Scroll down to read this post.

 

Please consider supporting my work here at Behind the Black. I keep the website clean from pop-ups and annoying demands. Instead, I depend entirely on my readers to support me. Though this means I am sacrificing some income, it also means that I remain entirely independent from outside pressure. By depending solely on donations and subscriptions from my readers, no one can threaten me with censorship. You don't like what I write, you can simply go elsewhere.

 

You can support me either by giving a one-time contribution or a regular subscription. There are five ways of doing so:

 

1. Zelle: This is the only internet method that charges no fees. All you have to do is use the Zelle link at your internet bank and give my name and email address (zimmerman at nasw dot org). What you donate is what I get.

 

2. Patreon: Go to my website there and pick one of five monthly subscription amounts, or by making a one-time donation.
 

3. A Paypal Donation:

4. A Paypal subscription:


5. Donate by check, payable to Robert Zimmerman and mailed to
 
Behind The Black
c/o Robert Zimmerman
P.O.Box 1262
Cortaro, AZ 85652

 

You can also support me by buying one of my books, as noted in the boxes interspersed throughout the webpage or shown in the menu above. And if you buy the books through the ebookit links, I get a larger cut and I get it sooner.


Mysterious hacking cell towers

This is intriguing: A secure cell phone maker has uncovered 17 cell towers designed to attack cell phones that have no known owner, all located close to military bases.

The highly self-monitored phone does more than protect itself; according to Popular Science, it found 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July. Interceptors are described to look to a typical phone like an ordinary tower, but once a phone connects with the interceptor, a variety of over-the-air attacks become possible, such as eavesdropping on calls and texts to pushing spyware to the device.

ESD America CEO Less Goldsmith found it suspicious that a lot of these interceptors are right on top of U.S. military bases. “So we begin to wonder – are some of them U.S. government interceptors? Or are some of them Chinese interceptors?” Goldsmith told Popular Science. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are.”

Genesis cover

On Christmas Eve 1968 three Americans became the first humans to visit another world. What they did to celebrate was unexpected and profound, and will be remembered throughout all human history. Genesis: the Story of Apollo 8, Robert Zimmerman's classic history of humanity's first journey to another world, tells that story, and it is now available as both an ebook and an audiobook, both with a foreword by Valerie Anders and a new introduction by Robert Zimmerman.

 
The ebook is available everywhere for $5.99 (before discount) at amazon, or direct from my ebook publisher, ebookit. If you buy it from ebookit you don't support the big tech companies and the author gets a bigger cut much sooner.


The audiobook is also available at all these vendors, and is also free with a 30-day trial membership to Audible.
 

"Not simply about one mission, [Genesis] is also the history of America's quest for the moon... Zimmerman has done a masterful job of tying disparate events together into a solid account of one of America's greatest human triumphs."--San Antonio Express-News

3 comments

  • mpthompson

    I had never heard of the CryptoPhone 500s before. How hard would it be to upgrade regular smart cell phones to at least post a warning when encryption of data is turned off similar to what these phones do?

    Given that these cell towers are cropping up near military bases I have to suspect that it’s more likely they are related to outside cyber attacks on the base. However, who knows. The sad thing is that I don’t think we’ll ever get a straight answer from our government.

  • Cotour

    The fact that the public is now aware of these towers and they are no longer secret, whom ever they belong to must now assume that at least some of the information that is gleaned from them is suspect. If its the U.S. government monitoring for suspicious communications related to security or whether its the Chinese or Russians attempting to intercept real time actionable information or a combination of the two, for what even reason, who ever it is, their existence is known and therefore all information must be considered compromised. It may still be valuable but its no longer clean.

    This story is all after the fact, when something “secret” is no longer secret and the public is now freely discussing it then its all over. The question remains, what information was collected before the existence of the equipment was revealed and more importantly, what equipment exists now and is not known of ?

  • Iachops

    I listened to an extended interview with the ESD CEO. The “phony cell towers” may not actually be a physical cell tower. The phony cell “tower” could be a laptop with some dongles that just acts like a cell tower to your phone. The Interceptors could be operated by law enforcement, intelligence services, criminals, etc…. The 17 reported phony cell towers are just the ones that ESD CryptoPhone customers have found and posted to a website. There could (and probably are) more.

    The way the Interceptors work is by fooling your phone into thinking there is no 3G service at that phony tower so it tries 2G which has much poorer encryption. Once the handshake between the phony tower and your phone is made the call can be monitored easily.

Readers: the rules for commenting!

 

No registration is required. I welcome all opinions, even those that strongly criticize my commentary.

 

However, name-calling and obscenities will not be tolerated. First time offenders who are new to the site will be warned. Second time offenders or first time offenders who have been here awhile will be suspended for a week. After that, I will ban you. Period.

 

Note also that first time commenters as well as any comment with more than one link will be placed in moderation for my approval. Be patient, I will get to it.

Leave a Reply

Your email address will not be published. Required fields are marked *