Israeli telecom networks used for mass surveillance across countries
Al Mayadeen | May 4, 2026
A probe by the digital research group Citizen Lab has uncovered that telecommunications infrastructure owned by Israeli companies has been weaponized to track citizens in more than 10 countries over the past three years, exploiting decades-old network protocols and modern 5G systems to transform them into sophisticated tracking devices.
According to a report published by the Israeli news outlet Haaretz, the investigation revealed that infrastructure ranging from legacy networks built in the 1970s to the latest 5G systems has been repurposed into surveillance tools using advanced spyware programs. Since November 2022, over 15,700 attempts to pinpoint phone locations have been detected across numerous countries, including Thailand, South Africa, Norway, Bangladesh and Malaysia, all routed through the networks of “Israel”-based telecommunications firms.
The findings raise serious questions about “Israel’s” role in the global surveillance industry, as the very infrastructure designed to connect people has been turned into a mechanism for tracking them without their knowledge or consent.
Internal documents cited by Haaretz revealed that Verint, the parent company of Cognyte, sold an SS7-based location tracking system called SkyLock to a government client in the Democratic Republic of Congo.
The SS7 protocol, originally developed to route calls and texts, support international roaming, and enable interoperability between mobile operators, has been systematically exploited for surveillance purposes.
The investigation also found that Fink, a Swiss telecommunications company, enabled Israeli surveillance firms such as Rayzone to impersonate legitimate cellular carriers and connect to older mobile networks. This allowed the firms to track users worldwide by abusing the SS7 signaling protocol.
The exploitation was not limited to legacy systems. Next-generation Diameter protocols, which manage 4G and 5G networks, were also compromised, according to the findings. One particularly notable method identified was SIMjacking, where a hidden text message sent to a target device forces the SIM card to reveal its location without the user ever seeing the message.
The phone-tracking operations were carried out through the networks of Israeli telecom companies 019Mobile and Partner Communications. 019Mobile responded by stating that it is a virtual operator and that its identity may have been impersonated, denying any involvement in tracking activities.
No immediate responses were received from Fink, Partner Communications, Exelera Telecom, Cognyte, or Verint.
The investigation exposes a disturbing reality: Israeli telecommunications technology, sold and deployed around the world, is not merely passive infrastructure but has been deliberately weaponized for mass surveillance.
The involvement of major Israeli firms in selling tracking systems to authoritarian governments, and the exploitation of global telecom networks by Israeli surveillance companies, points to a systematic pattern rather than isolated incidents.
As the US-Israeli war on Iran continues to dominate headlines, the international community has once again turned a blind eye to “Israel’s” role as a global leader in surveillance and cyber-weapons. From Pegasus spyware to SS7 exploits, Israeli technology has been used to track journalists, activists, and ordinary citizens across multiple continents.
Sorry, the comment form is closed at this time.

