• Hey, guest user. Hope you're enjoying NeoGAF! Have you considered registering for an account? Come join us and add your take to the daily discourse.

Security experts weigh in on mystery cell-phone towers

Status
Not open for further replies.

WorldStar

Banned
http://www.wnd.com/2014/09/security-experts-weigh-in-on-mystery-cell-phone-towers/

TowerRadio.jpg


There’s been an uproar this week following a Popular Science report that revealed the existence of more than a dozen cell phone-type towers across the United States for which no owner could be located or operator identified.

Business Insider reported the towers “appear to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts.”


The report said the “fake communication towers are undetectable” for most telephone users, but a new and pricey product, called a cryptophone, confirmed a number of “bogus cell phone towers.”

As for those who own and run the towers? Les Goldsmith, an expert in phone technology, said it just isn’t known.

“What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases. So we begin to wonder – are some of them U.S. government interceptors? Or are some of them Chinese interceptors?” he asked in a Popular Science interview. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are.”

Whatever the source, America has an increasing privacy problem, according to experts in the field.

“The [National Security Agency] revelations of the past year show that we have no privacy,” said John Whitehead, president of the Rutherford Institute, a nonprofit civil liberties organization.

Whitehead is also the author of “A Government of Wolves: The Emerging American Police State.”

“All of our records and communications are being monitored, tracked, uploaded and stored,” he said.

Cheryl Chumley, author of “Police State USA: How Orwell’s Nightmare is Becoming our Reality,” agreed.

“Law enforcement is seeming to suggest that these phony towers are the brainchild of hackers and data thieves – and that means cell phone users around the nation need to realize their so-called private conversations are vulnerable,” she said.

“Privacy as we know it in America is dead. Drone technology is blossoming, the federal government’s already been tapping into private social media messaging, all in the name of security, the private sector is latching on to emerging technology that puts the likes of audio and video recording devices in store mannequins, and now comes a new – and unknown – entity that’s listening in on cell phone conversations.”

Whitehead said the government intelligence “agency would have to know about these towers and their existence, and they have not alerted the public.”

“If these are private interests, it could very well be tied into a government intelligence agency’s programs,” he said. “For example, it has been revealed that the NSA is working openly with Google, and Amazon just built a multi-million dollar intelligence cloud to be shared by all 17 intelligence agencies.”

Whitehead added, “What we once called privacy has clearly been extinguished, and once the drones blanket the skies beginning in 2015, even those who thought they could get off the grid will no longer be able to do so.”

Chumley said it’s “crucial for Americans to understand that putting the technology genie back in the bottle just isn’t going to happen.”

“The best course of action is assume all phone conversations, all social media messaging, and computerized correspondences are being tapped and hacked – because the truth is, they very well could be,” she said.

Radio talk-show host Katherine Albrecht, whose Spychips website tracks privacy invasions, told WND she differs from Whitehead and Chumley.

It’s very important to watch for such developments, she said.

“Is our government doing this? Or is a rogue government doing this to eavesdrop on sensitive communications?” she asked.

She said while neither is good, the idea that a foreign power, such as China or ISIS, setting up communications monitoring locations across the United States is scary.

However, it just confirms her opinion, she said, that if there is an opening for exploiting computer software, it will happen.

“This is not the time to thrown in the towel,” she said. “This is time to roll up the sleeves.”

She’s also been a key promoter of StartMail encrypted email and encrypted search functions on the Web.

According to Business Insider, there were 17 fake cell phone towers found across the U.S.

VentureBeat reported they don’t likely belong to the NSA, because “that agency can tap all it wants without the need for bogus towers.”

BI reported ComputerWorld revealed the fake towers knock the performance of a 4G phone down to that of a 2G, giving away their operations.

The Popular Science report focused on the specialized security telephones now becoming available. As part of that, it revealed that one of the phones had detected “interceptors” across the U.S., in Seattle, Denver, Los Angeles, Dallas, several points in Nevada and Arizona, Chicago, Ohio and other eastern points.

