What's new

Secure terrorist network with Telecom experts help

Mega_Man

FULL MEMBER

New Recruit

Joined
Dec 4, 2018
Messages
84
Reaction score
2
Country
Pakistan
Location
Pakistan
"everything written in the following article is fictional any relation with the reality is totally coincidence"
"Every detail is on internet already"
"People who want to sleep peacefully at night shouldn't read this"

A single CPE/mobile booster installed at it's tower/antennas can provide coverage of 25-50 km then they have to install another one and the chain goes on as far as they want to increase it's coverage.
All antennas are run by a special computer a server exclusively made to register all it's compatible phones/Sims and provide them their addresses like IP for call/sms functionality.
Communication plays a vital role for every operation and we can't rely on pigeons, can we?
Theres an open source software out there with it's hardware you can install your own private mobile network with a single laptop, and you don't need a sim card your mobile will be registered with IMEI MCC MNC LAC on the network.
2 or more mobiles will be able to call within it's network coverage. Yes without sim cards(sim cards are embedded chips with credentials which can be defined manually)

Now let's assume the scenario

Team of telecom experts send by terrorists among refugees/tourists they're staying at houses/hotels and at 4 different locations
They installed the CPE/boosters on their roof tops/balconies painted or reshaped it's appearance to disguise it.
25_25_25_25
Now they're covering 100 kms of range with their illegal network.
Means they can call to each other with their network or assigned more phones to their operatives.
Which means they can operate within the 100Kms
Furthermore the system running on laptop can be connected to VOIP via internet which can make those cell phones calls out of it's network to any other network around the world like any other existing network but without cellphone number Or identity makes it harder to trace and if they use the service with VPN of other countries nearly undetectable (CIA uses this on every foreign soil they're stationed)
And of course without billing (makes you wanna acquire it right? Don't it's detectable and illegal)
Making it secure and encrypted and untraceable network And that controlled secure network can easily be shutdown after the given time or after operation. Makes it almost untraceable even after the operation.

PTA detected and seized few models of phones which was imported in our country which can provide adhoc network same local network functionality without antennas or laptop.
Like UHF Radio provides relayed network on field to transmit messages further away this relayed system is used in tunnels or caves mostly.

How to counter it
1st in real time
Military and PTA need a detection equipment at every government building or antennas to trace such network frequencies.
Optional All antennas should be on PTA lease lands which will not only provide monitoring and raw data but also generate revenue for the government.
With already installed mobile network it is easy to detect such network.

2nd way is to assign task force like those in UAE travel on bikes they can detect and fine anyone who is keeping their WiFi to public or sharing their WiFi with range extenders to others. But ours will detect unknown and illegal mobile networks.

These scenarios are not made on "if"
But rather on "when"
And to prepare for such situations to counter any possible attack.

Take telecom experts as seriously as Network experts both are required to pull out any major operations.

'War never changes, but weapons have been changed'

Peace out✌
 
Last edited:
.
what about a just a VOIP over VPN and end-to-end encryption communication with no VPN ?is traceable?
 
.
can we say that currently govt enforced mobile phones entering Pakistan without registration with PTA and will not be working if used and not registered within 15 days time?
if so, does it help avoid above scenario?
thanks
 
.
Well written and extremely pertinent. A country faced with terrorism MUST get smart about such methods and counter them effectively.

Pakistan needs some basic network monitoring. First of all, any access to the outside world MUST go through government proxies. Such access MUST be intercepted and government proxies should act as man in the middle. Then deep packet analysis must be performed to identify potential malicious uses.

Having a fabtech backbone would go a long way towards securing the country. If indigenous mobile phones can be manufactured cheaply, then all other mobiles can be banned. This means any unauthorized use of the spectrum would become more evident and can then be traced. As a side effect, this avoids outflows of valuable foreign exchange.

Similarly, foreign agents should not be allowed to work with impunity under the guise of 'diplomatic immunity'. Why does America have such a vast presence within Pakistan? Their embassy must be placed under constant jamming.

