By Vicki Batts
(NationalSentinel) There has been tremendous hub-bub about the rolling out of 5g, with many concerns about the potential health effects of bathing the worldâ€™s population in electromagnetic radiation.
Now, experts warn that there are other major safety concerns about 4g and 5g networks â€” namely, security. As it turns out, these networks have three major security flaws that can allow malicious actors to tap your phone calls, send fake text messages â€” and even trace your location.
These newly discovered flaws are the first known problems afflicting both 4g and 5g networks. Ironically, 5g was promoted as being more secure than generations past, but security researchers say the â€œbetterâ€ protections that were promised can be easily beaten with new attack methods. To make matters worse, the experts say anyone with a modicum of knowledge regarding cellular paging procedures can exploit these vulnerabilities.
Researchers fromÂ Purdue UniversityÂ and theÂ University of IowaÂ teamed up to put 4g and 5g networks to the test, and what they found was shocking: Even the supposedly more secure 5g network can still be exploited with relative ease.
Three major flaws were discovered: Torpedo, Piercer and IMSI Cracking are all attacks that malicious actors can carry out over these networks.
AsÂ Daily MailÂ reports, Torpedo â€œtakes advantage of a flaw in a networkâ€™s paging protocol,â€ and is the worst of the three attacks. Paging protocols make up the system which notifies phones of incoming texts and phone calls. By exploiting this vulnerability, attackers can track a victimâ€™s location.
Carrying out a Torpedo attack requires just a $200 device for placing the phone calls.
All an attacker has to do is place and cancel â€œa flurryâ€ of phone calls within a short span of time. This causes a paging message to be sent,Â withoutÂ alerting the target to an incoming call. From there, your location can be tracked by a malicious actor.
Torpedo also lets attackers hijack the paging channel, giving them room to inject fraudulent messages and deny phone calls. Engaging a Torpedo attack also paves the way for malicious actors to carry out two other attacks: Piercer and IMSI cracking.
AsÂ Tech CrunchÂ reports, Piercer â€œallows an attacker to determine an international mobile subscriber identity (IMSI) on the 4G network.â€ Meanwhile, IMSI-Cracking attacks â€œcan brute force an IMSI number in both 4G and 5G networks, where IMSI numbers are encrypted.â€
IMSI cracking allows for all kinds of snooping tactics â€” including tracking methods used by police (known as â€œstingraysâ€) to track a personâ€™s real-time location.
According to the researchers, all four major mobile carriers in the United States are vulnerable to these attacks. That includes AT&T, Sprint, T-Mobile and Verizon. With more advanced devices, attackers can even use these attacks to intercept phone calls and text messages.
Study co-author Syed Rafiul Hussain toldÂ Tech CrunchÂ in an email, â€œAny person with a little knowledge of cellular paging protocols can carry out this attack.â€
The team has since reported these vulnerabilities to GSMA, an organization that sets cellular standards for the telecom industry. According to reports, GSMA can fix the Torpedo and IMSI cracking vulnerabilities, but carriers will have to address the Piercer problem on their own.
5G has already been under immenseÂ scrutiny for the potential threatÂ it poses to human health; numerous studies have linked exposure to cellphone radiation to a myriad of adverse health effects. Now, it appears this â€œbetterâ€ network isnâ€™t even secure.
- A version of this story first appeared at NewsTarget.
Subscribe to ourÂ YouTube channel
Subscribe to ourÂ Brighteon channel
Sign up for ourÂ daily headlines newsletter
We’ve reduced the number of ads on our site to enhance the reader experience. Please support us by patronizing our remaining advertisers. Thanks!