Skip to main content

US spy on people using aircraft with security equipment

The US Justice Department is using "feykovye" cell tower on airplanes to get free access to registration data from the phones of almost all the country's population.

As told WSJ anonymous sources familiar with the secret program the US authorities, the technique of shadowing fully operational since 2007 and identifies the location of any phone with an error of only three meters.

It is running the whole system like this: on the aircraft (the most commonly used small civilian aircraft company Cessna) installed special equipment - stuffed with electronics boxes in the shape of a cube. Square faces boxes are 0.6 meters in length, but the relatively small size does not prevent them to play the role of full-fledged cell phone towers.

Aircraft with these devices is then lifted into the air. The operation uses five (at least) the major airports, and their location, coupled with a range of aircraft flight ensures contact with the phones of almost all of the US population.

"Towers" can analyze thousands of active phones, simulating a strong signal. Since modern mobile phones are designed in such a way that automatically selects the strongest signal, then fall into the trap and select signal "tower" on the plane.

As soon as the connection box on an airplane gets access to the phone of equal access of the cellular operator: he becomes the registration data phone, including highly valuable information to the authorities about his whereabouts.

According to sources the WSJ, this technique is only used to spy on suspects and criminals, but "towers" in the process of receiving data from thousands nothing to do with this or that operation of phones that just looking to identify the signal of the desired phone.

Saved if the data in the device memory, and some established control over their use - is unknown. Departures equipped aircraft occur regularly.

The Ministry of Justice at the request WSJ information to confirm or refute. A ministry spokesman said only that the discussion of these issues can be declassified US intelligence opportunities for criminals and foreign powers, and all ministries projects do not go beyond US laws.

From the article the WSJ, however, that if this program really exists, its use violates the country's constitution. 

Popular posts from this blog

The possibility of quantum computing breaking encryption algorithms

The possibility of breaking encryption algorithms is a powerful motivating factor for many countries of the world. Thus, knowledge of the enemy's encryption systems could give a huge advantage in intelligence, while at the same time contributing to the conduct of new fundamental research in the field of physics, since modern experimental systems have at their disposal only less than 100 qubits.    To achieve the useful computing performance of a supercomputer, we probably need machines with hundreds of thousands of qubits. In order for the devices to function correctly, they must correct all minor random errors in the software. In a quantum computer, such errors arise due to imperfect elements of the circuit and the interaction of qubits with their environment. For these reasons, qubits can lose coherence in literally a split second. A quantum computer with 100 qubits can simultaneously represent 2100 solutions. For some tasks, this exponential parallelism can be used to create a h

How to install cloudflare wrap on linux

 command mode user edition   millen@TechGlyphs-Studio:~/Desktop$ wrap-cli wrap-cli: command not found millen@TechGlyphs-Studio:~/Desktop$ curl | sudo gpg --yes --dearmor --output /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg Command 'curl' not found, but can be installed with: sudo snap install curl  # version 7.86.0, or sudo apt  install curl  # version 7.81.0-1ubuntu1.6 See 'snap info curl' for additional versions. [sudo] password for millen:  gpg: no valid OpenPGP data found. millen@TechGlyphs-Studio:~/Desktop$ sudo apt  install curl Reading package lists... Done Building dependency tree... Done Reading state information... Done The following packages were automatically installed and are no longer required:   chromium-codecs-ffmpeg-extra gstreamer1.0-vaapi libflashrom1 libftdi1-2   libgstreamer-plugins-bad1.0-0 Use 'sudo apt autoremove' to remove them. The following NEW packages will be in

Simple steps to protect your privacy.

  Step 1. Download DuckDuckGo on all your devices With just one download you'll get tracker blocking, private searching, increased encrypting, and privacy grading on all of your browsing. Our mobile app for iOS/Android (DuckDuckGo Privacy Browser) and browser extensions for Firefox, Chrome, and Safari (DuckDuckGo Privacy Essentials) has all of this in one seamless package. Privacy, simplified. Step 2. Update your software Your device operating systems get out-of-date over time, and old software can contain security bugs or settings that leak personal data. Set your devices (and the apps on them) them to update automatically. That way you'll always have the latest, safest versions. Step 3. Update your privacy settings Make sure your devices are using the best privacy settings. Here are step-by-step instructions for all the major device types. Especially make sure you adjust per-app location settings, so that your location history isn’t leaking where it shouldn’t. For extra bonus