T-Mobile Hacker Watches Secret Service Watching Him
from the the-secret-service-isn't-so-secret,-apparently dept
The Secret Service has been investigating various computer crimes lately, and Security Focus has a fascinating article about how one of the people they were going after was simultaneously tracking them back by accessing an agent's T-Mobile Sidekick account. The details are fairly complex, but basically, this hacker got his hands on the entire T-Mobile user database, including passwords and other private info, allowing him to access anyone's web-based Sidekick account. It just so happens that one of the Secret Service agents working on the case uses a Sidekick, and the hacker got various Secret Service documents by logging into that agent's account. If this brings up the question of: "what the hell is a Secret Service agent doing using a T-Mobile Sidekick and allowing it to receive sensitive documents?" you're not alone. One of the Sidekick's "nice" features from a user perspective is that it automatically syncs with T-Mobile's web server in real time. So any info on the device is accessible via the web. That's useful for a normal user, but also opens it up to hackers. You would think the Secret Service would be a bit more careful. This is an organization that has "secret" in their name, after all. Anyway, they eventually tracked down this guy, but have been very quiet about it. Also very quiet is T-Mobile -- which may be against the law. California has this data privacy law that says a company needs to tell people if their personal info may have been compromised. Apparently, T-Mobile doesn't think the law applies to them. Update: The Associated Press has more details, claiming that the hacker only had access to 400 names. This seems unlikely, as he appeared to hit the "jackpot" with those 400 names including a number of celebrities and this Secret Service agent. They also claim they informed those 400. The Secret Service admits the agent screwed up by using the Danger device to access his work email, but said it was the best way to get information to him when he was on the go (the Secret Service can't afford their own mobile email systems?!?). They also claim that nothing too important was available to the hacker.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Bound to happen
[ link to this | view in chronology ]
Re: Bound to happen
If you don't know what I mean? E-mail is unsecure, anyone can intercept it and read it, unless you use tools to secure it so only the people U want can read it.
Plus, this make the T-Mobile admins look like dummies. Make's me consider moving my phone service else where. But, will this mean that T-Mobile's security will become more secure?
[ link to this | view in chronology ]
Re: Bound to happen
Obviously, this tool just had NO clue that his/(her) email could be intercepted.
That is just SO sad, especially in this day and age.
The only mitigating factor is that unless htis person was Watched, they could maybe get away with public transmission.
The bright part?, maybe it was Planned...
Yeah, ok, I don't think so either!
[ link to this | view in chronology ]
Re: Bound to happen
[ link to this | view in chronology ]
More Deets
http://story.news.yahoo.com/news?tmpl=story&ncid=738&e=1&u=/ap/20050113/ap_on_hi_te/cellular_h acker
[ link to this | view in chronology ]
Please I need som help
I look for a special program for a cellular telephone to send messages to any cellular telephone, and I can through these messages penetrate the victim's cellular telephone and knowledge of all data stored in a victim of numbers and letters only script
[ link to this | view in chronology ]
Re: Hello
[ link to this | view in chronology ]
Megaupload downloading
[ link to this | view in chronology ]