Ghost Operators: How Israeli Telecoms Were Exploited to Track Citizens Worldwide

2026-05-03 12:34

Singapore’s public sector still treats telecom infrastructure as a trusted dependency in too many threat models. This class of surveillance bypasses endpoint controls, MDM baselines, and most user awareness programmes because the compromise sits inside roaming and signalling relationships that governments implicitly inherit from carriers and upstream providers. That creates a blind spot for officials travelling regionally with government-issued devices, especially in ASEAN states where telecom security governance and lawful intercept controls vary sharply.

The operational lesson is that 5G migration did not retire inherited trust assumptions from SS7-era architecture. It expanded the attack surface into more software-defined and globally interconnected control planes. Procurement and third-party assurance for telecom interconnects now belongs in national cyber resilience planning alongside cloud and identity infrastructure, because location intelligence derived from signalling abuse is enough to map sensitive meetings, procurement activity, and diplomatic engagement patterns without ever touching a device payload.