Unsecured communication: 9 ways to listen to your phone

The mobile gadget today has transformed from a regular phone into a multifunctional device. It allows you to keep abreast of events, make financial transactions, make online purchases, communicate with friends, stay in touch with your family, and also solve important production tasks. It is not surprising that many people have a desire and need to record telephone conversations. The saved files may contain some valuable information or hidden threats, and may be used as evidence in a dispute or trial. Fortunately, modern smartphones are equipped with functional software. But if the built-in capabilities are not enough, you can use third-party applications.

SORM - official wiretapping

The most obvious way is official wiretapping by the state.

In many countries around the world, telephone companies are required to provide access to telephone wiretap lines to competent authorities. For example, in Russia, in practice, this is carried out technically through SORM - a system of technical means to ensure the functions of operational investigative measures.

Each operator is required to install an integrated SORM module on its PBX.

If a telecom operator has not installed equipment on its PBX to wiretap the phones of all users, its license in Russia will be revoked. Similar total wiretapping programs operate in Kazakhstan, Ukraine, the USA, Great Britain (Interception Modernization Program) and other countries.

The corruption of government officials and intelligence officers is well known to everyone. If they have access to the system in "god mode", then for the right price you can have it too. As in all state systems, the Russian SORM is a big mess and typically Russian carelessness. Most technical specialists actually have very low qualifications, which allows unauthorized connection to the system without the notice of the intelligence services themselves.

Telecom operators do not control when and which subscribers are listened to via SORM lines. The operator does not check in any way whether there is a court sanction to wiretap a particular user.

“You take a certain criminal case about the investigation of an organized criminal group, in which 10 numbers are listed. You need to listen to a person who has nothing to do with this investigation. You simply get this number and say that you have operational information that this is the number of one of the leaders of a criminal group,” say knowledgeable people from the website “Agentura.ru”.

Thus, through SORM you can listen to anyone on “legal” grounds. This is such a secure connection.

Does the operator keep records of calls that have already been made?

A couple of years ago, for security reasons, the Russian government issued a law on storing citizens’ data on the servers of operators and providers. They can be stored for no more than 6 months from the date of recording.

This period applies to all providers and operators that provide their services in Russia. The servers are configured in such a way that upon expiration of the storage period, user information (conversations, messages) will be deleted automatically. The law also applies to large media companies: Yandex, Mail.ru, Rambler.

Despite this, ordinary subscribers cannot obtain this data under any pretext. Only law enforcement agencies have the right to do this in case of offenses. There are several foreign companies in the register of obligated companies – WeChat, Opera. But not on the list such as Instagram, Twitter, Facebook. These companies may store data from Russian users, but it is not accessible to Russian government agencies.

There is also a list of all government agencies that have the right to learn about user conversations:

  • FSIN,
  • Customs Service;
  • FSO,
  • Ministry of Internal Affairs,
  • FSB.

Based on this, users have a completely fair question: how to protect themselves from wiretapping. The answer to this is quite predictable - you need to stop using popular services in favor of secure communication tools. Calls made to any phone cannot be secure. To do this, you can use instant messengers - WhatsApp, Telegram. There is also a good alternative to the Yandex and Google search engines - DuckDuckGo.

This is one of the few search engines that does not track the user, does not collect information about his preferences and does not offer a lot of advertising according to his preferences.

This may be useful: How to enter an extension number from a mobile and landline phone.

Wiretapping through an operator

Cellular operators generally look at the call list and movement history of a mobile phone, which is registered in various base stations according to its physical location, without any problems. To obtain call records, like the intelligence services, the operator needs to connect to the SORM system.

According to new Russian laws, operators will be required to store audio recordings of all users’ conversations from six months to three years (the exact period is currently being negotiated). The law comes into force in 2018.

How to listen to a call recording in Android

Some Android mobile devices have a built-in recording function. It can be found on the screen during a call. The button is labeled “Record,” and pressing it turns on the internal voice recorder, which records sound in software.

To check its presence on your phone, you need to make a call and pay attention to the panel with buttons. In most countries, this built-in program is prohibited. Therefore, many developers do not add it to mobile devices.

