/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Citizen Lab details two spying campaigns that abuse weaknesses in the SS7 and Diameter protocols across 2G, 3G, 4G, and 5G networks to track people's locations

Security researchers have uncovered two separate spying campaigns that are abusing well-known weaknesses in the global telecoms infrastructure to track people's locations.

TechCrunch Lorenzo Franceschi-Bicchierai

Discussion

  • @vaspanagiotopoulos.com Vas Panagiotopoulos on bluesky
    New @citizenlab.ca investigation exposes how suspected commercial surveillance vendors exploit the global 📶telecom interconnect ecosystem, leverage private operator networks, and conduct covert location tracking operations that can persist undetected for years.  —  citizenlab.ca/…
  • @wchr Wolfie Christl on bluesky
    New @citizenlab.ca report with an incredibly sophisticated analysis of covert surveillance operations with a focus on location tracking, which target phones by exploiting global 3G/4G telecom networks and sending invisible SMS while acting as trusted telecom operators:  —  citize…
  • Gary Miller Gary Miller on linkedin
    What happens when surveillance actors operate inside telecom networks?  —  Today, Citizen Lab published new research uncovering …
  • @lorenzofb Lorenzo Franceschi-Bicchierai on bluesky
    NEW: Researchers have identified extensive spying campaigns abusing well-known weaknesses in the global cellphone infrastructure to track and locate targets.  —  Two (unnamed for now) surveillance vendors, whose customers are likely government agencies, were allegedly behind thes…
  • @rosamundevb Rosamunde Van Brakel on bluesky
    Security researchers have uncovered two separate spying campaigns that are abusing well-known weaknesses in the global telecoms infrastructure to track people's locations techcrunch.com/2026/04/23/s...
  • @zackwhittaker@mastodon.social Zack Whittaker on mastodon
    NEW: At least two surveillance vendors are believed to be abusing access to at least three telecommunication companies in an effort to tap people's location data on behalf of their government customers.  —  The phone companies include one in Israel, one in the U.K., and one in Je…