Wyden Again Warns That ‘SS7’ Telecom Flaw Lets Foreign Countries Broadly Spy On American Communications

from the everyone-spying-on-everyone,-everywhere,-constantly dept

For many many years, experts have warned about massive longstanding flaws in Signaling System 7 (SS7, or Common Channel Signaling System 7), a series of protocols hackers can exploit to track user location, dodge encryption, and even record private conversations. Governments and various bad actors routinely exploit the flaw to covertly spy on wireless users around the planet without them ever knowing. 

It’s extremely bad, and we’ve know about the problem for a long while. 60 Minutes aired a profile on the issue back in 2016. Senator Ron Wyden demanded answers as early as 2017 from mobile phone companies as to why they haven’t done more to thwart the abuse. I’d always lazily assumed we weren’t rushing to fix the problem because it was also being broadly exploited by the U.S. government.

Last year a Cybersecurity and Infrastructure Security Agency (CISA) official broke ranks with the NSA and finally formally acknowledged for the first time that yes, the U.S. has exploited flaws in SS7 for years, going so far as to use it to track and surveil folks within the U.S.

Senator Ron Wyden, ever the champion on consumer privacy issues, this week released more Department Of Homeland Security (DHS) warnings that China, Russia, Iran, and Israel are also happily exploiting the flaw to spy on people inside the United States. The information came in a response to Wyden’s ongoing inquiries by the Department of Defense (DoD):

“Karsten Nohl, founder and chief scientist of cybersecurity company Security Research Labs and who has extensively researched SS7, told 404 Media in an email that “We definitely observe geopolitical adversaries abusing SS7 weaknesses with impunity.”

Security Research Labs founder Karsten Nohl tells 404 Media that the amount of time people have spent talking about the SS7 flaw consistently exceeds the amount of time folks have actually put toward trying to fix it:

“It’s amazing that we are still talking about SS7. Solving these issues takes a focused multi-months project at each telco to configure a signalling firewall. It’s not a trivial undertaking; and yet is dwarfed by the amount of time people talk about SS7 security rather than fixing the issues already.” He said that while some countries are sending hundreds of pings per target each day, and that many of those malicious requests will be blocked by SS7 firewalls, it’s “safe to assume that other state actors and criminals are leveraging SS7 for a similar information gain without creating this unnecessary noise.”

Which is to say the problem is worse than what’s already known. And we’ve known it’s been really really bad for decades. We have the money to address it, so the question becomes, why haven’t we?

I can remember reading about this flaw back in the early 2000s. Public officials drove more attention toward the TikTok moral panic than they did toward fixing a massive security hole in our comms networks.

Our failure to hold telecom companies and executives accountable for being lazy cheapskates also continues to bite us on the ass. Telecoms and free market libertarian types insisted for years that gutting corporate oversight of telecoms would result in Utopian outcomes; here’s another arena where those deregulatory voices are suddenly nowhere to be found when the real world check for their ideology comes due.

It hasn’t been a banner year for telecom security in the wake of the Salt Typhoon hack (which the Wyden team is also raising a ruckus about), but the ongoing incompetence to tackle this SS7 flaw long ago tread well beyond embarrassment.

Filed Under: , , , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Wyden Again Warns That ‘SS7’ Telecom Flaw Lets Foreign Countries Broadly Spy On American Communications”

Subscribe: RSS Leave a comment
16 Comments

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

Re: Re: Re:

If you were a telecommunications security expert, you would already know things. If you are a telecommunications or security expert, you have better resources than a random blog to learn more about the flaws in SS7 (which are also present in the Diameter protocol that was adopted to replace it).

The details are dry and dense. Once I get past generalized info, I can’t summarize the issue without a better understanding of our common knowlege. So here is a 28 page paper from the EU in 2018 on the foundational flaws and the types of data capture that is ongoing to this day.

Anonymous Coward says:

Re:

I think you meant “But, but, think of the children”. That’s the only refrain that will garner any public traction, and without that public awareness, lawmakers won’t pay any attention either.

It’s all about face time and sound bites. Anything else is just a harassment of electrons.^

^ Paraphrased from Frank Zappa’s quote about composers.

Anonymous Coward says:

Re:

While true, Wyden’s warnings appear targeted at congress critters who are all in a lather about foreign adversaries tapping our communications, and those that vote for them. As such, there doesn’t appear to be anything to fix. As much as I assume Wyden’s previously expressed concern over the US’ domestic surveilance remains intact, his warning here does appear to be about the intercept of communications by foreign powers.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Subscribe to Our Newsletter

Get all our posts in your inbox with the Techdirt Daily Newsletter!

We don’t spam. Read our privacy policy for more info.

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...