Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

'Suspicious' Cellular Activity In D.C. Suggests Monitoring of Individual Smartphones
CBS News ^ | Marxh 18 2017 ast | Julia Kimani

Posted on 03/19/2017 4:51:46 PM PDT by drewh

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-33 last
To: drewh

I wonder what they’re actually saying. Packet cloning?


21 posted on 03/19/2017 7:37:35 PM PDT by lepton ("It is useless to attempt to reason a man out of a thing he was never reasoned into"--Jonathan Swift)
[ Post Reply | Private Reply | To 1 | View Replies]

To: drewh

Welcome to DC where the phones are “smart” and the “politicians” aren’t.


22 posted on 03/19/2017 7:39:51 PM PDT by MadMax, the Grinning Reaper
[ Post Reply | Private Reply | To 1 | View Replies]

To: drewh
From the article:Who is Kelly? Article doesn't say.
23 posted on 03/19/2017 9:01:45 PM PDT by upchuck (U have not lived today until u have done something for someone who can never repay u ~ John Bunyan)
[ Post Reply | Private Reply | To 1 | View Replies]

When your cell battery is dying 2-3 times faster it means the towers are pinging constantly to keep tabs of your location (among many other things).


24 posted on 03/20/2017 4:13:24 AM PDT by USCG SimTech
[ Post Reply | Private Reply | To 3 | View Replies]

To: Cementjungle

CBS is probably right in this case. (Broken clock) I’m sure that 0vomit gave all this information to hostile foreign governments so they didn’t need to monitor. Now that Trump is in the WH, the free flow of information to hostile powers has been cut.


25 posted on 03/20/2017 9:32:19 AM PDT by generally ( Don't be stupid. We have politicians for that.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: MadMax, the Grinning Reaper

Very good!


26 posted on 03/20/2017 10:05:47 AM PDT by homegroan (New to the Beltway: The TrumpTrap - guaranteed to TRAP Fake News -AND proudly Made in the USA!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: drewh
ESD America, hired preemptively for a DHS pilot program this January called ESD Overwatch, first noticed suspicious activity around cell phone towers in certain parts of the capital, including near the White House. This kind of activity can indicate that someone is monitoring specific individuals or their devices.

Huh?


WHAT kind???

Dogs marrying cats?

27 posted on 03/21/2017 3:07:27 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: drewh
“For several years, cyber security experts have repeatedly warned that U.S. cellular communications networks are vulnerable to surveillance by foreign governments, hackers, and criminals exploiting vulnerabilities in Signaling System 7,” wrote Sen. Ron Wyden (D-Oregon) and Rep. Ted Lieu (D-California). “U.S. cellular phones can be tracked, tapped, and hacked—by adversaries thousands of miles away—through SS7-enabled surveillance. We are deeply concerned that the security of America’s telecommunications infrastructure is not getting the attention it deserves.”

I DO wish they'd make up their mind!

28 posted on 03/21/2017 3:08:53 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PhiloBedo

Stingray’s big brother Manta ray.


29 posted on 03/21/2017 3:10:20 AM PDT by mad_as_he$$
[ Post Reply | Private Reply | To 6 | View Replies]

To: drewh
DHS confirmed the pilot program but did not comment on the suspicious activity.

WHAT??

Then WHERE did THIS come from??


According to the ESD America source, the first such spike of activity was in D.C. but there have been others in other parts of the country.

Based on the type of technology used, the source continued, it is likely that the suspicious activity was being conducted by a foreign nation.


This is not only a nothing burger; but it's made from tofu!!

I DO wish they'd make up their mind!

30 posted on 03/21/2017 3:12:03 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 353FMG
>raising concerns that U.S. officials are being monitored by a foreign entity.<

NOW the FBI can put much more man-power on this; since Brady's jersey has been rescued!!

31 posted on 03/21/2017 3:13:35 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Elsie

If WIKI knows...


Logging and eavesdropping[edit]

Proxies can be installed in order to eavesdrop upon the data-flow between client machines and the web. All content sent or accessed – including passwords submitted and cookies used – can be captured and analyzed by the proxy operator. For this reason, passwords to online services (such as webmail and banking) should always be exchanged over a cryptographically secured connection, such as SSL. By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind. In what is more of an inconvenience than a risk, proxy users may find themselves being blocked from certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to have spammed or trolled the site. Proxy bouncing can be used to maintain privacy.

 

 

 

Access control: Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the web. The organization can thereby track usage to individuals. Some anonymizing proxy servers may forward data packets with header lines such as HTTP_VIA, HTTP_X_FORWARDED_FOR, or HTTP_FORWARDED, which may reveal the IP address of the client. Other anonymizing proxy servers, known as elite or high-anonymity proxies, make it appear that the proxy server is the client. A website could still suspect a proxy is being used if the client sends packets which include a cookie from a previous visit that did not use the high-anonymity proxy server. Clearing cookies, and possibly the cache, would solve this problem.

 

 

 

Detection[edit]

There are several methods that can often be used to detect the presence of an intercepting proxy server:

https://en.wikipedia.org/wiki/Proxy_server
 
 

32 posted on 03/21/2017 3:34:24 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 31 | View Replies]

To: drewh

They should watch “Goodfellas.”

The mobster Paulie, I believe was his name, hated phones and insisted that his messages be delivered face-to-face.

It’s probably not practical in today’s world, but it’s certainly safer.


33 posted on 03/21/2017 9:55:14 AM PDT by proud American in Canada (May God Bless the U.S.A. (Trump: I will bear the slings and arrows for you, the American people).)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-33 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson