LIVE Gold Prices $  | E-Mail Subscriptions | Update GoldSeek | GoldSeek Radio 

Commentary : Gold Review : Markets : News Wire : Quotes : Silver : Stocks - Main Page >> News >> Story  Disclaimer 
Latest Headlines

Precious Metals Update Video: Gold consolidating
By: Ira Epstein

Gold & Jackson Hole: No Cause For Concern
By: Stewart Thomson, Graceland Updates

GDP Ain’t What it Used to Be!
By: David Haggith

The Case for Gold Keeps Getting Stronger As Negative Interest Rates Spread
By: Clint Siegner, Money Metals

Precious Metals Update Video: Gold consolidating
By: Ira Epstein

GoldSeek Radio: Gerald Celente and Bill Murphy
By: Chris Waltzek, GoldSeek Radio

SWOT Analysis: Gold Equities Have Room to Run…
By: Frank Holmes, US Funds

Technical Scoop: 200 Years - Gold/Gold Ratio, Precious Metals, equity, bond market updates and more
By: David Chapman

Gold Set to Correct but Internals Remain Bullish
By: Jordan Roy-Byrne CMT, MFTA

The Market Has Gone Nowhere In The Last Twelve Months
By: Avi Gilburt


GoldSeek Web

Are Fake Cell Towers Intercepting Your Calls?

 -- Published: Friday, 3 October 2014 | Print  | Disqus 

By Doug Hornig, Senior Editor

We’re now into Year 2 AS (After Snowden), and many Americans remain concerned about the security of their cellphone calls. They should be, especially considering a phenomenon that’s hit the news in the past few months.

Fake cell towers.

With most phones, you have no way of knowing whether someone might be listening in. You may believe that you’re safe because your calls are encrypted.

Trouble is, you may not be.

If you’d like to be informed when your call is being intercepted, one company that can put the proper tech in your hands is ESD America. It manufactures the CryptoPhone 500, which has a Samsung Galaxy SIII body, but with the standard Android OS hardened by the removal of 468 vulnerabilities.

The CryptoPhone will set you back $3,500. When it detects that your call has been compromised, it lights up and displays a warning message: “Caution: The mobile network’s standard encryption has been turned off, possibly by a rogue base station (‘IMSI Catcher’). Unencrypted calls not recommended.”

(IMSI stands for “international mobile subscriber identity” and is a unique identification number used by all cellular networks. It’s generally 15 digits in length, allotting the first three digits to country code and the next three to the mobile network code, with the remainder comprising the mobile subscription identification number within the network’s customer base.)

IMSI catchers are portable devices also known as “interceptors” or “stingrays.” They are not themselves actual towers, but they mimic the real thing and trick your mobile device into connecting to them even if you aren’t on a call. Once locked on to you, stingrays can be used for real-time location tracking, with the ability to pinpoint where you are within two meters. But they can also eavesdrop on and capture the contents of your communications.

Stingrays are not cheap—upwards of $150,000 each—but they’re portable. They can be hand carried or mounted on a vehicle or drone. While the abilities of these interceptors vary, the full-featured versions available to government agencies have a broad range of powers. For example, the VME Dominator can not only capture calls and texts, it can even take control of the intercepted phone. Yes, it can turn on your powered-down phone and essentially use it as a bug.

But didn’t the Supreme Court recently instruct police that they must obtain a warrant before they can search your phone? Not really. The ruling was more limited, stating that police must get a warrant “before searching a cell phone seized incident to an arrest.”

The 11th Circuit Court has also ruled that warrantless cellphone location tracking is unconstitutional. But that conflicts with an earlier judgment by the 5th Circuit, which stated that people have no expectation of privacy over location data collected by cell towers because they are nothing more than a business record. The Supreme Court has not yet resolved that one.

Stingrays, however, can basically serve as wiretapping devices. Shouldn’t a warrant be required for cellphone intercepts, as it would be if law enforcement wanted to tap your home phone or place a bug behind the painting in your office?

Technically, yes. The Wiretap Act of 1968 requires the police to get a court order whenever they want to intercept any oral, electronic communication, or wire communications. It’s also been established that that protection extends to cellphones that have been turned on remotely for eavesdropping purposes.

To what extent are authorities honoring that requirement? Decide for yourself after reading this excerpt from a recent Newsweek article:

In January, Tallahassee, Florida, police used [a stingray] to track a stolen cell phone to a suspect’s apartment. The police then entered the home without permission, conducted a search, and arrested the suspect in his home. Not only did the police not have a warrant, but they did not disclose to a judge that they were in possession of a stingray because the department had received it on loan from the manufacturer on condition of secrecy.

Only after a judge granted a motion filed by the ACLU to unseal the transcripts of the case (the federal government had previously demanded the proceedings be sealed, going so far as to try to invoke the Homeland Security Act as the reason) was it was revealed that between 2007 and 2010 the department used stingrays without getting warrants around 200 times.

One ACLU spokesperson put it like this: “They are essentially searching the homes of innocent Americans to find one phone used by one person … It’s like they’re kicking down the doors of 50 homes and searching 50 homes because they don’t know where the bad guy is.”

Even though data is obviously hard to come by, the ACLU has been able to determine that stingrays are in use in at least 18 states—by local police, state police, or both. They’re also widely employed by the federal government, so you might want to remember that if you’re using your phone in the vicinity of a government facility, particularly a military base.

And if you’re encrypting messages, don’t count on that to save you. A stingray can force your 4G service down to a 2G level to thwart encryption, and the best of them will do it so that you’re not even aware it’s happening. Support for 2G is going away—AT&T is phasing it out by 2017 and Verizon by 2020—but manufacturers of stingrays are hard at work on the next generation of product, which will feature the ability to crack 4G.

Mass surveillance of law-abiding citizens is just one aspect of the global cyberwar that’s red hot yet all but invisible to most of us. Casey Research has prepared an in-depth look at the subject in its white paper, Cyberwar: Threats to Your Money and Freedom, and How to Protect Yourself. We urge you to download a copy today.

The article Are Fake Cell Towers Intercepting Your Calls? was originally published at

| Digg This Article
 -- Published: Friday, 3 October 2014 | E-Mail  | Print  | Source:

comments powered by Disqus


Increase Text SizeDecrease Text SizeE-mail Link of Current PagePrinter Friendly PageReturn to >> Story

E-mail Page  | Print  | Disclaimer 

© 1995 - 2019 Supports

©, Gold Seek LLC

The content on this site is protected by U.S. and international copyright laws and is the property of and/or the providers of the content under license. By "content" we mean any information, mode of expression, or other materials and services found on This includes editorials, news, our writings, graphics, and any and all other features found on the site. Please contact us for any further information.

Live GoldSeek Visitor Map | Disclaimer


The views contained here may not represent the views of, Gold Seek LLC, its affiliates or advertisers., Gold Seek LLC makes no representation, warranty or guarantee as to the accuracy or completeness of the information (including news, editorials, prices, statistics, analyses and the like) provided through its service. Any copying, reproduction and/or redistribution of any of the documents, data, content or materials contained on or within this website, without the express written consent of, Gold Seek LLC, is strictly prohibited. In no event shall, Gold Seek LLC or its affiliates be liable to any person for any decision made or action taken in reliance upon the information provided herein.