To read this post please scroll down.

 

Readers!

 

My July fund-raising campaign to celebrate the fifteenth anniversary since I began Behind the Black is now over. I want to thank all those who so generously donated or subscribed, especially those who have become regular supporters. I can't do this without your help. I also find it increasingly hard to express how much your support means to me. God bless you all!

 

The donations during this year's campaign were sadly less than previous years, but for this I blame myself. I am tired of begging for money, and so I put up the campaign announcement at the start of the month but had no desire to update it weekly to encourage more donations, as I have done in past years. This lack of begging likely contributed to the drop in donations.

 

No matter. I am here, and here I intend to stay. If you like what I do and have not yet donated or subscribed, please consider supporting my work here at Behind the Black. You can support me either by giving a one-time contribution or a regular subscription. There are four ways of doing so:

 

1. Zelle: This is the only internet method that charges no fees. All you have to do is use the Zelle link at your internet bank and give my name and email address (zimmerman at nasw dot org). What you donate is what I get.

 

2. Patreon: Go to my website there and pick one of five monthly subscription amounts, or by making a one-time donation.
 

3. A Paypal Donation or subscription:

 

4. Donate by check, payable to Robert Zimmerman and mailed to
 
Behind The Black
c/o Robert Zimmerman
P.O.Box 1262
Cortaro, AZ 85652

 

You can also support me by buying one of my books, as noted in the boxes interspersed throughout the webpage or shown in the menu above.


Mysterious hacking cell towers

This is intriguing: A secure cell phone maker has uncovered 17 cell towers designed to attack cell phones that have no known owner, all located close to military bases.

The highly self-monitored phone does more than protect itself; according to Popular Science, it found 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July. Interceptors are described to look to a typical phone like an ordinary tower, but once a phone connects with the interceptor, a variety of over-the-air attacks become possible, such as eavesdropping on calls and texts to pushing spyware to the device.

ESD America CEO Less Goldsmith found it suspicious that a lot of these interceptors are right on top of U.S. military bases. “So we begin to wonder – are some of them U.S. government interceptors? Or are some of them Chinese interceptors?” Goldsmith told Popular Science. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are.”

Genesis cover

On Christmas Eve 1968 three Americans became the first humans to visit another world. What they did to celebrate was unexpected and profound, and will be remembered throughout all human history. Genesis: the Story of Apollo 8, Robert Zimmerman's classic history of humanity's first journey to another world, tells that story, and it is now available as both an ebook and an audiobook, both with a foreword by Valerie Anders and a new introduction by Robert Zimmerman.

 

The print edition can be purchased at Amazon or from any other book seller. If you want an autographed copy the price is $60 for the hardback and $45 for the paperback, plus $8 shipping for each. Go here for purchasing details. The ebook is available everywhere for $5.99 (before discount) at amazon, or direct from my ebook publisher, ebookit. If you buy it from ebookit you don't support the big tech companies and the author gets a bigger cut much sooner.


The audiobook is also available at all these vendors, and is also free with a 30-day trial membership to Audible.
 

"Not simply about one mission, [Genesis] is also the history of America's quest for the moon... Zimmerman has done a masterful job of tying disparate events together into a solid account of one of America's greatest human triumphs."--San Antonio Express-News

3 comments

  • mpthompson

    I had never heard of the CryptoPhone 500s before. How hard would it be to upgrade regular smart cell phones to at least post a warning when encryption of data is turned off similar to what these phones do?

    Given that these cell towers are cropping up near military bases I have to suspect that it’s more likely they are related to outside cyber attacks on the base. However, who knows. The sad thing is that I don’t think we’ll ever get a straight answer from our government.

  • Cotour

    The fact that the public is now aware of these towers and they are no longer secret, whom ever they belong to must now assume that at least some of the information that is gleaned from them is suspect. If its the U.S. government monitoring for suspicious communications related to security or whether its the Chinese or Russians attempting to intercept real time actionable information or a combination of the two, for what even reason, who ever it is, their existence is known and therefore all information must be considered compromised. It may still be valuable but its no longer clean.

    This story is all after the fact, when something “secret” is no longer secret and the public is now freely discussing it then its all over. The question remains, what information was collected before the existence of the equipment was revealed and more importantly, what equipment exists now and is not known of ?

  • Iachops

    I listened to an extended interview with the ESD CEO. The “phony cell towers” may not actually be a physical cell tower. The phony cell “tower” could be a laptop with some dongles that just acts like a cell tower to your phone. The Interceptors could be operated by law enforcement, intelligence services, criminals, etc…. The 17 reported phony cell towers are just the ones that ESD CryptoPhone customers have found and posted to a website. There could (and probably are) more.

    The way the Interceptors work is by fooling your phone into thinking there is no 3G service at that phony tower so it tries 2G which has much poorer encryption. Once the handshake between the phony tower and your phone is made the call can be monitored easily.

Readers: the rules for commenting!

 

No registration is required. I welcome all opinions, even those that strongly criticize my commentary.

 

However, name-calling and obscenities will not be tolerated. First time offenders who are new to the site will be warned. Second time offenders or first time offenders who have been here awhile will be suspended for a week. After that, I will ban you. Period.

 

Note also that first time commenters as well as any comment with more than one link will be placed in moderation for my approval. Be patient, I will get to it.

Leave a Reply

Your email address will not be published. Required fields are marked *