Summary

The Department of Homeland Security (DHS) has identified China, Russia, Iran, and Israel as the primary countries exploiting vulnerabilities in SS7, a telecom protocol, to spy on individuals in the U.S.

This includes tracking locations and intercepting calls and messages.

Newly released information, revealed by Senator Ron Wyden, links these attacks to foreign nations and builds on prior reports of SS7 exploitation.

A 2017 DHS presentation highlighted these risks, showing persistent concerns over SS7’s security flaws.

The disclosure underscores ongoing surveillance threats targeting U.S. telecommunications networks.

  • mydude@lemmy.world
    link
    fedilink
    arrow-up
    22
    arrow-down
    2
    ·
    10 days ago

    404media dared include israel in this list, they will be gone by the year. 404, Not found.

  • Rapidcreek@lemmy.world
    link
    fedilink
    arrow-up
    20
    arrow-down
    1
    ·
    11 days ago

    SS7 is a signaling protocol. It does specific things between exchanges. For example, you make a long distance call…before you input the last four numbers, SS7 has signaled the end office that a call is to be setup. As the last four numbers are dialed, the connection is interrogated and if free completes the connection, hello. But if it’s busy, SS7 signals back to your office to activate its tone generator to produce a busy signal. Magic. Very little resources are used. Knew a guy who was very good in SS7 and he claimed he could do some shit.

    • Brkdncr@lemmy.world
      link
      fedilink
      arrow-up
      13
      ·
      11 days ago

      I took a networking course and the teacher did 2 weeks in telephone protocols all the way from Morse code. Ss7 is magic.

      • Rapidcreek@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        10 days ago

        Hmmmmm. The first thing to remember is the only thing SS7 does is signal. No call processing. Also, the network control of SS7 is isolated, with only links to the processor (STP) being the exchanges themselves. You can simulate SS7 to the exchange which will cause a call setup to the exchange. But, that is a hack into the local exchange and not really SS7. Anyway, it would seem to me to be more work than worth.

  • Flying Squid@lemmy.world
    link
    fedilink
    arrow-up
    10
    ·
    10 days ago

    Surely nowhere near just those four.

    Swaziland’s probably doing it. Why not? It’s obviously not a challenge.

  • hnh@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    10 days ago

    It’s not that difficult to secure SS7, there are lots of good firewalls out there. But it takes effort and costs money…