Turn Off, Turn On: Simple Step Can Stop Phone Hackers
2021-08-01
LRC
TXT
大字
小字
滚动
全页
1American lawmaker Angus King is a member of the Senate Intelligence Committee.
2He received some advice this year by security staff on how to keep his cellphone safe from hackers.
3Step One: Turn off phone.
4Step Two: Turn it back on.
5That is it. At a time of widespread digital insecurity, it turns out that the oldest and simplest computer fix can stop hackers from stealing information.
6Restarting phones will not stop the army of digital criminals or spy-for-hire companies.
7But it can make even the most complex hackers work harder to keep entry and steal data from a phone.
8Neal Ziring is the technical director of the National Security Agency's (or NSA) digital security division.
9He said the advice is to make it more costly for hackers to steal data.
10The NSA recommends restarting a cellphone every week to prevent hacking.
11The recommendation was part of a guide for mobile digital security that the agency put out last year.
12Cellphones are always close by, rarely turned off, and hold huge amounts of personal data. Cellphones have become top targets for hackers looking to steal messages, contacts, and pictures.
13Cellphones also can be used to find out where users are physically.
14Hackers can even turn on a phone's camera and microphone.
15It is not known exactly how many people's phones are hacked each year.
16But a recent investigation by a group of worldwide media agencies found that over 1,000 reporters, human rights activists, and politicians were believed to be possible targets of an Israeli hacker-for-hire company.
17This has caused political disorder in France, India, Hungary, and elsewhere.
18Top hackers are now gaining entry to personal devices without any user action, instead of through a method like the common "open this link" trick.
19Normally, once hackers gain entry to a device or network, they look for ways to stay in the system.
20They do this by placing harmful programing into a computer's root file system.
21But Ziring said that is becoming more difficult, as phone manufacturers like Apple and Google have stronger security systems to block such actions.
22This has led hackers to use a sort of hacking called "in-memory payloads," which are harder to find in the phone.
23Such hacks cannot survive a restart.
24But because many people restart their phones so rarely, the hackers can get all the information needed.
25A large market currently exists for hacking tools that can break into phones.
26Some companies like Zerodium and Crowdfence publicly offer millions of dollars for hacks that do not need user interaction.
27Hacker-for-hire companies that sell hacking services to governments and law agencies have increased in recent years.
28The most well known is the Israel-based NSO Group.
29Their hacking programming has reportedly been used around the world to break into the phones of activists, reporters, and religious leaders
30Facebook has brought NSO Group to court for possibly targeting about 1,400 users on its messaging service WhatsApp with hacking programing.
31NSO Group said it only sells its programing to "vetted government agencies" for use against terrorists and major criminals.
32The company did not answer a request for comment from Associated Press reporters.
33Documents gained by Vice News found NSO's U.S.-based company advertised a powerful phone hacking tool to law enforcement agencies.
34The tool could even survive a factory reset - when all user data from a phone is removed.
35The NSA's guide for mobile digital security notes that restarting a phone only works sometimes.
36The agency's guide for personal devices has a simple piece of advice to make sure hackers cannot record you from your phone: do not carry it with you.
37I'm Gregory Stachel.
1American lawmaker Angus King is a member of the Senate Intelligence Committee. He received some advice this year by security staff on how to keep his cellphone safe from hackers. 2Step One: Turn off phone. 3Step Two: Turn it back on. 4That is it. At a time of widespread digital insecurity, it turns out that the oldest and simplest computer fix can stop hackers from stealing information. 5Restarting phones will not stop the army of digital criminals or spy-for-hire companies. But it can make even the most complex hackers work harder to keep entry and steal data from a phone. 6Neal Ziring is the technical director of the National Security Agency's (or NSA) digital security division. He said the advice is to make it more costly for hackers to steal data. 7The NSA recommends restarting a cellphone every week to prevent hacking. The recommendation was part of a guide for mobile digital security that the agency put out last year. 8Cellphones are always close by, rarely turned off, and hold huge amounts of personal data. Cellphones have become top targets for hackers looking to steal messages, contacts, and pictures. Cellphones also can be used to find out where users are physically. Hackers can even turn on a phone's camera and microphone. 9It is not known exactly how many people's phones are hacked each year. But a recent investigation by a group of worldwide media agencies found that over 1,000 reporters, human rights activists, and politicians were believed to be possible targets of an Israeli hacker-for-hire company. This has caused political disorder in France, India, Hungary, and elsewhere. 10Top hackers are now gaining entry to personal devices without any user action, instead of through a method like the common "open this link" trick. 11Normally, once hackers gain entry to a device or network, they look for ways to stay in the system. They do this by placing harmful programing into a computer's root file system. But Ziring said that is becoming more difficult, as phone manufacturers like Apple and Google have stronger security systems to block such actions. 12This has led hackers to use a sort of hacking called "in-memory payloads," which are harder to find in the phone. Such hacks cannot survive a restart. But because many people restart their phones so rarely, the hackers can get all the information needed. 13A large market currently exists for hacking tools that can break into phones. Some companies like Zerodium and Crowdfence publicly offer millions of dollars for hacks that do not need user interaction. 14Hacker-for-hire companies that sell hacking services to governments and law agencies have increased in recent years. The most well known is the Israel-based NSO Group. Their hacking programming has reportedly been used around the world to break into the phones of activists, reporters, and religious leaders 15Facebook has brought NSO Group to court for possibly targeting about 1,400 users on its messaging service WhatsApp with hacking programing. 16NSO Group said it only sells its programing to "vetted government agencies" for use against terrorists and major criminals. The company did not answer a request for comment from Associated Press reporters. 17Documents gained by Vice News found NSO's U.S.-based company advertised a powerful phone hacking tool to law enforcement agencies. The tool could even survive a factory reset - when all user data from a phone is removed. 18The NSA's guide for mobile digital security notes that restarting a phone only works sometimes. The agency's guide for personal devices has a simple piece of advice to make sure hackers cannot record you from your phone: do not carry it with you. 19I'm Gregory Stachel. 20Alan Suderman reported this story for The Associated Press. Gregory Stachel adapted it for VOA Learning English. Ashley Thompson was the editor. 21______________________________________________________________________ 22Words in This Story 23hack - v. to secretly get access to the files on a computer or network in order to get information or cause damage 24hire - v. to use or get the services of (someone) to do a particular job 25vet - v. to check (something) carefully to make sure it is acceptable 26interaction - n. to act together: to come together and have an effect on each other 27mobile - n. able to be moved