Feeds

Manchester biz raided in text message spam clampdown

Suspected ambulance-chasers 'sent thousands of txts'

Beginner's guide to SSL certificates

A clampdown on text spam has led to a police raid on offices in Urmston, Manchester, and the seizure of equipment by the Information Commissioner's Office.

The UK data privacy watchdog was given enhanced powers last year to tackle the growing problem of junk SMS messages, including the authority to ask mobile operators for information and numbers. The ICO was also allowed to obtain warrants to search premises.

The latest use of these powers targeted an unnamed firm touting an ambulance-chasing injury claims service. The watchdog, which is poring over evidence collected from the raided biz, said in a statement:

As part of the ICO’s ongoing investigations aimed at tackling the scourge of unwanted spam texts linked to the Claims Management Industry and the companies profiting from this unlawful activity, the ICO executed a search warrant on a premises situated in the Urmston area of Manchester on Tuesday 28 February.

The property was believed to be connected to individuals associated with a company that is suspected of sending out thousands of unsolicited electronic marketing messages.

We will take action where it is clear that individuals or companies are profiteering from unlawful activity. This includes issuing a monetary penalty of up to £500,000 to the worst offenders.

David Clancy, an investigation's manager at the ICO, explained the business model behind the mobile phone spam texts to the BBC.

"Once they [spammers] have trapped your number they will then sell it into the [claims] industry," he said. "First users will pay £1, £1.50 for that phone number. A month later it will be distributed to lots of organisations for 50p, 20p, 10p a time."

A previous raid last December led to the deactivation of 20,000 SIM cards. An ICO spokeswoman said the cards "had been used to send spam text messages".

Spam texts are usually sent using unregistered pay-as-you-go SIM cards. Under regulations introduced last year mobile operators are obliged to assist the ICO in pinpointing the locations from which clusters of junk messages have been sent. This cleared the way for the ICO to obtain a search warrant, authorising a raid by ICO investigators and local police.

The ICO advises punters to avoid responding to spam text messages. ®

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.