{"id":540426,"date":"2010-04-22T11:34:42","date_gmt":"2010-04-22T15:34:42","guid":{"rendered":"http:\/\/www.mobilecrunch.com\/?p=30087"},"modified":"2010-04-22T11:34:42","modified_gmt":"2010-04-22T15:34:42","slug":"legal-exploit-enables-tracking-and-spying-via-cellular-networks","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/540426","title":{"rendered":"Legal Exploit Enables Tracking and Spying via Cellular Networks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mobilecrunch.com\/wp-content\/uploads\/2010\/04\/whinwoiscasa-235x300.jpg\" alt=\"\" title=\"whinwoiscasa\" width=\"235\" height=\"300\" class=\"alignright size-medium wp-image-30101\" \/>Activate the cone of silence.<br \/>\nDon your tinfoil hat.<br \/>\nPull the bedsheets up.<\/p>\n<p>Now that you&#8217;ve taken the necessary precautions, I have to tell you some bad news: two researchers have found a way to exploit the mobile phone system in order to locate pretty much anyone they want. That means you, Carmen. All those years of hiding have been for naught. They&#8217;ll be here any moment now. This is the end: they&#8217;ve found you.<\/p>\n<p>The exploit enables anybody with the right equipment and know-how to find out a person&#8217;s private mobile phone number, and track their location (via celltowers, not GPS). Using another exploit, it is possible to listen to their voicemail messages.<\/p>\n<p>Interestingly, these exploits are within the bounds of the law. Thankfully (I suppose), they can&#8217;t monitor phone calls or read text messages, but this is clearly still a cause for concern.<\/p>\n<p>The hacks are done through exploiting a series of weak-points across various telephony systems in the world. The details of the techniques are outlined over at <a href=\"http:\/\/news.cnet.com\/8301-27080_3-20002986-245.html\">CNET<\/a>, and are worth a read.<\/p>\n<p>A talk on the exploit (entitled &#8220;We Found Carmen San Diego&#8221;) was given at the <a href=\"http:\/\/www.sourceconference.com\/\">Source Boston<\/a> security conference on Wednesday.<\/p>\n<p>The worst part of all this is that it seems that nothing is being done to fix it, and, in fact, it may not even be universally fixable.<\/p>\n<p>I think now is the time time to pull those bedsheets up a little higher.<\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/emEDo0sNpuYgtqKn2R_-qeV4-cM\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/emEDo0sNpuYgtqKn2R_-qeV4-cM\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/emEDo0sNpuYgtqKn2R_-qeV4-cM\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/emEDo0sNpuYgtqKn2R_-qeV4-cM\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?a=ADQNeY-4q9I:G1pbSuKN37o:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?i=ADQNeY-4q9I:G1pbSuKN37o:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?a=ADQNeY-4q9I:G1pbSuKN37o:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?i=ADQNeY-4q9I:G1pbSuKN37o:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?a=ADQNeY-4q9I:G1pbSuKN37o:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Activate the cone of silence. Don your tinfoil hat. Pull the bedsheets up. Now that you&#8217;ve taken the necessary precautions, I have to tell you some bad news: two researchers have found a way to exploit the mobile phone system in order to locate pretty much anyone they want. That means you, Carmen. All those [&hellip;]<\/p>\n","protected":false},"author":6653,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-540426","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/540426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/6653"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=540426"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/540426\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=540426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=540426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=540426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}