How Spies Can Use Your Cellphone to Find You

(Jewel Samad/AFP/Getty Images)
(Jewel Samad/AFP/Getty Images)
TT

How Spies Can Use Your Cellphone to Find You

(Jewel Samad/AFP/Getty Images)
(Jewel Samad/AFP/Getty Images)

Surveillance systems that track the locations of cellphone users and spy on their calls, texts and data streams are being turned against Americans as they roam the country and the world, say security experts and US officials.

Federal officials acknowledged the privacy risk to Americans in a previously undisclosed letter from the Department of Homeland Security to Sen. Ron Wyden (D-Ore.) last week, saying they had received reports that “nefarious actors may have exploited” global cellular networks “to target the communications of American citizens.”

The letter, dated May 22 and obtained by The Washington Post, described surveillance systems that tap into a global messaging system that allows cellular customers to move from network to network as they travel. The decades-old messaging system, called SS7, has little security, allowing intelligence agencies and some criminal gangs to spy on unwitting targets — based on nothing more than their cellphone numbers.

“I don’t think most Americans realize how insecure US telephone networks are,” Wyden said in a statement. “If more consumers knew how easy it is for bad guys to track or hack their mobile phones, they would demand the FCC and wireless companies do something about it. These aren’t just hypotheticals.”

Wyden also revealed in a separate letter Tuesday that a major American cellular carrier has referred an “SS7 breach” involving customer data to federal law enforcement officials for investigation. He chastised the Federal Communications Commission in the letter, saying it had “failed to address this ongoing threat to national security.”

The FCC declined to comment on the letter, which was addressed to Chairman Ajit Pai.

SS7, which stands for Signaling System 7, was created in the 1970s as a way for telecommunications carriers to exchange information as they routed calls. Over the years, SS7 expanded to serve a sprawling global cellular system that allowed users to move from network to network — within their own nations and across international borders — without missing calls, losing service or having to make payments to each carrier that routed a signal to their phones.

But as the number of companies with access to SS7 grew from a handful to many thousands, the lack of built-in security became a growing problem. It was easy for anyone with access to the network to pretend to be a carrier making legitimate requests for information about customers.

Early research of SS7 surveillance focused on its use in tracking user locations through cellphones. But in recent years, a more serious issue has emerged around its ability to intercept calls, texts and data.

Researchers say that SS7 tracking systems around the world now create millions of “malicious queries” — meaning messages seeking unauthorized access to user information — each month.

One Israeli surveillance vendor, Ability, said in an online marketing video posted last year that its ULIN interception system can eavesdrop on cellphone calls on targets in New York or Los Angeles while agents are “sitting at your desk . . . anywhere in the world.” A 2016 brochure for the company depicted phones being tracked in Massachusetts.

Ability declined to comment about SS7 interception or where the company conducts surveillance, but a person familiar with its operations, who spoke on the condition of anonymity to describe private corporate details, said that the ULIN system is not used in the United States. The video, this person said, is used “for demonstration purposes.”

The company says on its website that it has had 50 government clients around the world and does not have private-sector clients. Public financial documents listed Ability’s major areas of operation as Latin America, Asia and Africa, but it does not name nations. Forbes has previously reported on Ability’s capabilities and sales, including to a client in Mexico.

The company, which has struggled financially in recent years, according to news reports, has several competitors, including in Israel, in Eastern Europe and in other parts of the world, say experts in SS7 surveillance.

Wyden said the risks posed by SS7 surveillance go beyond privacy to affect national security. American, Chinese, Israeli and Russian intelligence agencies are the most active users of SS7 surveillance, experts say, and private-sector vendors have put systems within the reach of dozens of other governments worldwide. Sophisticated criminals and private providers of business intelligence also use the surveillance technology.

“America is the Number One target, far and away. Everyone wants to know what’s happening in America,” said Brian Collins, chief executive of AdaptiveMobile Security, a cellular security firm based in Dublin. “You will always be a target, whether at home or away.”

Other experts said SS7 surveillance techniques are widely used worldwide, especially in less developed regions where cellular networks are less sophisticated and may not have any protection against tracking and interception. But the experts agreed that Americans are significant targets, especially of rival governments eager to collect intelligence in the United States and other nations where Americans use their cellphones.

Collins said his firm detected a surge in SS7 queries in US networks in late 2014 that it thinks was related to the Office of Personnel Management hack in which intruders — widely reported to be Chinese — gained access to the files of millions of federal workers, including in some cases their phone numbers. (Although publicly reported in 2015, the hack began at least a year earlier.)

