MUPLUS+   Join Plus+ and get exclusive shows and extensions! Subscribe Today! LEARN MORE  

 
Close

Advertise here now!

 
 

Are Fake Cell Towers Secretly Monitoring Your Calls?

You’re driving along chatting (not texting!) on your cell phone when suddenly its performance drops from 4G to 2G for no apparent reason. It’s time to get paranoid … there are fake cell towers around the country and someone may be tapping your cell phone. Who would do such a thing? (Do I really need to ask?)

Les Goldsmith, the CEO of ESD America, a defense and law enforcement technology provider based in Las Vegas, sounded the alarm in an article in Popular Science. Using his company’s ESD’s CryptoPhone 500, a modified Samsung Galaxy SIII, he and his customers found 17 different fake cell phone towers in the U.S. in the month of July.

Fake cell phone towers found by ESD.

Fake cell phone towers found by ESD.

“Fake cell phone tower” is actually a misnomer for what Goldsmith calls an “interceptor.” What looks like a real cell tower to your phone is actually a radio-equipped computer with some sinister software. Android and iOS phones have a second operating system running in the phone’s baseband processor chip that the interceptor hacks into. Once connected, the phone is open to everything from call and text monitoring to downloading spyware.

Who would be attacking your phone like this? Although the nude celebrity photo hacker has been getting all the publicity this week, Goldsmith points to more worrisome sources.

What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases.  So we begin to wonder – are some of them U.S. government interceptors?  Or are some of them Chinese interceptors? Whose interceptor is it?  Who are they, that’s listening to calls around military bases?  Is it just the U.S. military, or are they foreign governments doing it?  The point is: we don’t really know whose they are.

Goldsmith says that the interceptor devices cost less than $100,000 and can do things like intercept both voice and text, manipulate voices, send text on behalf of the user, track the user and much, much more. A few police departments use something called “Stingray” devices that allow a less sophisticated form of surveillance.

Are you worried (or angry) yet? The CryptoPhone 500 sells for $3,500. You can also just buy a disposable “burner” phone to use a few times and then throw away.

This is only going to get worse. Any other ideas?

 TAGS: , , ,

  • mourningair

    we see the start of universal human control and tracking… precursor to 666

  • rob

    Of course you are going to find them around military installations. It’s use is justified in the protection of sensitive information. However, use by law enforcement needs to be tightly regulated. Privacy is dead and you should conduct yourself in a manner that assumes someone is always watching…or listening.