I would just like to inform interested readers about the technological details the media seems to ignore. Now, as far as I am aware there has been no hacking but there has been tapping of telephones. This might be a battle of semantics but lets see where it gets us.
Hacking a phone is very difficult. Most of our politicians use the BlackBerry for a very specific reason: it is very impossible to hack. So difficult indeed that Indian spooks gave up and forced RIM (the makers of BlackBerry) to give them the 'keys' for the phone (i.e. the software encryption code). This should give the reader some clue as to level of intricacy involved in hacking mobile phones, and BlackBerrys in particular, used by all government and major corporations because they are deceptively hard to enter without permission.
What you need to ask yourself now is this: could a NoTW private investigator accomplish what the entire Indian secret service could not? The smart money is on 'no'. Hence we can but conclude that the media, as always when it comes to technology, got it wrong. Whenever they talk about malign computer breaches they speak of 'hackers' as well even though the correct term is 'cracker' - two very different sides of the coin.
What they with all certainty did do was not phone hacking (because they do not have the brains nor the equipment to do that - GCHQ does but they are a government funded spy department with 20,000+ employees and a billion pound+ budget). What they did do was phone tapping which Wikipedia defines as 'the monitoring of telephone and Internet conversations by a third party, often by covert means.' This is much more within the confines of their technological expertise. It is not particularly hard to do if you have the right stuff. Joe Bloggs on the street could do it with some basic instructions. And by the looks of it Joe Bloggs on the street did do the tapping, judging by the fantastic mess they have created as a result of their amateurism.
4 comments:
Of all the million miles of column inches (and still growing) on this subject you are the first I've seen to cover this rather important question.
What is meant by "hacking" a la NoW? I doubt very much that any encrypted information has been hacked. When I dial my voice message service the voice service must look for some (encrypted) electronic ID.
What technically speaking has been done? Would any techies out there like to explain?
These days proviso you hold a telephone similar to nearly all of us carry out you often download and read these annoying calls along with hang ups. In a little cases you could even subsist obtaining harassed, luckily you be able to in our day own options with the purpose of stop the calls. Using services resembling this know how to bookmark you beginning possessing that hire a detective with the purpose of in time can detriment hundreds to facilitate thousands of dollars. Actually finding a webpage to offers "vacant" cell phone annul lookup services is not hard, there's hundreds of them, the problem is how to locate one to facilitate know how to actually provide you as well as the details you need phone number lookup However if it is actually a further number these directories self-control doubtless not exist able to subsidy you while they need not update their databases regularly. After a quantity of occasion you willpower forget all concerning your small investment and motivation assume as though you possess found a open reorder cell phone lookup directory. Visit us along with use our overturn mobile phone number search directory. Once a appliance in the home, the telephone is these days a required personal accessory. Many privacy groups be the owner of fought the trend to facilitate publish mobile numbers in public mobile phone books- particularly given that unsolicited calls can charge money. Luckily, there are other webpages with the purpose of provide this serviced on behalf of a extremely reasonable fee.
Another Smart post from you Admin :)
Smart and good another post admin :)
Egypt Map
Post a Comment