{"id":84469,"date":"2018-06-17T12:18:12","date_gmt":"2018-06-17T16:18:12","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-06-02T15:35:17","modified_gmt":"2021-06-02T19:35:17","slug":"what-is-ss7","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/what-is-ss7\/","title":{"rendered":"What is SS7?"},"content":{"rendered":"<p><strong><a href=\"https:\/\/www.ibtimes.co.uk\/ss7-hack-cyber-thieves-exploit-worldwide-mobile-network-flaw-drain-bank-accounts-1620014\" target=\"_blank\" rel=\"ss7? what is noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"What is SS7?\" src=\"https:\/\/i0.wp.com\/d.ibtimes.co.uk\/en\/full\/1610657\/man-using-smartphone.jpg?resize=155%2C90&#038;ssl=1\" alt=\"What is SS7?\" width=\"155\" height=\"90\" \/><\/a>&#8211; Updated 10\/25\/2018 &#8211;\u00a0<\/strong>The <em><a href=\"https:\/\/www.nytimes.com\/2018\/10\/24\/us\/politics\/trump-phone-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">NYT<\/a><\/em> is reporting that <strong>China and Russia are\u00a0spying on Trump<\/strong> via his <strong>unsecured iPhone<\/strong>. <em>NYT<\/em> says that though intercepted calls, likely related to SS7 the Chinese have pieced together a list of the people with whom Mr. Trump regularly speaks in hopes of using them to influence the president, the officials said. Among those on the list are <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stephen_A._Schwarzman\" target=\"_blank\" rel=\"noopener noreferrer\">Stephen A. <strong>Schwarzman<\/strong><\/a>, the Blackstone Group\u00a0<span style=\"font-size: 16px;\">CEO, <\/span>and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Steve_Wynn\" target=\"_blank\" rel=\"noopener noreferrer\">Steve <strong>Wynn<\/strong><\/a>, the former Las Vegas casino magnate.<\/p>\n<p><a href=\"https:\/\/appleinsider.com\/articles\/18\/05\/22\/trump-uses-iphones-for-twitter-and-voice-calls-reportedly-refuses-security-swap-outs\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-116870\" title=\"Trump uses unsecure cell phone\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Trumpie_cell-e1622661973703-150x123.jpg?resize=110%2C90&#038;ssl=1\" alt=\"Trump uses unsecure cell phone\" width=\"110\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Trumpie_cell-e1622661973703.jpg?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Trumpie_cell-e1622661973703.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Trumpie_cell-e1622661973703.jpg?w=501&amp;ssl=1 501w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>A <a href=\"https:\/\/www.pcmag.com\/news\/364630\/china-to-avoid-spying-trump-should-swap-iphone-for-a-huawe\" target=\"_blank\" rel=\"noopener noreferrer\">number<\/a> of <a href=\"https:\/\/web.archive.org\/web\/20190410103319\/https:\/\/motherboard.vice.com\/en_us\/article\/598xyb\/what-is-ss7-and-is-china-using-it-to-spy-on-trumps-cell-phone\" target=\"_blank\" rel=\"noopener noreferrer\">outlets<\/a> <a href=\"https:\/\/arstechnica.com\/tech-policy\/2018\/10\/nyt-chinese-and-russian-spies-routinely-eavesdrop-on-trumps-iphone-calls\/\" target=\"_blank\" rel=\"noopener noreferrer\">are<\/a> <a href=\"https:\/\/www.wired.com\/story\/trump-iphone-security-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\">speculating<\/a> that the Chinese are using the known <strong>SS7 flaw<\/strong> to spy on the president&#8217;s iPhone.\u00a0 I have written about the problems with SS7 a <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=82827\" target=\"_blank\" rel=\"noopener noreferrer\">number<\/a> of\u00a0<a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=84446\" target=\"_blank\" rel=\"noopener noreferrer\">times<\/a>\u00a0since <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=81247\" target=\"_blank\" rel=\"noopener noreferrer\">2016<\/a> and now the chicken has come home to roost.<\/p>\n<p style=\"text-align: center;\">&#8212;<\/p>\n<p><strong>Trump<\/strong> recently <a href=\"https:\/\/www.wired.com\/story\/trum-kim-jong-un-direct-number-bad-idea\/\" target=\"_blank\" rel=\"noopener noreferrer\">bragged<\/a> that he gave the <strong>North Korean dictator<\/strong> his <strong>personal cell number<\/strong>. If that is true,\u00a0he has created a major <strong>national security exposure<\/strong>.