Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: rarestia
"We're going to see more attacks that are leveraging WiFi hotspots, fake base stations or even more aggressive exploitation of mobile browsers or messaging applications," he told TechNewsWorld.

I thought so too. I posted an article on FR not too long ago about faux cell towers spoofing cell phones near military bases around the country intercepting calls and passing them on into the cell system. . . but no one knows whose they are. . . and what's being done with the cell traffic that goes through those "fake" or "unaffiliated" towers.

4 posted on 12/08/2014 4:01:22 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 3 | View Replies ]


To: Swordmaker

As a HAM radio operator, I’ve designed and setup my fair share of antennae arrays, and I’ve seen some antennae around cell towers that left me dumbfounded as to their utility. Oftentimes they were outside or actually on the fence surrounding the base which is against regulations.


5 posted on 12/08/2014 5:09:58 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson