Run optimized open source software on the backup phone. Therefore, they fool the radio antenna mast like a portable cell phone jammer and dip the frequency into a small part of the interference signal. Wrong calls may prevent text messages and calls from being sent to recipients in the area: forging identities and answering questions with strange names. In the worst case, you can even block text messages. Because the radio station will send hundreds of square kilometers of status information before being called. This process is called paging. The lead author of the study said: “You can send a call to all phones in the area.” It contains an identification number that can be used by any phone to check whether it is on the device. “
However, the replacement phone will answer these questions and accept them, make calls and text messages faster than other phones. At the transmission tower, it seems that the actual receiver has been notified. But he didn’t learn anything. In the best case, only the phone will be lost and no calls will be made. In the worst case, even text messages may be intercepted and read due to broken encryption and lack of authentication. So far, computer scientists have tested the GSM standard only more than 20 years ago, but have used many modern smartphones when necessary. In addition, the researchers said, this gap threatens the communication between machines and the future Internet of Things. New UMTS or LTE networks may also be vulnerable. Gold said: “Many GSM agreements are duplicates.
Bendit said: “The Ukrainian armed forces claim to have discovered the Leer-3 system in eastern Ukraine, and there is potential evidence that Leer-3 is also used in Syria.” “The Russian army continues to train three aerial drones while using the enemy Party signals and cellular communications are used to suppress, identify and ultimately destroy enemy forces. In fact, this training is part of the official tactics, techniques and procedures of electronic warfare and other units of the Russian army. “The development of electronic warfare is the development of military autonomous systems. The key component of Currently, drones are in an electronic war against cellular communications, but it is not difficult to imagine that new technologies will also apply the same courses. In this case, it is easy to imagine that other vehicles will become jammers on the battlefield in the future, even now.