- Joined
- Jun 30, 2024
- Messages
- 2,591
- Likes
- 22,772
What is this?
Circled in redView attachment 30518
NopeI won't ever believe that any madarsachaap can use such high end stuff... even most science/tech grads won't understand what's written in the tweet.
These are not simply SSG trained jihadis but ex/serving-SSG personnel roaming in J&K.
Looks like a portable repeater station for enabling longer distance communication for encrypted radios that operate on UHF or it simply could be a homemade meshtastic node like @Baseplate mentioned.What is this?
Circled in redView attachment 30518
The poblam is that most security forces except JKP (in most of the cases) use VHF/UHF sets with AES Encryption and complex modulation techniques like 4FSK for intra squad comms, frequency counter can not straight away decode the chatter, you need more specialized tools for it.AI said this about Portable Frequency Counter, I don't know much about Radios but if whatever said below is true then it explains why the simply manage to evade ambushes and search ops
The portable frequency counter is a handheld tool used to identify the exact radio frequency a device (like a walkie-talkie or drone) is using. While harmless in civilian use (e.g., hobbyist radio experiments), in conflict zones like Jammu & Kashmir, it becomes a tactical weapon. Here’s how:
1. Eavesdropping on Security Forces:
- Security agencies use specific VHF/UHF radio frequencies to coordinate operations. A frequency counter can scan and detect these frequencies, allowing terrorists to secretly listen to troop movements, patrol plans, or emergency calls.
2. Cloning Frequencies for Sabotage:
- Once the frequency is identified, terrorists can program their own radios to the same channel. This lets them:
- Intercept live communications: Gather intel on upcoming operations.
-Transmit fake orders: Create confusion by sending false alerts (e.g., "Retreat!" or "False alarm!") to disrupt coordination.
3. Bypassing Privacy Codes (CTCSS/DCS):
- Radios often use sub-audible tones (CTCSS) or digital codes (DCS) to filter out unwanted chatter. A frequency counter can decode these privacy settings, enabling terrorists to:
- Sneak into “secured” channels: Join conversations without being detected.
- Jam communications: Overwhelm the frequency with noise to block critical messages during attacks.
4. Replicating Drone/Device Signals:
- If security forces use drones or remote sensors, terrorists could reverse-engineer their frequencies to disable them or even hijack control
Also the problem with them trying to do jamming and is also that it can lead them to getting triangulated also they need a lot more power for it . so i don't think they are doing that .The poblam is that most security forces except JKP (in most of the cases) use VHF/UHF sets with AES Encryption and complex modulation techniques like 4FSK for intra squad comms, frequency counter can not straight away decode the chatter, you need more specialized tools for it.
It's only JKP that uses basic baofeng radios that can be tapped into using this tech.
A Lt Col ranked pak soldier apprehended during CT/CI ops, Can anyone verify this news. even if it is true paxtan has the rich history of disowning thier soldiers
View: https://x.com/Tej_Intel/status/1912766726900531208?t=p0xezPX9aXOv4l3yG0Z61g&s=19
A Lt Col ranked pak soldier apprehended during CT/CI ops, Can anyone verify this news. even if it is true paxtan has the rich history of disowning thier soldiers
View: https://x.com/Tej_Intel/status/1912766726900531208?t=p0xezPX9aXOv4l3yG0Z61g&s=19
A Lt Col ranked pak soldier apprehended during CT/CI ops, Can anyone verify this news. even if it is true paxtan has the rich history of disowning thier soldiers
View: https://x.com/Tej_Intel/status/1912766726900531208?t=p0xezPX9aXOv4l3yG0Z61g&s=19