Cell Phone Privacy Issues – Why It’s Impossible to Be Anonymous and Private on Cellular Networks

In this post we’re going to talk about using mobile cell phones and cellular networks for security privacy & anonymity and why actually that can’t really happen. It is an unfortunate fact that serious privacy and anonymity with modern smartphones using one of the popular operating systems on a mobile network is pretty much unattainable. The problem is everyone wants to use a modern non-privacy-focused smartphone and a popular operating system plus we connect to insecure mobile networks that track everything we do, It’s a problem. If you were to design a solution for de-anonymizing you and eroding your privacy, a mobile phone and network would be the solution that you would come up with. It is perfect for it – even if you’re using a proxy.

So it’s really an uphill battle to get security privacy and anonymity with your modern mobile phone and mobile networks. For me with mobile devices and phones, it’s more of a best-effort approach to privacy and anonymity so, for example, I’m going to use a secure messaging app like signal but I acknowledge that if I’m using an iPhone, Apple, my network provider, can control my phone if they really want to and that’s the same for all other major operating systems and networks like Android, Windows, BlackBerry et cetera.

we simply have less control over these devices than we do over desktops and laptops. Replacing the operating system on these phones is deliberately made difficult and its much harder to investigate malware and find and remove potential undesirable programs on these smartphones. But let me clarify, what I mean is you’re still pretty safe using a mobile banking app on an iPhone as long as the app and infrastructure is securely designed however if you want serious privacy and anonymity from a serious adversary who is well resourced like a nation state is near impossible. Well-designed security applications like mobile banking apps are designed in such a way that they help mitigate some of the underlying problems of the mobile network and the mobile platform. So I’ll just summarize the issues of why serious privacy and anonymity is a lost cause and why you should consider it best efforts really, mobile and cellular network security could be a cost to itself really. And later on I’m going to provide some mitigations to these issues that we go through.

cellular networks and ss7 explained

In the image above you can see two mobile operators connected by the SS7 protocol. So let’s consider the issues with the network provider or operator issues when it comes to privacy and anonymity and security.

Well first of all they can record your voice calls and they do if they need to, they can record and log the content of your internet data traffic anything unencrypted. That would be anything that is encrypted they would have to do an active attack which will be more difficult which is why end to end encryption is always what you need. The operator can read and store SMS messages, MMS messages and they can send a short message type zero also known as a silent SMS which can be sent to keep track of you by your geographic location. Some of them provide software updates that can manipulate your phone which means they can essentially take control of your phone but this will depend on your phone and your provider as some countries and networks are very different when it comes to software updates.

They can also do what’s called Tower dorms of all the connected phones over a given time on request. This is to help track and cross correlate who you know and who might be in the area at the same time, this is done for third parties on request. When you are connected to their network they can know your MAC address which is unique to your phone and if you purchased it non anonymously then it uniquely identifies you.

They record metadata like call duration, course location, callers and receivers of calls, time of calls, time of SMS and picture messages, Internet usage. And then over the air an advisory can possibly get your subscriber identity your IMZI and with IMZI attached they can get the TMSI with TMSI call patterns

Over the air an adversary can potentially get a hold of your precise location through location based services and triangulation in built up areas with more towers. A more precise location can be made where there is less towers in a less built up area the location is less precise. Providers between each other can also exchange data about the location of devices for more accuracy in locating.

Your data, voice, SMS can be intercepted by adversaries with the right equipment if there is no encryption or there is weak encryption. The encryption will depend on the provider that you have chosen and the network implementation and some governments have pressured providers to deliberately weaken encryption for that purpose.

So those are the general concerns that you would have in terms of privacy and anonymity when it comes to your provider and the general over the air issues.

FAQs

1. How do smartphones invade privacy?

Any app on your phone that collects this data has a high degree of accuracy in reading your text messages or the password to your banking app. Not only can your location be determined using the GPS on your phone, but also by monitoring nearby cell towers, Wi-Fi signals, and even Bluetooth devices.

2. Do you think mobile phone tracking is a violation of a person's privacy?

Apple iPhones and Google Android smartphones track people's locations on a regular basis and store this information in a hidden file on our phones. Cell phone tracking is an infringement on an individual's privacy. Cell phone tracking enables someone to track the location of another person without their consent.

3. Why is mobile privacy important?

Mobile devices, such as smart phones, laptops, tablets, portable hard drives, and USB keys, have the capacity to store massive amounts of sensitive personal information. It is critical to take precautions to safeguard the data stored on these devices against loss, theft, and threats such as viruses and spyware.

4. Can your phone hear your conversations?

When your device's default settings are used, everything you say may be recorded via the onboard microphone. While there is no concrete evidence to support this, many Americans believe their phones collect their voice data and use it for marketing purposes on a regular basis.

5 Are smartphones a threat to privacy?

According to some experts, smartphones are a threat to privacy because they can easily be converted into surveillance devices without impairing their functionality. Additionally, they assert that private hackers, the government, or cloud service providers can use smartphones as tracking devices.

About Lawrence Jung

Lawrence graduated cum laude from Boston University with a B.S. in Journalism. He then started working with The New York Times for 3 years as an editor. Upon their acquisition of online review website the Wire Cutter he became exposed to the digital world of review-style articles and digital content. He was a writer for many tech review products where he developed his expertise in the electronic and PC peripheral space. He quickly got promoted to managing a writing team where he was responsible for training and managing a team of over a dozen writers. After being there for another 3.5 years, Lawrence left in late 2019 to help Dusan create VSS Monitoring, where he could help design and contribute to the site’s content and website’s architecture to develop what he wants to become THE top tech resource online.

Leave a Comment