Big Brother Strikes Again: 17 Fake Cell Phone Towers Across America


Last week many tech publications and websites, including Popular Science, broke news of the discovery of 17 fake cell phone towers found across America. Andrew Rosenblum notes in the aforementioned article that every smart phone has a secondary operating system, which can be hijacked.

Interesting.

The discovery was made because of an alert to users of smartphones.

Trending: Beto takes gun-grab jargon to the bank with new campaign t-shirts

090214_1943_BigBrotherS1.png

take our poll - story continues below

Would more gun control laws reduce mass shootings in America?

  • Would more gun control laws reduce mass shootings in America?  

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to Freedom Outpost updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

Computer World reported on this sobering discovery earlier today:

CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. If you think you’d know if your calls are being intercepted by seeing the phone connect to “2G,” then think again.

You wouldn’t likely know if you are under cell phone surveillance, but you would if you were about to make a call and your phone displayed an unencrypted connection warning that states, “Caution: The mobile network’s standard encryption has been turned off, possibly by a rogue base station (‘IMSI Catcher’). Unencrypted calls not recommended.”

Through notifications such as that, CryptoPhone users found and mapped 17 fake “cell towers” in the U.S. during the month of July. While most phones can’t find those interceptors, a $3,500 CryptoPhone 500 can. The phone has a Samsung Galaxy SIII body, but unlike the Android OS that comes standard on the Galaxy SIII and “leaks data to parts unknown 80-90 times every hour,” ESD America hardened the Android OS by removing 468 vulnerabilities.

There are many questions that need to be answered including who is placing these towers and why they are placing them.

We Live Security offers a clue:

“What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases,” says Goldsmith.  “Whose interceptor is it?  Who are they, that’s listening to calls around military bases?  The point is: we don’t really know whose they are.”

So is this an NSA related program? Will this be the next big revelation from Edward Snowden? Why are those towers near military bases?

Paul Joseph Watson discusses this topic in his latest video:

When are Americans going to stand up and say that they have had enough of these unnecessary invasions of privacy?

Our government spends so much time spying on “domestic terrorists” that they will surely miss those real dangers that are promising to cross our Southern Border.

Enough is enough.

Source

Don't forget to Like Freedom Outpost on Facebook and Twitter, and follow our friends at RepublicanLegion.com on Instagram.

You Might Like
Previous Ex-CIA Agent: Shariah Constitutions in Iraq and Afghanistan Written to Prepare for Physical Domination
Next Extortion 17 Parent: "The Greatest Security Threat the US faces Resides at 1600 Pennsylvania Avenue"

Join the conversation!

We have no tolerance for comments containing violence, racism, profanity, vulgarity, doxing, or discourteous behavior. If a comment is spam, instead of replying to it please click the ∨ icon to the right of the comment, and report it as spam. Thank you for partnering with us to maintain fruitful conversation.