These can listen in on conversations, snoop in on text, push spyware to phones

Sep 2, 2014 12:15 GMT  ·  By

It seems like there are some entities out there that are doing their best to keep an eye on everything moving within the United States when it comes to communications. Seventeen cellphone towers have been discovered across America, looking just like you’d expect, but serving a completely different purpose – intercepting communications.

According to Popular Science, the discovery was made with the help of a heavily customized handset built for Android security called the CryptoPhone 500, which is marketed by EST America.

The device looks just like a Samsung Galaxy SIII, but features high-powered encryption. It is the highly sophisticated Android version that had been installed on the device that helped discover that the phone was leaking data to unknown locations 80-90 times per hour.

While this may indicate at first glance that the phones were being hacked, it seems like the issues are slightly different and more concerning. The problems the firewall was detecting weren’t attacks per se, but data leaks that were traced back to 17 mysterious cellphone towers that act as interceptors.

The phony constructions were detected by the CryptoPhone 500 during the month of July alone, which means that there can very well be quite a few more out there. Once a phone connects to it, a variety of “over-the-air” attacks become possible, which includes active eavesdropping on calls and reading text messages to pushing spyware to the device.

“Interceptor use in the US is much higher than people had anticipated. One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas,” said Les Goldsmith, CEO of ESD America.

The problem is likely a lot more widespread than the company discovered. Either way, the level of privacy violation that is involved here is off the charts and it rivals the widespread data collection the NSA is so busy with.

These towers are equipped with radio computer with software that can use arcane cellular network protocols that override the onboard encryption. They are also quite pricey, running as high as $100,000 per tower, which reinforces the belief that this isn’t some random operation.

Interesting enough, Edward Snowden’s leaked documents have already revealed that the NSA is capable of over-the-air attacks that force the phone to fake a shut-down while leaving the microphone running, which turns the device into a bug.

The worst part is that people won’t even know that they are being spied on. The issues that the CryptoPhone detected while passing by such a tower left an iPhone and a Samsung Galaxy S4 completely unaffected.

Even so, the question remains – who is running these interceptors masked as regular cellphone towers? ESD America’s CEO says that it cannot be known for sure, but one thing’s certain – they’re right on top of US military basis, which can only lead to one conclusion – the government is involved. It’s either that the US government is collecting more data than it is letting us know, or some foreign power is spying on the US military.