Signal Intelligence with a Software Defined Radio (SDR): The Quiet Revolution in Cybersecurity and Cyberwarfare

Welcome back, aspiring cyberwarriors!   Software-Defined Radio (SDR) has changed the way we communicate and conduct warfare. This comprehensive analysis explores the technical depths of SDR systems, their real-world applications, and their impact on military operations and satellite communications. Through detailed examples and case studies, we’ll examine how SDR has become a cornerstone of modern […]

Continue Reading

Software Defined Radio Basics (Signals Intelligence) for Hackers, June 10-12

Welcome my aspiring open-source signals intelligence officers!   A few years back there was revolution in signals intelligence similar to the revolution of the first PC, the Internet, and the smartphone. That revolution turned your computer into a powerful signals intelligence tool that used to cost hundreds of thousands of dollars. Those devices were only […]

Continue Reading

Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability

Welcome back, my rookie cyberwarriors!   In recent weeks, a series of sophisticated cyber attacks has once again exposed critical vulnerabilities in the Signaling System 7 (SS7) protocol, a fundamental component of global telecommunications infrastructure that manages call routing, SMS messaging, and cellular network interoperability. These security breaches, detected across multiple major U.S. telecommunications carriers […]

Continue Reading

Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance

Welcome back, my aspiring cyberwarriors!   Mobile hacking can take many forms. It can entail any of the following;   (1) a hack against a singular phone such Pegasus and many other IoS and Android malware, (2) an attack against the mobile infrastructure such as SS7 (Chinese hackers have recently compromised the entire US telecom […]

Continue Reading

What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?

Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital world would slow down considerably and even reading this article would be difficult and cumbersome. Nearly everything that is transmitted over the web is compressed to reduce latency and free up bandwidth. Compression is one of […]

Continue Reading

Satellite Hacking: Hacking the Iridium Satellite System

Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as: GPS Internet Broadband Connectivity Satellite Phone Emergency Response and Disaster Relief Broadcast TV and Radio Weather Data Scientific Data Collection Remote Sensing and Imaging and many more. If the security of these communications are compromised […]

Continue Reading

Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods

Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF, the possibility of hacking radio frequency (RF) communication and control devices has been blown wide open to anyone in the cybersecurity/infosec field. Although not commonly included in penetration tests, radio hacks should be considered […]

Continue Reading