Phone hacking is the practice of
exploring a
mobile device
A mobile device or handheld device is a computer small enough to hold and operate in hand. Mobile devices are typically battery-powered and possess a flat-panel display and one or more built-in input devices, such as a touchscreen or keypad. ...
, often using
computer exploits to analyze everything from the lowest
memory
Memory is the faculty of the mind by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action. If past events could not be remembe ...
and
CPU levels up to the highest
file system and
process levels. Modern
open source tooling has become fairly sophisticated to be able to "hook" into individual functions within any running
app on an unlocked device and allow deep inspection and modification of its functions.
Phone hacking is a large branch of
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
that includes studying various situations exactly how attackers use
security exploits to gain some level of access to a
mobile device
A mobile device or handheld device is a computer small enough to hold and operate in hand. Mobile devices are typically battery-powered and possess a flat-panel display and one or more built-in input devices, such as a touchscreen or keypad. ...
in a variety of situations and presumed access levels.
The term came to prominence during the
News International phone hacking scandal, in which it was alleged (and in some cases proved in court) that the British tabloid newspaper the ''
News of the World'' had been involved in the interception of voicemail messages of the
British royal family, other public figures, and murdered schoolgirl
Milly Dowler.
Victims of phone hacking
Although mobile phone users may be targeted, "for those who are famous, rich or powerful or whose prize is important enough (for whatever reason) to devote time and resources to make a concerted attack, it is usually more common, there are real risks to face."
Techniques
Voicemail hacking

The unauthorized remote access to
voicemail systems, such as exposed by the
News International phone hacking scandal, is possible because of weaknesses in the implementations of these systems by
telephone companies.
Mobile phone voicemail messages may be accessed on a
landline telephone with the entry of a
personal identification number
A personal identification number (PIN; sometimes RAS syndrome, redundantly a PIN code or PIN number) is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system.
The PIN has been the key to faci ...
(PIN).
Reporters for News International would call the number of an individual's mobile phone, wait to be moved to voicemail, and then guess the PIN, which was often set at a simple default such as 0000 or 1234.
Even where the default PIN is not known,
social engineering can be used to reset the voicemail PIN code to the default by impersonating the owner of the phone with a call to a
call centre.
During the mid-2000s, calls originating from the handset registered to a voicemail account would be put straight through to voicemail without the need of a PIN. A hacker could use
caller ID spoofing to impersonate a target's handset caller ID and thereby gain access to the associated voicemail without a PIN.
Following controversies over phone hacking and criticism of mobile service providers who allowed access to voicemail without a PIN, many mobile phone companies have strengthened the default security of their systems so that remote access to voicemail messages and other phone settings can no longer be achieved even via a default PIN.
For example,
AT&T
AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
announced in August 2011 that all new wireless subscribers would be required to enter a PIN when checking their voicemail, even when checking it from their phones. To encourage
password strength, some companies now disallow the use of consecutive or repeat digits in voicemail PINs.
Handsets
An analysis of user-selected PIN codes suggested that ten numbers represent 15% of all
iPhone passcodes, with "1234" and "0000" being the most common, with years of birth and graduation also being common choices. Even if a four-digit PIN is randomly selected, the
key space is very small (
or 10,000 possibilities), making PINs significantly easier to
brute force than most passwords; someone with physical access to a handset secured with a PIN can therefore feasibly determine the PIN in a short time.
Mobile phone microphones can be activated remotely by security agencies or telephone companies without physical access as long as the battery has not been removed.
This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations.
Other techniques for phone hacking include tricking a mobile phone user into downloading
malware that monitors activity on the phone.
Bluesnarfing is an unauthorized access to a phone via
Bluetooth.
Other
There are flaws in the implementation of the
GSM encryption algorithm that allow passive interception. The equipment needed is available to government agencies or can be built from freely available parts.
In December 2011, German researcher Karsten Nohl revealed that it was possible to hack into mobile phone voice and text messages on many networks with free decryption software available on the Internet. He blamed the mobile phone companies for relying on outdated encryption techniques in the
2G system, and said that the problem could be fixed very easily.
Legality
Phone hacking, being a form of
surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
, is illegal in many countries unless it is carried out as
lawful interception by a government agency. In the
News International phone hacking scandal, private investigator
Glenn Mulcaire was found to have violated the
Regulation of Investigatory Powers Act 2000. He was sentenced to six months in prison in January 2007. Renewed controversy over the phone-hacking claims led to the closure of the ''
News of the World'' in July 2011.
In December 2010, the
Truth in Caller ID Act was signed into
United States law
The law of the United States comprises many levels of Codification (law), codified and uncodified forms of law, of which the supreme law is the nation's Constitution of the United States, Constitution, which prescribes the foundation of the ...
, making it illegal "to cause any caller identification service to knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value."
, 29 September 2017
See also
* Mobile security
* Operation Weeting
* Phreaking
* Wiretapping
* Vault 7
* SIM swap scam
References
External links
*
US Today Has someone hacked your webcam
March 2 2018
Timeline: News of the World phone-hacking row
''BBC News
BBC News is an operational business division of the British Broadcasting Corporation (BBC) responsible for the gathering and broadcasting of news and current affairs in the UK and around the world. The department is the world's largest broad ...
'', 5 July 2011
Full Q&A On The Phone Hacking Scandal
'' Sky News'', 5 July 2011
Anatomy of the Phone-Hacking Scandal
''The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'', 1 September 2010
The Rise of Caller ID Spoofing
''The Wall Street Journal
''The Wall Street Journal'' (''WSJ''), also referred to simply as the ''Journal,'' is an American newspaper based in New York City. The newspaper provides extensive coverage of news, especially business and finance. It operates on a subscriptio ...
'', 5 February 2010
Phone hacking: Are you safe?
Rory Cellan-Jones, ''BBC News
BBC News is an operational business division of the British Broadcasting Corporation (BBC) responsible for the gathering and broadcasting of news and current affairs in the UK and around the world. The department is the world's largest broad ...
'', 12 July 2011
Should you cover your phone camera, BUSTLE
Feb 16 2018
{{DEFAULTSORT:News Of The World Phone Hacking Affair
Hacking (computer security)
Telephone crimes
Telephone tapping
Mobile security
Phreaking