If there is no call recording on your phone, use special applications for this. You can download Cube ACR from the Play Market. After installing it, the user will be able to save conversations on the phone, record calls in Skype, WhatsApp, Viber and other instant messengers.

After installation, a button will appear on the screen for any call. By clicking it, you can save the perfect conversation on your phone and listen to it after the conversation. Sound files can be stored separately on a remote virtual storage.

This is interesting: how to check if someone is following me on the phone.

Connection to the SS7 signal network

Knowing the victim's number, it is possible to wiretap the phone by connecting to the cellular operator's network through vulnerabilities in the SS7 signaling protocol (Signaling System No. 7).

Security experts describe the technique this way.

The attacker infiltrates the SS7 signaling network, in the channels of which it sends a service message Send Routing Info For SM (SRI4SM), indicating as a parameter the telephone number of the attacked subscriber A. In response, the home network of subscriber A sends the attacker some technical information: IMSI (international subscriber identifier) and the address of the MSC switch that is currently serving the subscriber.

Next, the attacker, using the Insert Subscriber Data (ISD) message, inserts an updated subscriber profile into the VLR database, changing the address of the billing system in it to the address of its own, pseudo-billing system. Then, when the attacked subscriber makes an outgoing call, his switch turns instead of the actual billing system to the attacker's system, which gives the switch a directive to redirect the call to a third party, again controlled by the attacker. On this third party, a conference call of three subscribers is assembled, two of which are real (caller A and caller B), and the third is unauthorized by the attacker and can listen and record the conversation.

The scheme is quite working. Experts say that when the SS7 signaling network was developed, it did not contain mechanisms to protect against such attacks. It was assumed that this system was already closed and protected from connection from the outside, but in practice an attacker could find a way to join this signaling network.

You can connect to the SS7 network in any country in the world, for example in a poor African country, and you will have access to switches from all operators in Russia, the USA, Europe and other countries. This method allows you to listen to any subscriber in the world, even on the other side of the globe. Interception of incoming SMS from any subscriber is also carried out simply, as well as transferring a balance via a USSD request.

Is it possible to wiretap using the Internet?

Some kind of remote wiretapping of your wife’s phone via the Internet is impossible. Although many services claim the opposite. Most often, these are fraudulent services whose task is to siphon money from the pockets of gullible people into the pockets of the owners. Also, you should not respond to advertisements from people promising to gain access to any handsets without the help of software - only special services that have an entire arsenal of special equipment and access to the switchboards of cellular operators are capable of this.

Connection to cable

From the documents of Edward Snowden, it became known that intelligence services not only “officially” listen to phones through communication switches, but also connect directly to the optical fiber, recording all traffic in its entirety. This allows you to listen to foreign operators who do not allow you to officially install listening equipment on their telephone exchanges.

This is probably a fairly rare practice for international espionage. Since PBXs in Russia already have listening equipment everywhere, there is no particular need to connect to fiber optics. Perhaps it makes sense to use this method only for intercepting and recording traffic on local networks at local PBXs. For example, to record internal conversations in a company, if they are carried out within a local PBX or via VoIP.

How to enable call recording on your phone

Some Android mobile phones have a built-in voice recorder for recording phone calls. However, not every model has this function, since in many countries it is prohibited by law to record conversations.

You can check if your phone has a call recording option as follows:

  1. Call the desired number or answer the call.
  2. During a call, open the conversation menu.
  3. See if there is a “Record” or “Record” button there.
  4. If there is such an option, click on it. After the call ends, the audio file will be saved in the device memory.

Installing a spy Trojan

At the everyday level, the easiest way to listen to a user’s conversations on a mobile phone, in Skype and other programs is to simply install a Trojan on his smartphone. This method is available to everyone; it does not require the powers of government intelligence agencies or a court decision.

Abroad, law enforcement agencies often purchase special Trojans that use unknown 0day vulnerabilities in Android and iOS to install programs. Such Trojans are developed by companies like Gamma Group (FinFisher Trojan) at the request of law enforcement agencies.

