UNCENSORED
Bad Connection: Global telecom exploitation by covert surveillance ... NewsAnarchist — The stories they don't want you reading

Bad Connection: Global telecom exploitation by covert surveillance actors

https://www.haaretz.com/israel-news/security-aviation/2026-0... ( https://archive.ph/0QYbN )

Bad Connection: Global telecom exploitation by covert surveillance ... — Surveillance State article

surveillance-actors.html" title="Bad Connection: Global telecom exploitation by covert surveillance actors" style="color:#1a1a1a;text-decoration:underline;text-decoration-style:dotted;font-weight:500;">surveillance-actors.html" title="Bad Connection: Global telecom exploitation by covert surveillance actors" style="color:#1a1a1a;text-decoration:underline;text-decoration-style:dotted;font-weight:500;">Surveillance State — The stories mainstream media won't cover.

What they're not telling you: # Bad Connection: Global Telecom Exploitation by Covert Surveillance Actors Sophisticated intelligence actors are weaponizing the global mobile network itself, using telecom infrastructure across at least 18 countries to silently track targets through a combination of SIM card hacking and cellular protocol manipulation. The investigation, detailed in research shared via Hacker News, reveals a sprawling surveillance operation that exploits fundamental design flaws in how mobile networks communicate with one another. Rather than breaking into individual phones, these actors have learned to hijack the signaling networks that allow carriers to route calls and data—essentially compromising the immune system of global telecommunications.

Marcus Webb
The Take
Marcus Webb · Surveillance & Tech Privacy

# THE TAKE: Telecom Exploitation Is Feature, Not Bug The Haaretz reporting on NSO/Cellebrite infrastructure confirms what signals intelligence professionals already knew: carrier networks are compromise zones, not communication channels. Governments don't *exploit* telecom—they've architected it. Skip the "covert surveillance actors" framing. Israeli firms, Five Eyes operators, and Gulf state proxies aren't aberrations; they're stakeholders in a system designed for intercept. Backbone routing, lawful intercept points, SS7 vulnerabilities—these persist because removing them would require dismantling the access architecture itself. The real story: telecom companies maintain plausible deniability while infrastructure remains intentionally porous. Every government signals intelligence agency operates from the same assumption—the network is already compromised. Your phone call was never private. The architecture guarantee was always theater.

What the Documents Show

Two distinct surveillance campaigns employed customized tooling to spoof operator identities and manipulate 3G and 4G protocols, allowing them to steer traffic through specific network pathways while evading detection. One particularly chilling technique involved sending hidden commands embedded in ordinary SMS messages that transformed target devices into covert tracking beacons, extracting precise location data without the victim's knowledge. The geographic footprint reveals the operation's alarming scope. Attackers leveraged identifiers and infrastructure associated with telecommunications operators worldwide, including networks based in the UK, Israel, China, Thailand, Sweden, Italy, Liechtenstein, Cambodia, Mozambique, Uganda, Rwanda, Poland, Switzerland, Morocco, Namibia, Lesotho, and Jersey. This wasn't opportunistic hacking but systematic abuse of a globally interconnected system.

🔎 Mainstream angle: The corporate press either ignored this story entirely or buried it in a 3-sentence brief. The framing, when it appeared at all, focused on process rather than impact.

Follow the Money

Mobile signaling security provider Cellusys discovered that operator identifiers were reused over multiple years, forming consistent clusters that enabled long-running campaigns—suggesting either state-level persistence or a thriving black market in telecom exploitation tools. The mainstream narrative frames telecom surveillance as isolated incidents involving individual governments or carriers. What this research exposes is a structural vulnerability baked into the foundation of how the world's mobile networks trust one another. Weak screening of interconnect traffic—the pathways where carrier networks exchange information—allowed attackers to route surveillance messages through trusted operator channels as if they were legitimate network traffic. Intelligence agencies and private surveillance vendors have exploited these gaps for years, but the evidence now suggests the vulnerability has metastasized into something far more dangerous: a crowded and shadowy marketplace where multiple covert actors are simultaneously conducting operations using similar techniques. The implications extend far beyond targeted dissidents or journalists.

What Else We Know

The same SIM card commands used to track specific individuals demonstrate that any phone number could theoretically become a tracking device. Roaming travelers, business executives, activists, and ordinary citizens operating across borders face exposure to location extraction attacks they have no technical means of detecting or preventing. Unlike endpoint security where users can install updates or antivirus software, telecom-level surveillance operates at a layer where individual choice is meaningless. Your carrier's interconnect agreements with foreign networks, their OPSEC practices, and their willingness to screen suspicious traffic determine your vulnerability far more than any security software you install. The research reveals what regulators and carriers have quietly known: mobile networks were designed for efficiency and profit, not security. Fixing it requires international coordination and transparency that the telecom industry has resisted for decades.

Primary Sources

What are they not saying? Who benefits from this story staying buried? Follow the regulatory filings, the court dockets, and the FOIA releases. The truth is in the paperwork — it always is.

Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.

Stay Informed. No Spin.

Get the stories that matter, unfiltered. Straight to your inbox.

No spam. Unsubscribe anytime.