Warnings of Islamic State interest in "dirty bombs" - radiological dispersal devices (RDDs) that spread radiation over a target area - surface periodically, but are generally overshadowed by the terrorist group's use of "lone wolf attacks" like the one in London this week. Despite its increased reliance on terrorists-behind-the-wheel and weapons no more sophisticated than a … [Read more...]
Mobile Hacking: SS7, SIGTRAN, Diameter Protocols Put Networks at Risk
A "new" U.S. government report finds that SS7, SIGTRAN, Diameter and other protocols put mobile and IP networks at risk to cyber attacks. Why didn't they notice the problem when first revealed in 2008? Call it the Revenge of the CLECs. When the communications industry underwent massive deregulation two decades past - e.g., in the U.S. Telecom Act of 1996 and similar laws in … [Read more...]
How NSA & GCHQ Hacked Gemalto SIM Card Keys By the Billions
Non-malware endpoint attacks drove GCHQ's hack of Gemalto SIM card keys - and these invisible tools remain popular at the CIA and NSA to this day. It was the biggest hack of SIM card keys and mobile networks ever: The joint NSA/GCHQ breach of the Gemalto SIM card empire, cracking the security of billions of mobile phones and scores of mobile networks worldwide. … [Read more...]
Best Mobile Hacking – Gemalto SIM Cards, Diameter and 5G IoT
This week C5IS takes you on a tour - past, present and future - of the best mobile hacking. Coming up in a series of three analyses: the NSA/GCHQ end point, encryption bypass attack on Gemalto SIM Cards; recent revelations that vulnerability of phones using SS7 and SIGTRAN persists as the industry migrates to Diameter protocol; plus the ways hackers plan to attack Internet of … [Read more...]
Knowlesys KIS: China’s World Class OSINT Extraction Engine
When the Peoples Republic of China needs to monitor its citizens on social media or other OSINT sources, they don't have to look far - Knowlesys KIS (Knowlesys Intelligence System) is already on the case providing detailed insights that can be gleaned from any website, social media or news engine. The Peoples Liberation Army as well as local government bureaus in China also … [Read more...]