“Rogue telephone masts which can listen to mobile phone conversations without the owner’s permission are being operated in Britain, it has been disclosed . . . ” – http://www.telegraph.co.uk

A US Congressman has learned first-hand just how vulnerable cellphones are to eavesdropping and geographic tracking after hackers were able to record his calls and monitor his movements using nothing more than the public ten-digit phone number associated with the handset he used.. “
Published on April-18-2016 – http://arstechnica.com


“Angry and Embarrassed, France summoned the U.S. ambassador Wednesday to respond to the revelations by WikiLeaks that the U.S. National Security Agency eavesdropped on three successive French presidents and other top officials. “ – http://www.zerohedge.com

“The Washington Post noted that surveillance agencies and private companies are increasingly deploying “IMSI catchers,” also referred to as StingRays, which enable users to send fake text messages, inject malware into targeted phones, and intercept the content of various forms of cellphone-based communications.” – https://www.wsws.org

“No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.”

Universal Declaration of Human Rights, 1948

As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage and often exposed to cybercriminal activities. Some individuals and organizations are exposed to high risk of phone hacking and tapping by private companies or foreigner gov agencies

Different sophisticated methods of eavesdropping exist (fake base stations, dedicated API shared by mobile operators, installed software or spyware on the targeted phone, etc.). The cost of simple spy software is very low and easily accessible.