Your cell phone can record all your conversations, even when it’s turned off
Why Nothing You Do On Your Phone Will Protect You From Surveillance, Spying, Hacking & Tracking
Hackers only need your phone number to eavesdrop on calls, read texts, track you
Source: Computerworld by Darlene Storm
If you use a mobile phone, then you use Signaling System Seven, or SS7; “Every person with a cellphone needs SS7 to call or text each other,” 60 Minutes explained. “The SS7 network is the heart of the worldwide mobile phone system. Phone companies use SS7 to exchange billing information. Billions of calls and text messages travel through its arteries daily. It is also the network that allows phones to roam.”
Security researchers have been warning about SS7 protocol flaws for years. Granted, most people would not be targeted by this type of attack. Then again, some companies sell “the ability to track your phone number wherever you go with a precision of up to 50 meters” as researcher Tobias Engel pointed out during the 2014 Chaos Communication Congress presentation “SS7: Locate. Track. Manipulate.”
NSA Eavesdropping: Your iPhone isn’t Safe Even when it’s Off
Source: The Mac Observer by Jeff Gamet, June 11, 2014
FBI taps cell phone mic as eavesdropping tool
Source: C|Net by Declan McCullagh, December 4, 2006
Agency used novel surveillance technique on alleged Mafioso: activating his cell phone’s microphone and then just listening.
SIM Jacking: A Backdoor Into Every Cell Phone
How you can hack any cell phone regardless of OS
AdaptiveMobile Security has detected over 1 BILLION instances of this attack in the wild, and it affects every device that takes a SIM Card: Cell Phones, Tablets, Home Security Systems, even ATM Machines.
SIMJacker – Next Generation Spying Over Mobile
Source: AdaptiveMobile Security by Cathal McDaid, September 12, 2019
AdaptiveMobile Security has detected a unique and novel mobile core network vulnerability that is currently being exploited by a sophisticated attacker in multiple countries for surveillance reasons. This exploit represents arguably one of the most complex and sophisticated attacks ever seen over mobile core networks. The observed attack involves the remote retrieval of specific information, such as location information, without the awareness or interaction of the mobile phone user. The vulnerability can also be used to perform additional types of attacks, such as denial of service, fraud, and other forms of information harvesting.