“Fake Cell Phone Towers Are Eavesdropping On Your Calls” Claim Makers Of CryptoPhone 500

Satya Swaroop Dash

Satya Swaroop Dash

@satya-swaroop-YDeBJM Oct 25, 2024
Les Goldsmith, the CEO of ESD America and the brain child behind ultra-secure CryptoPhone 500 claims that cell phone towers in at least 17 locations in the United States of America are intercepting calls and text messages from mobile phones. He claims that phony cell phone towers named as ‘interceptors’ have radio-equipped computers that are capable of beating any onboard encryption system. It does not matter whether you are on Android and iOS; interceptors take advantage of the baseband processor which functions as the link between the mobile phone’s operating system and cell towers. These interceptors are not just eavesdropping on your calls but are also pushing spyware on your phone.

Cellphone

Goldsmith uncovered these phony towers with the help of his CryptoPhone 500. The CryptoPhone 500 is a heavily modified Samsung Galaxy SIII that eliminates 468 vulnerabilities found on the stock software installation by employing sophisticated encryption system. When a CryptoPhone 500 comes across one of such fake cell phone towers it sends out the following warning messages to the user.

Cell Phone Hack 2 Cell Phone Hack 1
Warning Messages on a CryptoPhone 500

Map
Suspected Locations of Phony Cell Towers

Various customers have received such warnings and the company has compiled a list of all the locations in the map above. Goldsmith tested his CryptoPhone by taking a drive near a government facility in Nevada and his phone was able to warn him about the threat. An iPhone was oblivious to the threat and an off-the-shelf Samsung Galaxy S IV went from a 4G to a 3G connection and back to 4G again. The CryptoPhone too was being forced to change from 4G to 2G. So now the obvious question arises, who is behind these attacks? The team at ESD America say that they haven’t been able to pinpoint the perpetrators. The suspect list consists of government and private entities that have the financial capability of procuring these interceptors which cost no less than $100,000.

Before concluding we would like to ask our forum members to go through the source link below and discuss these claims.

Source: #-Link-Snipped-#

Replies

Welcome, guest

Join CrazyEngineers to reply, ask questions, and participate in conversations.

CrazyEngineers powered by Jatra Community Platform

  • Chaitanya Kukde

    Chaitanya Kukde

    @chaitanya-kukde-yk3G31 Sep 6, 2014

    Why anyone would like to tap 'all' the calls from a cell-phone tower? I mean, the probability of finding something of worth is a needle-in-a-haystack job, right?
  • Divyaprakash KC

    Divyaprakash KC

    @divyaprakash-UywozO Sep 6, 2014

    Chaitanya Kukde
    Why anyone would like to tap 'all' the calls from a cell-phone tower?
    Maybe the guys who hold the placard "End is Near!". The infamous dooms day sayers.
  • Tom Smith

    Tom Smith

    @tom-smith-0atd6S Sep 6, 2014

    Needle in a hay stack, eh?

    Please google Fast Data Finder or FDF. Unless that's been silently scrubbed from our view. Scrubbed Like the covert channel refs on the Qualcomm site. A search before 9/11 turned up about a hundred links to Q docs, now nothing.
  • Sarathkumar Chandrasekaran

    Sarathkumar Chandrasekaran

    @sarathkumar-FEGRPw Sep 6, 2014

    we should test it in India with Cryptophone 500
  • Tom Smith

    Tom Smith

    @tom-smith-0atd6S Sep 6, 2014

    It's almost useless to worry about surveillance, it's so pervasive. The way a person types on a keyboard is uniquely identifiable and if you start to connect the dots in a database you can monitor everything about an individual. But first you have to find the needles and then connect that needles communications with other needles in a network. Then you have something. Voices are also unique.