Most people are ready to jump on the newest smartphone bandwagon at a drop of a hat, at considerable expense.
Is the latest really the greatest?
What are the hidden 'traps' the user faces?
What are the exploits left open that the manufacturer (deliberately?) doe not tell the end user?
What most people did not know is that by the time Google updated their smartphone operating system, Android, to version 4.0 (Ice Cream Sandwich), where it appeared on Samsung's Galaxy SIII device there were 468 vulnerabilities!
WTF??? !!! ???
Were the programmers on ICE...
or was it a more sinister directive from above?
Would you trust a company the dodges tax to the tune of billions per annum?
Would you trust a company that leaves vulnerabilities (deliberately?) unattended?
Would you trust that company with YOUR data?
See the following article from computerword.com of the headline:
Are your calls being intercepted? 17 fake cell towers discovered in one month.
You wouldn’t likely know if you are under cell phone surveillance, but you would if you were about to make a call and your phone displayed an unencrypted connection warning that states, “Caution: The mobile network’s standard encryption has been turned off, possibly by a rogue base station (‘IMSI Catcher’). Unencrypted calls not recommended.”
$3,500 CryptoPhone 500 can. The phone has a Samsung Galaxy SIII body, but unlike the Android OS that comes standard on the Galaxy SIII and “leaks data to parts unknown 80-90 times every hour,” ESD America hardened the Android OS by removing 468 vulnerabilities.
“Interceptor use in the U.S. is much higher than people had anticipated,” said Les Goldsmith, the CEO of ESD America. He told Popular Science, “One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” He added, “What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases. Whose interceptor is it? Who are they, that’s listening to calls around military bases? The point is: we don’t really know whose they are.”
Privacy groups have been fighting unconstitutional stingray surveillance for several years, yet there's still a great deal citizens don't know about the portable devices known as IMSI catchers, also known by the generic term "stingray." It acts like a fake cell tower and tricks your mobile device into connecting to it even if you are not on a call. It is used for real time location tracking; some can pinpoint you within two meters as well as eavesdrop and capture the contents of your communications.
Goldsmith conducts testing on his company’s “baseband firewall” while driving by an unnamed government facility in the Nevada desert that runs an interceptor. ”As we drove by, the iPhone showed no difference whatsoever. The Samsung Galaxy S4, the call went from 4G to 3G and back to 4G. The CryptoPhone lit up like a Christmas tree.”
You might know your phone is being intercepted if it shows 2G, instead of 3G or 4G, but some interceptors claim to be “undetectable.” The VME Dominator, for example, is marketed only to government agencies. It promises that it allows “you to intercept, block, follow, track, record and listen to communications using unique triangulation and other advanced technology,” but “cannot be detected. It allows interception of voice and text. It also allows voice manipulation, up or down channel blocking, text intercept and modification, calling and sending text on behalf of the user, and directional finding of a user during random monitoring of calls.”
VME Dominator is not the only 4G interceptor on the market. Martone Radio Technology also advertises 4G interception, and SS8 describes solutions for “Integrating Lawful Intercept into the Next Generation 4G LTE Network” (pdf). According to Goldsmith, “If you've been intercepted, in some cases it might show at the top that you've been forced from 4G down to 2G. But a decent interceptor won't show that. It'll be set up to show you [falsely] that you're still on 4G. You'll think that you're on 4G, but you're actually being forced back to 2G.”
Yet Ars Technica reported that law enforcement agencies are trying to come up with the funds to upgrade their “stingray” cellular surveillance systems before 2G – and their ability to unconstitutionally spy on people – becomes obsolete. AT&T, for example, will shut down its 2G network in 2017, but Verizon’s network will support 2G until the “end of the decade.”
Although it will be a long time before cell phones no longer support 2G, Johnny Law is working on upgrading Harris Corporation “Stingray” systems, with “Hailstorm,” to support 4G LTE interception. The News Tribune in Tacoma reported on a March 2014 purchase order from the DEA, which stated, “The Hailstorm upgrade is necessary for the Stingray system to track 4G LTE phones.”
According to Ars Technica, the Oakland Police Department, Fremont Police Department, and the Alameda County District Attorney joined forces by applying for a DHS grant to pay for the Hailstorm upgrade. “The entire upgrade will cost $460,000—including $205,000 in total Homeland Security grant money, and $50,000 from the Oakland Police Department (OPD).” In theory, more documents are being gathered and will be released this month by the Alameda County DA's office.
While the FCC seems to have known about cellular network vulnerabilities that stingrays exploit, last month it established a “task force” to investigate the “illicit and unauthorized use” use of stingrays. Instead of investigating law enforcement’s use of such interceptors, the FCC “plans to study the extent to which criminal gangs and foreign intelligence services are using the devices against Americans.” The FCC also refused the ACLU’s FOIA request for stingray documents.
Meanwhile innocent Americans may be subjected to the “invasive surveillance technology” without ever knowing it is happening. ACLU technologist Christopher Soghoian said of stingray surveillance, “They are essentially searching the homes of innocent Americans to find one phone used by one person. It’s like they’re kicking down the doors of 50 homes and searching 50 homes because they don’t know where the bad guy is.”
If the framers of the Constitution could see how technology is being used against us, they would roll over in their graves.
computerworld.com 2 Sep 2014