For Russian law enforcement agencies, there is little point in installing Trojans, unless they need the ability to activate a smartphone’s microphone and record, even if the user is not talking on a mobile phone. In other cases, SORM does an excellent job of wiretapping. Therefore, Russian intelligence services are not very active in introducing Trojans. But for unofficial use it is a favorite hacking tool.

Wives spy on their husbands, businessmen study the activities of competitors. In Russia, Trojan software is widely used for wiretapping by private clients.

The Trojan is installed on a smartphone in various ways: through a fake software update, through an email with a fake application, through a vulnerability in Android or in popular software like iTunes.

New vulnerabilities in programs are found literally every day, and then they are closed very slowly. For example, the FinFisher Trojan was installed through a vulnerability in iTunes, which Apple did not close from 2008 to 2011. Through this hole, it was possible to install any software on behalf of Apple on the victim’s computer.

It is possible that such a Trojan is already installed on your smartphone. Have you ever felt like your smartphone battery has been draining a little faster than expected lately?

Possible consequences of wiretapping

Some wives and husbands misinterpret the provisions of the law on the secrecy of correspondence and telephone conversations, rightly believing that they have every right to such actions. In fact, this is not so - if wiretapping is discovered, the wife can sue her own husband, and she most likely wins the case (a technical examination of the smartphone will help to collect evidence).

Moreover, there are factors indicating wiretapping:

  • The smartphone battery began to discharge a couple of times faster than before.
  • Traffic leakage – conversations take little, but regular sending of photos can raise suspicions.
  • Some errors began to appear on the phone - this is due to possible malfunctions in the operation of spy applications.

If you have any doubts, hand over your smartphone to experts who can easily detect the installed software. Therefore, before wiretapping your own wife’s phone, we recommend that you think twenty times about the consequences - going to court will lead to the imposition of a substantial fine or imprisonment.

According to Art. 138 of the Criminal Code of the Russian Federation, violation of the secrecy of correspondence, telephone conversations, postal, telegraph or other messages of citizens is punishable by fines of up to 80 thousand rubles (or up to six salaries or other income of the convicted person), or correctional labor for up to one year. If, due to your official position, it is possible to use technical means, the fine increases to 300 thousand rubles (or the amount of wages for a period of up to two years), and arrest for up to four months is also possible.

Prosecution under Art. 137 of the Criminal Code of the Russian Federation - on violation of privacy. And a good lawyer hired by his wife for legal proceedings will easily bring additional articles of the Criminal Code of the Russian Federation into the case, which will only increase the chances of going to jail. We recommend that you think about the possible consequences and advisability of wiretapping.

We must not forget about the ethical side of the issue of listening - it is ugly towards your other half.

Application update

Instead of installing a special spy Trojan, an attacker can do an even smarter thing: choose an application that you yourself voluntarily install on your smartphone, after which you give it full authority to access phone calls, record conversations and transfer data to a remote server.

For example, it could be a popular game that is distributed through “left” mobile application catalogs. At first glance, it’s an ordinary game, but with the function of wiretapping and recording conversations. Very comfortably. The user manually allows the program to access the Internet, where it sends files with recorded conversations.

Alternatively, malicious application functionality may be added as an update.

How to get a copy of a conversation that has already been made on Beeline

After dialing the help desk of any Russian mobile operator, we hear a notification that the telephone conversation may be recorded for security purposes. This gives subscribers hope that they can find their conversations with other interlocutors through any services or subscriptions.

And such an opportunity really exists, but you need to connect it first. Until this point, old calls were not recorded. And you won't be able to hear them.

You can find out more about the functions of this service by calling toll-free number 8. You can also connect it online on the Beeline website page if you log in using your mobile number and login information.

Individuals and corporate clients can use the call recording service. In addition, the service gives access to information about the statistics of calls to certain numbers. Therefore, you can easily listen to a recording of a telephone conversation that has already been made previously.

Fake base station

A fake base station has a stronger signal than a real base station. Due to this, it intercepts subscriber traffic and allows you to manipulate data on the phone. Fake base stations are known to be widely used by law enforcement agencies abroad.

