recentpopularlog in

cellular

« earlier   
When Trump Phones Friends, the Chinese and the Russians Listen and Learn - The New York Times Oct 2018
"When President Trump calls old friends on one of his iPhones to gossip, gripe or solicit their latest take on how he is doing, American intelligence reports indicate that Chinese spies are often listening — and putting to use invaluable insights into how to best work the president and affect administration policy, current and former American officials said.

Mr. Trump’s aides have repeatedly warned him that his cellphone calls are not secure, and they have told him that Russian spies are routinely eavesdropping on the calls, as well. But aides say the voluble president, who has been pressured into using his secure White House landline more often these days, has still refused to give up his iPhones."
NYTimes  cellular  surveillance 
16 days ago by pierredv
City-Wide IMSI-Catcher Detection - SeaGlass
"SeaGlass is a system designed by security researchers at the University of Washington to measure IMSI-catcher use across a city."

"For more details on the SeaGlass sensors, data collection system, detection algorithms, and results see our technical paper published at Privacy Enhancing Technology Symposium 2017" https://seaglass-web.s3.amazonaws.com/SeaGlass___PETS_2017.pdf
UW  surveillance  cellular  security  cyber-spectrum  IMSI-catchers  StingRay 
16 days ago by pierredv
5G mobile network deployment - implications for MNOs and towercos - AnalysysMason Jul 2019
"The number of 5G deployments is increasing worldwide and these deployments are making use of new spectrum and new technologies. Mobile network operators (MNOs) and towercos will need to respond differently to the network architecture and infrastructure requirements for 5G. More specifically, MNOs need to fully understand the costs associated with 5G in terms of both capex (for example, new equipment) and opex (for instance, site rental), whereas towercos must consider how they can maximise revenue from their towers amidst changes to site configurations, while also identifying opportunities to address the changing infrastructure requirements of MNOs. This article discusses how mobile network deployment is changing in response to 5G technology and examines how these changes will affect MNOs and towercos."
AnalysysMason  cellular  5G  business 
16 days ago by pierredv
radio spectrum auctions. 3G Auction.
"Nokia’s “3G technology” propaganda was in a class of its own. They had done some quite innovative work in stimulating a number of small Silicon Valley companies to try out ideas for Internet type applications on the mobile phones. They were also one of the champions of getting Internet Web site text onto mobile phones using a protocol they called WAP (Wireless Application Protocol).

They showed us a graph of the steep world-wide growth in the numbers of mobile radio customers. This was a curve soaring upwards. They then showed a graph of the steep world-wide growth in the number of customers connecting to the Internet. It was another curve soaring upwards. We were invited to imagine the potential growth that would come from putting the Internet on a mobile phone. A market that would be the imposition of one high growth curve being overlaid on another high growth curve was a very compelling image. The 3G opportunity was an enabling technology to do this."
3G  cellular  hype  WAP 
19 days ago by pierredv
CTIA - Protecting America’s Next-Generation Networks
Executive Summary
The wireless industry has baked security into our networks since the beginning, and works diligently to continually update and build on our security capabilities with every generation of wireless. Today’s 4G LTE networks have the most advanced security features to date, and 5G will further improve upon them.

As 5G networks start to be deployed this year, wireless providers are leveraging new and advanced measures—after years of research, investment, and contributions to standards bodies—to secure 5G networks. This paper updates CTIA’s 2017 Protecting America’s Wireless Networks paper to feature 5G security highlights, including
CTIA  cellular  Wireless  security  5G 
22 days ago by pierredv
An old rotary phone as Bluetooth set | Hackaday.io
The aim of this project is to bring an old FeTAp-611 german rotary phone back to life. The device will be used as a bluetooth peripheral for your smartphone to make calls and receive them. Basically the same purpose it was thought for 30 years ago but complicating the things a lot.
hackaday.io  cellular  mobile  rotary  tutorial 
22 days ago by cyberchucktx
Exclusive: Russia Carried Out A 'Stunning' Breach Of FBI Communications System, Escalating The Spy Game On U.S. Soil | HuffPost Sep 2019
"Both compounds, and at least some of the expelled diplomats, played key roles in a brazen Russian counterintelligence operation that stretched from the Bay Area to the heart of the nation’s capital, according to former U.S. officials. The operation, which targeted FBI communications, hampered the bureau’s ability to track Russian spies on U.S. soil at a time of increasing tension with Moscow, forced the FBI and CIA to cease contact with some of their Russian assets, and prompted tighter security procedures at key U.S. national security facilities in the Washington area and elsewhere, according to former U.S. officials. It even raised concerns among some U.S. officials about a Russian mole within the U.S. intelligence community."

