Wednesday, September 3, 2014

Mysterious Fake Mobile Phone Towers Discovered



Fake Cell Phone Towers are discovered by people using a heavily customized Android device - but it's unclear who owns them.





CHICAGO (CBS) — So-called rogue cell phone towers, the type that can intercept your mobile calls and data, are cropping up all over the United States, including here in Chicago, according to a company that specializes in developing highly secure mobile phones.

More cell phone users, who fear their information could be at risk, are turning to high-end secure mobile devices. As a result, it is become easier for them to detect the presence of these interceptor devices.
A user gets an alert that a "cell tower" nearby may be a threat. (Credit: ESD)
A user gets an alert that a “cell tower” nearby may be a threat. (Credit: ESD)

The origin of these devices that disguise themselves as cell phone towers is not known.
CBS 2 security analyst Ross Rice, a former FBI agent, said it’s likely being used illegally.
“I doubt that they are installed by law enforcement as they require a warrant to intercept conversations or data and since the cell providers are ordered by the court to cooperate with the intercept, there really would be no need for this,” Rice said.

“Most likely, they are installed and operated by hackers, trying to steal personal identification and passwords.”

Les Goldsmith, the CEO of ESD America, which makes secure cell phones, said law enforcement, with a warrant, can use interceptor devices if they need information in real time, or if they don’t want a cellular network to know what they are tracking.

These devices don’t look like a tower, but are rather electronic boxes and laptops that trick a regular phone that it’s part of an actual cellular network.

How did ESD customers discover these interceptor devices?

ESD America’s cellphones protect users data, phone calls and text. The phone looks like a typical Android phone, but the inside includes encryption algorithms developed by a German company, GSMK, that protects the phone from intercepts.

ESD has asked them to report when their devices detect a threat.


Anyone out there know anything about these?

No comments:

Post a Comment