By [1]David DiMolfetta

  | March 28, 2024

The protocols are a cornerstone of wireless communications but may contain
flaws that enable hackers to tap into Americans’ mobile activities, the
agency says.

    * [2]FCC
    * [3]Telecom

  The Federal Communications Commission is asking communications service
  providers to give the agency a progress update on how they are
  refurbishing their networks to prevent spies and cybercriminals from
  exploiting protocols that could let bad actors track targets.

  The FCC has been working to reduce vulnerabilities in the Signaling
  System No. 7 — or SS7 — protocol, as well as the Diameter protocol, a
  pair of foundational wireless signal functionalities that enable phone
  calls, text messages and other communications to travel across
  different network layers uninterrupted.

  SS7 and Diameter have [4]frequently made headlines for flaws in their
  algorithms that could potentially let hackers tether their own
  communications streams to Americans’ conversations, allowing them to
  spy on and track individuals, including journalists, politicians or
  political dissidents. SS7 and Diameter are considered vital tools that
  enable modern wireless communications, especially over roaming networks
  for individuals traveling abroad, but such protocols have not been
  fully augmented to meet modern encryption standards, the agency argues.

  The FCC is [5]asking providers to detail what steps they’ve taken to
  prevent customer spying over SS7 and Diameter, and also asks them to
  reveal known instances in which targets were successfully compromised.

  The inquiry comes a month after privacy hawk Ron Wyden, a Democratic
  senator from Oregon who sits on the Senate Intelligence Community,
  [6]asked the Biden administration to look into the matter.

  “America needs to ramp up our defenses against mercenary surveillance
  companies that help foreign dictators threaten U.S. national security,
  human rights and journalists working to expose wrongdoing,” Wyden said
  in response to the inquiry that was launched Wednesday.

  SS7 flaws became front and center concerns in April 2016, when German
  researchers in a demonstration exploited the protocol to [7]track the
  location and communications of Rep. Ted Lieu.

  Lieu, later that year, urged the FCC to [8]expedite an investigation
  into SS7 flaws after Russian operatives [9]hacked into the Republican
  and Democratic Congressional Campaign Committees.

  Lieu’s office did not respond to a request for comment about the new
  FCC inquiry by publishing time.

References

  1. https://www.nextgov.com/voices/david-dimolfetta/25968/?oref=ng-post-author?oref=rf-post-author
  2. https://www.nextgov.com/topic/fcc/?oref=ng-article-topics
  3. https://www.nextgov.com/topic/telecom/?oref=ng-article-topics
  4. https://cyberscoop.com/ss7-stingrays-imsi-catchers-chris-krebs-dhs-ron-wyden/
  5. https://www.fcc.gov/document/pshsb-seeks-comment-implementation-security-protocols
  6. https://www.wyden.senate.gov/news/press-releases/wyden-urges-biden-administration-to-crack-down-on-surveillance-companies-and-shore-up-security-of-wireless-networks
  7. https://www.theguardian.com/technology/2016/apr/18/phone-number-hacker-read-texts-listen-calls-track-you
  8. https://lieu.house.gov/media-center/press-releases/congressman-lieu-requests-update-expedited-investigation-fcc-ss7-flaw
  9. https://www.nbcnews.com/news/us-news/hack-democratic-congressional-campaign-committee-tied-earlier-breach-n619786