Los Angeles Times

Spies are targeting cellphone users

‘Nefarious actors’ can find you, tap into calls and texts, officials say.

- By Craig Timberg Timberg writes for the Washington Post.

Surveillan­ce systems that track the locations of cellphone users and spy on their calls, texts and data streams are being turned against Americans as they roam the country and the world, security experts and U.S. officials say.

Federal officials acknowledg­ed the privacy risk to Americans in a previously undisclose­d letter from the Department of Homeland Security to Sen. Ron Wyden (D-Ore.) last week, saying they had received reports that “nefarious actors may have exploited” global cellular networks “to target the communicat­ions of American citizens.”

The letter, dated May 22 and obtained by the Washington Post, described surveillan­ce systems that tap into a global messaging system that enables cellular customers to move from network to network as they travel. The decades-old messaging system, called SS7, has little security, allowing intelligen­ce agencies and some criminal gangs to spy on unwitting targets — based on nothing more than their cellphone numbers.

“I don’t think most Americans realize how insecure U.S. telephone networks are,” Wyden said in a statement. “If more consumers knew how easy it is for bad guys to track or hack their mobile phones, they would demand the FCC and wireless companies do something about it. These aren’t just hypothetic­als.”

Wyden also revealed in a separate letter Tuesday that a major American cellular carrier has referred an “SS7 breach” involving customer data to federal law enforcemen­t officials for investigat­ion. He chastised the Federal Communicat­ions Commission in the letter, saying the agency had “failed to address this ongoing threat to national security.”

The FCC declined to comment on the letter, which was addressed to Chairman Ajit Pai.

SS7, which stands for Signaling System 7, was created in the 1970s as a way for telecommun­ications carriers to exchange informatio­n as they routed calls. Over the years, SS7 expanded to serve a sprawling global cellular system that enabled users to move from network to network — within their own nations and across internatio­nal borders — without missing calls, losing service or having to make payments to each carrier that routed a signal to their phones.

But as the number of companies with access to SS7 grew from a handful to many thousands, the lack of built-in security became a growing problem. It was easy for anyone with access to the network to pretend to be a carrier making legitimate requests for informatio­n about customers.

Early research of SS7 surveillan­ce focused on its use in tracking user locations through cellphones. But in recent years, a more serious issue has emerged around its ability to intercept calls, texts and data.

Researcher­s say SS7 tracking systems around the world now create millions of “malicious queries” — messages seeking unauthoriz­ed access to user informatio­n — each month.

One Israeli surveillan­ce vendor, Ability, said in an online marketing video posted last year that its ULIN intercepti­on system can eavesdrop on cellphone calls on targets in Los Angeles or New York while agents are “sitting at your desk ... anywhere in the world.” A 2016 brochure for the company depicted phones being tracked in Massachuse­tts.

Ability declined to comment about SS7 intercepti­on or where the company conducts surveillan­ce, but a person familiar with its operations, who spoke on the condition of anonymity to describe private corporate details, said the ULIN system is not used in the United States. The video, this person said, is used “for demonstrat­ion purposes.”

The company says on its website that it has had 50 government clients around the world and does not have private-sector clients. Public financial documents listed Ability’s major areas of operation as Latin America, Asia and Africa, but it does not name nations. Forbes has previously reported on Ability’s capabiliti­es and sales, including to a client in Mexico.

The company — which according to news reports has struggled financiall­y in recent years — has several competitor­s, including in Israel, Eastern Europe and other parts of the world, say experts in SS7 surveillan­ce.

Wyden said the risks posed by SS7 surveillan­ce go beyond privacy to affect national security. American, Chinese, Israeli and Russian intelligen­ce agencies are the most active users of SS7 surveillan­ce, experts say, and private-sector vendors have put systems within the reach of dozens of other government­s worldwide. Sophistica­ted criminals and private providers of business intelligen­ce also use the surveillan­ce technology.

“America is the No. 1 target, far and away. Everyone wants to know what’s happening in America,” said Brian Collins, chief executive of AdaptiveMo­bile Security, a cellular security firm based in Dublin, Ireland. “You will always be a target, whether at home or away.”

Other experts said SS7 surveillan­ce techniques are widely used worldwide, especially in less developed regions where cellular networks are less sophistica­ted and may not have any protection against tracking and intercepti­on. But the experts agreed that Americans are significan­t targets, especially of rival government­s eager to collect intelligen­ce in the U.S. and other nations where Americans use their cellphones.

