Posted on 09/03/2014 7:36:16 PM PDT by gunsmithkat
A secure cell phone maker has uncovered more than a dozen cell phone towers around the U.S. that no one seems to know who owns them and no one is sure how they get installed.
The towers were uncovered by ESD America, which built the CryptoPhone 500, a highly modified Galaxy S III secured phone with end-to-end encryption and firewall protection of its baseband chip, plus its own custom Android distribution with many vulnerabilities the ESD team found and removed.
(Excerpt) Read more at itworld.com ...
I can guarantee there are many more. If I so much as take my flip phone out and open it up I will be removed from some work sites. (Phone confiscated as well)
The map shows them mainly along the borders.
Why would one be in Asheville? There’s nothing there except a bunch of washed out hippies.
I read this article on Drudge. The one thing that the article gets wrong is that it says that it can’t be a a law enforcement effort.
How do I know that is wrong? The Feds have been supplying law enforcement in WA State with equipment to listen in and track any cell phone in the county. Blaine, WA has a mobile van tha equipped for this purpose and Tacoma, WA has what I believe to be more stationary equipment.
I read this article on Drudge. The one thing that the article gets wrong is that it says that it can’t be a a law enforcement effort.
How do I know that is wrong? The Feds have been supplying law enforcement in WA State with equipment to listen in and track any cell phone in the county. Blaine, WA has a mobile van tha equipped for this purpose and Tacoma, WA has what I believe to be more stationary equipment.
Thats an ESD cellphone map. Quite inconclusive.
I learned a new word today. Thanks.
Pretty sure the town or county deeds know.
Most of these are around military installations in remote areas where commercial service is poor at best. Ft. Bliss, WSMR, Ft. Irwin, the western test ranges. Commercial cell phone service has become an important supplement for training and testing and there is insufficient population density to justify commercial installation. Someone used year end funds to build these and made deals with providers to provide service. At White Sands, I believe that its Sprint that does this. You can’t get service from anyone else up on the northern ranges.
PARI in nearby Rosman is a Cold War era mountaintop facility apparently still in operation. It’s long been reputed to be a sort of “spook” spy site.
The NCDC division of NOAA is in Asheville. Related federal facilities once filled the historic Grove Arcade, which has since been restored and the federal offices relocated.
ping
They are keeping us safe.
Why, all those red spots look like drug hubs!
No wonder nobody can get a collar on them.
That involves CALEA intercepts and other intercepts by law enforcement — which is different than unidentified cell towers. They don’t need special cell towers to track communications - they can use the carrier equipment and just call in an intercept whether it is cellular or wifi. My guess is the cell towers are military.
What about the Vanderbilt property? I know most of it is a museum, but I seem to recall that the family still maintains some private apartments in the mansion. Just brainstorming.
CC
Obama/Jarrett trying to catch a general talking to his girlfriend so they can purge him?
Google owns them.
They can listen in to any phone call in the county and track it, right from their van. If they were going through the phone companies, they would need a warrant, they do not have warrants for what they are doing.
The interceptor tower also forced the CryptoPhone from 4G down to 2G, a much older protocol that is easier to de-crypt in real-time. But the standard smart phones didnt even show theyd experienced the same attack.
Smartphones should get smarter.
The linked Popular Science article is here:
From that article:
...But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example. Edward Snowden revealed that the N.S.A. is capable of an over-the-air attack that tells the phone to fake a shut-down while leaving the microphone running, turning the seemingly deactivated phone into a bug. And various ethical hackers have demonstrated DIY interceptor projects, using a software programmable radio and the open-source base station software package OpenBTS this creates a basic interceptor for less than $3,000.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.