What they're not telling you: # Bad Connection: Global telecom exploitation by covert surveillance actors Sophisticated state-level actors are systematically exploiting fundamental vulnerabilities in the global mobile network to track targets across borders by spoofing telecommunications operator identities and manipulating the very protocols designed to connect us. The Citizen Lab's investigation, released in late 2024, reveals a staggering scope of coordinated surveillance campaigns that leverage both signaling network protocols and direct device exploitation. Rather than hacking individual phones, these actors compromise the infrastructure itself—the telecommunications backbone that every mobile device depends on.
What the Documents Show
Two distinct campaigns demonstrate how far this exploitation extends: one uses a technique called SIM card command injection, embedding hidden instructions in SMS messages to transform devices into covert tracking beacons, while another combines 3G and 4G signaling manipulation with direct device exploitation to achieve persistent location tracking. Mainstream coverage has focused narrowly on government surveillance capabilities, but this investigation exposes a far more systemic problem: the entire architectural foundation of mobile telecommunications is engineered with security vulnerabilities that enable this type of attack. The reach of these operations is genuinely global. Attackers have spoofed operator identities associated with networks across the UK, Israel, China, Thailand, Sweden, Italy, Liechtenstein, Cambodia, Mozambique, Uganda, Rwanda, Poland, Switzerland, Morocco, Namibia, and Lesotho—a geographically dispersed set of countries that reveals how interconnected mobile infrastructure has become a universal vulnerability. According to telemetry from Cellusys, a mobile signaling security provider, the same operator identifiers have been reused across multiple years, forming consistent clusters that enable long-running surveillance operations.
Follow the Money
This persistence suggests these aren't one-off hacks but institutionalized exploitation campaigns with significant resources and coordination. What enables this at scale is weak operational security among the telecom providers themselves. The investigators found that intercarrier traffic—messages routed between different telephone companies—is screened poorly enough that attackers can route surveillance messages through trusted operator pathways without detection. By manipulating the signaling protocols that different carriers use to authenticate each other, the actors effectively impersonate legitimate telecom operators. This is not a sophisticated hack requiring zero-day exploits. It works because the basic infrastructure between carriers was designed with the assumption that operators would trust each other.
What Else We Know
The mainstream narrative around telecom surveillance typically frames it as a choice between privacy and national security, positioning government agencies as the primary threat. But this investigation reveals something more troubling: the infrastructure itself is fundamentally compromised, and the actors exploiting it operate in a "shadowy marketplace" where tools and techniques are shared, refined, and reused across campaigns. Once vulnerabilities are discovered and weaponized, they remain embedded in systems serving billions of users. For ordinary people, the implication is stark. There is no encryption, no authentication system, no consumer choice that can protect against surveillance routed through the mobile network itself. Your location, your contacts, your communications can be intercepted not through your phone's operating system but through the underlying infrastructure your carrier relies on.
Primary Sources
- Source: Hacker News
- Category: Surveillance State
- Cross-reference independently — don't take our word for it.
Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.

