www.helpnetsecurity.com Open in urlscan Pro
44.241.182.52  Public Scan

URL: https://www.helpnetsecurity.com/2022/07/13/weaponizing-smartphone-location-data-battlefield/
Submission: On July 28 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

Name: searchformGET https://www.helpnetsecurity.com/

<form id="searchform" name="searchform" class="searchform" method="get" action="https://www.helpnetsecurity.com/" role="form">
  <div class="input-group">
    <input type="search" name="s" id="headerSearchField" class="form-control" placeholder="What are you looking for?" aria-label="Search" value="" tabindex="1">
    <span class="input-group-append">
      <button class="btn btn-search input-addon-item" type="submit" id="headerSearchSubmit" tabindex="2"><svg class="hic">
          <use xlink:href="#hic-search"></use>
        </svg></button>
    </span>
  </div>
</form>

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-195955 mc4wp-ajax" method="post" data-id="195955" data-name="Bottom of the posts Exp_04">
  <div class="mc4wp-form-fields">
    <center><img src="https://img.helpnetsecurity.com/wp-content/uploads/2021/08/05092721/newsletters-head.jpg"></center>
    <br>
    <div class="form-check pb-2">
      <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
      <label class="form-check-label" for="mcs1">
        <b>Daily Newsletter</b> - E-mail sent every business day with a recap of the last 24 hours </label>
    </div>
    <div class="form-check pb-2">
      <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
      <label class="form-check-label" for="mcs2">
        <b>Weekly Newsletter</b> - E-mail sent every Monday with a recap of the last 7 days </label>
    </div>
    <div class="form-check pb-3">
      <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
      <label class="form-check-label" for="mcs3">
        <b>(IN)SECURE Magazine</b> - E-mail sent when a new issue is released </label>
    </div>
    <p></p>
    <p>
      <label>
        <input name="AGREE_TO_TERMS" type="checkbox" value="1" required=""> <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener">I have read and agree to the terms &amp; conditions</a>
      </label>
    </p>
    <div class="input-group">
      <input type="email" name="email" id="email" class="form-control border-danger" placeholder="Please enter your e-mail address" required="">
      <div class="input-group-append">
        <button class="btn btn-danger rounded-0" type="submit">Subscribe</button>
      </div>
    </div>
    <br>
    <hr>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1659007211"><input type="hidden" name="_mc4wp_form_id" value="195955"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle
upmagazine plus

The global average cost of a data breach reaches an all-time high of $4.35
million

 * News
 * Features
 * Expert analysis
 * Videos
 * Reviews
 * Events
 * Reports
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 
 * (IN)SECURE Magazine



Mike Fong, CEO, Privoro
July 13, 2022
Share


THE WEAPONIZING OF SMARTPHONE LOCATION DATA ON THE BATTLEFIELD



For soldiers on the battlefield, the act of turning on one’s smartphone has been
described as the digital equivalent of lighting a cigarette, as doing so creates
a signal about one’s location that can be picked up by the enemy. Despite this,
smartphones have played a meaningful role in recent conflicts, including
Russia’s invasion of Ukraine, where the devices have been used for communicating
in the event of radio failure, disseminating on-the-ground footage to counter
propaganda and maintaining morale by staying in touch with family and friends.
How each side collects the adversary’s smartphone location data and shields
their own can mean the difference between victory and defeat.




HOW SMARTPHONE LOCATION DATA IS OBTAINED

For a country at war, monitoring the cellular networks in the conflict zone
provides the most comprehensive view of mobile device activity. But before the
conflict even begins, the nation can identify phones of interest, including the
devices belonging to soldiers.

Because mobile app location data is often sold to commercial data brokers and
then repackaged and sold to individual customers, a country can access such a
database and then pick out the phones likely belonging to soldiers. Such devices
will ping regularly in the locations of known bases or other military
facilities. It’s even possible to identify the owner of a device by tracking the
phone to its home address and then referencing publicly available information.

A country can also use information obtained from one or more data breaches to
inform their devices of interest. The T-Mobile breach in 2021 demonstrated how
much customer data is in the hands of a mobile operator, including a phone’s
unique identifier (IMEI) and its SIM card’s identifier (IMSI).

Spies can also physically monitor known military sites and use devices known as
IMSI catchers – essentially fake cell towers – to collect phone data from the
phones in the vicinity. The Kremlin reportedly did this in the UK, with GRU
officers gathering near some of the UK’s most sensitive military sites.

When a phone of interest appears on the monitored mobile network, the country
can keep a close eye on the device’s location and other cellular data. The
presence of two or more such devices in close proximity indicates that a mission
may be taking place.

In addition to monitoring cell networks, a nation at war can utilize IMSI
catchers on the battlefield to gather phone data for the purposes of locating
and identifying devices. Location can be determined by triangulating signal
strengths from nearby cell towers or by pinging a targeted device’s GPS system.
Russia’s Leer-3 electronic warfare system, which consists of two drones
containing IMSI catchers along with a command truck, can locate up to 2,000
phones within a 3.7-mile range.

To counter these location-finding drones, an opposing nation may jam a drone’s
GPS signal, using a radio emitter to block the drone from receiving GPS signals.
The country can also try GPS spoofing, employing a radio transmitter to corrupt
the accuracy of the drone’s reported location. To counter such spoofing, systems
for validating GPS signals have been deployed on the battlefield. In the larger
picture, the corruptibility of GPS data has forced some nations to build their
own geopositioning systems. For the US, M-Code serves as a military-only GPS
signal that is both more accurate and provides anti-jamming and anti-spoofing
capabilities.