In the USA, a model of fake BS called StingRay is popular.


1 / 0


2 / 0

And it's not just law enforcement agencies that use such devices. For example, merchants in China often use fake BS to send mass spam to mobile phones that are located within a radius of hundreds of meters around. In general, in China the production of “fake honeycombs” has been ramped up, so in local stores it is not a problem to find such a device, assembled literally on your knees.

Is it possible to record calls in MTS?

The mobile operator MTS Russia offers subscribers a useful service, after which it will be possible to hear a telephone conversation that you made in the past. To connect to this service, you need to use the mobile application.

Find it in the list or visit the MTS website and log into your personal account. Minimum cost – 0.90 rub. For 5,000 minutes, which is quite enough for subscribers. Before connecting, it is recommended to consult with a support operator. This can also be done on the website or app.

To communicate with a consultant, select the link at the bottom of the service window. You can ask any questions you may have in the chat. You can connect up to 500 thousand minutes per month. Mostly this package of services is ordered by large companies, where it is necessary to monitor the level of quality of customer service by employees.

Mobile complex for remote wiretapping

In this case, the radio antenna is installed close to the subscriber (operates at a distance of up to 500 meters). A directional antenna connected to the computer intercepts all phone signals, and when the work is completed, it is simply taken away.

Unlike a fake femtocell or Trojan, here the attacker does not have to worry about getting into the site and installing a femtocell, and then removing it (or removing the Trojan without leaving any traces of hacking).

The capabilities of modern PCs are enough to record a GSM signal on a large number of frequencies, and then crack the encryption using rainbow tables (here is a description of the technique from a well-known specialist in this field, Carsten Nohl).

If you voluntarily carry a universal bug with you, you automatically collect an extensive dossier on yourself. The only question is who will need this dossier. But if he needs it, he can get it without much difficulty.

Applications for recording conversations on Android

You can also save the conversation using third-party apps. However, it is worth warning that recording telephone conversations is permitted in the Russian Federation only with the consent of the subscriber, and the saved dialogue can only be used for personal purposes.

If you don't want to use carriers and don't have built-in recording functionality, download one of the following apps.

Voice Recorder Pro

  • Cost: Free
  • Version: For Android 4.1+

Voice Recorder Pro is one of the best call recording apps. First of all, this utility has a simple and beautiful interface. All necessary functions are located in the form of tabs at the top of the screen.

This application offers many settings and options. It supports both stereo and mono recording. You can also change the bitrate. There are four different audio formats that can also be selected for recording. However, the developer notes that the application may not work on some devices.

Google Voice

  • Cost: Free
  • Version: For Android: 5.0+

Google Voice is an Internet service that uses voice transmission over the VoIP protocol. To record a call using this utility, you need to press the “Menu” button, then go to “Settings”, and in the “Calls” section enable “Recording incoming calls”. Please note that you can only record incoming calls with this app.

MobileTool program

The application for recording telephone conversations MobileTool is an analogue of Talklog. But the cost of its services is lower. And it also has a free trial period.

Be careful, genuine call tracking apps offer a free trial period. If payment is required in advance, you most likely have contacted scammers.

Once MobileTool is installed on your mobile phone, it provides the following functions:

  • In the application, you can record telephone conversations and send the recording file to your MobileTool personal account;
  • Record your surroundings (activate the voice recorder);
  • Monitor mobile browser activities;
  • Enable/disable data transfer (mobile Internet);
  • Receive MMS and SMS messages in your personal account;
  • Hide your presence on the phone;
  • The application does not use mobile traffic for its purposes. Data transfer is carried out only via Wi-Fi.

And its main advantage is the price - 0.5 dollars per day. And you can use Demo MobileTool (free period) for three whole days. The MobileTool mobile application and its description are available on 4PDA.

The application is distributed in two versions: Stabile and Root . The first is a standard program for all devices with Android 2.3 and higher. The second is for rooted (jailed) phones. Root version offers users more features.

Rating
( 2 ratings, average 5 out of 5 )
Did you like the article? Share with friends:
For any suggestions regarding the site: [email protected]
Для любых предложений по сайту: [email protected]