uber fuzz

Terms of Use

US Army-funded ‘research project’ quietly tracked mobile phone movements at Russian military sites & govt buildings – media


Read More

Mobile devices used by personnel at Russian military sites, government premises and foreign embassies in Moscow were reportedly shadowed by researchers who used commercially available software as part of a Pentagon-funded study.

According to the Wall Street Journal, a research team based in Starkville, Mississippi deployed a little-known spying tool called Locate X to snoop on as many as 48 mobile phones that were going online back on August 9, 2019 – a day after a powerful blast rocked the Russian Navy’s secretive testing ground near the northern city of Severodvinsk. 

The tracking experiment, carried out for the Mississippi State University, was apparently to demonstrate to the US military how commercially available phone data could be turned towards other ends, including gathering valuable intelligence.

Read more

FILE PHOTO: It has not been revealed what type of missile was involved in the classified engine test. Pictured is a test of Russia’s new heavy intercontinental ballistic missile, the Sarmat, at the northern Plesetsk test range.
‘They were thrown into sea as it blew up’: Rosatom gives details of deadly experimental engine blast

Employing GPS location data usually extracted from mobile apps like games or weather services, they tracked the movements of those phones over a period of time, the WSJ reported, citing study logs.

Some devices reportedly traveled to Moscow and St. Petersburg, as well as Severodvinsk and Arkhangelsk – home to military command centers – while two more were spotted in Cuba and Azerbaijan.

The choice of the target could be partly explained by the nature of the incident. The 2019 explosion triggered a brief spike in radiation levels, with the readings returning to normal shortly afterward.

Russian officials later explained that a faulty “isotope and liquid-propellant engine” had caught fire during trials, killing five staff from Russia’s nuclear agency Rosatom and seriously injuring several Defense Ministry personnel.

But the secrecy surrounding the incident generated panicked international headlines, fueled by conspiracy theories that authorities were trying to cover up nothing less than another Chernobyl. 

The intelligence-gathering effort, funded by the US Army Combat Capabilities Development Command, wasn’t restricted to monitoring military compounds in Russia’s north, the WSJ wrote.

Researchers also tracked phones at Russian government buildings and foreign diplomatic missions in Moscow. While the Journal itself stressed that the trackers weren’t “professional intelligence analysts,” spy agencies may have left some fingerprints on the project.

Babel Street, a cybersecurity firm that made the mobile phone tracking tool Locate X, has sold its products to nearly every major defense or intelligence agency – among them the CIA, the NSA, the DHS and the US Cyber Command.

The WSJ says Babel Street, which repackages customer data mined by corporations and mobile app developers for intelligence-related software, also sold its software to Canada, the United Kingdom, Australia, New Zealand, Singapore, Germany, and others.

While the WSJ revelations are far from sensational (tracking mobile phone data is commonplace in espionage), it comes at the time when the Russiagate row is still brewing.

Also on rt.com

Screenshot of the first page of the CIA WikiLeaks Task Force's final report
Who needs ‘Russian hackers’? Report reveals CIA incompetence to blame for Vault 7 breach

The case, alleging that Moscow attempted to meddle into 2016 US presidential elections and also backed the candidacy of Donald Trump, has received a new spin just recently. It emerged that the FBI was aware that the infamous dossier – written by British ex-spy Christopher Steele and used as a pretext to snoop on the Trump campaign – was unreliable.

It was also revealed that the New York Times published false information about the ‘Russiagate’ probe, when it alleged that Trump’s team contacted Russian intelligence officials on numerous occasions.

Like this story? Share it with a friend!

Mobile devices used by personnel at Russian military sites, government premises and foreign embassies in Moscow were reportedly shadowed by researchers who used commercially available software as part of a Pentagon-funded study. Read Full Article at RT.com