Cyber Law, Cyber Security, Privacy, Data Protection Blog - FREE TO SHARE
Tuesday, June 21, 2016
Sunday, June 5, 2016
Terrorist using Customised Apps to evade detection
Terrorist have created an application 'calculator' which can be downloaded on smart phones attached to the off-air network created specifically for them.
The technology is based on the concept of 'cognitive digital radio' that enables users to turn their smartphones into peer-to-peer, off-grid communication tools.
The network generates its own signal through proprietary adhoc networking protocols and automatically coordinates with other units within range which enables users to send and receive text messages, share their GPS locations on offline maps regardless of access to WiFi or cellular service.
The technology is based on the concept of 'cognitive digital radio' that enables users to turn their smartphones into peer-to-peer, off-grid communication tools.
The network generates its own signal through proprietary adhoc networking protocols and automatically coordinates with other units within range which enables users to send and receive text messages, share their GPS locations on offline maps regardless of access to WiFi or cellular service.
The Calculator app is loaded on a normal Android phone and communicates over WiFi to the Radio which further gets transmitted on VHF as digital burst communication.
The principle is same as Gotennna but with little difference.
Gotennna uses Bluetooth to communicate with the a small Radio device Antenna which further uses UHF to transmit data.
Gotennna works on P2P concept while this most likely is not working on P2P.
Terrorist are also using morse code and DTMF to evade interception.
#cyberenabledterrorism #cyberterrorism
Subscribe to:
Posts (Atom)
FIR : All you want to know about in a criminal case
FIR - What is? The first information report is a report giving information of the commission of a cognizable crime, which may be made by t...
-
The Telecommunications Act of 2023 has strengthened the dispute resolution framework by introducing an online grievance redressal system. T...
-
Types of Cyber Attacks There are several effective methods for disrupting computer systems. We are talking of a method known as cyber ...
-
Police Closure Reports after investigation in cyber crime cases : 1. Art 21 of the Constitution guarantees fundamental right to life and per...