AdaptiveMobile Security also detected an uptick in malicious SS7 queries this month in the Middle East, in the days after President Trump announced the U.S. withdrawal from the Iran nuclear agreement, Collins said. This surveillance probably was the work of intelligence agencies studying how the US move would affect oil prices and production, Collins said.

CTIA, a wireless industry group based in Washington, said carriers have worked to implement recommendations from federal officials to protect against SS7 surveillance. “The wireless industry is committed to safeguarding consumer security and privacy and collaborates closely with DHS, the FCC and other stakeholders to combat evolving threats that could impact communications networks,” CTIA said in a statement.

Firewalls installed by carriers in recent years block many of the malicious queries, but many others are successful in eliciting unauthorized information from cellular carriers worldwide.

“It does happen, and it does happen thousands of times a month,” said Karsten Nohl, a telecommunications security expert with Security Research Labs in Berlin.

The most advanced SS7 surveillance systems can monitor the movements of dozens of people for hours at a time, sending alerts if they get close to select areas or to one another, experts say.

German telecommunications researcher Tobias Engel first warned of the potential for SS7 surveillance at a security conference in 2008, during which he demonstrated how to locate a cellphone provided by a volunteer from the audience. Engel also located the cellphone of a Post reporter in 2014, at The Post’s request, for an article about the growing availability and effectiveness of such systems.

Researchers have continued to detail SS7 vulnerabilities in recent years, including call, data and text interception. A site reachable on Tor, an encrypted Internet browsing tool, offers SS7 tracking and interception of cellphones for a few hundred dollars a month.

Criminals last year used SS7 to intercept security codes that a bank texted to its customers in Germany, allowing the criminals to steal money from accounts, according to news reports.

Carriers worldwide have gradually added better security, but SS7 does not have any way to verify that carriers sending data requests are who they claim to be. The firewalls increasingly installed by carriers, meanwhile, protect their own customers but typically not people who are roaming on the network, said Engel, the German researcher who first reported the security and privacy risks of SS7.

“It’s much simpler to protect your own subscribers,” said Engel, now a researcher for GSMK, a mobile communications security company based in Berlin. “It could be that you’re vulnerable as soon as you enter somebody else’s network, domestic or foreign.”

Calls for an aggressive federal response grew after The Post’s 2014 article and a “60 Minutes” report in 2016 in which Nohl, one of the German researchers, demonstrated SS7 surveillance risks by intercepting a call to the cellphone of Rep. Ted Lieu (D-Calif.), with his permission.

DHS, which declined to comment for this article, issued a report on SS7 cellphone security in April 2017 that noted the risk to federal personnel: “SS7 attack types can be used to target key U.S. Federal Government personnel both in the United States and traveling or working overseas.”

The DHS report recommended that carriers adopt new protections. An FCC group, the Communications Security, Reliability and Interoperabilty Council, issued recommendations for improving SS7 security in March 2017 that US carriers have largely adopted.

But Wyden and some other officials say the government must do more to protect American cellphone users by documenting SS7 breaches and commissioning independent testing of the vulnerabilities in national cellular networks — a step that Britain and some other nations have taken.

“The FCC has been studying SS7 vulnerabilities for nearly two years. Enough,” said FCC Commissioner Jessica Rosenworcel, a Democrat. “It’s time for the agency to get serious and come up with a real plan to make sure that our networks are safe and secure.”

(The Washington Post)



Google, Meta, TikTok Hit by EU Consumer Complaints about Handling of Financial Scams

FILE PHOTO: The logo of Meta is seen during the Viva Technology conference dedicated to innovation and startups at Porte de Versailles exhibition center in Paris, France, June 12, 2025. REUTERS/Benoit Tessier/File Photo
FILE PHOTO: The logo of Meta is seen during the Viva Technology conference dedicated to innovation and startups at Porte de Versailles exhibition center in Paris, France, June 12, 2025. REUTERS/Benoit Tessier/File Photo
TT

Google, Meta, TikTok Hit by EU Consumer Complaints about Handling of Financial Scams

FILE PHOTO: The logo of Meta is seen during the Viva Technology conference dedicated to innovation and startups at Porte de Versailles exhibition center in Paris, France, June 12, 2025. REUTERS/Benoit Tessier/File Photo
FILE PHOTO: The logo of Meta is seen during the Viva Technology conference dedicated to innovation and startups at Porte de Versailles exhibition center in Paris, France, June 12, 2025. REUTERS/Benoit Tessier/File Photo

Alphabet's Google, Meta Platforms and TikTok were hit with complaints from European Union consumer groups on Thursday for allegedly failing to protect users from financial scams on their platforms, putting them at risk of regulatory fines.

