Privacy. There is none. We paying for a service so we can keep in touch and communicate. It was supplied and set-up and is being used for further control and manipulation. They are using it, and it is ATT. I was just offered a job to monitor and control traffic using this protocol. The pay was $52.00 an hour. I would have taken the job, but after looking more into this technology, it is way above what I have experience to do. Also looking further into the technology uncovered what I am sharing. We are Set-up and will be used. I have done surveillance equipment that tracks anything transmitting, but this is something even more sinister. BE CAREFUL what you say and type across that cell. It is being tracked, listened to and used to control. ======================= Mobile privacy open to global cyber snooping from 'SS7 protocol' by Jason Murdock 17 Aug 2015 The security of global mobile phone networks has been called into question after a controlled hack showed how phone calls and text messages can be intercepted by cyber criminals. An experiment carried out for Australian TV programme 60 Minutes demonstrated a vulnerability in Signalling System Number 7 (SS7), a global system used by around 800 telecoms companies across the world to share mobile data while roaming. However, the system shows identifiable information, including a mobile phone's unique IMEI number, details of the account holder and the closest cell tower. The hack, which was given legal permission to take place, shows how German security consultant Luca Melette, working from Berlin, was able to intercept and record a mobile phone conversation and a text message exchange between 60 Minutes reporter Ross Coulthart and independent Australian senator Nick Xenophon. Using the SS7 network allowed the hacker to hear and record the conversation in real time and to 'geo-track' the movements of the participants via nearby cell towers. Xenophon, who also gave permission for the hack to take place, explained that he was shocked that the vulnerability existed and has called for a public inquiry. "It means anyone with a mobile phone can be hacked, can be bugged, can be harassed. The implications of it are enormous and what we find shocking is that the security services, the intelligence services, know about this vulnerability," he said. Coulthart explained that the scope of potential cyber attacks is growing as more people get access to SS7 protocols. "Historically, only large telecoms providers were allowed to query SS7 for subscriber data, but in recent years VoIP providers, smaller phone companies and numerous third-party SMS messaging services are now gaining access," he said. However, Coulthart warned that intelligence agencies may not want the SS7 vulnerability to be fixed. "It has long been speculated in security industry circles that the reason why countries like Australia and the US have not rushed to ensure the SS7 vulnerability is fixed is because the location tracking and call bugging capacity has been widely exploited by intelligence services for espionage," he said.