Rather than offering you cellphone service, the towers appear to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts. http://finance.yahoo.com/news/mysterious-fake-cellphone-towers-intercepting-162645809.html
How can nobody know who put these things up... Somebody bought or leased the land, somebody brought in guys and equipment to put it up. They didn't just appear overnight.
Wow. How strange. This was the most telling part of the article to me (in regards to who put them up)- "Although it is unclear who owns the towers, ESD found that several of them were located near U.S. military bases. "Whose interceptor is it? Who are they, that's listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don't really know whose they are," Goldsmith said to Popular Science. It's probably not the NSA — that agency can tap all it wants without the need for bogus towers, VentureBeat reported:"
I'm surprised they didn't just hide the wiretapping technology within real cell phone towers. They could have gotten away with it a lot more inconspicuously. Common sense doesn't seem to exist even with our oppressors.
I figured out a possible angle on this. I looked over the map of the towers, and they're all by the big important cities for the most part. I noticed there are three in southern nevada (that's a lot since the map only had 19 shown). I'm figuring one is on the south end, another on the north end, and one might be by the nuclear test site. Reading about what these towers are capable of doing, here is just one scenario I see for them: these towers have the ability to force cellphones to use them, that is very important. That means they can override any existing signal and take command of ppls cellphones. If there is an impending terror attack, rather than inform the telcos and wait for them to do anything, these towers can shutdown all phones so an IED attached to a cellphone trigger would be unable to explode. Of course they can also spy on your activities and record everything without you or even the telcos knowing as the signal has been intercepted and diverted. The question to answer whether this is their purpose is how wide is the signal from these towers? Can they cover a whole city with just one or two or three? Perhaps that's not even necessary. It's possible these towers can also TAKE COMMAND of other towers and they can all then issue the same orders at once. See so this cuts out the reluctant telcos who are leery of letting the government take control. But when you think about it, that's exactly what the gov't wants, direct and total control over communications, esp. in an emergency. And obviously there is now the technology to do just that... Just wait till the towers get hacked!!!
Here is an article that sez that the towers are not physical towers at all. They may be only a device called a Stingray which mimic phone towers. They can be as simple as a dongle plugged into a lap top. Here is another article on Stingrays. Google Stingray and cell phone tower.
If that's so, then the Vegas police are probably listening in on the mafia there... Also there would be more of those found, no? And just like in the show "Person of Interest", they can clone your phone! Then they can listen in on all your calls, read your address book, review your internet activity, etc. etc....
duckduckgo it unless you want google to make a record of your search, aggregate it with other data, and then sell data use to commercial interests
I think we need to re-enter the topic of what encryption is. You don't' just decide " hey I think I'm gonna bypass that" it doesn't work that way. A cellular device may try to handshake with a certain tower, but it should not be possible to handshake without encryption, and if it is then that's a serious security flaw on the part of the cellphone manufacturer and the models affected should be recalled. I guess it's kinda like sending de-authentication requests on a wireless network, making the access point (in this case cell tower) unavailable and forcing a handshake with the attacker. In any case the protocols and standards involved should be seriously looked at and reconsidered, and overhauled, and cellular devices should be made to reject any unencrypted connection on the hardware level. This is why open source code and firmware is such a great idea, it's hard to trust something if you can't look at the code ...
the solutions for this is pretty fuckin obvious, but if people wanna be paranoid, then so be it. i just get annoyed at this mentality, oh the governenment the fuckin hackers, the boogey man can do all this stuff and theres nothing you can do blah blah, actually there is something that can be done. there's a mechanism to how this shit works, no such thing as magic. if an exploit is found then a patch is released, if no mechanism can be found, then it probably really isn't happening why has no one set up an antenna at home, and tried to duplicate this effect on a computer?
Did you ever consider that maybe cell phones deliberately come with these "security flaws" to make it easier for the government to listen in on you?
That would mean that there's stuff going on that shouldn't be, and that we've all been lied to, and that's just crazy talk.
what Pressed_Rat is referring to is a backdoor read RFCs and be free .. ow http://lte-epc.blogspot.com/2009/11/lte-control-plane-protocol-stacks.html {NOT AN AN OFFICIAL REQUEST FOR COMMENTS} edit: ahem GTP C see: - GPRS Tunnelling Protocol for the control plane (GTP C): This protocol tunnels signalling messages between SGSN and S GW (S4).