In the report, Goldsmith said: “Interceptor use in the U.S. is much higher than people had anticipated. One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”

The report said the towers are “radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. Whether your phone uses Android or iOS, it also has a second operating system that runs on a part of the phone called a baseband processor. The baseband processor functions as a communications middleman between the phone’s main O.S. and the cell towers. And because chip manufacturers jealously guard details about the baseband O.S., it has been too challenging a target for garden-variety hackers.”

But the report said for governments, such interception is simple.

BI reported: “Whenever he wants to test out his company’s ultra-secure smart phone against an interceptor, Goldsmith drives past a certain government facility in the Nevada desert. (To avoid the attention of the gun-toting counter-intelligence agents in black SUVs who patrol the surrounding roads, he won’t identify the facility to Popular Science). He knows that someone at the facility is running an interceptor …”

A new report from CBS in Chicago said there actually were 19 such “eavesdropping devices across the country, including at least one in Chicago.”
 

Raistlin

Post Count: 9999
a "secret tower" right on top of a military base...HMMMMM I WONDER WHO I BELONGS TOO.

They aren't on top ... they are nearby, outside of the military property. Hence the question of whether they could in fact be foreign.

Until it is known who built and owns them, it is completely up in the air who is actually utilizing them and for what purpose.





Could they be military run, and simply being used to listen on nearby communications to possibly prevent sabotage/attacks? Sure. Wouldn't surprise me. If they're not though, things get really interesting. It doesn't make sense to be NSA.
 
Well, tear em down. What will society come to when everyone and their neighbor is plastering the landscape with illegal metal structures.
 
I live two blocks away from an Air Force base, and get laughably terrible reception, but I'm willing to bet it's just AT&T's fault.
 

Scrooged

Totally wronger about Nintendo's business decisions.
Didn't the guy who found them say they were not literal towers?
 
A foreign nation like China or fucking ISIS setting up advanced communication towers across the United States (some even near military bases for crying out loud) and no one notices until they're up and running?

OK.
 

Zeth

Member
Orwellian is the word that comes to mind.

"Parallel construction" would be my fear. Authorities could use illegally seized information to arrest/prosecute, then go back to use alternate methods to construct their case legitimately.

Didn't the guy who found them say they were not literal towers?

They're not towers, lots of articles simply use stock photos. They're more like base stations.The latest episode of Security Now does a great analysis on the topic.
 

commedieu

Banned
A foreign nation like China or fucking ISIS setting up advanced communication towers across the United States (some even near military bases for crying out loud) and no one notices until they're up and running?

OK.

Link

This was in 2013.

Within half an hour, snipers opened fire on a nearby electrical substation. Shooting for 19 minutes, they surgically knocked out 17 giant transformers that funnel power to Silicon Valley. A minute before a police car arrived, the shooters disappeared into the night.


"The attack was "the most significant incident of domestic terrorism involving the grid that has ever occurred" in the U.S., said Jon Wellinghoff, who was chairman of the Federal Energy Regulatory Commission at the time."
 

RoyalFool

Banned
At GCHQ they have these but it's to monitor wireless traffic leaving the facility rather than snooping on the surrounding area.
 

riotous

Banned
That same web site had an article a about how leftist professors have been recruited by Cuba to spy on and brainwash Americans.

And a number of other suspect articles.

Not outright bashing your link but how serious is this?
 

riotous

Banned
And their "security expert" is the CEO of a company that sells encrypted cell phones.

This reminds me of Glenn Beck selling survival kits while screaming on his radio show that the government is going to come for you.
 

v1lla21

Member
Along one of the highways here in the bay area are some cell towers disguised as trees. I've always wondered what they are for, but I don't think it's the same as this.

How don't they know who put them up though? Why not just knock them down and see who comes?
 

DECK'ARD

The Amiga Brotherhood
It's lucky these reports of cell phone towers that might not exist came to light when there's an encrypted phone to buy to protect yourself.
 