The move highlights growing pressure worldwide on Big Tech to do more to address the negative impacts of social media, particularly for children and vulnerable users.

The complaints, filed by the European Consumer Organisation (BEUC) and 29 of its members in 27 European countries, were submitted to the European Commission and national regulators under the Digital Services Act, which requires large online platforms to do more to tackle illegal and harmful content, Reuters reported.

"Meta, TikTok and Google not only fail to proactively remove fraudulent ads but also do little when being notified about such scams," BEUC Director General Agustin Reyna said in a statement.

"If they fail to address the financial scams circulating on their platforms, fraudsters will continue to reach millions of European consumers daily, leaving people at risk of losing hundreds to thousands of euros to fraud," he said. Google and Meta rejected the complaints and said they work proactively to protect their users.

A Google spokesperson said: "We strictly enforce our ad policies, blocking over 99% of violating ads before they ever run. Our teams constantly update these defences to stay ahead of scammers and protect people."

Meta said it found and removed over 159 million scam ads last year, 92% before anyone reported them. "We invest in advanced AI, tools, and partnerships to stop them," a spokesperson said.

TikTok said it takes action against violations, adding that scams are an industry-wide challenge while bad actors constantly adapt their tactics.

The consumer groups, meanwhile, said they reported nearly 900 ads suspected of breaching EU laws between December last year and March this year but the platforms only took down 27% of the ads and 52% of the reports were rejected or ignored.

The groups urged regulators to investigate whether the companies were complying with the rules and to impose fines for breaches.

DSA fines can reach as much as 6% of a company's global annual turnover.


SDAIA Outlines Comprehensive Data Quality Journey to Support National AI Initiatives

The Saudi Authority for Data and Artificial Intelligence (SDAIA)
The Saudi Authority for Data and Artificial Intelligence (SDAIA)
TT

SDAIA Outlines Comprehensive Data Quality Journey to Support National AI Initiatives

The Saudi Authority for Data and Artificial Intelligence (SDAIA)
The Saudi Authority for Data and Artificial Intelligence (SDAIA)

The Saudi Data and Artificial Intelligence Authority (SDAIA) highlighted data quality as a critical foundation for enhancing information reliability, boosting performance, and enabling accurate business decisions, as part of its efforts during the Year of Artificial Intelligence 2026 to raise awareness about data importance.

The authority noted that high data quality serves as the cornerstone for sustainable national trust, integrated digital services, operational savings, entrepreneurship, and readiness for artificial intelligence applications, SPA reported.

SDAIA stated that the data quality journey spans five phases, beginning with a creation phase, where data is entered according to standardized criteria.

This is followed by a storage and organization phase to structure data and eliminate duplication, and an integration and sharing phase, which assesses quality before data is reused.

The journey continues through an analysis and use phase, where report accuracy is tied directly to source quality, and culminates in a continuous improvement phase, which utilizes analysis and user feedback to constantly refine data sets.

SDAIA called on organizations to adopt comprehensive data quality practices and strictly adhere to national regulations and standards. This includes integrated data quality planning, prioritizing initial assessments, developing data rules, and establishing clear performance indicators to measure improvement.

The authority also emphasized the importance of conducting periodic reviews and enabling users to report quality problems, which will ultimately maximize the efficiency of digital services and AI applications across the Kingdom.


Dell to Asharq Al-Awsat: AI in Saudi Arabia Enters Production, Not Experimentation Phase

Mohammed Amin, Senior Vice President for Central Eastern Europe, Middle East, Türkiye and Africa at Dell Technologies
Mohammed Amin, Senior Vice President for Central Eastern Europe, Middle East, Türkiye and Africa at Dell Technologies
TT

Dell to Asharq Al-Awsat: AI in Saudi Arabia Enters Production, Not Experimentation Phase

Mohammed Amin, Senior Vice President for Central Eastern Europe, Middle East, Türkiye and Africa at Dell Technologies
Mohammed Amin, Senior Vice President for Central Eastern Europe, Middle East, Türkiye and Africa at Dell Technologies

Saudi Arabia became a focal point of discussion in the “Dell Technologies World 2026” in Las Vegas this week about the next phase of artificial intelligence.

