5 ways to listen to your phone
2017-10-10 15:47
5 ways to listen to your phone
Unprotected connection.
Sign up for news “UkrMedia” in Facebook or Twitter
Sure that the content of the telephone conversation is protected and will remain only between you and your interlocutor? As it is not so… Modern mobile phone is a real godsend for intelligence agencies and hackers, because it represents the ideal bug you constantly carry with you. In this article we will talk about how easy it is to listen to conversations and read your messages.
1. SORM — official wire
The most obvious is the official audition from the state. Each operator is obliged to install on their PBX integrated module SORM, which allows to provide the functions of operative-investigative activities. Given that the Russian SORM, as in other state structure, there is chaos and carelessness, to access information for a fee. By the way, Telecom operators do not control when and who of the subscribers listen to the lines themselves.
2. Listening through the operator
Operators have access to information about the movement of the phone (with you, of course) that logs into different base stations according to their physical location. Call recording can be accessed through the same system themselves.
3. Connection to the signaling network SS7
Possessing a victim, you can listen to her talk through vulnerabilities in the signaling Protocol SS7. Experts say that during the development, it was not incorporated defences against these attacks. To the SS7 network, you can connect anywhere in the world, for example in a poor African country, and will be accessible switches, all operators in Russia, USA, Europe and other countries. Intercept incoming SMS any subscriber is elementary.
4. Connection cable
The publication of Edward Snowden showed that intelligence agencies in some situations connect directly to the fiber optic cable and “steal” all of the traffic entirely. This allows you to listen to foreign operators that do not allow officially to install listening equipment at their exchanges.
5. Installing spyware Trojan
Not possessing powers of intelligence, each of you can set the phone of the victim of a Trojan that will listen to the conversations of the user of the mobile phone, Skype and other programs. Law enforcement agencies for such operations using special Trojans that use is known to nobody 0day-vulnerabilities in Android and iOS to install programs.