These precautions are valid for all electronic equipment. Look at the plethora of television, computers, washing machines, air conditioners. Under the Internet of Things initiative, they will all be connected to the Internet. Is anyone checking what kinds of sensors are present in them and what signals they are transmitting? These devices are present in the houses of Army chief, Prime Minister, Chief Justice. Who is protecting their privacy?

Our main weakness is that we are enamored with Western technology, to the point that basic sense and sensibilities are set aside. You will never tell a stranger on the road your most private secrets. If someone random asks your birth date, you will be suspicious. Yet, on Facebook you share your complete timeline. This data is definitely accessible by a Facebook employee you don't know, have never met, and could potentially be a psychopath. You wouldn't give any of this information to him if he asked you while walking on the road, yet you are OK when he can access it at Facebook. Same applies to every other organization.

If a stranger asks to spend a night in your drawing room, you would probably kick him. Yet, you bring a television into your home. How do you know this equipment isn't recording everything that happens in front of it and transmitting to a secure location?

This network of devices can be used in war time against the people and the country. Many people don't know, but there is such a thing as wireless power. A switched off TV disconnected from electricity can be powered remotely to perform some minimal functionality without you having a clue.

I hope this knocks sense into people.
 
.
what about a just a VOIP over VPN and end-to-end encryption communication with no VPN ?is traceable?
I can trace VOIP even from multiple VPN connected. So can PTA. But tracing won't help unless their local security agencies are on our side.
I.e.
In 2007 our hackers community detected a signal coming from an island near India where recently a Christian missionary was killed by some fake native tribe. These are the stuff we need to be careful. Those black market sites to buy weapons and uranium.
Even their police been tipped off and apprehended the smugglers twice but news started with a sugar coating that it was depleted uranium. And weaponizing it require plutonium and etc.
This act can't be done without more than a single UN security partners involved to cover media for them. We can't do anything about it. And that's the biggest threat in my knowledge.
Tracing won't help you always sometimes you need to have "offensive is best defensive" measures. And stop attack before it happens.

can we say that currently govt enforced mobile phones entering Pakistan without registration with PTA and will not be working if used and not registered within 15 days time?
if so, does it help avoid above scenario?
thanks
We can solve on network problems with it and also tracing suspicious activity will be somehow easier for PTA they can also recover stolen phones.
But this network doesn't follow PTA rules this network register any phone without sim cards from old to smart phones anything can be connected with it. Makes it dangerous and should only be allowed at Universities in controlled environment to learn and Telecom and Computer science majors should be taken as seriously as micro biologists. And list should be maintained for such individuals. That's my opinion I am sure people would disagree but I belong to a Pakistan which witnessed the destruction of enemy sponsored terrorism.
 
Last edited:
.
We can solve on network problems with it and also tracing suspicious activity will be somehow easier for PTA they can also recover stolen phones.
But this network doesn't follow PTA rules this network register any phone without sim cards from old to smart phones anything can be connected with it. Makes it dangerous and should only be allowed at Universities in controlled environment to learn and Telecom and Computer science majors should be taken as seriously as micro biologists. And list should be maintained for such individuals. That's my opinion I am sure people would disagree but I belong to a Pakistan which witnessed the destruction of enemy sponsored terrorism.

Our real problem is the complete garbage being taught in our universities. I suspect there is a fear of intellect in our establishment. This fear is keeping our masses uneducated and contributing to our decline. On the contrary, in the West, you have a lot of personal freedom. In most cases, your boss and your peers will support creativity and thirst for knowledge. The government won't come knocking on your door because you share your knowledge. Nobody maintains 'lists' of computer science graduated. And as you know, they are advancing rapidly.

Instead of controlling knowledge, we need to establish a strong sense of national identity. That's the core problem. People have grievances that lead them to shun their national identity, and adopt a different agenda. Until you solve this problem, Pakistan will remain at risk of terrorism.
 
