PDA

View Full Version : Security experts weigh in on mystery cell-phone towers



Skywizard
6th September 2014, 01:56
http://www.wnd.com/files/2014/05/TowerRadio.jpg


There’s been an uproar this week following a Popular Science report that revealed the
existence of more than a dozen cell phone-type towers across the United States for which
no owner could be located or operator identified.

Business Insider reported the towers “appear to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts.”

The report said the “fake communication towers are undetectable” for most telephone users, but a new and pricey product, called a cryptophone, confirmed a number of “bogus cell phone towers.”

As for those who own and run the towers? Les Goldsmith, an expert in phone technology, said it just isn’t known.

“What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases. So we begin to wonder – are some of them U.S. government interceptors? Or are some of them Chinese interceptors?” he asked in a Popular Science interview. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are.”

Whatever the source, America has an increasing privacy problem, according to experts in the field.

“The [National Security Agency] revelations of the past year show that we have no privacy,” said John Whitehead, president of the Rutherford Institute, a nonprofit civil liberties organization.

Whitehead is also the author of “A Government of Wolves: The Emerging American Police State.”


Keep up with the threats to your privacy, get “A Government of Wolves: The Emerging American Police State,”
and “Police State USA: How Orwell’s Nightmare is Becoming our Reality,” as soon as you can.

“All of our records and communications are being monitored, tracked, uploaded and stored,” he said.

Cheryl Chumley, author of “Police State USA: How Orwell’s Nightmare is Becoming our Reality,” agreed.

“Law enforcement is seeming to suggest that these phony towers are the brainchild of hackers and data thieves – and that means cell phone users around the nation need to realize their so-called private conversations are vulnerable,” she said.

“Privacy as we know it in America is dead. Drone technology is blossoming, the federal government’s already been tapping into private social media messaging, all in the name of security, the private sector is latching on to emerging technology that puts the likes of audio and video recording devices in store mannequins, and now comes a new – and unknown – entity that’s listening in on cell phone conversations.”

Whitehead said the government intelligence “agency would have to know about these towers and their existence, and they have not alerted the public.”

“If these are private interests, it could very well be tied into a government intelligence agency’s programs,” he said. “For example, it has been revealed that the NSA is working openly with Google, and Amazon just built a multi-million dollar intelligence cloud to be shared by all 17 intelligence agencies.”

Whitehead added, “What we once called privacy has clearly been extinguished, and once the drones blanket the skies beginning in 2015, even those who thought they could get off the grid will no longer be able to do so.”

Chumley said it’s “crucial for Americans to understand that putting the technology genie back in the bottle just isn’t going to happen.”

“The best course of action is assume all phone conversations, all social media messaging, and computerized correspondences are being tapped and hacked – because the truth is, they very well could be,” she said.

Radio talk-show host Katherine Albrecht, whose Spychips website tracks privacy invasions, told WND she differs from Whitehead and Chumley.

It’s very important to watch for such developments, she said.

“Is our government doing this? Or is a rogue government doing this to eavesdrop on sensitive communications?” she asked.

She said while neither is good, the idea that a foreign power, such as China or ISIS, setting up communications monitoring locations across the United States is scary.

However, it just confirms her opinion, she said, that if there is an opening for exploiting computer software, it will happen.

“This is not the time to thrown in the towel,” she said. “This is time to roll up the sleeves.”

She’s also been a key promoter of StartMail encrypted email and encrypted search functions on the Web.

According to Business Insider, there were 17 fake cell phone towers found across the U.S.

VentureBeat reported they don’t likely belong to the NSA, because “that agency can tap all it wants without the need for bogus towers.”

BI reported ComputerWorld revealed the fake towers knock the performance of a 4G phone down to that of a 2G, giving away their operations.

The Popular Science report focused on the specialized security telephones now becoming available. As part of that, it revealed that one of the phones had detected “interceptors” across the U.S., in Seattle, Denver, Los Angeles, Dallas, several points in Nevada and Arizona, Chicago, Ohio and other eastern points.

In the report, Goldsmith said: “Interceptor use in the U.S. is much higher than people had anticipated. One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”

The report said the towers are “radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. Whether your phone uses Android or iOS, it also has a second operating system that runs on a part of the phone called a baseband processor. The baseband processor functions as a communications middleman between the phone’s main O.S. and the cell towers. And because chip manufacturers jealously guard details about the baseband O.S., it has been too challenging a target for garden-variety hackers.”

