Global Tracking of People via Mobile Networks

Introduction A recent client was concerned that their Directors were being tracked and their location (Country) was being published and updated regularly on a stalker website.  The website contained the Company name, Directors name, and the name of the Country they currently resided in followed by the Country’s flag.  The question arose; How are they tracking us? Initial thoughts were that something quite simple or trivial was happening such as…

IMSI Catchers

An IMSI catcher is essentially a false mobile tower acting between the target mobile phone(s) and the service providers real towers. As such it is considered a Man-in-The-Middle (MiTM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones. With the recent wave of femto cell technology  available to the general public; Hackers are turning these useful devices…

Telephony Hacking and Fraud | Securing Telephony Systems

Telephony Fraud Telephony Hacking and Fraud is once again on the rise.  Phone Phreaking was common between the 60’s and 90’s; it allowed Phreakers to place free calls and access Remote Dial-In computers; from there they would add voicemail boxes, snoop on phone lines, add call forwarding etc. Phreaking once again is emerging with modern technology (VOIP, SIP, IAX etc).  Just like open web-services, that allow public internet users to…