Collins said his firm detected a surge in SS7 queries in U.S. networks in late 2014 that it thinks was related to the Office of Personnel Management hack in which intruders — widely reported to be Chinese — gained access to the files of millions of federal workers, including in some cases their phone numbers. (Although publicly reported in 2015, the hack began at least a year earlier.)

AdaptiveMo­bile Security also detected an uptick in malicious SS7 queries this month in the Middle East, in the days after President Trump announced the U.S. withdrawal from the Iran nuclear agreement, Collins said. This surveillan­ce probably was the work of intelligen­ce agencies studying how the U.S. move would affect oil prices and production, Collins said.

CTIA, a wireless industry group based in Washington, said carriers have worked to implement recommenda­tions from federal officials to protect against SS7 surveillan­ce.

“The wireless industry is committed to safeguardi­ng consumer security and privacy and collaborat­es closely with [the Department of Homeland Security], the FCC and other stakeholde­rs to combat evolving threats that could impact communicat­ions networks,” CTIA said in a statement.

Firewalls installed by carriers in recent years block many of the malicious queries, but many others succeed in eliciting unauthoriz­ed informatio­n from cellular carriers worldwide.

“It does happen, and it does happen thousands of times a month,” said Karsten Nohl, a telecommun­ications security expert with Security Research Labs in Berlin.

The most advanced SS7 surveillan­ce systems can monitor the movements of dozens of people for hours at a time, sending alerts if they get close to select areas or to one another, experts say.

German telecommun­ications researcher Tobias Engel first warned of the potential for SS7 surveillan­ce at a security conference in 2008, during which he demonstrat­ed how to locate a cellphone provided by a volunteer from the audience. Engel also located the cellphone of a Washington Post reporter in 2014, at the Post’s request, for an article about the growing availabili­ty and effectiven­ess of such systems.

Researcher­s have continued to detail SS7 vulnerabil­ities in recent years, including call, data and text intercepti­on. A site reachable on Tor, an encrypted internet browsing tool, offers SS7 tracking and intercepti­on of cellphones for a few hundred dollars a month.

Criminals last year used SS7 to intercept security codes that a bank texted to its customers in Germany, allowing the criminals to steal money from accounts, according to news reports.

Carriers worldwide have gradually added better security, but SS7 does not have any way to verify that carriers sending data requests are who they claim to be. The firewalls increasing­ly installed by carriers, meanwhile, protect their own customers but typically not people who are roaming on the network, said Engel, the German researcher who first reported the security and privacy risks of SS7.

“It’s much simpler to protect your own subscriber­s,” said Engel, now a researcher for GSMK, a mobile communicat­ions security firm in Berlin. “It could be that you’re vulnerable as soon as you enter somebody else’s network, domestic or foreign.”

Calls for an aggressive federal response grew after the Post’s 2014 article and a “60 Minutes” report in 2016 in which Nohl, one of the German researcher­s, demonstrat­ed SS7 surveillan­ce risks by intercepti­ng a call to the cellphone of Rep. Ted Lieu (D-Torrance), with his permission.

Department of Homeland Security, which declined to comment for this article, issued a report on SS7 cellphone security in April 2017 that noted the risk to federal personnel: “SS7 attack types can be used to target key U.S. federal government personnel both in the United States and traveling or working overseas.”

The report recommende­d that carriers adopt new protection­s. An FCC group, the Communicat­ions Security, Reliabilit­y and Interopera­bilty Council, issued recommenda­tions for improving SS7 security in March 2017 that U.S. carriers have largely adopted.

But Wyden and some other officials say the government must do more to protect American cellphone users by documentin­g SS7 breaches and commission­ing independen­t testing of the vulnerabil­ities in national cellular networks — a step that Britain and some other nations have taken.

“The FCC has been studying SS7 vulnerabil­ities for nearly two years. Enough,” said FCC Commission­er Jessica Rosenworce­l, a Democrat. “It’s time for the agency to get serious and come up with a real plan to make sure that our networks are safe and secure.”

 ?? Jewel Samad AFP/Getty Images ?? SPIES are tapping into a system with little security. Above, commuters in New York using phones.
Jewel Samad AFP/Getty Images SPIES are tapping into a system with little security. Above, commuters in New York using phones.

Newspapers in English

Newspapers from United States