The question is no longer just about the size of investment in infrastructure or national capacity building, but about the difference the Kingdom can make in a global market transitioning from AI experimentation to its operational deployment within institutions.

In exclusive remarks to Asharq Al-Awsat, Michael Dell, Chairman and CEO of Dell Technologies, stated that what the company sees in Saudi Arabia is a “deep commitment to modernizing the Kingdom,” highlighting its significant energy resources and Dell's collaboration with Humain and other companies in the Kingdom, in addition to a regional facility through which the company works to “aggregate these capabilities and build infrastructure for customers in the region.”

He added that every country today is going through a phase of re-understanding what the transition towards AI means, and how citizens and industries can be empowered to drive the economy forward. In the same session, Dell described Saudi Vision 2030 as “highly ambitious,” and the ambition for AI under this vision as “impressive.”

The Operation Test

From this point, the real discussion about Saudi Arabia and artificial intelligence begins. The narrative is no longer solely about the volume of investments, the speed of data center construction, or the number of announced national projects.

The challenge of the next test relates to how this national capability can be transformed into operational value within government entities, banks, hospitals, energy and telecommunications companies, and smart cities. It's about how institutions move from AI experiments to systems that operate daily, on real data, within secure environments, and at a predictable cost.

Mohammed Amin, Senior Vice President for Central Eastern Europe, Middle East, Türkiye and Africa at Dell Technologies, places this transformation in a clear context.

In remarks to Asharq Al-Awsat on the sidelines of the conference, he states that the biggest barrier for institutions in Saudi Arabia and the Gulf as they transition from AI experimentation to production is not a single isolated factor, but an interconnected system encompassing infrastructure, governance, skills, cyber resilience, cost, and operating models.

However, he considers “data readiness” to be the primary obstacle. He adds: “Without a reliable and AI-ready data foundation, even the most advanced infrastructure is insufficient, and pilot projects falter before reaching production.”

Mohammed Amin, Senior Vice President for Central Eastern Europe, Middle East, Türkiye and Africa at Dell Technologies

Data Before the Model

This point appears fundamental to Dell's assessment of the Saudi phase, as the company indicates that 96 percent of Saudi institutions now view AI as a key part of their business strategy, according to its research on the state of innovation and AI.

However, this indicator, despite its importance, does not mean that the path to production has become easy. Many institutions still operate through outdated and fragmented systems, distributed data, inconsistent governance, and limited access to reliable real-time data.

According to Amin, the fastest-advancing institutions are those that treat AI “not as a standalone tool, but as a transformation of the entire operating model.”

Here lies the difference between ambition and operational infrastructure. An institution that wants to use AI for customer service, risk management, predictive maintenance, or patient data analysis not only needs a robust model but also requires its data to be discoverable, governed, reliable, and usable by AI systems in a timely manner.

Amin defines AI-ready data as data that is “discoverable, governed, reliable, and usable by AI systems in real-time.” This definition transforms the discussion from a narrow technical question to an institutional one: Does the institution know where its data is, who can use it, and can it be trusted when fed into a model or intelligent agent?

Data from Sensitive Sectors

In the Saudi banking sector, this could mean linking customer, transaction, and risk data across different environments while maintaining compliance and governance. In hospitals, it involves securely organizing clinical and imaging data so that AI can support diagnosis or improve operations without compromising patient privacy. For government entities, it means unifying citizen and operational data while preserving sovereignty and security controls. As for energy companies, it might involve combining operational, sensor, and geographic data to support predictive maintenance and improve performance.

Dell states that updates to its Dell AI Data Platform specifically target this point, by indexing billions of files and linking them into governed data pipelines. The platform includes capabilities such as GPU-accelerated SQL analytics, achieving up to six times faster performance, and vector indexing up to 12 times faster.

These details might seem technical, but they actually determine the speed at which an institution transitions from a limited experiment to a widely operational AI service. The slower data is accessed or the less organized it is, the more the data pipelines themselves become an operational bottleneck. Amin notes that these capabilities help reduce response time, improve accuracy, and expand AI services with higher efficiency.

