A security company says it has found 19 different phony cell towers’ located throughout the United States. (see map below) The fake towers are found in New York City, Chicago, Dallas and Los Angeles. There is even one tower in Nevada that was found near a government facility out in the desert. Customers who are using the Crypto phone 500, sold by ESD America, have detected signals from transmitters masquerading as cell towers that, if a cell phone connects to it, can track the phone’s location or leave data on its operating system vulnerable to attacks. Meaning that if you pass the tower or close to it, your information in your phone can leave a digital mark and all the information to it and people will be able to locate you through your GPS. It isn’t clear who installed these ‘towers,’ devices with the ability to trick cellphones into connecting to their network have existed for decades.
The Wall Street Journal reported in 2011 that the Federal Bureau of Investigations used a device known as a stingray to catch tax fraud Daniel David Rigmaiden. Also, the Los Angeles Police Department purchased a stingray and used it to monitor 21 individuals, according to L.A. Weekly.
But Critics question the constitutionality of stingrays. The LAPD used the device to track burglary and murder suspects. Despite the fact of them saying the device would be used for ‘regional terrorism investigations’ in the grant application submitted to the Department of Homeland Security.
Popular Science reports that the devices target a smartphone’s ‘baseband operating system,’ which receives radio signals such as cellular, Bluetooth and Wi-Fi.
This functions together with a smartphone’s more user-friendly operating system and personal data can be vulnerable on some phones where the two operating systems communicate.
These towers should be offering you cellphone service, but it appears to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts.
With most phones, these fake communication towers are undetectable. But not for the Crypto Phone 500, a customized Android device that is disguised as a Samsung Galaxy S III but has highly advanced encryption.
Do you think it is the NSA? The NSA agency can tap all it wants without the need for bogus towers, Venture Beat reported:
Not the NSA, cloud security firm SilverSky CTO/SVP Andrew Jaquith told us.
So whose is it? Why isn’t anyone checking into it? Or do they really know and just is not telling us? Well let me know what you think!