Surveillance data challenges what we thought we knew about location tracking
How the tracking works
- Core mechanism is abuse of SS7, the legacy inter-carrier signaling system that still underpins 2G/3G and backwards compatibility for 4G/5G.
- Surveillance firms lease “Global Titles” from operators or get in-country SS7 links, then send location and routing commands that other networks accept without strong authentication.
- This enables remote location tracking (including across borders) and interception of SMS, especially one-time verification codes (e.g. for WhatsApp login) without fake antennas.
- Other attack surfaces mentioned: femtocells and fake base stations/IMSI catchers, which can downgrade connections and capture identifiers or traffic; and adtech/RTB-style tracking via mobile IDs.
Security implications and mitigations
- Hijacking WhatsApp via SMS codes:
- Doesn’t reveal past message history.
- Breaks service on the original phone (a warning sign).
- Can be blocked by enabling a WhatsApp PIN and security notices.
- SMS-based 2FA is widely criticized as “basically open”; attackers can buy or rent SS7 access. Some banks implement stronger device binding (IMEI/SIM/hardware, biometrics) to reduce reliance on SMS.
- Several comments emphasize that dissidents effectively cannot safely carry phones, and in Europe mandatory SIM registration links almost everyone’s movements to identity.
Telecom and regulatory failures
- SS7 weaknesses have been publicly documented for well over a decade; 4G/5G still depend on it, and fixes are largely voluntary.
- Foreign roaming partners and even misconfigured or modified femtocells can abuse SS7 globally.
- Telcos have also been fined for selling location data outright; commenters assume both formal and “shadow” markets exist.
Journalism, leaks, and data access
- Some speculate the dataset came from a sloppy cloud deployment (e.g. open S3), others think reporters obtained samples by posing as customers. Exact source remains unclear.
- There’s praise for cross-border investigative journalism and the separate technical explainer.
- Several want a “Have I Been Pwned”-style lookup to see if their number appears in the archive, but no such tool is offered.
Surveillance, crime, and power
- Debate over whether mass surveillance meaningfully prevents serious crime; many argue it mainly empowers states against dissent and protest.
- Discussion of leaders’ incentives: once in office, they prioritize perceived safety and political risk over civil liberties; surveillance is described as an “externality” the public quietly absorbs.
- Some advocate strict warrant requirements, narrow use, transparency, and shorter political careers; others hold a hard pro-surveillance stance (“only criminals fear it”), which is challenged as authoritarian and short-sighted.