Raistlin

Post Count: 9999
Just cut the fucking power to one and see who shows up to fix it.

No one claims it? Knock them all down

Um yeah no.


I don't want to live in a country that shoots first, asks questions later / guilty until proven innocent. You can't just destroy property without evidence.
 
They're not towers, lots of articles simply use stock photos. They're more like base stations.The latest episode of Security Now does a great analysis on the topic.

Exactly. This is also a "fake cell tower:"
Stingray-cell-phone-tracking-device.jpg


Incidentally:
Cities scramble to upgrade “stingray” tracking as end of 2G network looms
(Though I'd say that article is unrelated to the "towers" discussed in this thread.)

And their "security expert" is the CEO of a company that sells encrypted phones.

The CryptoPhones are more complex than just encryption. I think these "towers" were actually discovered by people using CryptoPhones.

At GCHQ they have these but it's to monitor wireless traffic leaving the facility rather than snooping on the surrounding area.

How would the system discriminate between what is "leaving the facility" and traffic from the surrounding area?

Along one of the highways here in the bay area are some cell towers disguised as trees. I've always wondered what they are for, but I don't think it's the same as this.

They're not. That's just for aesthetics. Now if you want something a touch more Orwellian in that vein, look to Intellistreets. While apparently not stated as accessing the cellular bands (though capabilities of their specific "wireless mesh transceivers" are not stated), their lamps were advertised in part for their "data harvesting" capabilities. I say "were advertised" because after some reporting on the subject, they scrubbed all mention of the term "data harvesting" from their website. Archive.org got us covered, though. Unfortunately, they were more successful in scrubbing "voice stress analyzers" from their site, though that was reported in the Las Vegas Sun.
 

Zeth

Member
This kind of thing always has people saying "tinfoil hats/aliens/lizard people" regardless of the legitimacy of the topic. I feel like it makes a lot issues difficult to discuss. I mean, this is an actual thing covered in mainstream media isn't it?(assuming that lends it credence to some people) Honest question - I heard it discussed on a weekly internet security podcast.
 

BocoDragon

or, How I Learned to Stop Worrying and Realize This Assgrab is Delicious
She said while neither is good, the idea that a foreign power, such as China or ISIS, setting up communications monitoring locations across the United States is scary.

I laughed at "ISIS".
 
At GCHQ they have these but it's to monitor wireless traffic leaving the facility rather than snooping on the surrounding area.

One of the leaked documents from GCHQ this year concerned the operational procedures around secure mobile phones issued to staff. One of the procedures was to never, under any circumstances, to bring such a phone within 50 miles of Cheltenham. That's a circle that includes, for example, Birmingham, Wolverhampton, Bristol and Oxford.

Phone snooping is nothing new.
 

akira28

Member
aw man...i've done some shady shit next to military bases. I hope they don't have any of my nude selfies.

that shit's gonna haunt me if I ever run for president.
 
A foreign nation like China or fucking ISIS setting up advanced communication towers across the United States (some even near military bases for crying out loud) and no one notices until they're up and running?

OK.
Would it be that hard for a foreign government to set up some middle men and get some builders for it?

I don't know how things like these are generally handled, but I'd imagine when companies are building them, they'd have to get permissions from some government agency first. But how would such an agency supervise it if they're simply not aware of it in the first place (meaning that the people just would build it - I kinda doubt there would be people asking much questions if it wasn't the most visible place)?

Not that I actually think it's a foreign country (especially ISIS lol) behind these, but I dunno, it doesn't sound theoretically implausible to me. But I really don't know how these things work so feel free to enlighten me anyone.
 

FOOTE

Member
... if they're on private property then there has to be some sort of easement agreement recorded ( which is public info). A local title company can figure it out. If the easement (or related agreement) doesn't exist, the property owner can tear it down, and they should. If its on public (government) property. Then who the hell do they think owns the towers?
 
Status
Not open for further replies.
Top Bottom