.
Our real problem is the complete garbage being taught in our universities. I suspect there is a fear of intellect in our establishment. This fear is keeping our masses uneducated and contributing to our decline. On the contrary, in the West, you have a lot of personal freedom. In most cases, your boss and your peers will support creativity and thirst for knowledge. The government won't come knocking on your door because you share your knowledge. Nobody maintains 'lists' of computer science graduated. And as you know, they are advancing rapidly.

Instead of controlling knowledge, we need to establish a strong sense of national identity. That's the core problem. People have grievances that lead them to shun their national identity, and adopt a different agenda. Until you solve this problem, Pakistan will remain at risk of terrorism.
Just like I said people would disagree in keeping tabs on poi and I respect that. Universities are great at teaching Not everyone has a brain to use the existing knowledge and build something new. Those students can be marked during their studies that's exactly how cia recruits.
I never said control knowledge but experiments should be done in controlled environment provided by university.
60% of most wanted terrorists are engineers osama was civil engineer.
I am a realist and I know how much destruction can a person like myself cause working against any country. Not everyone has a code not everyone has a conscience.
 
.
"everything written in the following article is fictional any relation with the reality is totally coincidence"
"Every detail is on internet already"
"People who want to sleep peacefully at night shouldn't read this"

A single CPE/mobile booster installed at it's tower/antennas can provide coverage of 25-50 km then they have to install another one and the chain goes on as far as they want to increase it's coverage.
All antennas are run by a special computer a server exclusively made to register all it's compatible phones/Sims and provide them their addresses like IP for call/sms functionality.
Communication plays a vital role for every operation and we can't rely on pigeons, can we?
Theres an open source software out there with it's hardware you can install your own private mobile network with a single laptop, and you don't need a sim card your mobile will be registered with IMEI MCC MNC LAC on the network.
2 or more mobiles will be able to call within it's network coverage. Yes without sim cards(sim cards are embedded chips with credentials which can be defined manually)

Now let's assume the scenario

Team of telecom experts send by terrorists among refugees/tourists they're staying at houses/hotels and at 4 different locations
They installed the CPE/boosters on their roof tops/balconies painted or reshaped it's appearance to disguise it.
25_25_25_25
Now they're covering 100 kms of range with their illegal network.
Means they can call to each other with their network or assigned more phones to their operatives.
Which means they can operate within the 100Kms
Furthermore the system running on laptop can be connected to VOIP via internet which can make those cell phones calls out of it's network to any other network around the world like any other existing network but without cellphone number Or identity makes it harder to trace and if they use the service with VPN of other countries nearly undetectable (CIA uses this on every foreign soil they're stationed)
And of course without billing (makes you wanna acquire it right? Don't it's detectable and illegal)
Making it secure and encrypted and untraceable network And that controlled secure network can easily be shutdown after the given time or after operation. Makes it almost untraceable even after the operation.

PTA detected and seized few models of phones which was imported in our country which can provide adhoc network same local network functionality without antennas or laptop.
Like UHF Radio provides relayed network on field to transmit messages further away this relayed system is used in tunnels or caves mostly.

How to counter it
1st in real time
Military and PTA need a detection equipment at every government building or antennas to trace such network frequencies.
Optional All antennas should be on PTA lease lands which will not only provide monitoring and raw data but also generate revenue for the government.
With already installed mobile network it is easy to detect such network.

2nd way is to assign task force like those in UAE travel on bikes they can detect and fine anyone who is keeping their WiFi to public or sharing their WiFi with range extenders to others. But ours will detect unknown and illegal mobile networks.

These scenarios are not made on "if"
But rather on "when"
And to prepare for such situations to counter any possible attack.

Take telecom experts as seriously as Network experts both are required to pull out any major operations.

'War never changes, but weapons have been changed'

Peace out✌


Your heart is in the right place, but you are needlessly over complicating the threat. All you need is one gateway and several mesh routers:

wireless-mesh-network-1024x720.jpg


Now all your terrorists or criminals need is to townload telegram or download Zello:

Instant encrypted comms infrastructure!

what about a just a VOIP over VPN and end-to-end encryption communication with no VPN ?is traceable?

