Mobile Intelligence Alliance
Mobile Intelligence Alliance
  • Home
  • Who We Are
  • Mission Plan
  • Threat Insights
  • Resources
    • Content
    • Threat Intelligence
    • Mobile Threat Map
  • Contact
  • About Gary Miller
  • More
    • Home
    • Who We Are
    • Mission Plan
    • Threat Insights
    • Resources
      • Content
      • Threat Intelligence
      • Mobile Threat Map
    • Contact
    • About Gary Miller
  • Home
  • Who We Are
  • Mission Plan
  • Threat Insights
  • Resources
  • Contact
  • About Gary Miller

Threat Insight Feeds

Mobile Security Research Links

Industry & Government Guidelines

Publicly Available Surveillance Media Stories

Publicly Available Surveillance Media Stories

  • http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2553/original/31c3-ss7-locate-track-manipulate.pdf


  • https://www.itu.int/en/ITU-T/Workshops-and-Seminars/201606/Pages/default.aspx


  • https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf


  • http://icc2017.ieee-icc.org/


  • https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/telecommunications-interception-and-surveillance


  • https://link.springer.com/chapter/10.1007/978-3-319-64701-2_45


  • https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG4_Final_Report_031815.pdf


  • https://www.enisa.europa.eu/publications/signalling-security-in-telecom-ss7-diameter-5g


  • https://docs.fcc.gov/public/attachments/DA-20-141A1.pdf


  • https://www.fcc.gov/file/13925/download


  • https://www.dhs.gov/publication/csd-mobile-device-security-study


  • https://www.dhs.gov/publication/st-mobile-security-rd-program-guide


  • https://ecfsapi.fcc.gov/file/10503106179911/180503%20CTIA%20Comments%20SS7.pdf


  • https://www.ntia.doc.gov/files/ntia/publications/ctia_comments_re_ntia_national_strategy_to_secure_5g_implementation_plan.pdf


  • https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-for-5g-networks/at_download/fullReport


  • https://www.gsma.com/security/resources/fs-07-ss7-and-sigtran-network-security-v4-0/


  • https://www.gsma.com/security/resources/ir-82-ss7-security-network-implementation-guidelines-v5-0/


  • https://www.gsma.com/security/wp-content/uploads/2020/02/FS.31-v2.0.pdf


  • https://www.itu.int/en/ITU-T/extcoop/figisymposium/Documents/ITU_SIT_WG_Technical%20report%20on%20the%20SS7%20vulnerabilities%20and%20their%20impact%20on%20DFS%20transactions.pdf


  • https://www.gsma.com/security/resources/fs-11-ss7-interconnect-security-monitoring-and-firewall-guidelines-v6-0/


  • https://www.gsma.com/security/resources/fs-20-gprs-tunnelling-protocol-gtp-security-v3-0/


  • https://www.gsma.com/security/resources/fs-21-interconnect-signalling-security-recommendations-v6-0/


  • https://www.gsma.com/security/resources/fs-31-gsma-baseline-security-controls/


  • https://www.gsma.com/security/resources/fs-34-key-management-for-4g-and-5g-inter-plmn-security/


  • https://www.gsma.com/security/resources/fs-37-gtp-u-security/


  • https://www.gsma.com/security/resources/ir-82-ss7-security-network-implementation-guidelines-v5-0/

Publicly Available Surveillance Media Stories

Publicly Available Surveillance Media Stories

Publicly Available Surveillance Media Stories

  • https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks


  • https://www.thebureauinvestigates.com/stories/2020-12-16/spy-companies-using-channel-islands-to-track-phones-around-the-world


  • https://techcrunch.com/2020/12/30/nso-fleming-data-location/


  • https://www.theguardian.com/world/2020/dec/16/israeli-spy-firm-suspected-accessing-global-telecoms-channel-islands


  • https://www.theguardian.com/world/2020/mar/29/revealed-saudis-suspected-of-phone-spying-campaign-in-us


  • https://www.vice.com/en/article/mbzvxv/criminals-hackers-ss7-uk-banks-metro-bank


  • https://www.zdnet.com/article/5g-networks-could-be-vulnerable-to-exploit-due-to-mishmash-of-old-technologies/


  • https://www.theregister.co.uk/2014/12/26/ss7_attacks/


  • https://www.thedailybeast.com/you-can-spy-like-the-nsa-for-a-few-thousand-bucks


  • https://www.ptsecurity.com/upload/ptcom/SS7-VULNERABILITY-2016-eng.pdf


  • http://2014.hackitoergosum.org/slides/day3_Worldwide_attacks_on_SS7_network_P1security_Hackito_2014.pdf


  • http://2014.hackitoergosum.org/slides/day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec.pdf


  • https://www.washingtonpost.com/business/technology/for-sale-systems-that-can-secretly-track-where-cellphone-users-go-around-the-globe/2014/08/24/f0700e8a-f003-11e3-bf76-447a5df6411f_story.html?utm_term=.33db0bf4c1


  • http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/original/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf


  • https://www.cbsnews.com/news/60-minutes-hacking-your-phone/


  • https://eng.nkom.no/topical-issues/news/nordic-authorities-collaborating-on-measures-against-vulnerabilities-in-networks


  • https://www.corelan.be/index.php/2014/05/30/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency/


  • http://www.sueddeutsche.de/digital/it-sicherheit-schwachstelle-im-mobilfunknetz-kriminelle-hacker-raeumen-konten-leer-1.3486504


  • https://www.theregister.co.uk/2017/09/18/ss7_vuln_bitcoin_wallet_hack_risk/


  • https://www.digi.no/artikler/roper-hvem-som-forarsaket-telenors-mobil-havari/348087


  • https://www.adaptivemobile.com/blog/malicious-data-interception-via-ss7


  • https://www.adaptivemobile.com/blog/ss7-security-putting-pieces-together


  • https://wikileaks.org/hackingteam/emails/emailid/133908


  • https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To- Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdf


  • https://www.capacitymedia.com/articles/3825262/attempts-to-infiltrate-4g-networks-100-successful-


  • https://www.thebureauinvestigates.com/stories/2020-12-16/the-rapid-rise-of-phone-surveillance-firms


  • https://citizenlab.ca/2020/12/running-in-circles-uncovering-the-clients-of-cyberespionage-firm-circles/


  • https://web.archive.org/web/20190409205521/https://www.alaraby.co.uk/file/get/4749a75b-fc46-4917-85d3-7f8b41d4b34a


  • https://www.forbes.com/sites/thomasbrewster/2020/12/01/this-spy-tool-can-find-you-with-just-a-telephone-number-and-25-countries-own-it-warn-researchers/?sh=71531793331e

Copyright © 2022 The Mobile Intelligence Alliance - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept