Phony cell towers known as “interceptors”

angelburst29

The Living Force
Although cell towers come in different shapes and sizes, some even camouflaged to look like (fake) trees or church spire's, there was the assumption that they were just cell tower's? Some are even outfitted with camera's. This article describes tower's that are interceptors and the vulnerabilities that were discovered.

Every smart phone has a secondary OS, which can be hijacked by high-tech hackers.

_http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls

Saturday August 27, 2014

Like many of the ultra-secure phones that have come to market in the wake of Edward Snowden's leaks, the CryptoPhone 500, which is marketed in the U.S. by ESD America and built on top of an unassuming Samsung Galaxy SIII body, features high-powered encryption. Les Goldsmith, the CEO of ESD America, says the phone also runs a customized or "hardened" version of Android that removes 468 vulnerabilities that his engineering team team found in the stock installation of the OS.

His mobile security team also found that the version of the Android OS that comes standard on the Samsung Galaxy SIII leaks data to parts unknown 80-90 times every hour. That doesn't necessarily mean that the phone has been hacked, Goldmsith says, but the user can't know whether the data is beaming out from a particular app, the OS, or an illicit piece of spyware. His clients want real security and control over their device, and have the money to pay for it.

To show what the CryptoPhone can do that less expensive competitors cannot, he points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. (The map below is from August.) Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device.


August GSM Interceptor Map ESD
“Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”


Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions.

“What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases. So we begin to wonder – are some of them U.S. government interceptors? Or are some of them Chinese interceptors?” says Goldsmith. “Whose interceptor is it? Who are they, that's listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don't really know whose they are.”

Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. Whether your phone uses Android or iOS, it also has a second operating system that runs on a part of the phone called a baseband processor. The baseband processor functions as a communications middleman between the phone’s main O.S. and the cell towers. And because chip manufacturers jealously guard details about the baseband O.S., it has been too challenging a target for garden-variety hackers.

“The baseband processor is one of the more difficult things to get into or even communicate with,” says Mathew Rowley, a senior security consultant at Matasano Security. “[That’s] because my computer doesn't speak 4G or GSM, and also all those protocols are encrypted. You have to buy special hardware to get in the air and pull down the waves and try to figure out what they mean. It's just pretty unrealistic for the general community.”


But for governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example. Edward Snowden revealed that the N.S.A. is capable of an over-the-air attack that tells the phone to fake a shut-down while leaving the microphone running, turning the seemingly deactivated phone into a bug. And various ethical hackers have demonstrated DIY interceptor projects, using a software programmable radio and the open-source base station software package OpenBTS – this creates a basic interceptor for less than $3,000. On August 11, the F.C.C. announced an investigation into the use of interceptors against Americans by foreign intelligence services and criminal gangs.

An “Over-the-Air” Attack Feels Like Nothing

Whenever he wants to test out his company’s ultra-secure smart phone against an interceptor, Goldsmith drives past a certain government facility in the Nevada desert. (To avoid the attention of the gun-toting counter-intelligence agents in black SUVs who patrol the surrounding roads, he won't identify the facility to Popular Science). He knows that someone at the facility is running an interceptor, which gives him a good way to test out the exotic “baseband firewall” on his phone. Though the baseband OS is a “black box” on other phones, inaccessible to manufacturers and app developers, patent-pending software allows the GSMK CryptoPhone 500 to monitor the baseband processor for suspicious activity.

So when Goldsmith and his team drove by the government facility in July, he also took a standard Samsung Galaxy S4 and an iPhone to serve as a control group for his own device.

”As we drove by, the iPhone showed no difference whatsoever. The Samsung Galaxy S4, the call went from 4G to 3G and back to 4G. The CryptoPhone lit up like a Christmas tree.”

Though the standard Apple and Android phones showed nothing wrong, the baseband firewall on the Cryptophone set off alerts showing that the phone’s encryption had been turned off, and that the cell tower had no name – a telltale sign of a rogue base station. Standard towers, run by say, Verizon or T-Mobile, will have a name, whereas interceptors often do not.

And the interceptor also forced the CryptoPhone from 4G down to 2G, a much older protocol that is easier to de-crypt in real-time. But the standard smart phones didn’t even show they’d experienced the same attack.

