Eavesdropping via Fake Cell Towers

Can you hear me now? In case you still thought you had personal privacy…


Fake Cell Towers Allow the NSA and Police to Keep Track of You
By Lauren Walker
Newsweek
September 5, 2014

phony-towers-425

The Internet is abuzz with reports of mysterious devices sprinkled across America””many of them on military bases””that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but they are the new favorite toy of government agencies of all stripes; everyone from the National Security Agency to local police forces are using them.

These fake towers, known as “interceptors,” were discovered in July by users of the CryptoPhone500, one of the ultra-secure cell phones released after Edward Snowden”™s leaks about NSA snooping. The phone is essentially a Samsung Galaxy S3 customized with high-level encryption that costs around $3,500. While driving around the country, CryptoPhone users plotted on a map every time they connected to a nameless tower (standard towers run by wireless service providers like Verizon usually have names) and received an alert that the device had turned off their phone”™s encryption (allowing their messages to be read). Read the rest of this article here.

Have a Secret? Good Luck

Ever wonder what’s happening with all the data the NSA has collected on you?


New Snowden Leak: NSA Shares 850 Billion Metadata Records Via Search Portal
by Graham Cluley
Tripwire.com
August 27, 2014

783640841-425

Some are starting to consider Edward Snowden as the NSA”™s old, boring uncle. His leaks grimly pass around secrets of the NSA: online surveillance disclosures, the MonsterMind program and privacy invasion of international governments. And still revelations about the NSA”™s classified activities continue to tumble out.

The latest? The National Security Agency is supplying data to two dozen US government agencies courtesy of a “Google-like” search engine designed to share 850 billion records about emails, cellphone locations, Internet chats and phone calls, according to classified documents provided to The Intercept by none other than Edward Snowden.

The tool, called ICREACH, includes millions of records on innocent US citizens (not accused of any wrongdoing), as well as private communications of foreigners. While a multitude of NSA programs have been exposed for collecting large data of communications, and the NSA has admitted sharing some of the collected information with domestic agencies, no one had a clue about the scoop and insights of its sharing. Read the rest of this article here.

NSA Cracks Smartphone Security. Why Wear Clothes?

The NSA Can Access Basically Everything On iOS, Android and Blackberry
by Lily Hay Newman
Gizmodo
August 8, 2013

ku-bigpic-200I guess we’re not even surprised at this point. Der Spiegel is reporting that internal NSA documents prove the agency’s widespread smartphone data access. And it’s pretty exhaustive. Spiegel found explicit mention of information access from iPhones, BlackBerry handsets, and devices running Android.

Everything from contact lists to texts and location tracking is available, and the NSA has set up teams to specialize in cracking each operating system. These teams also look for additional gains like the ability to monitor a user’s computer after an iPhone sync, and get access from there to even more iPhone features.

The news is problematic for RIM in particular, because the security of BlackBerry mail has always been a touted feature. A RIM representative made a statement to Der Spiegel that, “It is not for us to comment on media reports regarding alleged government surveillance of telecommunications traffic.”

Der Spiegel notes that the documents indicate specific, customized access on the part of the NSA, perhaps without company knowledge, rather than widespread smartphone surveillance. But at this point who knows. [Der Spiegel]

image: Gizmodo

Iranian Prank Calls the NSA

We interviewed the guy who prank-called the NSA
by Brian Fung
WashingtonPost.com
September 1, 2013

The NSA is in dire need of customer service training “” at least in the case of Bahram Sadeghi, a Dutch-Iranian filmmaker who decided to call the surveillance agency for “help” after one of his e-mails was accidentally deleted. In a three-minute exchange with NSA spokespeople, Sadeghi manages to confound one with his request (you can almost hear the relief in her voice when Sadeghi asks to speak to someone else) and gets a curt reply from another.

How did Sadeghi pull off his trick? In an interview Sunday, the prankster revealed how his plan came together and where it went off the rails. The following transcript has been lightly edited for clarity.

Read the rest of the story here.

via BoingBoing