Jump to content

Local law enforcement deploying fake base stations for tracking, eavesdropping


Rawvega

Recommended Posts

March 16, 2014 | By Tammy Parker

 

Fake base stations have been used by the federal government for years but now have been adopted by local law enforcement agencies, and privacy advocates are not happy about it.

 

Read more: Local law enforcement deploying fake base stations for tracking, eavesdropping - FierceWirelessTech http://www.fiercewireless.com/tech/story/local-law-enforcement-deploying-fake-base-stations-tracking-eavesdropping/2014-03-16#ixzz2wL3PlwhU 

Subscribe at FierceWirelessTech

 

 

 

 

Gotta say, I'm not a fan of this.  :secret:

 

Link to comment
Share on other sites

Eavesdropping? So now local law enforcement thinks we are all terrorists too? What an invasion of privacy! Stop police corruption!

 

 

Sent from Josh's iPhone 5S using Tapatalk 2

  • Like 3
Link to comment
Share on other sites

I don't think they would ever be able to have them here. Way too many people here would be pissy, and our "church owned" town just barely got beer/wine approved for sale. But there should be some sort of limitation, like only being able to listen/track users that are high level targets.

Link to comment
Share on other sites

I have been following this story pretty solid. They have 2 kinds of these devices, one that offers simple Geo data, and another that is much smarter. Your data is essentially routed through their femtocell. You can imagine the implications with that. I have been trolling the area here looking for them, no luck yet, but I sure will post when I find anything good.

Link to comment
Share on other sites

I have been following this story pretty solid. They have 2 kinds of these devices, one that offers simple Geo data, and another that is much smarter. Your data is essentially routed through their femtocell. You can imagine the implications with that. I have been trolling the area here looking for them, no luck yet, but I sure will post when I find anything good.

 

I wonder what Signal Check Pro would show connected to one of them???

Link to comment
Share on other sites

I wonder what Signal Check Pro would show connected to one of them???

I have been trying with scp, as well as a couple other methods. So far just the standard stuff. I am unaware as to how they can specifically target one user if the method is to simply use signal strength to grab your line in a dragnet sense, but the technology is definitely available once you are identified through the back haul or on their network per se. What it would read I have yet to identify. I am trying, though.

  • Like 1
Link to comment
Share on other sites

Most California agencies use it and have been for years. Sent from my Nexus 5

Law enforcement doesn't have "special rights" so if they can do this anyone can as long as it seves a public interest which I'm sure is their argument. Just saying.

Link to comment
Share on other sites

I don't think they would ever be able to have them here. Way too many people here would be pissy, and our "church owned" town just barely got beer/wine approved for sale. But there should be some sort of limitation, like only being able to listen/track users that are high level targets.

 

 

the limit used to be the necessity for a search warrant 

  • Like 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • large.unreadcontent.png.6ef00db54e758d06

  • gallery_1_23_9202.png

  • Posts

    • Since this is kind of the general chat thread, I have to share this humorous story (at least it is to me): Since around February/March of this year, my S22U has been an absolute pain to charge. USB-C cables would immediately fall out and it progressively got worse and worse until it often took me a number of minutes to get the angle of the cable juuuussst right to get charging to occur at all (not exaggerating). The connection was so weak that even walking heavily could cause the cable to disconnect. I tried cleaning out the port with a stable, a paperclip, etc. Some dust/lint/dirt came out but the connection didn't improve one bit. Needless to say, this was a MONSTER headache and had me hating this phone. I just didn't have the finances right now for a replacement.  Which brings us to the night before last. I am angry as hell because I had spent five minutes trying to get this phone to charge and failed. I am looking in the port and I notice it doesn't look right. The walls look rough and, using a staple, the back and walls feel REALLY rough and very hard. I get some lint/dust out with the staple and it improves charging in the sense I can get it to charge but it doesn't remove any of the hard stuff. It's late and it's charging, so that's enough for now. I decide it's time to see if that hard stuff is part of the connector or not. More aggressive methods are needed! I work in a biochem lab and we have a lot of different sizes of disposable needles available. So, yesterday morning, while in the lab I grab a few different sizes of needles between 26AWG and 31 AWG. When I got home, I got to work and start probing the connector with the 26 AWG and 31 AWG needle. The stuff feels extremely hard, almost like it was part of the connector, but a bit does break off. Under examination of the bit, it's almost sandy with dust/lint embedded in it. It's not part of the connector but instead some sort of rock-hard crap! That's when I remember that I had done some rock hounding at the end of last year and in January. This involved lots of digging in very sandy/dusty soils; soils which bare more than a passing resemblance to the crap in the connector. We have our answer, this debris is basically compacted/cemented rock dust. Over time, moisture in the area combined with the compression from inserting the USB-C connector had turned it into cement. I start going nuts chiseling away at it with the 26 AWG needle. After about 5-10 minutes of constant chiseling and scraping with the 26AWG and 31AWG needles, I see the first signs of metal at the back of the connector. So it is metal around the outsides! Another 5 minutes of work and I have scraped away pretty much all of the crap in the connector. A few finishing passes with the 31AWG needle, a blast of compressed air, and it is time to see if this helped any. I plug my regular USB-C cable and holy crap it clicks into place; it hasn't done that since February! I pick up the phone and the cable has actually latched! The connector works pretty much like it did over a year ago, it's almost like having a brand new phone!
    • That's odd, they are usually almost lock step with TMO. I forgot to mention this also includes the September Security Update.
    • 417.55 MB September security update just downloaded here for S24+ unlocked   Edit:  after Sept security update install, checked and found a 13MB GP System update as well.  Still showing August 1st there however. 
    • T-Mobile is selling the rest of the 3.45GHz spectrum to Columbia Capital.  
    • Still nothing for my AT&T and Visible phones.
  • Recently Browsing

    • No registered users viewing this page.
×
×
  • Create New...