Blog Posts

Eavesdropping via Fake Cell Towers

posted by
Filed under: First Amendment Issues, Fraud and Deception

Can you hear me now? In case you still thought you had personal privacy…


Fake Cell Towers Allow the NSA and Police to Keep Track of You
By Lauren Walker
Newsweek
September 5, 2014

phony-towers-425

The Internet is abuzz with reports of mysterious devices sprinkled across America””many of them on military bases””that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but they are the new favorite toy of government agencies of all stripes; everyone from the National Security Agency to local police forces are using them.

These fake towers, known as “interceptors,” were discovered in July by users of the CryptoPhone500, one of the ultra-secure cell phones released after Edward Snowden”™s leaks about NSA snooping. The phone is essentially a Samsung Galaxy S3 customized with high-level encryption that costs around $3,500. While driving around the country, CryptoPhone users plotted on a map every time they connected to a nameless tower (standard towers run by wireless service providers like Verizon usually have names) and received an alert that the device had turned off their phone”™s encryption (allowing their messages to be read). Read the rest of this article here.

NSA Cracks Smartphone Security. Why Wear Clothes?

posted by
Filed under: First Amendment Issues

The NSA Can Access Basically Everything On iOS, Android and Blackberry
by Lily Hay Newman
Gizmodo
August 8, 2013

ku-bigpic-200I guess we’re not even surprised at this point. Der Spiegel is reporting that internal NSA documents prove the agency’s widespread smartphone data access. And it’s pretty exhaustive. Spiegel found explicit mention of information access from iPhones, BlackBerry handsets, and devices running Android.

Everything from contact lists to texts and location tracking is available, and the NSA has set up teams to specialize in cracking each operating system. These teams also look for additional gains like the ability to monitor a user’s computer after an iPhone sync, and get access from there to even more iPhone features.

The news is problematic for RIM in particular, because the security of BlackBerry mail has always been a touted feature. A RIM representative made a statement to Der Spiegel that, “It is not for us to comment on media reports regarding alleged government surveillance of telecommunications traffic.”

Der Spiegel notes that the documents indicate specific, customized access on the part of the NSA, perhaps without company knowledge, rather than widespread smartphone surveillance. But at this point who knows. [Der Spiegel]

image: Gizmodo

Iranian Prank Calls the NSA

posted by
Filed under: Political Pranks, Satire

We interviewed the guy who prank-called the NSA
by Brian Fung
WashingtonPost.com
September 1, 2013

The NSA is in dire need of customer service training “” at least in the case of Bahram Sadeghi, a Dutch-Iranian filmmaker who decided to call the surveillance agency for “help” after one of his e-mails was accidentally deleted. In a three-minute exchange with NSA spokespeople, Sadeghi manages to confound one with his request (you can almost hear the relief in her voice when Sadeghi asks to speak to someone else) and gets a curt reply from another.

How did Sadeghi pull off his trick? In an interview Sunday, the prankster revealed how his plan came together and where it went off the rails. The following transcript has been lightly edited for clarity.

Read the rest of the story here.

via BoingBoing