\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/karsten-nohl-227b30115\/\" target=\"_blank\" rel=\"noopener noreferrer\">Karsten Nohl<\/a>, chief scientist at the firm <a href=\"https:\/\/srlabs.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Research Labs<\/a>, who researches cell network attacks told <em>Wired<\/em>,\u00a0 &#8220;<em>Absolutely that is a problem<\/em>.&#8221; He says hackers can\u00a0<a href=\"https:\/\/www.wired.com\/2016\/04\/the-critical-hole-at-the-heart-of-cell-phone-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer\">abuse flaws in Signaling System 7<\/a>\u00a0to listen in on someone&#8217;s phone calls, intercept their text messages, and track their location.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-116868\" title=\"North Korean intelligence isn't already tracking Trump's phones\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacker7-1-e1622660416629-150x84.jpg?resize=111%2C62&#038;ssl=1\" alt=\"North Korean intelligence isn't already tracking Trump's phones\" width=\"111\" height=\"62\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacker7-1-e1622660416629.jpg?resize=150%2C84&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacker7-1-e1622660416629.jpg?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacker7-1-e1622660416629.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 111px) 100vw, 111px\" \/>If <strong>North Korean intelligence<\/strong> isn&#8217;t already tracking Trump&#8217;s <a href=\"https:\/\/gizmodo.com\/report-trump-using-personal-cell-phone-a-lot-more-jus-1825488093\" target=\"_blank\" rel=\"noopener noreferrer\">phones<\/a> through malware, a direct phone number could give them a way in. The<a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=84446\" target=\"_blank\" rel=\"noopener noreferrer\"><strong> SS7 attacks<\/strong><\/a>\u00a0can give hackers relatively easy access to calls and texts, and location data.\u00a0<em>Wired<\/em> points out that\u00a0North Korea has proven itself as an <strong>adversary<\/strong> willing to hack and manipulate systems around the world for its <strong>financial or intelligence gain<\/strong>\u2014it was responsible both for the 2014\u00a0<a href=\"https:\/\/www.nytimes.com\/2014\/12\/31\/business\/media\/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html\" target=\"_blank\" rel=\"noopener noreferrer\">hack of Sony<\/a>\u00a0and 2017&#8217;s\u00a0<a href=\"https:\/\/www.engadget.com\/2017\/12\/18\/north-korea-wannacry\/\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry ransomware<\/a>\u00a0outbreak &#8211; SS7 hacking is likely no exception.<\/p>\n<p>The telecom industry and U.S.government have done <a href=\"https:\/\/web.archive.org\/web\/20190316142454\/https:\/\/motherboard.vice.com\/en_us\/article\/7x9q8y\/telecom-lobbyists-downplayed-theoretical-security-flaws-in-mobile-data-backbone\" target=\"_blank\" rel=\"noopener noreferrer\">very little to plug the SS7 hole<\/a>. Senator <a href=\"https:\/\/www.wyden.senate.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ron Wyden<\/a>, a Democrat from Oregon and a senior member of the <a href=\"https:\/\/www.intelligence.senate.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Senate Select Committee on Intelligence<\/a>, has been tracking the SS7 issue for several years. He has sent letters to <strong><a href=\"https:\/\/www.fcc.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">FCC<\/a> Chairman <a href=\"https:\/\/arstechnica.com\/tech-policy\/2018\/06\/ajit-pai-says-youre-going-to-love-the-death-of-net-neutrality\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ajit Pai<\/a><\/strong>, asking for <a href=\"https:\/\/web.archive.org\/web\/20190316142454\/https:\/\/motherboard.vice.com\/en_us\/article\/7x9q8y\/telecom-lobbyists-downplayed-theoretical-security-flaws-in-mobile-data-backbone\" target=\"_blank\" rel=\"noopener noreferrer\">answers<\/a> on SS7 security and details about how many network providers have been breached through SS7. Mr. Wyden wrote,\u00a0<em>\u201cI\u2019ve spent the past year fighting to reveal what a terrible job the telephone companies and FCC are doing at protecting Americans from being spied on, tracked, or scammed.