Mysterious hacking cell towers


Genesis cover

On Christmas Eve 1968 three Americans became the first humans to visit another world. What they did to celebrate was unexpected and profound, and will be remembered throughout all human history. Genesis: the Story of Apollo 8, Robert Zimmerman's classic history of humanity's first journey to another world, tells that story, and it is now available as both an ebook and an audiobook, both with a foreword by Valerie Anders and a new introduction by Robert Zimmerman.

 
The ebook is available everywhere for $5.99 (before discount) at amazon, or direct from my ebook publisher, ebookit.

 
The audiobook is also available at all these vendors, and is also free with a 30-day trial membership to Audible.
 

"Not simply about one mission, [Genesis] is also the history of America's quest for the moon... Zimmerman has done a masterful job of tying disparate events together into a solid account of one of America's greatest human triumphs." --San Antonio Express-News

This is intriguing: A secure cell phone maker has uncovered 17 cell towers designed to attack cell phones that have no known owner, all located close to military bases.

The highly self-monitored phone does more than protect itself; according to Popular Science, it found 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July. Interceptors are described to look to a typical phone like an ordinary tower, but once a phone connects with the interceptor, a variety of over-the-air attacks become possible, such as eavesdropping on calls and texts to pushing spyware to the device.

ESD America CEO Less Goldsmith found it suspicious that a lot of these interceptors are right on top of U.S. military bases. “So we begin to wonder – are some of them U.S. government interceptors? Or are some of them Chinese interceptors?” Goldsmith told Popular Science. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are.”

Readers!
 

My July fund-raiser for Behind the Black is now over. The support from my readers was unprecedented, making this July campaign the best ever, twice over. What a marvelous way to celebrate the website's tenth anniversary!
 

Thank you! The number of donations in July, and continuing now at the beginning of August, is too many for me to thank you all personally. Please forgive me by accepting my thank you here, in public, on the website.
 

If you did not donate or subscribe in July and still wish to, note that the tip jar remains available year round.


 

Regular readers can support Behind The Black with a contribution via paypal:

Or with a subscription with regular donations from your Paypal or credit card account:


 

If Paypal doesn't work for you, you can support Behind The Black directly by sending your donation by check, payable to Robert Zimmerman, to
 
Behind The Black
c/o Robert Zimmerman
P.O.Box 1262
Cortaro, AZ 85652

3 comments

  • mpthompson

    I had never heard of the CryptoPhone 500s before. How hard would it be to upgrade regular smart cell phones to at least post a warning when encryption of data is turned off similar to what these phones do?

    Given that these cell towers are cropping up near military bases I have to suspect that it’s more likely they are related to outside cyber attacks on the base. However, who knows. The sad thing is that I don’t think we’ll ever get a straight answer from our government.

  • Cotour

    The fact that the public is now aware of these towers and they are no longer secret, whom ever they belong to must now assume that at least some of the information that is gleaned from them is suspect. If its the U.S. government monitoring for suspicious communications related to security or whether its the Chinese or Russians attempting to intercept real time actionable information or a combination of the two, for what even reason, who ever it is, their existence is known and therefore all information must be considered compromised. It may still be valuable but its no longer clean.

    This story is all after the fact, when something “secret” is no longer secret and the public is now freely discussing it then its all over. The question remains, what information was collected before the existence of the equipment was revealed and more importantly, what equipment exists now and is not known of ?

  • Iachops

    I listened to an extended interview with the ESD CEO. The “phony cell towers” may not actually be a physical cell tower. The phony cell “tower” could be a laptop with some dongles that just acts like a cell tower to your phone. The Interceptors could be operated by law enforcement, intelligence services, criminals, etc…. The 17 reported phony cell towers are just the ones that ESD CryptoPhone customers have found and posted to a website. There could (and probably are) more.

    The way the Interceptors work is by fooling your phone into thinking there is no 3G service at that phony tower so it tries 2G which has much poorer encryption. Once the handshake between the phony tower and your phone is made the call can be monitored easily.

Leave a Reply

Your email address will not be published. Required fields are marked *