Mwrf 1586 Friedrich595x335 0
Mwrf 1586 Friedrich595x335 0
Mwrf 1586 Friedrich595x335 0
Mwrf 1586 Friedrich595x335 0
Mwrf 1586 Friedrich595x335 0

Don’t Trust that Tower

Oct. 6, 2014
Rogue cell towers have been linked to potential national security breaches.

Current news headlines seem to scream weekly about hackers getting credit card and other secure information from stores, banks, etc. Meanwhile, concerns are already being voiced about spying that can be done via the famed and much-awaited “Internet of Things” (IoT). It also is possible to steal user information and data usage from cellular phones. Beyond identity theft, these threats raise concerns about what such breaches can mean for our national security—especially when our wireless infrastructure itself is called into question.

In an article titled, “Rogue cell towers discovered in Washington, D.C.” on CSO, the author reports that engineers and customers of ESD America (makers of the ultra-secure CryptoPhone) had discovered more than a dozen rogue cell towers (also known as interceptors or IMSI catchers) around the U.S. this past summer. There is a good chance that this number is only a small representation of the total interceptors that exist. It also fails to take into account mobile base stations, which may only be turned on temporarily.

The article notes that these interceptors are only supposed to be used by law enforcement or the government. According to CSO, “That’s because once a device connects to them, the interceptor’s operator can perform a number of tasks, including eavesdrop on calls or text messages, or in some cases push data (spyware for example) to the device.” Due to the suspected large number of interceptors in the U.S.—from standard base stations to home-grown solutions—it also is possible that other countries or entities could be spying on the U.S.

Realizing the threat that could be posed by interceptors, Congress has pressured the Federal Communications Commission (FCC) to tackle this topic. Reportedly, the FCC responded by creating a task force “to combat the illicit and unauthorized use of IMSI catchers.” Truly, though, this is not much of a fix. The carriers need to step up to secure the spectrum they use. While the official parties wrangle over this topic and try to come up with mandatory solutions, individuals need to be aware. For engineers working for defense contractors in particular: If your employer trusts you with design, financial, or any other type of secret, it is time to think about securing your cell phone with more than just a password.

Download this article in .PDF format
This file type includes high resolution graphics and schematics when applicable.

Sponsored Recommendations

What is a Vector Network Analyzer?

Feb. 19, 2024
For engineers that are outside of the RF and Microwave industry and work in industries like the healthcare and medical fields, food and beverage, agriculture, and beyond, a vector...

Time Domain Gating Measurements with a VNA Webinar

Feb. 19, 2024
Time domain gating is a very useful tool in vector network analysis. If a measurement can be made over sufficient bandwidth, there will be ample resolution in the time domain ...

Webinar: Introduction to OTA Measurement for mmWave and Sub-THz

Feb. 19, 2024
Join Jeanmarc Laurent, a leading expert from MilliBox, for an exclusive live webinar showcasing a complete Over-the-Air (OTA) testing system setup. In this immersive session, ...

Using a CMT VNA with Socket Server

Feb. 19, 2024
This application note describes use of a software application CMT Socket Server which is distributed and supported by Aphena Ltd. Please email [email protected] regarding purchase...