&#8221;<\/em><\/p>\n<h3>Attackers used SS7 to get customer data<a style=\"color: #777777; text-decoration-line: none;\" href=\"https:\/\/www.commondreams.org\/news\/2018\/04\/06\/ajit-pais-fcc-doesnt-want-you-know-about-secret-deliberations-led-worst-video\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-116765\" title=\"FCC Chairman Ajit Pai\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ajit_pie-e1620783916945-150x134.jpg?resize=110%2C98&#038;ssl=1\" alt=\"FCC Chairman Ajit Pai\" width=\"110\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ajit_pie-e1620783916945.jpg?resize=150%2C134&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ajit_pie-e1620783916945.jpg?resize=75%2C67&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ajit_pie-e1620783916945.jpg?w=621&amp;ssl=1 621w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a><\/h3>\n<p>Mr. Wyden said he had been told by a big-name mobile network that <strong>malicious attackers<\/strong> are believed to have used <strong>SS7 to obtain US customer data.<\/strong> <a href=\"https:\/\/www.dhs.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">DHS<\/a> <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/05\/nefarious-actors-may-have-abused-routing-protocol-to-spy-on-us-phone-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">confirmed<\/a>\u00a0reports of &#8220;nefarious&#8221; types leveraging SS7 to spy on American citizens by targeting their calls, text messages, and other information.<\/p>\n<h3>So what is SS7?<\/h3>\n<p>The Signaling System 7 (SS7)\u00a0network is fundamental to <strong>cellphones operations<\/strong>, but its <strong>security design relies entirely on trust<\/strong>. The protocol <strong>does not authenticate messages<\/strong>; anyone with access to SS7 can send a routing message, and the network will make it. Now as SS7 network operators are opening the SS7 network to <strong>third-party access, <a href=\"http:\/\/whatis.techtarget.com\/definition\/vulnerability\">vulnerabilities<\/a> are being exposed and attacked<\/strong> initially by governments and now criminals.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright \" style=\"font-size: 16px;\" src=\"https:\/\/i0.wp.com\/web.archive.org\/web\/20170309035426\/https%3A\/\/hotforsecurity.bitdefender.com\/wp-content\/uploads\/2012\/09\/island-dispute-sets-off-chinese-cyber-attack-against-japan-19-japanese-websites-hit-300-targeted.png?resize=116%2C95&#038;ssl=1\" width=\"116\" height=\"95\" \/><\/p>\n<p>Since 1975, over <strong>800 telecommunications companies<\/strong> around the world use SS7 to ensure their networks interoperate. <a href=\"https:\/\/searchnetworking.techtarget.com\/definition\/Signaling-System-7\" target=\"_blank\" rel=\"noopener noreferrer\"><em>SearchNetworking.com<\/em><\/a> defines the Signaling System 7 (SS7) as an <strong>international telecommunications standard<\/strong> that describes how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.<\/p>\n<h3>SS7 control messages<\/h3>\n<p>SS7 control messages contain <strong>routing, congestion, and authentication information<\/strong>.<\/p>\n<ul>\n<li>SS7 routing deals with: How do I send a call to 313-555-1234?<\/li>\n<li>Congestion &#8211; What to do if the route to a network point is crowded.<\/li>\n<li>Authentication &#8211; Confirms that the caller is a valid subscriber and lets the call set up continue.<\/li>\n<\/ul>\n<p>They explain that SS7 consists of a set of reserved or dedicated channels known as signaling links. There are three kinds of <strong>network points signaling points<\/strong>:<\/p>\n<ul>\n<li><strong>Service Switching Points<\/strong> (SSPs) originate or terminate a call and communicate with SCPs to determine how to route a call or set up and manage some special feature.<\/li>\n<li><strong>Signal Transfer Points<\/strong> (STPs) are packet switches that route traffic on the SS7 network.