[ti:Turn Off, Turn On: Simple Step Can Stop Phone Hackers] [by:www.51voa.com] [00:00.00]更多听力请访问51VOA.COM [00:00.04]American lawmaker Angus King [00:03.56]is a member of the Senate Intelligence Committee. [00:08.40]He received some advice this year by security staff [00:12.84]on how to keep his cellphone safe from hackers. [00:17.72]Step One: Turn off phone. [00:20.56]Step Two: Turn it back on. [00:23.84]That is it. [00:25.76]At a time of widespread digital insecurity, [00:30.16]it turns out that the oldest and simplest computer fix [00:35.08]can stop hackers from stealing information. [00:39.76]Restarting phones will not stop the army of digital criminals [00:44.80]or spy-for-hire companies. [00:48.44]But it can make even the most complex hackers [00:53.16]work harder to keep entry and steal data from a phone. [00:58.96]Neal Ziring is the technical director of the National [01:03.08]Security Agency's (or NSA) digital security division. [01:10.40]He said the advice is to make it more costly for hackers to steal data. [01:18.12]The NSA recommends restarting a cellphone [01:22.28]every week to prevent hacking. [01:26.08]The recommendation was part of a guide [01:29.72]for mobile digital security that the agency put out last year. [01:36.72]Cellphones are always close by, rarely turned off, [01:42.00]and hold huge amounts of personal data. [01:47.04]Cellphones have become top targets for hackers [01:51.44]looking to steal messages, contacts, and pictures. [01:57.32]Cellphones also can be used to find out where users are physically. [02:05.12]Hackers can even turn on a phone's camera and microphone. [02:11.76]It is not known exactly how many people's phones are hacked each year. [02:19.12]But a recent investigation by a group of worldwide media agencies [02:25.92]found that over 1,000 reporters, human rights activists, [02:31.80]and politicians were believed to be possible targets [02:36.76]of an Israeli hacker-for-hire company. [02:41.24]This has caused political disorder in France, [02:44.88]India, Hungary, and elsewhere. [02:49.28]Top hackers are now gaining entry to personal devices [02:53.96]without any user action, instead of through a method [02:58.92]like the common "open this link" trick. [03:02.96]Normally, once hackers gain entry to a device or network, [03:08.40]they look for ways to stay in the system. [03:12.80]They do this by placing harmful programing [03:16.40]into a computer's root file system. [03:21.04]But Ziring said that is becoming more difficult, [03:24.84]as phone manufacturers like Apple and Google [03:29.72]have stronger security systems to block such actions. [03:35.68]This has led hackers to use a sort of hacking called [03:40.24]"in-memory payloads," which are harder to find in the phone. [03:46.44]Such hacks cannot survive a restart. [03:50.32]But because many people restart their phones so rarely, [03:55.96]the hackers can get all the information needed. [04:00.92]A large market currently exists [04:04.08]for hacking tools that can break into phones. [04:08.96]Some companies like Zerodium and Crowdfence [04:13.04]publicly offer millions of dollars for hacks [04:16.88]that do not need user interaction. [04:21.16]Hacker-for-hire companies that sell hacking services [04:25.52]to governments and law agencies have increased in recent years. [04:31.72]The most well known is the Israel-based NSO Group. [04:37.64]Their hacking programming has reportedly been used [04:42.00]around the world to break into the phones of activists, [04:46.68]reporters, and religious leaders [04:51.28]Facebook has brought NSO Group to court [04:54.84]for possibly targeting about 1,400 users [04:59.92]on its messaging service WhatsApp with hacking programing. [05:05.72]NSO Group said it only sells its programing to "vetted government agencies" [05:12.44]for use against terrorists and major criminals. [05:17.68]The company did not answer a request [05:20.92]for comment from Associated Press reporters. [05:25.64]Documents gained by Vice News found NSO's U.S.-based company [05:32.00]advertised a powerful phone hacking tool to law enforcement agencies. [05:39.48]The tool could even survive a factory reset [05:43.84]– when all user data from a phone is removed. [05:48.92]The NSA's guide for mobile digital security notes [05:53.60]that restarting a phone only works sometimes. [05:58.60]The agency's guide for personal devices [06:02.36]has a simple piece of advice to make sure hackers [06:06.24]cannot record you from your phone: [06:09.28]do not carry it with you. [06:12.76]I'm Gregory Stachel.更多听力请访问51VOA.COM