“If you've been intercepted, in some cases it might show at the top that you've been forced from 4G down to 2G. But a decent interceptor won't show that,” says Goldsmith. “It'll be set up to show you [falsely] that you're still on 4G. You'll think that you're on 4G, but you're actually being forced back to 2G.”

So Do I Need One?

Though Goldsmith won’t disclose sales figures or even a retail price for the GSMK CryptoPhone 500, he doesn’t dispute an MIT Technology Review article from this past spring reporting that he produces about 400 phones per week for $3,500 each. So should ordinary Americans skip some car payments to be able to afford to follow suit?

It depends on what level of security you expect, and who you might reasonably expect to be trying to listen in, says Oliver Day, who runs Securing Change, an organization that provides security services to non-profits.

“There's this thing in our industry called “threat modeling,” says Day. “One of the things you learn is that you have to have a realistic sense of your adversary. Who is my enemy? What skills does he have? What are my goals in terms of security?”

If you’re not realistically of interest to the U.S. government and you never leave the country, then the CryptoPhone is probably more protection than you need. Goldsmith says he sells a lot of phones to executives who do business in Asia. The aggressive, sophisticated hacking teams working for the People’s Liberation Army have targeted American trade secrets, as well as political dissidents.

Day, who has written a paper about undermining censorship software used by the Chinese government, recommends people in hostile communications environments watch what they say over the phone and buy disposable “burner” phones that can be used briefly and then discarded.

“I'm not bringing anything into China that I'm not willing to throw away on my return trip,” says Day.

Goldsmith warns that a “burner phone” strategy can be dangerous. If Day were to call another person on the Chinese government’s watch list, his burner phone’s number would be added to the watch list, and then the government would watch to see who else he called. The CryptoPhone 500, in addition to alerting the user whenever it’s under attack, can “hide in plain sight” when making phone calls. Though it does not use standard voice-over-IP or virtual private network security tools, the CryptoPhone can make calls using just a WI-FI connection -- it does not need an identifiable SIM card. When calling over the Internet, the phone appears to eavesdroppers as if it is just browsing the Internet.
 
What is described as an "interceptor" cell tower in the first Post, purporting to be a valid cell tower - also mimics an existing cellular surveillance system commonly known as "a stingray" by the Department of Defense and law enforcement agencies.

"One of the primary ways that stingrays operate is by taking advantage of a design feature in any phone available today. When 3G or 4G networks are unavailable, the handset will drop down to the older 2G network. While normally that works as a nice last-resort backup to provide service, 2G networks are notoriously insecure. Handsets operating on 2G will readily accept communication from another device purporting to be a valid cell tower, like a stingray. So the stingray takes advantage of this feature by jamming the 3G and 4G signals, forcing the phone to use a 2G signal."


_http://massprivatei.blogspot.com/2014/09/police-across-country-are-upgrading.html

Wednesday September 3, 2014

Documents released last week by the City of Oakland reveal that it is one of a handful of American jurisdictions attempting to upgrade an existing cellular surveillance system, commonly known as a stingray.

The Oakland Police Department, the nearby Fremont Police Department, and the Alameda County District Attorney jointly applied for a DHS grant to "obtain a state-of-the-art cell phone tracking system," the records show.

Stingray is a trademark of its manufacturer, publicly traded defense contractor Harris Corporation, but "stingray" has also come to be used as a generic term for similar devices.

The cellular surveillance system's upgrade, known as Hailstorm, is necessary. Existing stingray devices will no longer work in a few years as older phone networks get turned off.


According to Harris' annual report, which was filed with the Securities and Exchange Commission last week, the company profited over $534 million in its latest fiscal year, the most since 2011.

"We do not comment on solutions we may or may not proivde to classified Department of Defense or law enforcement agencies," Jim Burke, a spokesman for Harris.

Other locales known to be in the process of related federally-funded upgrades include Tacoma, Wash.; Baltimore, Md.; Chesterfield, Va.; Sunrise, Fla.; and Oakland County, Mich. There are likely many more, but such purchases are often shrouded in secrecy.

Cops have lied to courts about the use of such technology. Not only can stingrays be used to determine a phone’s location, but they can also intercept calls and text messages.