But the report said for governments, such interception is simple.

BI reported: “Whenever he wants to test out his company’s ultra-secure smart phone against an interceptor, Goldsmith drives past a certain government facility in the Nevada desert. (To avoid the attention of the gun-toting counter-intelligence agents in black SUVs who patrol the surrounding roads, he won’t identify the facility to Popular Science). He knows that someone at the facility is running an interceptor …”

A new report from CBS in Chicago said there actually were 19 such “eavesdropping devices across the country, including at least one in Chicago.”



Source: http://www.wnd.com/2014/09/security-experts-weigh-in-on-mystery-cell-phone-towers/



peace...

sigma6
6th September 2014, 02:55
oh... yeah right... that's it... yeah... it must be the Chinese!... LOL...

Octavusprime
6th September 2014, 03:11
I doubt the towers are Chinese in origin but their existence is to be expected given the NSA revelations. I can see thieves setting these up to collect mass data in small scale but at the nationwide scale only one organization could get away with it...

ghostrider
6th September 2014, 06:18
these towers have popped up everywhere ...

Sidney
6th September 2014, 06:31
I have noticed those new ones popping up too. Chinese my A$$ come on, do they really thing the chinese are going to erect a tower on a us base without anyone noticing. That is the funniest line of crap i have seen in a longggg time.

Bongo
6th September 2014, 11:37
Easiest way to find out would be knock one down, wouldn't take long for the owner to spring in to action.

Xanth
6th September 2014, 12:03
Why would you install these when there are so many other ways of capturing communications?
Well:

Tells you who's nearby
Enables you to take over their device - listen/view through camera
Enables you to disable their device
Enables you to install software on their device


Think how this could be used somewhere like Ferguson, Missouri

Belle
6th September 2014, 12:52
Food for thought....

http://www.thecommonsenseshow.com/2014/09/05/the-phony-cell-towers-are-part-of-the-smart-grid-mind-control-network/

An excerpt from the article:


Paul Watson’s recent report, chronicled in the video listed below, accurately portrays 50% of the operational functioning of what is presently being referred to as “phony cell towers”. Watson is correct in that these “phony towers” are indeed stealing data from your electronic devices.

However, Watson’s depiction of the phony cell phone towers only represents half of the picture. On the other side of the coin, these towers are part of a mind control apparatus. Here is an excerpt of the relevant patent.


United States Patent

4,858,612

Stocklin

August 22, 1989

Hearing device

Abstract

A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the region of the auditory cortex is shown and described. A microphone is used to transform sound signals into electrical signals which are in turn analyzed and processed to provide controls for generating a plurality of microwave signals at different frequencies. The multifrequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the mammal which are representative of the original sound received by the microphone.

Inventors:
Stocklin; Philip L. (Satellite Beach, FL)

Family ID:
24247585

Appl. No.:
06/562,742

Filed:
December 19, 1983



The patent’s use of the phrase “… introduction of a plurality of microwaves into the region of the auditory cortex is shown…The multifrequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the mammal which are representative of the original sound received by the microphone“. In other words, this is a smoking gun patent for what is often referred to as “voice to skull” technology. This means that the thoughts (i.e. words) in your head may not be your own. This patent clearly demonstrates that the technology has existed to control your thoughts and the technology is over 35 years old.

Today, your smart meter, smart appliances and your wi-fi networks in your home all have this capability. In fact, one of my military sources, once associated with the project known as “Owning the Weather 2025″, tells me that any device which can receive or send an electrical signal is vulnerable to the manifestation of mind control through the psychotronic manipulation of the mind. The recently exposed phony cell phone towers are only part of an overall smart grid system designed, in part, to effect mind control. My military sources tell me that this system is part of what is popularly known as “the Smart Grid”. The various Smart Grids are all being connected into a what is called a “Land Area Network”. My sources also tell me that mind control is only one function of this network and that presently there is an effort underway to integrate the various Land Area Networks across various continents (e.g. North American and Europe). The system, once fully integrated will include health care and overall energy usage. Mind control is a byproduct of this technology.