Spyware is a more targeted approach to obtaining location data. It can be
delivered over the cell network (via a malicious carrier update) or through an
IMSI catcher. It’s also not uncommon for operators to pose as single women on
social media sites to lure soldiers into downloading a malicious app. Hamas has
reportedly used this tactic many times against Israeli soldiers. Such spyware
can capture a device’s real-time location, among other capabilities.


THE RISKS OF CAPTURED SMARTPHONE LOCATION DATA

Of all the signals given off by smartphones in the normal course of operation,
location data is perhaps the most valuable during battle. Unlike captured
conversations or call metadata, location data is actionable immediately.
Location data can reveal troop movements, supply routes and even daily routines.
A cluster of troops in a given location may signal an important location.
Aggregated location data can also reveal associations between different groups.

The obvious risk to soldiers is that their location data can be used by the
enemy to direct targeted attacks against them. Notably, it has been reported
that a Russian general and his staff were killed in an airstrike in the early
weeks of the invasion after his phone call was intercepted and geolocated by the
Ukrainians.

Short of lethal strikes, location data can be used to inform a country’s
strategy. For example, Russia’s phone data-collecting drone flights over Poland
and the Baltic states in 2017 suggested to military experts that the country was
trying to monitor troop levels at NATO’s new bases to see if there were more
forces present there than the alliance had disclosed publicly.


SMARTPHONE LOCATION DATA COUNTERMEASURES

To counter the capture of location data from soldiers’ smartphones, many
countries have understandably banned the presence of these devices on the
battlefield. In 2019, for instance, Russia’s parliament unanimously voted to ban
smartphones and tablets from being used by on-duty armed forces.

However, banning mobile device usage by soldiers who have never known a world
without smartphones has its limitations. Since the invasion began, there have
been multiple instances of Russian commanders confiscating their subordinates’
personal phones for fear that they would unwittingly give away the locations of
their units.

Short of an outright ban, soldiers may be encouraged to mind their SIM cards.
Ukrainian soldiers have been advised to obtain a SIM card in the conflict zone,
which helps shield a device’s identity. During the war in Afghanistan, some top
Taliban leaders played SIM card roulette, randomly distributing SIM cards at
frequent intervals to elude American trackers.

Soldiers are also advised to shield their true locations when smartphones are
used. Ukrainian soldiers, for example, are instructed to walk at least 1,600
feet away from their squad position in order to make a phone call, ideally to an
area with many civilians. Soldiers can also use a Faraday case to cloak their
direction of travel, first heading in the wrong direction before placing their
phone in the case. Using a Faraday case is a safer option than turning off the
phone, as powering off is a signal in its own right that can invite additional
scrutiny, and as the phone may have been hacked to appear to be off when it’s in
fact still on and transmitting signals to the enemy.


WHAT’S AT STAKE

Smartphones are so ubiquitous that their presence on the battlefield is
inevitable, even when they’ve been prohibited or otherwise discouraged from use
due to lethal consequences. But each location ping gives the enemy another
signal that may ultimately culminate in a targeted missile strike or an improved
defensive posture. The side that can best fight this information battle very
likely has the upper hand in winning the war.




Daily Newsletter - E-mail sent every business day with a recap of the last 24
hours
Weekly Newsletter - E-mail sent every Monday with a recap of the last 7 days
(IN)SECURE Magazine - E-mail sent when a new issue is released



I have read and agree to the terms & conditions

Subscribe


--------------------------------------------------------------------------------

Leave this field empty if you're human:



More about
 * Audax Private Equity
 * data
 * data security
 * Israel
 * mobile devices
 * opinion
 * Privoro
 * smartphone
 * smartphones
 * war

Share this

FEATURED NEWS

 * The future of attack surface management (ASM)
 * The global average cost of a data breach reaches an all-time high of $4.35
   million
 * Israel’s new cyber-kinetic lab will boost the resilience of critical
   infrastructure

Find out why developers love Pentest as a Service (PtaaS)


WHAT'S NEW


THE FUTURE OF ATTACK SURFACE MANAGEMENT (ASM)


ONLY 25% OF ORGANIZATIONS CONSIDER THEIR BIGGEST THREAT TO BE FROM INSIDE THE
BUSINESS


84% OF ORGANIZATIONS EXPERIENCED AN IDENTITY-RELATED BREACH IN THE PAST 18
MONTHS


1 IN 3 EMPLOYEES DON’T UNDERSTAND WHY CYBERSECURITY IS IMPORTANT




DON'T MISS


THE FUTURE OF ATTACK SURFACE MANAGEMENT (ASM)


THE GLOBAL AVERAGE COST OF A DATA BREACH REACHES AN ALL-TIME HIGH OF $4.35
MILLION


ISRAEL’S NEW CYBER-KINETIC LAB WILL BOOST THE RESILIENCE OF CRITICAL
INFRASTRUCTURE


ORGANIZATIONS ARE STRUGGLING WITH SAAS SECURITY. WHY?


TARGETED CAMPAIGN USES INFOSTEALER TO HIJACK FACEBOOK BUSINESS ACCOUNTS


Follow us
 * Features
 * News
 * Expert Analysis
 * Reviews
 * Events
 * Reports
 * Whitepapers
 * Industry news
 * Newsletters
 * Product showcase
 * Twitter

IN CASE YOU’VE MISSED IT

 * Israel’s new cyber-kinetic lab will boost the resilience of critical
   infrastructure
 * The infosec investment landscape: Which tech gets the most bucks?
 * Who are the best fraud fighters?
 * Dealing with threats and preventing sensitive data loss

(IN)SECURE MAGAZINE ISSUE 72 (JULY 2022)

 * 7 threat detection challenges CISOs face and what they can do about it
 * How to set up a powerful insider threat program
 * An offensive mindset is crucial for effective cyber defense

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise
×