What's new

Secure terrorist network with Telecom experts help

If they are state sponsored then they are not going to deploy said infrastructure in Pakistan, I don't know about Afghanistan but our friends to the east have electronic warfare COMINT and SIGINT on lock down. The network being proposed here can be defeated with a single spectrum GSM Jammer!

The operation of Open BTS still requires the use of SIP endpoints in Voice over IP networks! These can be intercepted and defeated by state agencies!

They first need to be aware of such a setup. His post talks about personnel using bicycles to cover area for detection. Basically, he is highlighting the threat. Of course our agencies should be able to deal with them once identified.
 
.
They first need to be aware of such a setup. His post talks about personnel using bicycles to cover area for detection. Basically, he is highlighting the threat. Of course our agencies should be able to deal with them once identified.
This relies on VOIP and SIP (SIP Trunking ) our techs in Rawalpindi know more than you think! This is civ tech used in businesses, its not covert knowledge! Read my previous posts please! I have explained in great detail why this is not a BIG threat! The sky is not falling, please breathe!
 
.
This relies on VOIP and SIP (SIP Trunking ) our techs in Rawalpindi know more than you think! This is civ tech used in businesses, its not covert knowledge! Read my previous posts please! I have explained in great detail why this is not a BIG threat! The sky is not falling, please breathe!
If i am not wrong two such kind of illegal networks were taken down.
 
. . .
Brother @RescueRanger tell us about E2E encryption communication in CT perspective and does companies like telegram or whatsapp share data on our agencies request?
Telegram is used by ISIS because they refuse to hand over the private keys used for client side encryption, the same goes for Zello App and Protonmail.
 
.
Back
Top Bottom