{"id":95573,"date":"2026-05-03T12:48:16","date_gmt":"2026-05-03T12:48:16","guid":{"rendered":"https:\/\/www.europesays.com\/iran\/95573\/"},"modified":"2026-05-03T12:48:16","modified_gmt":"2026-05-03T12:48:16","slug":"ghost-operators-how-israeli-telecoms-were-exploited-to-track-citizens-worldwide","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/iran\/95573\/","title":{"rendered":"Ghost Operators: How Israeli Telecoms Were Exploited to Track Citizens Worldwide"},"content":{"rendered":"<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Israeli telecom infrastructure was used to track citizens in more than ten countries over the past three years, according to a report published recently by the digital research group Citizen Lab.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">The findings, reviewed by Haaretz in recent weeks, expose how efforts to upgrade phone network infrastructures built in the 1970s for the smartphone era still leave even the most advanced devices exposed to surveillance.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\"><a class=\"x1bvjpef x41m6fz xly1mqq x1k57tk5 x1i43xu1 xx6stda x15spe28 x1wntsoc xj69yco xfw692k xg830sg x13dflua xfagghw xz4gly6\" href=\"https:\/\/citizenlab.ca\/research\/uncovering-global-telecom-exploitation-by-covert-surveillance-actors\/\" target=\"_blank\" referrerpolicy=\"no-referrer-when-downgrade\" rel=\"nofollow noopener\">The report<\/a> describes two separate tracking operations, each likely run by a commercial firm selling surveillance technologies to governments around the world. One was also found to have exploited Israeli geolocation technology to track targets, using networks belonging to 019Mobile and Partner Communications, although both Israeli companies denied any involvement.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">A second, more sophisticated operation is linked to a Swiss firm at the center of<a class=\"x1bvjpef x41m6fz xly1mqq x1k57tk5 x1i43xu1 xx6stda x15spe28 x1wntsoc xj69yco xfw692k xg830sg x13dflua xfagghw xz4gly6\" target=\"_router\" href=\"https:\/\/www.haaretz.com\/israel-news\/security-aviation\/2023-05-14\/ty-article-magazine\/.highlight\/global-surveillance-the-secretive-swiss-dealer-enabling-israeli-spy-firms\/00000188-0005-dc7e-a3fe-22cdf2900000\" referrerpolicy=\"no-referrer-when-downgrade\" rel=\"nofollow noopener\"> a 2023 Haaretz investigation<\/a> for supplying Israeli surveillance companies, including Rayzone, which develops and sells cyber intelligence technologies to government agencies around the world.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">The investigation found that the Swiss telecom company allowed companies like Rayzone to impersonate cellular carriers and connect to legacy mobile networks in order to track users worldwide, exploiting an older telecom signaling protocol called <a class=\"x1bvjpef x41m6fz xly1mqq x1k57tk5 x1i43xu1 xx6stda x15spe28 x1wntsoc xj69yco xfw692k xg830sg x13dflua xfagghw xz4gly6\" target=\"_router\" href=\"https:\/\/www.haaretz.com\/israel-news\/tech-news\/2020-12-17\/ty-article\/israeli-spy-tech-firm-tracked-mobile-users-around-the-world-investigation-suggests\/0000017f-e76b-da9b-a1ff-ef6f847c0000\" referrerpolicy=\"no-referrer-when-downgrade\" rel=\"nofollow noopener\">SS7 <\/a>for surveillance purposes. SS7 was originally designed to route calls and text messages, enable international roaming, and connect different mobile operators.<\/p>\n<p><img data-chromatic=\"ignore\" alt=\"d\" width=\"1500\" height=\"772\"  src=\"https:\/\/www.europesays.com\/iran\/wp-content\/uploads\/2026\/05\/how-eng-desktop.webp\"  decoding=\"async\" class=\"x1mraiob xxymvpz xt7dq6l x193iq5w xh8yej3 x1huxd7x\" loading=\"lazy\"\/><img data-chromatic=\"ignore\" alt=\"d\" width=\"1500\" height=\"772\"  src=\"https:\/\/www.europesays.com\/iran\/wp-content\/uploads\/2026\/05\/how-eng-desktop.webp\"  decoding=\"async\" class=\"x1mraiob xxymvpz xt7dq6l x193iq5w xh8yej3\" loading=\"lazy\"\/>Close<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">British regulators banned the practice last week in an effort to crack down on tracking spyware, after more than a decade of investigative reporting on its abuse, calling the practice the largest source of malicious traffic to mobile networks.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Moreover, Citizen Lab&#8217;s findings show that newer signalling systems \u2013 introduced to strengthen security measures \u2013 are being similarly exploited by spyware firms, despite being designed to mitigate security risks and prevent surveillance.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">One example is Diameter, a mobile network system that handles 4G international roaming and most 5G networks, designed to streamline cellular connectivity to the internet, which was now shown to be susceptible to tracking spyware.<\/p>\n<p>Related Articles<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">In the first operation uncovered by Citizen Lab, researchers logged more than 500 location-tracking attempts between November 2022 and 2025 across Thailand, South Africa, Norway, Bangladesh, Malaysia and several other African countries. The investigation began with a single subscriber: a Middle East businessman tracked methodically over four hours in an episode that opened the door to the broader pattern researchers later mapped: a company querying the international phone system on behalf of clients to follow targets.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">An Israeli carrier, 019Mobile, was used in the operation. According to information obtained by Haaretz, dozens of separate tracking attempts appear to have passed through 019&#8217;s servers &#8211; requests that did not look like legitimate communications but like surveillance. Every mobile network has a unique address \u2013 similar to a website address \u2013 that other telecom companies use to route calls and data traffic. Citizen Lab found that addresses registered to 019 were used to send location-tracking requests through Partner Communications, whose infrastructure 019 relies on. Another route passed through Exelera Telecom, an Israeli company that provides cloud and communications services, including an international undersea fiber-optic cable. Exelera did not respond to Haaretz&#8217;s request for comment.