VOIP can be traced by your ISP if they have wire shark captures, our agencies have equipment in place to capture .pcap files and once you have the actual file with the G711 Codec, you can use software like Audacity to convert the file format into .Wav at 8000mhz and hey presto you have now hacked the VOIP infrastructure of your target!
 
.
Your heart is in the right place, but you are needlessly over complicating the threat. All you need is one gateway and several mesh routers:

View attachment 533993

Now all your terrorists or criminals need is to townload telegram or download Zello:

Instant encrypted comms infrastructure!



VOIP can be traced by your ISP if they have wire shark captures, our agencies have equipment in place to capture .pcap files and once you have the actual file with the G711 Codec, you can use software like Audacity to convert the file format into .Wav at 8000mhz and hey presto you have now hacked the VOIP infrastructure of your target!

If the terrorists use a customized VOIP software with customized headers and encryption, I doubt our agencies will be able to intercept it.
 
.
VOIP can be hack and wifi router network as you said detectable. this is why I am more concerned about terrorists using the network off the grid and locally. Like open BTS provides 2g network. Which can increase the terrorist network for more than miles and keeps it secure. VOIP is an optional feature in my scenario not required for local network. Like we hammer those equipments in Gadani shipbreaking yard UHF radios and other communication devices, importing such BTS should also be regulated and require license and excise dptt should be instructed to hold any device belongs to individuals not company or university. It's everywhere and easy to obtain.
 
Last edited:
.
VOIP can be hacked and wifi router network as you said detectable.

You don't need to hack the end point, you can intercept the headers from the end point over the ISP network! See example below:
1.png


Now if you manage to get a full capture, you can get the audio too. But our agencies have tools that work better than wireshark and end point captures, so I have been told anyway.
 
.
images (2).png

Open BTS doesn't follow computer network protocols they're on telecommunication end. Perceptive but entirely based on telecom devices
http://openbts.org
GSM UMTS LTE signals are still secure unless we have hardcoded or put custom firmware (like we have WRT for wifi router) in CPE/BTS where signals are transmitting or recieving.
Indeed our intelligence agencies are capable of intercepting such networks. But it's still a threat and there's no harm in regulating those 25-50 km range telecom devices easily obtainable from shops.
 
Last edited:
.
View attachment 533998
Open BTS doesn't follow computer network protocols they're on telecommunication end. Perceptive but entirely based on telecom devices
http://openbts.org
GSM UMTS LTE signals are still secure unless we have hardcoded or put custom firmware (like we have WRT for wifi router) in CPE/BTS where signals are transmitting or recieving.
I know what Open BTS is, you are over complicating the threat friend, no one needs to over-engineer anything, there is more than one way to make a bomb and terrorists still choose a layer of cordite, a mechanical detonator and ammonia, get my drift!

The infrastructure you are discussing is much to advanced to go ignored, terrorists use dual purpose items to achieve their ends! #Keepitsimple!
 
.
I know what Open BTS is, you are over complicating the threat friend, no one needs to over-engineer anything, there is more than one way to make a bomb and terrorists still choose a layer of cordite, a mechanical detonator and ammonia, get my drift!

The infrastructure you are discussing is much to advanced to go ignored, terrorists use dual purpose items to achieve their ends! #Keepitsimple!

He is hinting towards state sponsored terrorists. Are we keeping tabs on equipment brought into the country by embassies, for example? What if a state has create a front company for importing such technology undetected?
 
.
He is hinting towards state sponsored terrorists. Are we keeping tabs on equipment brought into the country by embassies, for example? What if a state has create a front company for importing such technology undetected?

If they are state sponsored then they are not going to deploy said infrastructure in Pakistan, I don't know about Afghanistan but our friends to the east have electronic warfare COMINT and SIGINT on lock down. The network being proposed here can be defeated with a single spectrum GSM Jammer!

The operation of Open BTS still requires the use of SIP endpoints in Voice over IP networks! These can be intercepted and defeated by state agencies!
 
.
Back
Top Bottom