Privacy and security at risk: Lebanese security agencies accessing the mobile telecom’s network performance system
While mobile operators use the network monitoring system to keep up the quality of service and follow up on users’ requests and service quality, how do security agencies use this system? Who is managing this system?