<\/li>\n<li><strong>Service Control Points<\/strong> (SCPs) SCPs and STPs are usually mated so that service can continue if one network point fails.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.bustle.com\/articles\/86351-10-creepy-games-like-the-charlie-charlie-challenge-because-charlie-isnt-the-only-ghost-you-can\" target=\"_blank\" rel=\"cell noopener phones noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Cell phones\" src=\"https:\/\/i0.wp.com\/imgix.bustle.com\/lovelace\/uploads\/191\/23754280-e78e-0132-cef3-0e01949ad350.jpg?resize=160%2C107&#038;ssl=1\" alt=\"Cell phones\" width=\"160\" height=\"107\" \/><\/a>SS7 out-of-band signaling (control) information travels on a\u00a0separate, dedicated 56 or 64 Kbps channel and not within the same channel as the telephone call. Historically, the signaling for a telephone call has used the same voice circuit that the telephone call traveled on. Using SS7, <strong>telephone calls can be set up<\/strong> more efficiently and <strong>special service<\/strong>s such as call forwarding and wireless roaming service are easier to add and manage. SS7 is used for:<\/p>\n<ul>\n<li>Setting up and managing the connection for a call,<\/li>\n<li>Tearing down the connection when the call is complete<\/li>\n<li>Billing,<\/li>\n<li>Managing features such as:\n<ul>\n<li>call forwarding,<\/li>\n<li>calling party name and number display,<\/li>\n<li>three-way calling,<\/li>\n<li>Toll-free (800 and 888) and toll (900) calls<\/li>\n<li><strong>911 emergency service calls<\/strong> in the US, and,<\/li>\n<li>Other Intelligent Network (IN) services.<\/li>\n<\/ul>\n<\/li>\n<li>Wireless as well as wireline call service including:\n<ul>\n<li>Mobile telephone subscriber authentication,<\/li>\n<li>Personal communication service (PCS) and,<\/li>\n<li><strong>Roaming,<\/strong><\/li>\n<li><strong>SMS message<\/strong>s.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Within SS7, SMS messages are sent on the same channels and infrastructure as SS7 uses to control the core of the telephone networks.<\/p>\n<p>When an <strong>SMS message<\/strong> is sent from an SMS-capable cell phone, the message is <strong>handled no differently than a normal call setup<\/strong>: it moves from the cell phone to a base station to a Mobile Switching Center (MSC).<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20210423031616\/https:\/\/wwvremc.com\/content\/outage-texting\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-116869\" title=\"SMS message\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/texting-1.png?resize=76%2C110&#038;ssl=1\" alt=\"SMS message\" width=\"76\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/texting-1.png?resize=103%2C150&amp;ssl=1 103w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/texting-1.png?resize=52%2C75&amp;ssl=1 52w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/texting-1.png?w=515&amp;ssl=1 515w\" sizes=\"auto, (max-width: 76px) 100vw, 76px\" \/><\/a>From the mobile switching center, the SMS message moves inside the SS7 network to the Short Messaging Service Center (SMSC), a standard part of the network. The SMSC queries the Home Location Register (HLR) to find out where the recipient of the message is and whether he or she is switched on to receive a message. If not, the SMSC stores the message until it can be delivered.<\/p>\n<p><strong>Mobile Switching Center<\/strong> (MSC) \u2014 The MSC is the equivalent of the local switch inside the mobile network. It provides very similar services to a switch, but uses virtual circuits over radio channels instead of physical voice circuits. One variation on the MSC is the Gateway Mobile Switching Center (GMSC) which routes calls into and out of the network and will not have phones locally registered.<\/p>\n<p><strong>Visitor Location Register<\/strong> (VLR) \u2014 The VLR is the database attached to an MSC that keeps track of all the phones currently \u201cregistered\u201d to it, informing other nodes of status changes, and checking authentication information.