The last week I’ve been visiting my friend and colleque Ziggy in Tel Aviv which gave me something I’ve been waiting for almost a year, a brand new BladeRF x40, a low-cost USB 3.0 Software Defined Radi
From now on, you can configure the BTS to do whatever you want … either act as a “proxy” to a legit SMC ( with a GSM/3g USB dongle ) and sniff the unencrypted GSM traffic of each phone, or to create a private GSM network where users can communicate for free using SIP, refer to the YateBTS Wiki for specific configurations.
If I'm reading this correctly, would it be feasible to set one of these up to proxy at a protest to semi-anonymize the phone traffic and location data?
I don't know how much it would really cover up the data, would need someone a bit more experienced in traffic than I, but might be worth experimenting with. At the very least you would become the complete and total focus of any feds trying to do listening just by virtue of being there doing that kind of thing which might be a resource drain on something that requires highly technical people that are quite limited in quantity and expertise.
I think it's absolutely possible to saturate the man hours that they have on the technical side of things and that's precisely how people should analyse the conflict, a resource battle of total labour hours on each side.
If you attended as press you would largely be able to do this kind of activity and carry technical gear without being questioned about it as well.
You might have to compete with the cop's version. You'd probably be better off setting up a mesh of wifi access points and providing a local server in a nearby car or something for communications (message board, jabber server, etc) and storing recordings of police actions. I've definitely not thought about this before.😅
For bonus points, look into using an esp32 or esp8266 to prerecord MAC addresses that show up to local police stations and FBI offices.
If I'm reading this correctly, would it be feasible to set one of these up to proxy at a protest to semi-anonymize the phone traffic and location data?
I don't know how much it would really cover up the data, would need someone a bit more experienced in traffic than I, but might be worth experimenting with. At the very least you would become the complete and total focus of any feds trying to do listening just by virtue of being there doing that kind of thing which might be a resource drain on something that requires highly technical people that are quite limited in quantity and expertise.
I think it's absolutely possible to saturate the man hours that they have on the technical side of things and that's precisely how people should analyse the conflict, a resource battle of total labour hours on each side.
If you attended as press you would largely be able to do this kind of activity and carry technical gear without being questioned about it as well.
You might have to compete with the cop's version. You'd probably be better off setting up a mesh of wifi access points and providing a local server in a nearby car or something for communications (message board, jabber server, etc) and storing recordings of police actions. I've definitely not thought about this before.😅
For bonus points, look into using an esp32 or esp8266 to prerecord MAC addresses that show up to local police stations and FBI offices.