Without our knowledge the government has been putting up cell towers of their own so they can hack your cell phone. what is the reason for this? shouldn’t we have some agreement with phone carriers that they are the only ones to build these microwave stations. these are not stingrays from local police, these are being implemented for the u.s. military. i see this as no different then the u.s. military using weapons against us right in our neighborhoods. i suggest moving away from all cell/micro wave towers because of the deathly radiation they admit.
The towers attack the baseband radio in your phone and use it to hack the OS; they’re only visible if you’re using one of the customized, paranoid-Android, post-Snowden secure phones, and they’re all around US military bases.
ESD’s Cryptophone 500 spotted 17 of the fake cellular towers on casual drives around the USA, including one at the South Point Casino in Las Vegas. The baseband processor, which controls the phone’s radio, is notoriously insecure and vulnerable to over-the-air attacks; it can serve as a back-door to your phone’s main OS. The fake “interceptor” towers force your phone to back \\down to an easy-to-break 2G connection, then goes to work:
Whenever he wants to test out his company’s ultra-secure smart phone against an interceptor, Goldsmith drives past a certain government facility in the Nevada desert. (To avoid the attention of the gun-toting counter-intelligence agents in black SUVs who patrol the surrounding roads, he won’t identify the facility to Popular Science). He knows that someone at the facility is running an interceptor, which gives him a good way to test out the exotic “baseband firewall” on his phone. Though the baseband OS is a “black box” on other phones, inaccessible to manufacturers and app developers, patent-pending software allows the GSMK CryptoPhone 500 to monitor the baseband processor for suspicious activity.
So when Goldsmith and his team drove by the government facility in July, he also took a standard Samsung Galaxy S4 and an iPhone to serve as a control group for his own device.
”As we drove by, the iPhone showed no difference whatsoever. The Samsung Galaxy S4, the call went from 4G to 3G and back to 4G. The CryptoPhone lit up like a Christmas tree.”
Though the standard Apple and Android phones showed nothing wrong, the baseband firewall on the Cryptophone set off alerts showing that the phone’s encryption had been turned off, and that the cell tower had no name – a telltale sign of a rogue base station. Standard towers, run by say, Verizon or T-Mobile, will have a name, whereas interceptors often do not.
- A Horrifying Drought Is Causing Widespread Crop Failures Throughout The United States And Europe
- China’s Warning ENTIRE Economy Will Collapse In 34 Days
- Ron Paul: “With each passing day, the Biden Administration drifts further & further from reality… The painful economic realities of government spending and Fed inflation are staring every American in the face.”
- CDC is quietly deleting misleading information from their website. The following statement was removed from their website between July 16th and July 22nd
- China ending paper trading in Precious Metals On MONDAY, could be HUGE
- An EU Satellite captures a terrifying picture of Western Europe, almost looks like the Sahara
- A man apprehends a thief who sucker punched an elderly customer and stole his wallet and phone.
- Tom Fitton: “I’ve reviewed the warrant material released in response to Judicial Watch court request. It is all a scam.”
- Disturbing Proof They’re Quietly Deleting the Internet
- People Are Going To Go Absolutely Insane When Food Prices Double Or Triple From Current Levels