<\/p>\n<p><strong>Short Message Service Center<\/strong> (SMSC) \u2014The SMSC is the clearinghouse for SMS messages on an SS7 network and provides store-and-forward services.<\/p>\n<p><strong>Home Location Register<\/strong> (HLR) \u2014 HLR is a core database that keeps track of subscribers. It contains information on the current account status and provides authorization information for billing. When a call or SMS is trying to reach a subscriber, this is the node that is queried to find out where in the network that subscriber actually is.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200110130214\/http:\/\/www.suun-cti.com.cn:80\/UploadFiles\/Resource\/WhitePaper\/Media-Signal\/Wp-SMS_Messg_SS7_Net_Opt_Rev_Mod_Comp.pdf\/\" target=\"_blank\" rel=\"architecture ss7 noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86702 size-full\" title=\"SS7 Architecture\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2018\/06\/SS7Architecture-e1622660739984.png?resize=480%2C215&#038;ssl=1\" alt=\"SS7 Architecture\" width=\"480\" height=\"215\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2018\/06\/SS7Architecture-e1622660739984.png?w=738&amp;ssl=1 738w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2018\/06\/SS7Architecture-e1622660739984.png?resize=75%2C34&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2018\/06\/SS7Architecture-e1622660739984.png?resize=150%2C67&amp;ssl=1 150w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Mr. Nohl <a href=\"https:\/\/web.archive.org\/web\/20190114203150\/https:\/\/motherboard.vice.com\/en_us\/article\/78k4vb\/cell-phone-network-flaws-can-help-spies-get-around-encryption-apps\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> Motherboard SS7 is, &#8220;probably the <strong>weakest link<\/strong> in our digital protection chain.&#8221; CTIA, the telecom lobbying arm, denies there is a problem with SS7. CTIA told DHS that the SS7 flaws are &#8220;perceived shortcomings.&#8221; They also said that talking about SS7 attacks is &#8220;<a href=\"https:\/\/www.documentcloud.org\/documents\/3897211-CTIA-Position-Paper-on-the-Department-of.html\" target=\"_blank\" rel=\"noopener noreferrer\">unhelpful<\/a>.&#8221;\u00a0CTIA, practicing &#8220;<strong>security through obscurity<\/strong>,&#8221; claimed that talking about the issues may help hackers.\u00a0<\/em><\/p>\n<p><em>This is a mess. <strong><a href=\"https:\/\/www.commoncause.org\/find-your-representative\/addr\/\" target=\"_blank\" rel=\"noopener noreferrer\">Contact your senator and representative in D.C.<\/a><\/strong> and tell them to support Senator Wyden, efforts to force the FCC to deal with the SS7 flaws.\u00a0<\/em><\/p>\n<p><strong>Related article<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.androidheadlines.com\/2018\/06\/ss7-network-bug-used-to-target-victims-bank-accounts.html\" target=\"_blank\" rel=\"noopener noreferrer\">SS7 Network Bug Used To Target Victims\u2019 Bank Accounts<\/a>\u00a0(<a href=\"https:\/\/www.androidheadlines.com\/\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android Headlines)<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Signaling System 7 (SS7) is key to cellphone operations, but its security relies on trust allows attackers to listen in on phone calls intercept text messages and track locations<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3046,3056,2099,306,2518,1536,67,3055,1780,3053,4,1384,2758,3054],"class_list":["post-84469","post","type-post","status-publish","format-standard","hentry","category-security","tag-3046","tag-ajit-pai","tag-authentication","tag-ctia","tag-dhs","tag-fcc","tag-hack","tag-karsten-nohl","tag-potus","tag-ron-wyden","tag-security","tag-sms","tag-ss7","tag-ted-lieu"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=84469"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84469\/revisions"}],"predecessor-version":[{"id":131999,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84469\/revisions\/131999"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=84469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=84469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=84469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}