It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: theantediluvian
a reply to: Maxmars
...
They're really not as expensive as the author leads on (or particularly new). Here's an article about the demonstration of an IMSI-catcher at DefCon in 2010 that cost about $1500 to put together:
Wired - Hacker Spoofs Cell Phone Tower to Intercept Calls
There's some interesting information at the Android IMSI-Catcher Detector project site including a list of links to even more information.
originally posted by: eriktheawful
Just another reason why I'm glad I do not own a cell phone.
originally posted by: douglas5
I wonder what Steve jobs was thinking now
originally posted by: ANNED
NSA or a hacker looking for credit card numbers, passwords ect ect ect.
originally posted by: Bone75
What better way to squash any kind of opposition to our fascist dictators, before it even gets started, than this?
originally posted by: MystikMushroom
It's called "Stingray" and the ACLU is aware of it:
ACLU - "Stingray"
If you have something important to tell someone, and you don't want anyone but the intended recipient to hear it -- discuss it in person, in an interior room without windows and very loud white noise.
originally posted by: thinline
I could be reading this post wrong. What we are talking about is that some people who are making a product that creates privacy just came out and said that there is less privacy then we all thought. Therefore, creating a bigger need and giving their start up company more press then they could pay for.
Not saying they are lying, just saying clarification/verification would be nice before we go all ranty
originally posted by: AgentSmith
1) The headline is misleading (not your fault OP) - it implies they are only spying on Android devices - not so...
2) These 'towers' which are more likely to be small femtocell sized homebrew devices can be easily constructed by someone who can read, understands Linux, has some mediocre programming skills and any amount of money ranging from about $50 to many thousands.
So much disinformation as usual and the usual 'Government are doing it' crowd are out in force I see....
So sorry to burst the 'government did it' crowds bubble...
originally posted by: Leonidas
There are nineteen (19) towers identified in this article I just read. The conclusion in the article discount the NSA as the culprit because they have easier and more complete ways to do this and dont need these towers.
....
Is this part of the same Android story being reported, or is it something else?
originally posted by: Dragoon01
Very similar to a thread I saw last week.
A lot of implications that are not entirely supported by the facts.
This talks about fake “towers” and implies that the NSA is the operator of those towers.
Well that’s not the only possibility. Setting up a local cell is not that hard and not that costly.
There are companies that do it to improve connectivity in their campus for their employees.
They set up the tower and route the traffic over their corporate PBX. Their employees devices are authorized on the networks but all others are not.
So to your phone it looks like a fake tower.
What they did not do is do some locating of one of these “towers” and then cross reference that location with the FCC’s transmitter database.
If the tower was fake or not legit it would not show up in that data. If it’s a business operating it then it would be there and be identified.
If they did that however they would not have a marketing angle for their special super secret cryptophone.
originally posted by: Assassin82
I'm not suggesting that some people aren't out for some evil or sinister use for this technolgy or information. But I did want to suggest something in regards to the ones being on military installations.
Imagine a scenario where somehow, somway, someone takes truck full of explosives onto a miltary base and kills hundres of our troops. Imagine the outcry for better security and intelligence gathering. Now imagine if that base didn't have the ability to monitor cell phone track around the base. They had no early intelligence warnings that someone was planning something. That would be a terrible day for America.
Now imagine if they did, and the sole purpose was to listen for possible warnings or attacks. Some tracking algorythm picked up on a few key words, an alert goes out to SP's or MP's to either increase security protocol or shut down the base completely. They find and detain the bad guys or at the very least scare them off.
No dead soldiers, and you'd likely hear very little about it because it's not shocking enough to be carried on MSM. My point is, not everything and everyone is sinister in nature. Not everyone is out to get your nude photos stored on your phone or your password/credit card numbers/etc. Sometimes this technology is used to save lives.
But there certainly is no reason for it to be in a Casino or anything like that.
originally posted by: wmd_2008
a reply to: Maxmars
Had a quick look at the link doesn't really say what's claimed in the title.
So we have a guy PUSHING his OWN product claiming dozens of towers with NO real proof of the fake claim and in the link a road trip of possibly up to 650 miles they find 8 of these claimed fake towers.
Now since his phone is $3500 dollars what better way to push sales than make claims WE can't really check!!!
originally posted by: parad0x122
a reply to: Maxmars
I have to disagree about this, and kind of take it offensively being that I work in security myself.
There are those out there that actually do wish to protect those they are tasked to protect. That includes protection from an over-reaching gov't, as well as hackers.
Whether you consider Edward Snowden a traitor or a patriot, before he hit the news most people didn’t give much thought to government spying on everyday citizens. During a recent interview, he said that the NSA has the ability to spy on your smartphone, even if it's turned off.
The worst part is that even if you turned the phone off to be safe, it wouldn't really be off. The app makes your phone pretend to be off — it turns off the screen, ignores incoming calls and doesn't respond to button presses — but the spying will still be going on.
Location Reporting in Google Settings is available on devices running Android 2.3 or higher and have Google Maps for mobile 6.14.5 or higher installed.
Location Reporting allows Google to periodically store and use your device's most recent location data, as well as activities like driving, walking, and biking, in connection with your Google Account.
Location Reporting is a per-device setting and can potentially use a lot of data. We recommend that you review your data plan before using this feature. If Location Reporting is not available in your region, it’s automatically turned off for that device.
How often Location Reporting updates your location data isn't fixed. Frequency is determined by factors like how much battery life your device has, if you’re moving, or how fast you’re moving. Location Reporting will only use cell ID or Wi-Fi location detection depending on your device.
Android Police has unearthed a hidden app permissions manager that allows users to selectively disable certain permissions for apps.
The feature is apparently called App Ops, and lets users toggle app permissions — such as location and the ability to post notifications — on and off for individual apps. Android Police notes that a developer has already created an app (available here on Google Play if you have Android 4.3 installed) that foregrounds App Ops, and has been having a play around with it.
Tap the icon and you'll see something like this. There's list of all your apps and the permissions they use, categorized into 4 handy tabs. The tabs are broken down into "location," "personal," "messaging," and "device," so it's easy to see what app uses the permissions you're concerned about. On the right is a timestamp for when the app last used a permission.