Page 57 - index
P. 57







Criminals attempted to extort citizens with messages that appeared to come from banks,
government agencies, and customer service departments in order to obtain valuable personal
information. In addition to the arrests, Chinese authorities seized equipment from 2,600 fake
base stations, according to the English Chinese news agency ECNS. If common criminals can
extort the public with mobile interception in China, it is certain that this same equipment is being
used by Chinese spies, spies from other countries, and countless others committing corporate
espionage right here in your back yard.

Although long overdue, the FCC is finally beginning to investigate the use of IMSI catchers by
criminal organizations. Luckily they will also investigate weaknesses in our mobile networks and
try to remedy the problem from a network perspective.



Your Protection from Criminal Surveillance

The bottom line: law enforcement needs to ramp up their mobile counter surveillance and be
able to protect themselves and their loved ones by detecting mobile call interception. Luckily,
there are new products out there that meet this critical need for protection against criminal
surveillance.

The Network Guard product line by Charon Technologies consists of some of the most
innovative and comprehensive counter-surveillance products on the market. The Network Guard
system is capable of detecting all types of network interception, from basic IMSI grabbers to
advanced technologies that only governments possess. It also monitors all types of networks
from 2G to 4G, LTE and CDMA.

Charon also provides another counter surveillance solution to law enforcement and mobile
network operators with Cell Seeker Pro. Cell Seeker Pro can survey and map out entire mobile
networks.

These mapped out networks can then be compared to maps of legitimate networks to determine
the existence and location of poor reception areas, rogue base stations or IMSI catchers, and
compare against suspected nefarious activity for mobile forensic purposes. Charon's mobile
security products are an excellent solution to mobile call interception that can protect
government and law enforcement agencies, and ultimately, the public itself.


About the Author

Scott Aken, Senior Director of Strategic Programs, Charon Technologies

Scott is a former FBI special agent in cyber counterintelligence. He has over 15 years of
experience in IT, security and business strategy. As a recognized thought leader in cyber
operations, his expertise is sought at government and commercial conferences as well as from
notable security and technology publications.


57 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   52   53   54   55   56   57   58   59   60   61   62