Saturday, September 17, 2022

Russian radio bands hacking tutorial command line (Russia intel)

 https://www.hackers-arise.com/post/sdr-for-hackers-jamming-russian-military-signals-in-ukraine


First, you will need a HackRF One. The RTL-SDR is inadequate for this task. Although the inexpensive RTL-SDR is an excellent receiver, it is ONLY a receiver. We need hardware that can transmit signals that can jam the Russian military signals. You can purchase one here and you can set it up in this tutorial here.


Next, you need an installation of Kali Linux (most other Linux distributions will work equally well). You will then need to install GNU Radio and gr-osmosdr. Fortunately, both are in the Kali repository so we can use the apt utility to install.


kali > sudo apt install gnuradio


kali > sudo apt install gr-osmosdr




Step #2: Identify the Frequencies Used by the Russian Military


The frequencies used by the Russian military are published online in numerous location including the one below.


https://wiki.radioreference.com/index.php/Category:Russia_Military_Frequencies


In addition, the adept radio jammer is recommended to simply listen to the frequencies around them to identify potential frequencies to jam.


Step #3 Jamming their Signals


osmosdr package we just downloaded has a utility named osmocom_siggen_nogui. This is a signal generator. As a signal generator, it has the capability of also jamming signals.


This signal generator is capable of producing various signals useful for jammimg including;


constant


sinusoid


uniform noise


Gaussian noise


Frequency sweep


GSM bursts


Two Tone


Let's take a look at the help screen for this utility.


kali > osmocom_siggen_nogui -h

Now, check that your HackRF One is connected and functioning.


Kali > sudo hackrf_info

Now, we can begin the jamming! Select a frequency that the Russians are using for communication or other purposes and create a command similar to the following;


kali > osmocom_siggen_nogui -a hackrf -f 4182e6 --gaussian -x 2e6 -y 10 -v


This command uses our HackRF (-a hackrf) at 4182 kHz (one of Russian military communication frequencies) and uses a Gaussian noise (similar to white noise) jamming technique.


To apply this jamming on other communication frequencies, simply edit the frequency setting (in this case, 4182e6) and possibly the jamming technique. Different jamming techniques work better on different frequencies and communication protocols (GSM bursts, for instance, on GSM cellular communication).


Limitations


The primary limitation we must be concerned with is strength of signal. These are only effective if we are close to the receiver or can project a VERY strong signal. In addition, Russian military signals employ frequency hopping where the signal changes frequencies at a very rapid rate. In such cases, we may have employ multiple transceivers and target multiple frequencies (we don't need to target all the frequencies as missing components will garble the signal adequately) or set the sending bandwidth very wide to cover the multiple frequencies.


Summary


Signal jamming has long and storied history in military tactics. Although some military communication is encrypted (many of the Russian shortwave communication is unencrypted and can be intercepted) this does not stop us from jamming it. It essence, jamming it keeps the signal from being received as sent as the receiver. That can have critical military implications.


Look for more tutorials here on using our HackRF to blunt the Russian attack in Ukraine.

Wednesday, September 7, 2022

Russia, NK, Iran...chips smuggling

 Putin went to NK looking for something he didn't got it in China

the RTL8139D semiconductor chip for drones firewall, Russia depends, and its manufactured on the West, probably Texas Instruments
It seems China is also having a lot of problems getting this tek, and bcz the latest info says China bust a smuggling operation in Hong Kong, probably NK agents (link down)
So, last resource for Russia, incredibly is NK suplly of some of these chips
My personnal opinion, 
  1. on the US exportation dpt licence request, let's check the last smuggling case at the US with Iran (the italian mafia who sold the chips trough a business of printers)
  2. bcz de smuggling gets out of land inside printers.
  3. lets check all printers business in China
  4. lets be behind this intel, so we can sell it to anyone or anywhere, we find  strategic
anyone remembers how can chips be destroyed on a mid range distance?

Portugal Intel (TAP - Azul Brasil, e Hainan China, 7% shareholding, and 34% profits, secret memorandum "this is confidential, if it becomes public, we deny everything) :))

 




In 1994, four non-Portuguese companies created a joint venture named TSKJ to bid for natural gas contracts in Nigeria. The joint venture was created via three special purpose shell corporations based in the Madeira FTZ. Some of these companies’ directors were Portuguese nationals. TSKJ ultimately secured contracts worth more than USD 6 billion by paying over USD 182 million in bribes to various Nigerian public officials.After the on-site visit, Portuguese authorities added that the three Madeira companies were “special purpose vehicles” (SPVs).

#antoniocostapm #Portugal .. it was discovered that Singaporean middle-men had arranged for the shipment to Burma of .5 million worth of arms and ammunition manufactured in Portugal, in direct violation of the European Community's arms embargo against the Rangoon regime (..) Included in the order were 120mm heavy mortars, 81mm medium mortars and possibly some 60mm light mortars. There were also said to be at least 20,000 mortar bombs and artillery shells in the shipment (..)

Portugal Intel (gold mines locations)

 









Saturday, August 27, 2022

Em conclusão, os " espiritos" têm apenas ligação às pessoas vivas na Terra, um breve periodo de tempo, assim como, iremos reencontra las nessa nova identidade, sem que hajam entre nós, lacos afectivos