Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Saudi Arabia May be Spying on its Citizens Via US Mobile Networks

Accepted submission by upstart at 2020-03-31 03:58:04
News

████ # This file was generated bot-o-matically! Edit at your own risk. ████

Saudi Arabia may be spying on its citizens via US mobile networks [engadget.com]:

Data shared by a whistleblower suggests Saudi Arabia may be using a weakness in mobile telecom networks to track its citizens in the US, The Guardian reports [theguardian.com]. The data shows that over a four-month period, Saudi Arabia's three biggest mobile phone companies sent 2.3 million requests for Provider Subscriber Information (PSI). Normally, that data is used to help foreign operators register roaming charges, but the high volume of requests could also give the Saudi telecoms enough info to track users within hundreds of meters of accuracy.

This takes advantage of long-standing vulnerabilities [engadget.com] in a global messaging system called SS7, which routes mobile calls when a user from one country is traveling in another. According to the data shared with The Guardian, the Saudi telecoms sent millions of these PSI SS7 requests to US carriers, including AT&T, T-Mobile and Verizon (Engadget&aposs parent company) between November 2019 and March 1st -- sometimes requesting data as often as two to 13 times per hour.

It isn't clear if the Saudi telecoms were spying on behalf of the government, but the kingdom doesn't have the best track record. Earlier this year, The Guardian reported that Amazon's Jeff Bezos's phone was hacked [engadget.com] via a WhatsApp message from the personal account of Prince Mohammed. Twitter has banned thousands of accounts [engadget.com] linked with a state-backed effort to promote the Saudi government's message, and the Department of Justice has charged former Twitter employees with spying for Saudi Arabia [engadget.com].

"I think they are surveilling not only those they know are dissidents, but those they fear may deviate from the Saudi leadership," Andrew Miller, a Middle East expert and former member of Barack Obama's national security council, told The Guardian. "They are particularly worried about what Saudi nationals will do when they are in western countries."

Ron Wyden, a Democratic senator from Oregon, previously warned the Federal Communications Commission [engadget.com] (FCC) that "malicious attackers" were exploiting SS7 vulnerabilities.

In a statement to The Guardian, Wyden wrote, "Because of [Pai's] inaction, if this report is true, an authoritarian government may be reaching into American wireless networks to track people inside our country."

Verizon owns Engadget's parent company, Verizon Media. Rest assured, Verizon has no control over our coverage. Engadget remains editorially independent.

In this article: att [engadget.com], data [engadget.com], data requests [engadget.com], FCC [engadget.com], gear [engadget.com], location data [engadget.com], mobile [engadget.com], politics [engadget.com], provider subscriber information [engadget.com], PSI [engadget.com], Ron Wyden [engadget.com], saudi arabia [engadget.com], security [engadget.com], spying [engadget.com], ss7 [engadget.com], t-mobile [engadget.com], telecoms [engadget.com], tracking [engadget.com], verizon [engadget.com], whistleblower [engadget.com]All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.Comments104Shares

SoyCow8162

Saudi Arabia reportedly tracked phones by using industry-wide carrier weakness [arstechnica.com]:

The Guardian says it has evidence that Saudi Arabia is exploiting a decades-old weakness in the global telecoms network to track the kingdom’s citizens as they travel in the United States.

The publication cited data provided by a whistleblower that suggests Saudi Arabia is engaged in systematic spying by abusing Signalling System No. 7 [wikipedia.org]. Better known as SS7, it’s a routing protocol that allows cell phone users to connect seamlessly from carrier to carrier as they travel throughout the world. With little built-in security for carriers to verify one another, SS7 has always posed a potential hole that people with access could exploit to track the real-time location of individual users. SS7 abuse also makes it possible for spies to snoop on calls [arstechnica.com] and text messages [arstechnica.com]. More recently, the threat has grown, in part because the number of companies with access to SS7 has grown from a handful to thousands.

The data provided to The Guardian “suggests that millions of secret tracking requests emanated from Saudi Arabia over a four-month period beginning in November 2019,” an article published on Sunday [theguardian.com] reported. The requests, which appeared to originate from the kingdom’s three largest mobile phone carriers, sought the US location of Saudi-registered phones.

The unnamed whistleblower said they knew of no legitimate reason for requests of that volume. “There is no explanation, no other technical reason to do this,” The Guardian quoted the source as saying. “Saudi Arabia is weaponizing mobile technologies.”

The whistleblower’s data appears to show Saudi Arabia sending an unnamed major US mobile operator requests for PSI—short for Provide Subscriber Information. Sunday’s report said there were an average of 2.3 million such requests per month for the four months starting in November. The data, The Guardian said, suggests that Saudi Arabian phones were tracked as many as 13 times per hour as their owners carried them about the United States. The Saudi operators also sent separate PSLs. US carriers blocked the requests, indicating that the requests were suspicious.

System-breaking potential

Les Goldsmith, a researcher with Las Vegas security firm ESD, told me the volume reported by The Guardian had the potential to break systems used by the mobile operator being queried.

“Performing so many send subscriber data requests on a carrier could, in fact, result in the carriers’ Visiting Location Register (VLR) or even Home Location Register (HLR) to potentially crash,” he said. “So in essence, excessive tracking by Saudi Arabia could have potentially knocked legitimate users off a US cellular provider as the HLR and VLR reset.”

The Guardian, meanwhile, cited one mobile security expert who reviewed the data and said the requests had the ability to track the owners on a map to within hundreds of meters in a city. Several other experts said the requests indicated systematic spying on the part of Saudi Arabia.

In a statement, AT&T representatives wrote: “We have security controls to block location-tracking messages from roaming partners.” Representatives of T-Mobile and Verizon didn’t respond to a request to comment for this post. It will be updated later if the companies respond.

SS7 largely works on an honor system, although some carriers are in the process of rolling out measures designed to better lock it down. Given the current way mobile networks operate, there is little cell phone owners can do to prevent tracking through the abuse of SS7. Users can turn off phones to temporarily prevent tracking, but even, then adversaries can learn the location just before the device was turned off and obtain the location when it is later turned on.

&larr Previous story [arstechnica.com]Next story &rarr [arstechnica.com]


Original Submission