Surveillance Companies in the MENA Region
Circles Technologies
Circles Technologies was established in Israel in 2011. In 2014 Francisco Partner acquired and merged it with NSO that it had acquired in the same year in a deal of 250 million Dollars. Circles sells its product to governments exclusively. Among the most important service provided by the company is the ability to intercept communications and determining the geographical location of any mobile phone through only its phone number. The company promotes that this service can reach any mobile phone in 6 seconds only. Circles exploits Signaling System 7 (SS7) for determining the geographic locations of the targeted device and intercepting communications. SS7 is a protocol used by domestic and international communications companies and enables roaming through the mobile phone line. To exploit this protocol for spying on individuals Circles created a fake company in 2015 under the name Circles Bulgaria, to be able to use this protocol in surveillance. The company also exploit SS7 protocol to infect the targeted devices with malware. Both UAE and Morocco use Circles products. Some document filed during lawsuit litigated in Israel against both Circles and NSO Group have shown correspondence between Circles and many clients in UAE, among these is the Emirati Supreme Council of National Security.
Country of Origin
Israel, 2011
Company’s Branches
Bulgaria
Partner Companies
Works with governments
Software and Equipment
Circles Cloud
Type of Attack
SS7 attacks
Targeted Software
None
Functions
Targeting specific users
Targeted OS
Android، iOS
Countries
Morocco, UAE
Technical Specifications of Software and Equipment
Circles sells a system that enables its clients to attach this system to the infrastructure of their telecom companies, or to use a separate system called Circles Cloud, which is a system that connects to telecom companies around the globe. Circles works by exploiting Signaling System 7 (SS7) protocol, a protocol used to exchange information and routing phone calls among different wired and wireless telecommunications companies. It manipulates it for determining the geographic location of the targeted person’s phone. It can also intercept audio calls, and short text messages, which in case of being intercepted the two-factor authentication codes sent through SMSs can also be intercepted. The company determines the geographic location only by using the phone number, by determining the cellular cell the phone is connected to and its location.