The CBS brings to light a bug in the net that permits to intercept calls and messages, and to triangulate the position of the connected phones. Then, it opened one of the many articles of Wired about interceptions.
It was 2016 and, since then, the inquiries, the experiments and the dedicated press and televisive services about wiretappings have multiplied. The situation is continuously evolving, but we can be sure about one thing: nobody’s safe and it’s so easy to be intercepted during a conversation through telephones, whatsapp and others. The aim of this article is to illustrate to our readers the main tapping techniques used by the hackers, investigators, industrial spies and other subjects, in the private and in the business field.
1) To intercept calls exploiting the bugs in the system
This method, the same on what the CBS opened the spotlight, is about the possibility to intercept conversations just knowing… the telephone number of the victim! Yeah, that’s true: like the German hacker Karsetn Nohl has demonstrated, it is sufficient exploiting a bug in the system (also very well-known) of the SS7 signaling protocol, a bug which is inside the protocol itself, and not in the product (meaning the smartphone). Following his example, everyone can intercept a conversation on every phone that leans to the SS7 protocol, identifying as well the position of the person, thanks to the triangulation of the information that have been made available from the repeaters.
2) Intercepting calls with spy programs
We have already talked about spy programs (or spywares, or spysoftwares) with the article “Telephone under control: how to be aware of it”. The spy programs are softwares that is possible to install in the victims telephone in order to keep them under control (from all points of view). The list of these programs is huge (from Hoverwatch to Spybubble), also because many of the spywares have been developed to manage the phones of their children and that’s why they result as perfectly legal and can be purchased by online passes. But, if these are bought by the person who wants to intercept you, it’s obvious that there will be enormous risks for the privacy and safety: yours and of the ones around you.
If you think you’re safe because you always have your phone under control and you never give it to anyone, you must know that you might have already been intercepted. This is one of the most subtle ad insidious techinques, because the victim often doesn’t have a clue nor the slightest suspect of being spied. Caution is never too much, but sometimes you cannot count only on yourself. If you think that’s the right moment to protect yourself, take a look at Cripty Talk, the only app with military security for encrypted messages and calls 24/7, everywhere around the world.