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">019Mobile&#8217;s head of security, Gil Nagar, denied any involvement, writing that the company is a virtual operator, selling service over another carrier&#8217;s network without running its own, and has no roaming agreements with foreign carriers. He said messages sent in its name would have been &#8220;rejected&#8221; in any case. Citizen Lab says whoever is behind the operation may have forged 019&#8217;s identity to gain access.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Although the Canadian researchers do not publicize the vendors behind the operations, they do flag several potential suspects &#8211; among them Cognyte, an Israeli-American company that provides similar services to government clients.<\/p>\n<p>Haaretz PodcastHow a Haaretz investigation into stolen Ukrainian wheat triggered a diplomatic crisis<\/p>\n<p>play<\/p>\n<p>Haaretz Podcast<\/p>\n<p>How a Haaretz investigation into stolen Ukrainian wheat triggered a diplomatic crisis<\/p>\n<p>Volume: 0.5<\/p>\n<p>X1<\/p>\n<p>total&#8211; : &#8211;time0:00<\/p>\n<p>fast forward15<\/p>\n<p>play<\/p>\n<p>rewind15<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Internal files obtained by Haaretz show that Cognyte&#8217;s parent company, Verint, sold a product called SkyLock &#8211; an SS7-based tracking tool &#8211; to a government client in the Democratic Republic of Congo.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">SkyLock uses the old roaming system to locate devices anywhere in the world. The files also show the company&#8217;s commercial ties with operators in Thailand, Malaysia, Indonesia, Vietnam and Congo &#8211; some of the same countries where the first tracking campaign was later identified. One of those operators, AIS Thailand, also appears as a source of traffic in that campaign.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Another operation is attributed to <a class=\"x1bvjpef x41m6fz xly1mqq x1k57tk5 x1i43xu1 xx6stda x15spe28 x1wntsoc xj69yco xfw692k xg830sg x13dflua xfagghw xz4gly6\" target=\"_router\" href=\"https:\/\/www.haaretz.com\/israel-news\/security-aviation\/2023-05-14\/ty-article-magazine\/.highlight\/global-surveillance-the-secretive-swiss-dealer-enabling-israeli-spy-firms\/00000188-0005-dc7e-a3fe-22cdf2900000\" referrerpolicy=\"no-referrer-when-downgrade\" rel=\"nofollow noopener\">Fink Telecom Services<\/a> \u2013 a Swiss company exposed by Haaretz and Lighthouse Reports in 2023 for supplying SS7-based tracking capabilities to surveillance firms, allowing them to ping the mobile network as if they were mobile providers. <\/p>\n<p><img data-chromatic=\"ignore\" alt=\"Russian shadow fleet vessel hit by a Ukrainian drone, near Malta.\" width=\"1238\" height=\"720\"  src=\"https:\/\/www.europesays.com\/iran\/wp-content\/uploads\/2026\/05\/hcjfw8oawaqhhbn.jfif.jpeg\"  decoding=\"async\" class=\"x1mraiob xxymvpz xt7dq6l x193iq5w xh8yej3 x1irir5p x1gq9eym\" loading=\"lazy\"\/>Haaretz national security<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Researchers say that newer mobile infrastructure, meant to prevent exactly this kind of abuse, is being exploited in a very similar way as the older system it was supposed to render obsolete. In fact, it shows how both the old and new signaling systems are being used in tandem to try to find people.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">One method includes deploying a technique that exploits vulnerabilities in SIM cards, showing how the firms and ghost operators are adapting their surveillance methods as telecom infrastructure evolves. The target phone receives a hidden text message containing a secret command that prompts the SIM card to transmit the device&#8217;s location \u2013 without the user&#8217;s knowledge and without leaving any visible trace on the phone.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Citizen Lab identified more than 15,700 such tracking attempts since late 2022. When Haaretz and Lighthouse Reports exposed Fink&#8217;s activity in 2023, it did not yet employ this technique, known as SIMjacking.<\/p>\n<p data-testid=\"rich-text\" class=\"x13faqbe x12ds5z6 x1rrzvkg x1txrjqu x115k1yo x126s5kd x1az39ph x1qxhirb xhhm3bp xjplvm8 x1ur7pbh\">Fink, Exelera Telecom, and Verint\/Cognyte did not respond. Partner told Haaretz that the company &#8220;has no connection to the current case and any attempt to link its name to it is mistaken.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"Israeli telecom infrastructure was used to track citizens in more than ten countries over the past three years,&hellip;\n","protected":false},"author":2,"featured_media":95574,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[2241,37],"class_list":{"0":"post-95573","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-israel","8":"tag-cyber-warfare","9":"tag-israel"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@iran\/116510726894515701","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/95573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/comments?post=95573"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/95573\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media\/95574"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media?parent=95573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/categories?post=95573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/tags?post=95573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}