Advertise | Bookmark | Contact Us | E-Mail List |  | Update Page | UraniumSeek.com 

Commentary : Gold Review : Markets : News Wire : Quotes : Silver : Stocks - Main Page 

 GoldSeek.com >> News >> Story  Disclaimer 
 
Latest Headlines

Gold Seeker Weekly Wrap-Up: Gold and Silver Gain Over 1% and 2% on the Week
By: Chris Mullen, Gold Seeker Report

Ira Epstein's Metals Video 11 17 2017
By: Ira Epstein

Next-Generation Crazy: The Fed Plans For The Coming Recession
By: John Rubino

COT Gold, Silver and US Dollar Index Report - November 17, 2017
By: GoldSeek.com

Gold Miners’ Q3’17 Fundamentals
By: Adam Hamilton, CPA

Bonfire of the Absurdities
By: John Mauldin

The Social Security Inflation Lag Calendar - Partial Indexing Part 1
By: Daniel R. Amerman, CFA

Rob From The Middle Class Economics
By: Gary Christenson

GoldSeek Radio Nugget: John Williams and Chris Waltzek
By: radio.GoldSeek.com

The Metals Market Is A Mess And Will Likely Continue To Frustrate You
By: Avi Gilburt

 
Search

GoldSeek Web

 
Are Fake Cell Towers Intercepting Your Calls?


 -- Published: Friday, 3 October 2014 | Print  | Disqus 

By Doug Hornig, Senior Editor

We’re now into Year 2 AS (After Snowden), and many Americans remain concerned about the security of their cellphone calls. They should be, especially considering a phenomenon that’s hit the news in the past few months.

Fake cell towers.

With most phones, you have no way of knowing whether someone might be listening in. You may believe that you’re safe because your calls are encrypted.

Trouble is, you may not be.

If you’d like to be informed when your call is being intercepted, one company that can put the proper tech in your hands is ESD America. It manufactures the CryptoPhone 500, which has a Samsung Galaxy SIII body, but with the standard Android OS hardened by the removal of 468 vulnerabilities.

The CryptoPhone will set you back $3,500. When it detects that your call has been compromised, it lights up and displays a warning message: “Caution: The mobile network’s standard encryption has been turned off, possibly by a rogue base station (‘IMSI Catcher’). Unencrypted calls not recommended.”

(IMSI stands for “international mobile subscriber identity” and is a unique identification number used by all cellular networks. It’s generally 15 digits in length, allotting the first three digits to country code and the next three to the mobile network code, with the remainder comprising the mobile subscription identification number within the network’s customer base.)

IMSI catchers are portable devices also known as “interceptors” or “stingrays.” They are not themselves actual towers, but they mimic the real thing and trick your mobile device into connecting to them even if you aren’t on a call. Once locked on to you, stingrays can be used for real-time location tracking, with the ability to pinpoint where you are within two meters. But they can also eavesdrop on and capture the contents of your communications.

Stingrays are not cheap—upwards of $150,000 each—but they’re portable. They can be hand carried or mounted on a vehicle or drone. While the abilities of these interceptors vary, the full-featured versions available to government agencies have a broad range of powers. For example, the VME Dominator can not only capture calls and texts, it can even take control of the intercepted phone. Yes, it can turn on your powered-down phone and essentially use it as a bug.

But didn’t the Supreme Court recently instruct police that they must obtain a warrant before they can search your phone? Not really. The ruling was more limited, stating that police must get a warrant “before searching a cell phone seized incident to an arrest.”

The 11th Circuit Court has also ruled that warrantless cellphone location tracking is unconstitutional. But that conflicts with an earlier judgment by the 5th Circuit, which stated that people have no expectation of privacy over location data collected by cell towers because they are nothing more than a business record. The Supreme Court has not yet resolved that one.

Stingrays, however, can basically serve as wiretapping devices. Shouldn’t a warrant be required for cellphone intercepts, as it would be if law enforcement wanted to tap your home phone or place a bug behind the painting in your office?

Technically, yes. The Wiretap Act of 1968 requires the police to get a court order whenever they want to intercept any oral, electronic communication, or wire communications. It’s also been established that that protection extends to cellphones that have been turned on remotely for eavesdropping purposes.

To what extent are authorities honoring that requirement? Decide for yourself after reading this excerpt from a recent Newsweek article:

In January, Tallahassee, Florida, police used [a stingray] to track a stolen cell phone to a suspect’s apartment. The police then entered the home without permission, conducted a search, and arrested the suspect in his home. Not only did the police not have a warrant, but they did not disclose to a judge that they were in possession of a stingray because the department had received it on loan from the manufacturer on condition of secrecy.

Only after a judge granted a motion filed by the ACLU to unseal the transcripts of the case (the federal government had previously demanded the proceedings be sealed, going so far as to try to invoke the Homeland Security Act as the reason) was it was revealed that between 2007 and 2010 the department used stingrays without getting warrants around 200 times.

One ACLU spokesperson put it like this: “They are essentially searching the homes of innocent Americans to find one phone used by one person … It’s like they’re kicking down the doors of 50 homes and searching 50 homes because they don’t know where the bad guy is.”

Even though data is obviously hard to come by, the ACLU has been able to determine that stingrays are in use in at least 18 states—by local police, state police, or both. They’re also widely employed by the federal government, so you might want to remember that if you’re using your phone in the vicinity of a government facility, particularly a military base.

And if you’re encrypting messages, don’t count on that to save you. A stingray can force your 4G service down to a 2G level to thwart encryption, and the best of them will do it so that you’re not even aware it’s happening. Support for 2G is going away—AT&T is phasing it out by 2017 and Verizon by 2020—but manufacturers of stingrays are hard at work on the next generation of product, which will feature the ability to crack 4G.

Mass surveillance of law-abiding citizens is just one aspect of the global cyberwar that’s red hot yet all but invisible to most of us. Casey Research has prepared an in-depth look at the subject in its white paper, Cyberwar: Threats to Your Money and Freedom, and How to Protect Yourself. We urge you to download a copy today.

The article Are Fake Cell Towers Intercepting Your Calls? was originally published at caseyresearch.com.

| Digg This Article
 -- Published: Friday, 3 October 2014 | E-Mail  | Print  | Source: GoldSeek.com

comments powered by Disqus



 



Increase Text SizeDecrease Text SizeE-mail Link of Current PagePrinter Friendly PageReturn to GoldSeek.com

 news.goldseek.com >> Story

E-mail Page  | Print  | Disclaimer 


© 1995 - 2017



GoldSeek.com Supports Kiva.org

© GoldSeek.com, Gold Seek LLC

The content on this site is protected by U.S. and international copyright laws and is the property of GoldSeek.com and/or the providers of the content under license. By "content" we mean any information, mode of expression, or other materials and services found on GoldSeek.com. This includes editorials, news, our writings, graphics, and any and all other features found on the site. Please contact us for any further information.

Live GoldSeek Visitor Map | Disclaimer

The views contained here may not represent the views of GoldSeek.com, its affiliates or advertisers. GoldSeek.com makes no representation, warranty or guarantee as to the accuracy or completeness of the information (including news, editorials, prices, statistics, analyses and the like) provided through its service. Any copying, reproduction and/or redistribution of any of the documents, data, content or materials contained on or within this website, without the express written consent of GoldSeek.com, is strictly prohibited. In no event shall GoldSeek.com or its affiliates be liable to any person for any decision made or action taken in reliance upon the information provided herein.