"American officials discovered that the Russians had dramatically improved their ability to decrypt certain types of secure communications and had successfully tracked devices used by elite FBI surveillance teams."

Joel Brenner: "we were neither organized nor resourced to deal with counterintelligence in networks, technical networks, electronic networks.”

"Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications."
HuffPost  Russia  surveillance  spying  FBI  cyber-spectrum  vulnerability  cellular 
24 days ago by pierredv
Lynk
Formerly Ubiquitilink, now Lynk or Lynk Global
satellite  LTE  cellular  communications  telecommunications  IoT  networking 
28 days ago by asteroza
Mint Mobile's $20 data plan sounds too good to be true — here's why it's not | Android Central
HHere at Android Central, we consider ourselves pretty thrifty people — it's no accident we've partnered with the amazing folks at Thrifter, after all — and in the U.S., wireless service feels like a treadmill of endless fees and price increases.

That's why, when we had an opportunity to check out Mint Mobile, we jumped at the chance. The MVNO runs on T-Mobile's nationwide network, but does things a bit differently than the rest of the pack, and as a result can offer plans that even its most penny-pinching competitors can't approach.
2019  cellular  mobile  phone  cell 
28 days ago by jmello
Is 5G a Solution in Search of a Problem? – Brink – The Edge of Risk - William Webb
"Original proponents of 5G suggested widespread use of virtual and augmented reality, autonomous cars that need low-latency gigabit connectivity, body-cams, ubiquitous internet of things and many services we cannot currently imagine. However the upgrade to 4G showed that charging customers more did not work. More critically, few consumers will see any benefit from 5G."

"A Poor Business Case for the Operator"

"5G appears to be another leap into the unknown. But unlike 3G, which happened during a tech bubble, 5G is happening in an era of austerity."
5G  hype  cellular 
4 weeks ago by pierredv
Simjacker – Next Generation Spying Over Mobile | Mobile Security News | AdaptiveMobile, Sep 2019
Via Amie Stepanovich

"... Simjacker. We believe this vulnerability has been exploited for at least the last 2 years by a highly sophisticated threat actor in multiple countries, primarily for the purposes of surveillance. Other than the impact on its victims, from our analysis, Simjacker and its associated exploits is a huge jump in complexity and sophistication compared to attacks previously seen over mobile core networks. It represents a considerable escalation in the skillset and abilities of attackers seeking to exploit mobile networks. "

"This S@T Browser software is not well known, is quite old, and its initial purpose was to enable services such as getting your account balance through the SIM card. Globally, its function has been mostly superseded by other technologies, and its specification has not been updated since 2009, however, like many legacy technologies it is still been used while remaining in the background."
AdaptiveMobile  SIM  cyber-spectrum  spectrum  cellular  vulnerability 
4 weeks ago by pierredv
Unlicensed Signal Boosters Get a Boost From Amazon | WIRED Aug 2019
Via Blake Reid

"The FCC requires booster manufacturers to get their products certified as safe, and it publishes each valid certification on its website. WIRED found a number of sellers offering boosters on Amazon that are not listed as certified by the FCC."
Amazon  cellular  enforcement  FCC 
6 weeks ago by pierredv
Lynk: mobile connectivity for the world
Lynk has built the first cell tower in space. Soon, everyone in the world will be connected, everywhere, with just the phone in their pocket. No new hardware required. No new software needed. The Lynk network will enable everyone with a standard mobile phone to stay connected … everywhere.
cellular  worldwide  networking  communications  satellite 
7 weeks ago by cyberchucktx
Trackimo 3G Guardian GPS Tracking Device - Trackimo
Trackimo 3G Guardian GPS tracker is the lightest GPS tracking device that will help you track your pets, kids, and elderly loved ones. Buy one now.
gps  tracker  keyfinder  cellular 
9 weeks ago by omen

Copy this bookmark:





to read