A paper presented at Mobile World Congress in Barcelona this week explains weaknesses in the cellular paging (broadcast) protocol. The primary attack, dubbed ToRPEDO, can be used to verify the location of a specific device. Attackers could also inject fake paging messages and mount denial-of-service (DoS) attacks, researchers said. The paper was presented by researchers from Purdue University, the University of Iowa and Purdue University of Purdue University in Barcelona, the researchers explained that the issues arise from weaknesses.
Source: https://threatpost.com/torpedo-privacy-4g-5g/142174/

