http://money.msn.com/investing/post--mysterious-fake-cellphone-towers-found-across-us Bunch of towers that intercept our phone calls and text? Who would do such a thing, more importantly, if "no one" knows who they belong to then why are they not being cut down like a christmas tree?
I read that this AM. Strange thing....I have occasion to communicate with someone who works just outside Ft Gordon and this exact thing happens all the time. And it sure as hell ain't the NSA because Ft Gordon is host to Sweet Tea. They listen all over the world and have no need of a phony cell tower.
Well, they probably aren't really "towers". They are a device called a StingRay cellphone surveillance device or another one called Hailstorm. They have been around for a while and work by connecting with a nearby cell tower and then tricks mobile phones that are also connected with the tower into giving up their identification data. And who is using the devices? A few scammers and government agencies but mostly it is our good friends in local law enforcement. http://www.theblaze.com/stories/201...earing-about-arent-necessarily-towers-at-all/
Seems like entrapment to me. So what happens when they uncover someone else breaking the law as they are spying on someone else? We have zero rights anymore.
To me the structure doesn't matter. The functionality does. And while your link suggests that law enforcement are likely offenders, it doesn't say that others can't be.
It said specifically that scammers and government agencies (read FBI, homeland security) use them. I think this kind of thing is what people expect con-men and identity thieves to use. But police using them without warrants is over the line.
Cell towers are very expensive. About $150K to $250K to build and you would have to buy or lease the land to put it on. Plus the costs of maintenance. That's a bit out of reach for most scammers. Its gotta be something more sinister than a scam
Read the article. There are not any "fake towers". They don't have to build a tower. It's a device like a laptop computer with a radio. They just set it up near any real cell tower and then they can spoof the other phones logged in to that tower.