FEATUREDLatestNationalNewsTechnologyTODAY'S STORIESTOP STORIESWORLD

Pakistan’s Covert Telecom Strategy: Terrorist Aid In PoK Raises Security Concerns

Pakistan’s Covert Telecom Strategy: Terrorist Aid in PoK Raises Security Concerns.

Pakistan’s Covert Telecom Strategy: Discover how Pakistan leverages technology to aid terrorists, with secret towers in PoK enabling encrypted communication and evading border surveillance.

Learn about the implications for national security. Pakistan is helping terrorists with the help of technology, installing special towers in PoK; Signals coming to Jammu jail.

According to sources, there has been a significant surge in the number of cellular towers along the Line of Control in Pakistan-occupied Kashmir (POK) to aid terrorists and their allies in infiltration efforts.

Officials said after studying the pattern of infiltration attempts and recent terror attacks, especially in the Pir Panjal south of Jammu, that terrorist groups are using highly encrypted YSMS services.

A technology that merges smartphones and radio sets for covert communication purposes.

Pakistan’s Covert Telecom Strategy: How will the technology work?

This technology allows the terrorist organization’s handler in the Pakistan-Occupied Kashmir (PoK) to communicate with the infiltration group and its receiving party in the Jammu region via the telecom network that is used throughout the Line of Control.

The Army and BSF, who monitor the borders with Pakistan, are avoided by doing this.

The project to boost the telecom signal has been completely handed over to the Special Communications Organization (SCO) led by Pakistan Army officer Major General Omar Ahmed Shah.

It is believed that he previously worked with Pakistan’s spy agency ISI.

According to Article 45 of the Constitution of the International Telecommunication Union (ITU), a body under the United Nations, it is forbidden to strategically place telecommunication towers close to the Line of Control (LOC) and the international border.

These towers are typically used to aid terrorists and their allies in infiltration activities. is against the law.

Prohibition of broadcasting false or misleading signals.

Article 45 of the ITU’s constitution requires all 193 member states to take necessary steps to prevent the transmission or dissemination of identification signals.

Officials said the Bureau of Radiocommunication (BR) under ITU has reiterated that all stations are prohibited from making unnecessary broadcasts, broadcasting unnecessary signals, broadcasting false or misleading signals, or broadcasting signals without identification.

Let us tell you that discussions are being held at the ministerial level to raise the matter at the relevant international forum.

Officials said the new telecom towers are working on code-division multiple access (CDMA) technology and the encryption is primarily done by a Chinese firm to complement YSMS operations.

This rogue telecom infrastructure supports terrorists and their contacts infiltrating into Jammu and Kashmir areas.

The deployment of CDMA technology along the Line of Control is intended to complicate surveillance efforts as the technology allows multiple signals on the same transmission channel, creating challenges in controlling illicit communications.

Testing new technology.

Officials said the new technology is likely to be tested by security agencies across the country, especially in prisons, to effectively deal with security threats.

Officials said cell phone smuggling into prisons poses an urgent public safety threat, giving criminals the authority to carry out terrorist acts from within prison.

This comes after several security agencies indicated that telecom signals from PoK were entering Indian territories, affecting areas ranging from Baramulla and Kupwara in Kashmir to Jammu, Kathua, Rajouri, and Poonch districts in the Jammu division.

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2023 DNN All Rights Reserved