44 paramilitary soldiers were killed in a suicide attack on Thursday in Jammu e-Mohammed terrorist organization in Jammu and Kashmir State Pulwama last week. The Indian Army for this attack
Various parties have been saying that they should give a proper response.

It is reported that the conspirators of the Pulwama attack are using the innovative technology to intercept their communications with intelligence.

High frequency radio
It is noteworthy that the technique used in conjunction with mobile phones and high-frequency radio sets is created for rescue operations in New York during the 2012 Sandy Hurricane Attack.

With the help of cell phone towers ...
This is a mechanism for transferring information through mobile phones without the help of cell phone towers
It is noteworthy. But this technology is now boundary border control
The terrorists on both sides, to deploy and intimidate security personnel, to sabotage sabotage
Is said to be used.

Sajjad Ahmad
In August last year, Sajjad Ahmed, a Pakistani militant who was captured alive, has been told of smart phones and radio sets to send SMS messages.

In the same line ...
And when using this type of technique, the two devices that communicate are in the same straight line
Is said to be used. Then, after the terrorists discovered that they were dealing with this innovative system, that was the case
Although the methods used to intercept communications have been created by the Security Department, it is said to have been largely unprofitable.

Peer-to-peer type
Therefore, the Pulwama assault conspirators, in addition to being monitored by mobile phone communications
It is suspected that this method can be used to communicate. It is also suspected that YYSMS could be used for peer-to-peer software service
Various parties have been saying that they should give a proper response.

It is reported that the conspirators of the Pulwama attack are using the innovative technology to intercept their communications with intelligence.

High frequency radio
It is noteworthy that the technique used in conjunction with mobile phones and high-frequency radio sets is created for rescue operations in New York during the 2012 Sandy Hurricane Attack.

With the help of cell phone towers ...
This is a mechanism for transferring information through mobile phones without the help of cell phone towers
It is noteworthy. But this technology is now boundary border control
The terrorists on both sides, to deploy and intimidate security personnel, to sabotage sabotage
Is said to be used.

Sajjad Ahmad
In August last year, Sajjad Ahmed, a Pakistani militant who was captured alive, has been told of smart phones and radio sets to send SMS messages.

In the same line ...
And when using this type of technique, the two devices that communicate are in the same straight line
Is said to be used. Then, after the terrorists discovered that they were dealing with this innovative system, that was the case
Although the methods used to intercept communications have been created by the Security Department, it is said to have been largely unprofitable.

Peer-to-peer type
Therefore, the Pulwama assault conspirators, in addition to being monitored by mobile phone communications
It is suspected that this method can be used to communicate. It is also suspected that YYSMS could be used for peer-to-peer software service
No comments:
Post a Comment