Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Jesus Malverde

(10,274 posts)
Thu Dec 18, 2014, 08:58 PM Dec 2014

German researchers discover a flaw that could let anyone listen to your cell calls.

Source: Washington Post

German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available.

The flaws, to be reported at a hacker conference in Hamburg this month, are the latest evidence of widespread insecurity on SS7, the global network that allows the world’s cellular carriers to route calls, texts and other services to each other. Experts say it’s increasingly clear that SS7, first designed in the 1980s, is riddled with serious vulnerabilities that undermine the privacy of the world’s billions of cellular customers.

The flaws discovered by the German researchers are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network.

snip

These vulnerabilities continue to exist even as cellular carriers invest billions of dollars to upgrade to advanced 3G technology aimed, in part, at securing communications against unauthorized eavesdropping. But even as individual carriers harden their systems, they still must communicate with each other over SS7, leaving them open to any of thousands of companies worldwide with access to the network. That means that a single carrier in Congo or Kazakhstan, for example, could be used to hack into cellular networks in the United States, Europe or anywhere else.



Read more: http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/

7 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
German researchers discover a flaw that could let anyone listen to your cell calls. (Original Post) Jesus Malverde Dec 2014 OP
Great work on a little known but ubiquitous control protocol for nearly all telco traffic -eom whereisjustice Dec 2014 #1
Anyone still worried about the NSA? L0oniX Dec 2014 #2
Because after all,... Android3.14 Dec 2014 #5
That's not a bug, it's a feature mindwalker_i Dec 2014 #3
I am puzzled about this. SS7 has always been a different path than the voice calls. LiberalArkie Dec 2014 #4
It's in the article Paulie Dec 2014 #6
And I'm sure the equipment the hackers use is going to be known as a trusted device snooper2 Dec 2014 #7
 

Android3.14

(5,402 posts)
5. Because after all,...
Fri Dec 19, 2014, 07:24 AM
Dec 2014

...if criminals do it, then it's okay for the government to do it. That's why no one cares about the police killing unarmed people.

LiberalArkie

(15,715 posts)
4. I am puzzled about this. SS7 has always been a different path than the voice calls.
Thu Dec 18, 2014, 09:55 PM
Dec 2014

From the cell site it was the slow speed circuits. In fact because the small packets of handoff data used so little bandwidth, the cellular companies started selling off the excess bandwidth on the circuits from the cellular tower to the cellular switch (MTSO). The excess packets that they sold to customers were called SMS or text messages. I can understand how tapping into the SS7 network might get text messages, but I can't see voice.

Paulie

(8,462 posts)
6. It's in the article
Fri Dec 19, 2014, 08:26 AM
Dec 2014

Post recorded decryption of the call streams:

The second technique requires physical proximity but could be deployed on a much wider scale. Hackers would use radio antennas to collect all the calls and texts passing through the airwaves in an area. For calls or texts transmitted using strong encryption, such as is commonly used for advanced 3G connections, hackers could request through SS7 that each caller’s carrier release a temporary encryption key to unlock the communication after it has been recorded.
Latest Discussions»Latest Breaking News»German researchers discov...