|Unencrypted Connection Les Goldsmith|
This is a sign people are really waking up. A few years ago it was revealed PacBell (now AT&T) was handing off telephone Asynchronous Transport Mode (ATM - the core of DSL, fiber Internet, VOIP) packets (voice and data) to the NSA through a San Francisco switching center. The major telecom companies in the USA now have a big business doing roving wiretaps for government an alphabet soup of agencies and the fees for those services now run into a billions of dollars, which makes your phone company the biggest paid snitch around, rouge cell tower interceptors or not...
When the ATM protocol was being designed I remember some controversy about the ability in the protocol design (and some portions were classified even then) to clone ATM frames and hand them off transparently from the end user. In standard TCP/IP protocol interception required someone be in the middle and therefore be somewhat detectable (at least in theory with conventional routers).
In any case the worlds intelligence agencies share your data around the world so freely I am not sure if matters if its the NSA, the Chinese, MI5, the German DVD, or Mossad. If any agency wants the data they will have access to it through interagency agreements and other covert means.
Its all one big mesh of control, meant to sift and sort, preferably anonymously and unobserved so they can exert unseen pressure on your life and you have no idea of where it originates and no course to pursue to stop it. And most of the data, mostly like in digested, data mined consolidated form, ends up in banker hands, as they fund the whole crazy mess. As they say "He who has the gold makes the rules..." except the bankers don't have gold, and neither do the asians.... all they got are illusions, th (gold plated tungsten bars in vaults anyone?) and pieces of paper claiming title to gold. And oh here are some bonds we'll never pay off on... And soon the militaries and intel agencies will wake up to that fact as well. -AK
Mysterious Phony Cell Towers Could Be Intercepting Your Calls
Every smart phone has a secondary OS, which can be hijacked by high-tech hackers
By Andrew Rosenblum Posted 08.27.2014 at 1:00 pm
Like many of the ultra-secure phones that have come to market in the wake of Edward Snowden's leaks, the CryptoPhone 500, which is marketed in the U.S. by ESD America and built on top of an unassuming Samsung Galaxy SIII body, features high-powered encryption. Les Goldsmith, the CEO of ESD America, says the phone also runs a customized or "hardened" version of Android that removes 468 vulnerabilities that his engineering team team found in the stock installation of the OS.
His mobile security team also found that the version of the Android OS that comes standard on the Samsung Galaxy SIII leaks data to parts unknown 80-90 times every hour. That doesn't necessarily mean that the phone has been hacked, Goldmsith says, but the user can't know whether the data is beaming out from a particular app, the OS, or an illicit piece of spyware. His clients want real security and control over their device, and have the money to pay for it.
To show what the CryptoPhone can do that less expensive competitors cannot, he points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. (The map below is from August.) Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device.
|August GSM Interceptor Map ESD|
“Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”