The question I have to ask, can these towers owned by the unknown - TopicsExpress



          

The question I have to ask, can these towers owned by the unknown block sattalite signals from lets say 11 missing Airliners? Heres the story. Local Rogue ‘Cell Towers’ Can Intercept Your Data; At Least One Found In Chicago September 3, 2014 1:02 PM By John Dodge CHICAGO (CBS) — So-called rogue cell phone towers, the type that can intercept your mobile calls and data, are cropping up all over the United States, including here in Chicago, according to a company that specializes in developing highly secure mobile phones. More cell phone users, who fear their information could be at risk, are turning to high-end secure mobile devices. As a result, it is become easier for them to detect the presence of these interceptor devices. A user gets an alert that a cell tower nearby may be a threat. (Credit: ESD) A user gets an alert that a “cell tower” nearby may be a threat. (Credit: ESD) The origin of these devices that disguise themselves as cell phone towers is not known. CBS 2 security analyst Ross Rice, a former FBI agent, said it’s likely being used illegally. “I doubt that they are installed by law enforcement as they require a warrant to intercept conversations or data and since the cell providers are ordered by the court to cooperate with the intercept, there really would be no need for this,” Rice said. “Most likely, they are installed and operated by hackers, trying to steal personal identification and passwords.” Les Goldsmith, the CEO of ESD America, which makes secure cell phones, said law enforcement, with a warrant, can use interceptor devices if they need information in real time, or if they don’t want a cellular network to know what they are tracking. These devices don’t look like a tower, but are rather electronic boxes and laptops that trick a regular phone that it’s part of an actual cellular network. How did ESD customers discover these interceptor devices? ESD America’s cellphones protect users data, phone calls and text. The phone looks like a typical Android phone, but the inside includes encryption algorithms developed by a German company, GSMK, that protects the phone from intercepts. ESD has asked them to report when their devices detect a threat.
Posted on: Thu, 04 Sep 2014 15:11:36 +0000

Trending Topics



Recently Viewed Topics




© 2015