Spies exploit core telecom protocols to track billions worldwide

Citizen Lab documented two active surveillance campaigns exploiting SS7 and Diameter—the foundational signaling protocols that all cellular networks rely on—exposing structural weaknesses in telecom infrastructure that state-level actors can penetrate. These aren't vulnerabilities in consumer apps or endpoints, but flaws embedded in the protocols themselves across 2G through 5G. Location tracking works regardless of encryption, device security, or carrier, because the weakness exists at the network layer. The gaps persist despite decades of known issues because carriers, regulators, and vendors lack individual incentive to absorb replacement costs when governments can simply purchase access instead.