{
	"id": "8373096f-29ad-4894-9cff-89d52a516c5d",
	"created_at": "2026-04-06T00:19:14.213138Z",
	"updated_at": "2026-04-10T03:22:05.405344Z",
	"deleted_at": null,
	"sha1_hash": "a11933891eaf1f4b52d0b400e4370793109f9cf3",
	"title": "CEL-18 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 43138,
	"plain_text": "CEL-18 · Mobile Threat Catalogue\r\nArchived: 2026-04-05 21:48:48 UTC\r\nMobile Threat Catalogue\r\nPhone Call Eavesdropping\r\nContribute\r\nThreat Category: SMS / MMS / RCS\r\nID: CEL-18\r\nThreat Description: Phone calls can be intercepted by adversaries, who can listen to the calls.\r\nThreat Origin\r\nNot Applicable, See Exploit or CVE Examples\r\nExploit Examples\r\nResearchers exploit cellular tech flaws to intercept phone calls 1\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nReferences\r\n1. J. Vijayan, “Researchers Exploit Cellular Tech Flaws to Intercept Phone Calls”, ComputerWorld, 1 Aug.\r\n2013; http://www.computerworld.com/article/2484538/cybercrime-hacking/researchers-exploit-cellular-tech-flaws-to-intercept-phone-calls.html [accessed 8/23/2016] ↩\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-18.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-18.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-18.html"
	],
	"report_names": [
		"CEL-18.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434754,
	"ts_updated_at": 1775791325,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a11933891eaf1f4b52d0b400e4370793109f9cf3.pdf",
		"text": "https://archive.orkl.eu/a11933891eaf1f4b52d0b400e4370793109f9cf3.txt",
		"img": "https://archive.orkl.eu/a11933891eaf1f4b52d0b400e4370793109f9cf3.jpg"
	}
}