Robert Shipway, of the Alameda County Public Defender’s Office, said he was not aware of their described use during the process of criminal discovery in county prosecutions in recent years. That could mean that local law enforcement and prosecutors are concealing or obscuring their use.

"The upgrade has not been fulfilled," Michael O’Connor, an assistant district attorney in Alameda County, told Ars. "It has not been approved and it has not been purchased."

He also noted that the county had applied for a similar grant to conduct an upgrade in 2012, but that application was denied, and he did not know why.

O’Connor also said that his office was currently in the process of gathering more relevant documents and would publicly release them in September. According to the newly released documents, the entire upgrade will cost $460,000—including $205,000 in total Homeland Security grant money, and $50,000 from the Oakland Police Department (OPD). Neither the OPD nor the mayor's office immediately responded to requests for comment.

Christopher Soghoian, a technologist with the American Civil Liberties Union said, little is known about the upgrades Hailstorm offers.

"The only difference that we know about is the 4G," he said, citing a purchase order from the Drug Enforcement Agency first unearthed by The News Tribune in Tacoma. That March 2014 document states: "Stingray II to Hailstrom Upgrade, etc. The Hailstorm Upgrade is necessary for the Stingray system to track 4G LTE Phones"

He explained that the new upgrade will continue to provide existing surveillance capability even after major cellular providers turn off support for the legacy 2G network, which is expected to occur in upcoming years. In 2012, AT&T announced that it would be shutting down its 2G network in 2017.

Without the forced downgrade to 2G, a 4G phone targeted by a stingray would not be susceptible to the same types of interception at present, but it likely would still be susceptible to location tracking.
"Presumably, at some point after, new phones sold by AT&T will no longer support 2G," Soghoian added. "Once new phones stop working with 2G, Stingrays won't work any more. At that point, the Hailstorm will be the only way."

Thomas Pica, a Verizon spokesman, said the company's network would be operational "through the end of the decade." T-Mobile nor Sprint did not comment.

"These things aren't cheap," Soghoian added. "My guess is that there are law enforcement agencies around the country who are frantically trying to find the money because at some point in the future, in the next two to five years, their existing stingrays are going to stop working and my guess is that they're really worried about that."

Other firms that make related devices include Martone Radio Technology, located 25 miles from Oakland, in San Ramon, Calif. Martone also did not respond to Ars' request for comment. Martone advertises 4G LTE interception on its site.

For now, 4G LTE stingray-like devices appear relatively rare.

"We haven't seen any 4G LTE IMSI catchers from any of the brochures from companies that we've picked up yet, so this will be the first," Eric King, the deputy director of Privacy International, told Ars, using another name for stingrays.

His London-based organization, in conjunction with WikiLeaks and other groups, released the Spy Files in 2011, which includes many corporate documents illustrating telecom interception and surveillance.

_http://arstechnica.com/tech-policy/2014/09/cities-scramble-to-upgrade-stingray-tracking-as-end-of-2g-network-looms/

Also:
_http://www.usatoday.com/story/news/politics/2014/09/02/appeals-court-government-phone-surveillance-aclu/14973301/
 
angelburst29,

Thanks for the story and the links. Well, I guess I wanted to be here and see how things turn out but the devil is in the details as they say. Many of us suspect the technology is already in place for the control system and this is just more proof of how bad it is and it probably will get worse.

from the first link above: _http://arstechnica.com/tech-policy/2014/09/cities-scramble-to-upgrade-stingray-tracking-as-end-of-2g-network-looms/

As a result, one state lawmaker has even recently attempted to regulate the device’s use in the wake of the disclosure of the Hailstorm acquisition in Oakland County, Mich.

"The most frustrating part of this whole situation is that the county continually refuses to share information on what the technology does, while telling lawmakers and the public to just trust them," Michigan state representative Tom McMillin said in a statement in June 2014. "Among other things, this technology can mimic cell towers to collect data, and citizens wouldn’t have any way of knowing their privacy, or worse their rights, have been violated. To me, that runs into our constitutional rights."

Of course will the PTB care about any personal rights? I doubt it.

Thanks,

goyacobol :(
 
Back
Top Bottom