Star 0

Abstract

Every cellular network relies on the SS7 network for billing and user location purposes. It was designed without a comprehensive threat model in mind, and there are significant vulnerabilities which can be exploited. The radio frequencies can also be manipulated in ways that compromise the networks. The SS7 and RF vulnerabilities combined represent significant risks for global mobile users.