Aside from the phone actually spying on it's users, metadata correlation, network, tringualtion, isp..

Invisible Infrastructures : Surveillance Architecture
https://labs.rs/en/invisible-infrastructures-surveillance-achitecture/

let’s start from the beginning and explain the way a device connects to a network, or rather how it authenticates itself on the network. For the purpose of authentication the device uses 2 ID numbers, the first one is the device’s IMEI number (International Mobile Station Equipment Identity), and the SIM card’s IMSI number (International Mobile Subscriber Identity). Both numbers are unique and predefined for every device/SIM card. The mobile carriers have an infrastructures of Base Stations (BS) that are geographically distributed throughout the area that’s being served by the operator

Reply via email to