      13 May 2025

      TCS | Kiaan Pillay on fintech start-up Stitch and its R1-billion funding round

      7 May 2025

      TCS+ | Switchcom and Huawei eKit: networking made easy for SMEs

      6 May 2025

      TCS | How Covid sparked a corporate tug-of-war over Adapt IT

      30 April 2025

      TCS+ | Inside MTN’s big brand overhaul

      11 April 2025
    • Opinion

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025

      ICT distributors must embrace innovation or risk irrelevance

      9 April 2025

      South Africa unprepared for deepfake chaos

      3 April 2025

      Google: South African media plan threatens investment

      3 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » News » News of the World scandal: is your phone safe?

    News of the World scandal: is your phone safe?

    By Editor11 July 2011
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Scandal-plagued UK tabloid News of the World published its last issue on Sunday following accusations the newspaper hacked into the voice mailboxes of more than 4 000 people. But how easy or difficult is it to do this type of hacking? And how prevalent is it exactly?

    Etienne Labuschagne, MD of SpyCatcher SA, which develops and imports a wide range of surveillance equipment and other hi-tech gear, says it’s “actually very easy”. He explains that there are three methods people can use to gain access to someone’s voice mail or any other information on a mobile phone. Of course, he cautions that the practice is illegal.

    The first way it can be done is using malware. “There’s software you can create for a mobile phone that can be sent as an SMS,” Labuschagne says. “Once the person reads the SMS, it installs an application in the background that can do things like forwarding a copy of all incoming messages via e-mail.”

    Labuschagne says another common tactic, and the cheapest, for bugging or tracking cellular phones or gaining access to voice mail is simply getting hold of the actual device. “If someone can get to the device, they can either embed hardware or software in it, or switch it for a modified device. Aside from being able to access conversations, text messages and e-mails, the phone can then also be used as a room bug.”

    The third and most expensive method is via government or network operators themselves. “You can buy someone off in government or at the operator.”

    Etienne Labuschagne

    Labuschagne says gaining access to thousands of people’s voice mail would require government contacts, as government is the only body entitled to access voice mails across multiple networks. “Money talks, unfortunately.”

    Although the ability to listen in to calls and voice mail is only meant to be available to government, “with the right contacts and the right software it’s easy to arrange. It’s been going on for years,” he says.

    “Many people think that this sort of thing isn’t happening — that corporate espionage is just something you see in movies,” says Labuschagne. “But that’s just not the case. As more people use these kinds of methods, more of them are getting caught. We live in an era where you can buy bugging gear for a few dollars … and where people will move mountains to get information first.”

    Labuschagne says News of the World was simply “one of the unlucky ones that got caught doing it”. He suggests the newspaper got complacent after having gotten away with the practice for so long.

    “It used to be easy to say people were just paranoid,” says Labuschagne. “I’m dealing with more and more clients every day who have these problems.”

    The only way to ensure one’s phone calls, SMS messages and voice mails are entirely secure is to encrypt conversations, he adds. “The only way to be 100% sure is by using point-to-point encryption, where your unit and mine are both encrypted.”

    With corporate espionage on the rise, he says that many companies are opting for counter surveillance strategies to protect their information, particularly because prevention is always easier than prosecution.

    “I recently dealt with a company that knew it had been bugged by competitors. But the problem is that in order to prosecute, the company would have to produce extensive evidence. Even then, that doesn’t stop it in the interim.”  — Craig Wilson, TechCentral

    • Subscribe to our free daily newsletter
    • Follow us on Twitter or on Facebook


    Etienne Labuschagne News of the World Spycatcher SpyCatcher SA
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleGoogle offers more Street View images of SA
    Next Article Plain language: simpler said than done

    Related Posts

    Spy vs spy in corporate SA

    29 March 2011
    Company News

    Zoom Fibre’s mission: powering the economy with world-class internet

    16 May 2025

    Retailers: take back control of your tech stack with self-enablement

    15 May 2025

    Sigfox South Africa unveils next-gen asset intelligence for smarter logistics

    15 May 2025
    Opinion

    Solar panic? The truth about SSEG, fines and municipal rules

    14 April 2025

    Data protection must be crypto industry’s top priority

    9 April 2025

    ICT distributors must embrace innovation or risk irrelevance

    9 April 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.