Tecniche per intercettare le conversazioni

3 techniques to intercept telephone conversations

The CBS brings to light a bug in the net that permits to intercept calls and messages, and to triangulate the position of the connected phones. Then, it opened one of the many articles of Wired about interceptions.
It was 2016 and, since then, the inquiries, the experiments and the dedicated press and televisive services about wiretappings have multiplied. The situation is continuously evolving, but we can be sure about one thing: nobody’s safe and it’s so easy to be intercepted during a conversation through telephones, whatsapp and others. The aim of this article is to illustrate to our readers the main tapping techniques used by the hackers, investigators, industrial spies and other subjects, in the private and in the business field.

1) To intercept calls exploiting the bugs in the system

This method, the same on what the CBS opened the spotlight, is about the possibility to intercept conversations just knowing… the telephone number of the victim! Yeah, that’s true: like the German hacker Karsetn Nohl has demonstrated, it is sufficient exploiting a bug in the system (also very well-known) of the SS7 signaling protocol, a bug which is inside the protocol itself, and not in the product (meaning the smartphone). Following his example, everyone can intercept a conversation on every phone that leans to the SS7 protocol, identifying as well the position of the person, thanks to the triangulation of the information that have been made available from the repeaters.

2) Intercepting calls with spy programs

We have already talked about spy programs (or spywares, or spysoftwares) with the article “Telephone under control: how to be aware of it”. The spy programs are softwares that is possible to install in the victims telephone in order to keep them under control (from all points of view). The list of these programs is huge (from Hoverwatch to Spybubble), also because many of the spywares have been developed to manage the phones of their children and that’s why they result as perfectly legal and can be purchased by online passes. But, if these are bought by the person who wants to intercept you, it’s obvious that there will be enormous risks for the privacy and safety: yours and of the ones around you.

3) Intercepting calls and messages with “evil” links

If you think you’re safe because you always have your phone under control and you never give it to anyone, you must know that you might have already been intercepted. This is one of the most subtle ad insidious techinques, because the victim often doesn’t have a clue nor the slightest suspect of being spied. Caution is never too much, but sometimes you cannot count only on yourself. If you think that’s the right moment to protect yourself, take a look at Cripty Talk, the only app with military security for encrypted messages and calls 24/7, everywhere around the world.

Share on facebook
Share on twitter
Share on linkedin
Share on email

METTI AL SICURO LE TUE COMUNICAZIONI

Crypty Secure

Crypty Secure

Azienda leader nella sicurezza delle comunicazioni.

ULTIMI POST

CRYPTY TALK

MESSAGGISTICA E CHIAMATE SICURE CONTRO LE INTERCETTAZIONI
BEST APP

CRYPTY BOX

PER NAVIGARE IN MODO SICURO E PROTETTO
BEST APP

ISCRIVITI A CRYPTY NEWS

Ricevi info e news sul mondo della sicurezza delle comunicazioni
Perquisizione informatica trascrizione di dati da pc

Cyber Search: what is it, rules and how to defend ourselves

The cyber search is fundamental to find out and prove an illicit.

Basically, when we talk about cyber search, we mean a forensic deepening used as a tool for the acquisition of evidences.

The cases where the judicial authority exploits this tool are increasing, just because of its usefulness in getting a great amount of data from the searched devices.

Leggi di più