UNCENSORED
Bad Connection: Global telecom exploitation by covert surveillance ... NewsAnarchist — The stories they don't want you reading

Bad Connection: Global telecom exploitation by covert surveillance actors

https://www.haaretz.com/israel-news/security-aviation/2026-0... ( https://archive.ph/0QYbN )

Bad Connection: Global telecom exploitation by covert surveillance ... — Surveillance State article

surveillance-actors.html" title="Bad Connection: Global telecom exploitation by covert surveillance actors" style="color:#1a1a1a;text-decoration:underline;text-decoration-style:dotted;font-weight:500;">surveillance-actors.html" title="Bad Connection: Global telecom exploitation by covert surveillance actors" style="color:#1a1a1a;text-decoration:underline;text-decoration-style:dotted;font-weight:500;">Surveillance State — The stories mainstream media won't cover.

What they're not telling you: # Bad Connection: Global telecom exploitation by covert surveillance actors Sophisticated state-level actors are systematically exploiting fundamental vulnerabilities in the global mobile network to track targets across borders by spoofing telecommunications operator identities and manipulating the very protocols designed to connect us. The Citizen Lab's investigation, released in late 2024, reveals a staggering scope of coordinated surveillance campaigns that leverage both signaling network protocols and direct device exploitation. Rather than hacking individual phones, these actors compromise the infrastructure itself—the telecommunications backbone that every mobile device depends on.

Marcus Webb
The Take
Marcus Webb · Surveillance & Tech Privacy

# THE TAKE: Telecom Exploitation Is The Feature, Not The Bug The framing here is backwards. We're not witnessing "covert actors exploiting" telecom infrastructure—we're watching infrastructure *designed* for exploitation. NSA's SIGINT apparatus didn't infiltrate these networks; telecom carriers architected backdoors into core switching systems decades ago, documented in classified orders carriers won't acknowledge under oath. The Israeli surveillance angle? Tactical noise. When every major carrier maintains lawful intercept capabilities by regulatory requirement, distinguishing "covert" from "authorized" becomes semantic theater. What matters: backbone access points in Frankfurt, London, UAE hubs—not nationality of the actor. The real story buried here: why telecom executives still claim ignorance about their own infrastructure. They know exactly what's possible. They've priced compliance into quarterly earnings. Until we document *which* carriers maintain undisclosed access points—specifics, not allegations—this remains distributed guilt masquerading as investigation.

What the Documents Show

Two distinct campaigns demonstrate how far this exploitation extends: one uses a technique called SIM card command injection, embedding hidden instructions in SMS messages to transform devices into covert tracking beacons, while another combines 3G and 4G signaling manipulation with direct device exploitation to achieve persistent location tracking. Mainstream coverage has focused narrowly on government surveillance capabilities, but this investigation exposes a far more systemic problem: the entire architectural foundation of mobile telecommunications is engineered with security vulnerabilities that enable this type of attack. The reach of these operations is genuinely global. Attackers have spoofed operator identities associated with networks across the UK, Israel, China, Thailand, Sweden, Italy, Liechtenstein, Cambodia, Mozambique, Uganda, Rwanda, Poland, Switzerland, Morocco, Namibia, and Lesotho—a geographically dispersed set of countries that reveals how interconnected mobile infrastructure has become a universal vulnerability. According to telemetry from Cellusys, a mobile signaling security provider, the same operator identifiers have been reused across multiple years, forming consistent clusters that enable long-running surveillance operations.

🔎 Mainstream angle: The corporate press either ignored this story entirely or buried it in a 3-sentence brief. The framing, when it appeared at all, focused on process rather than impact.

Follow the Money

This persistence suggests these aren't one-off hacks but institutionalized exploitation campaigns with significant resources and coordination. What enables this at scale is weak operational security among the telecom providers themselves. The investigators found that intercarrier traffic—messages routed between different telephone companies—is screened poorly enough that attackers can route surveillance messages through trusted operator pathways without detection. By manipulating the signaling protocols that different carriers use to authenticate each other, the actors effectively impersonate legitimate telecom operators. This is not a sophisticated hack requiring zero-day exploits. It works because the basic infrastructure between carriers was designed with the assumption that operators would trust each other.

What Else We Know

The mainstream narrative around telecom surveillance typically frames it as a choice between privacy and national security, positioning government agencies as the primary threat. But this investigation reveals something more troubling: the infrastructure itself is fundamentally compromised, and the actors exploiting it operate in a "shadowy marketplace" where tools and techniques are shared, refined, and reused across campaigns. Once vulnerabilities are discovered and weaponized, they remain embedded in systems serving billions of users. For ordinary people, the implication is stark. There is no encryption, no authentication system, no consumer choice that can protect against surveillance routed through the mobile network itself. Your location, your contacts, your communications can be intercepted not through your phone's operating system but through the underlying infrastructure your carrier relies on.

Primary Sources

What are they not saying? Who benefits from this story staying buried? Follow the regulatory filings, the court dockets, and the FOIA releases. The truth is in the paperwork — it always is.

Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.

Stay Informed. No Spin.

Get the stories that matter, unfiltered. Straight to your inbox.

No spam. Unsubscribe anytime.