How do cell phone towers work?

What is an ethical hacker?