Local Operating Economics

As AI transitions to more sensitive and continuous workloads, another question emerges: when does private or institution-controlled infrastructure become more suitable than the public cloud? Amin does not present this as a stark choice between cloud and private infrastructure; he believes the public cloud remains important for experimentation, flexibility, and quick access to AI services. However, he adds that there comes a stage where controlled infrastructure becomes “strategically better,” especially when workloads involve sensitive national or financial data, or when response time requirements are critical.

This aligns with what Dell presented at the conference regarding Deskside Agentic AI, a solution aimed at running some AI agents locally on high-performance workstations, rather than relying entirely on cloud programming interfaces.

The company states that this solution can, in some cases, reach a break-even point with the cost of cloud programming interfaces within three months, and reduce spending by up to 87 percent within two years. Amin interprets these figures from a broader perspective, stating that technology managers in Saudi Arabia must evaluate the economics of AI “over its full lifecycle, not just by focusing on initial infrastructure costs.” The cloud might appear attractive at the outset, but it can become more expensive when running continuous generative or agentic workloads at the scale of a large enterprise.

Processor Efficiency

For Saudi Arabia, this issue is also linked to sectors with regulatory and sensitive natures. Amin acknowledges that the most realistic use cases today are those that deliver clear productive and operational value while maintaining manageable governance.

He points out that private assistants within institutions and workflow in regulated sectors represent a compelling starting point in the Kingdom, due to the strong focus on data security and sovereignty. He also believes that programming assistants are rapidly gaining momentum because they offer direct benefits to development teams.

The transition to production requires not only data and architecture but also infrastructure capable of handling high workload density. In heavy AI environments, processing units are insufficient if data does not move quickly between computing, storage, and applications.

Amin notes that the network design in PowerRack includes a switching capacity exceeding 800 terabits per second per rack, explaining that the practical meaning of this capacity is to eliminate data traffic bottlenecks between GPUs, storage, and applications. The longer GPUs wait for data, the lower the efficiency of infrastructure investment. Conversely, when data moves with low latency, training and inference operations become faster and more effective.

Cooling as a Strategic Factor

This discussion cannot be separated from cooling and power, as AI increases rack density and power requirements within data centers, making cooling a strategic, not just operational, factor.

Amin notes that the ability of Dell PowerCool C7000 to support facility water temperatures up to 40 degrees Celsius means that data centers can operate with higher efficiency in hot climates, reducing reliance on energy-intensive cooling.

In Saudi Arabia, where the government and private sector are investing in sovereign AI infrastructure, he believes that cooling “is no longer merely an operational issue,” but has become linked to scalability, energy efficiency, and long-term viability.

Data and Model Security

Cyber resilience is part of AI readiness; an intelligent system is not reliable if its data is corruptible, its models are exploitable, or its infrastructure is not recoverable. Amin points out that an AI system “is only as reliable as the data and models it operates on,” and a cyberattack that corrupts data or harms a model can have significant consequences.

Therefore, he believes that the maturity of cyber resilience will directly impact the extent to which institutions trust expanding their adoption of AI. Here, Dell offers tools like Cyber Detect, which it claims can detect data corruption resulting from ransomware attacks and accurately identify the last known clean version.

Openness and Sovereignty

With Dell's expanded partnerships with Google, Hugging Face, OpenAI, Palantir, ServiceNow, and SpaceXAI, the company emphasizes that institutions do not want to tie their AI strategy to a single model, cloud platform, or infrastructure package.

This openness, in Amin's view, gives institutions a “choice” and reduces vendor lock-in risks, allowing them to develop their capabilities as technology evolves. This is crucial in a fast-moving market like Saudi Arabia, where integration and interoperability can become strategic advantages in themselves.

When Mohamed Amin was asked about the Saudi sectors that would first require AI-ready infrastructure, he placed government, energy, telecommunications, finance, and smart cities at the forefront, due to the volume of their data, their national importance, and the operational value that AI can unlock.

These sectors are also most closely linked to sovereignty, compliance, and security requirements. Therefore, building a secure and scalable AI infrastructure appears not merely a technical upgrade, but part of institutions' ability to transform the Vision's ambitions into measurable daily operations.

Between Michael Dell's response regarding Saudi Arabia and Mohamed Amin's vision for the region, the picture of the next phase becomes clear. The Kingdom is not entering the AI race merely from the perspective of consumption or experimentation, but from the perspective of building institutional capability.

However, true capability will not be measured solely by the number of data centers or the volume of investment, but by institutions' ability to prepare their data, choose where to run their workloads, manage costs, protect their models and data, and scale their use without losing control or governance.