\"\"
<\/span><\/figcaption><\/figure>A call from a Pakistani spy agency to an Army installation in eastern India has led to the unravelling of an illegal telephone exchange<\/a> in Bengaluru, raising questions whether similar systems were operational in other parts of the country, officials said on Thursday.

The entire racket was busted by the Military Intelligence wing of the Army's Southern Command which had intercepted the call received at the Army installation in eastern India a few weeks back.

During the call, a spy from Pakistan was asking about general details while posing as a senior officer.

On further investigation, the intelligence sleuths found that some other offices located in various formations such as the Movement Control Office (MCO) as well as the Principal Comptroller of Defence Account (PCDA) were also receiving such calls seeking details from them.

A deeper probe led to uncovering of the scam in which Pakistan-based intelligence operatives exploited such illegal exchanges to route their calls to connect with Indian citizens and obtain information of military installations.

The officials said Pakistani intelligence operatives have adopted the modus operandi of investing in illegal call exchanges that switch Voice over Internet Protocol (VoIP) calls to normal Indian mobile calls.

To execute this illegal operation, SIM boxes are used which run a parallel illegal telephone exchange.

The officials explained that a Subscriber Identity Module (SIM) box, also known as a SIM bank, is a hardware-based device used in the telecom sector for termination of direct Global System for Mobile Communications (GSM) communication.

An operator uses a technology called 'migration' of the SIM cards, wherein the registration of the SIM cards jumps on different GSM modules with a specific frequency, leading to multiple GSM gateways located throughout a city or a town, and the system creates an illusion of a real user's movement by showing the call being conducted from different gateways.

This helps in prevention of a SIM card from being blocked by service providers or detected by government agencies.

Operation of these illegal exchanges not only incurs losses to the cellular networks but also to the government as it is an un-registered operation, and the money generated is un-accounted and non-taxable which can further be utilised to support anti-national activities without leaving any money trail.

The officials said the \"adversary nation\" has been found using these illegal SIM boxes often to obtain sensitive information and maintain contact with their agents who have penetrated into the country.

The racket came to light after the anti-terror cell of the Bengaluru Police, with the help of Military Intelligence of the Southern Command, arrested two men who ran an illegal phone exchange, converting
international calls<\/a> to local ones, causing a huge revenue loss and posing a threat to national security.

Thirty-two SIM box devices, which can use 960 SIM cards at a time, were seized from them, they said.

Ibrahim Mullatti Bin Mohammed Kutty, hailing from Malappuram in Kerala, and Gautham B Vishwanathan from Tirupur in Tamil Nadu had placed the 32 devices at six areas of the city to carry out their illegal activities.

After termination of a VoIP call, the same call is further generated to the destination phone with the number appearing as that of an Indian number.

The
Indian Army<\/a> has issued many advisories and drafted SOPs to prevent leaks through such means. However, a lot of civilian staff still fall prey to the con.

<\/body>","next_sibling":[{"msid":83394019,"title":"Altice takes 12% stake in BT, says no plans to make takeover offer","entity_type":"ARTICLE","link":"\/news\/altice-takes-12-stake-in-bt-says-no-plans-to-make-takeover-offer\/83394019","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":83394271,"entity_type":"ARTICLE","title":"Pakistan spies ring illegal Indian telephone exchanges for secret info","synopsis":"The entire racket was busted by the Military Intelligence wing of the Army's Southern Command which had intercepted the call received at the Army installation in eastern India a few weeks back.","titleseo":"telecomnews\/illegal-telephone-exchange-used-for-spying-unearthed-in-bluru","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":1316,"shares":0,"engagementtimems":6017000},"Alttitle":{"minfo":""},"artag":"PTI","artdate":"2021-06-10 12:26:11","lastupd":"2021-06-10 17:14:50","breadcrumbTags":["illegal network","Indian Army","Spying","Telephone Exchange","Telecom Regulatory Authority of India","Industry","international calls","BTM Layout","electronic devices"],"secinfo":{"seolocation":"telecomnews\/illegal-telephone-exchange-used-for-spying-unearthed-in-bluru"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2021-06-10" data-index="article_1">

巴基斯坦间谍环非法印度电话交换机的秘密信息

整个球拍被军事情报的南方军队的命令在军队截获了调用接收安装在印度东部几周后回来。

  • 更新在2021年6月10日下午05:14坚持
阅读: 100年行业专业人士
读者的形象读到100年行业专业人士
巴基斯坦间谍机构的电话安装一支军队在印度东部的解体导致非法的电话交换机在班加罗尔,质疑类似的系统是否运行在这个国家的其他地方,官员周四表示。

整个球拍被军事情报的南方军队的命令在军队截获了调用接收安装在印度东部几周后回来。

在调用期间,来自巴基斯坦的间谍是询问细节而伪装成一名高级官员。

在进一步调查,情报侦探发现,一些其他办公室位于等构造运动控制办公室(MCO)以及国防的主要审计账户(PCDA)也接受这样的呼吁寻求他们的细节。

广告
深入调查导致揭露骗局的巴基斯坦情报人员利用这些非法交易所路线他们电话联系印度军事设施的公民和获取信息。

官员说,巴基斯坦情报人员已经采用了投资的做法非法调用交流开关互联网协议语音(VoIP)调用正常印度移动电话。

执行非法操作,SIM卡盒使用并行运行一个非法电话交换机。

官员解释说,一个用户身份模块(SIM),也称为SIM银行,电信行业是一个基于硬件的设备用于直接终止全球移动通讯系统(GSM)通信。

操作员使用一种技术称为“迁移”的SIM卡,在登记的SIM卡跳不同的GSM模块与一个特定的频率,导致多个GSM网关坐落在一个城市或小镇,和系统创建一个幻觉真实用户的运动通过显示的调用进行不同网关。

这有助于预防的SIM卡被服务提供者或被政府机构。

这些非法操作交流不仅发生亏损的蜂窝网络也给政府,因为它是一个取消操作,生成的钱是un-accounted和非税进一步可以利用支持反国家活动没有留下任何钱。

广告
官员说,“对手国家”被发现使用这些非法SIM框经常获得敏感信息和与他们保持联系代理渗透进入这个国家。

球拍曝光班加罗尔警察反恐细胞后,借助南方司令部的军事情报,逮捕了两名男子跑了一个非法电话交换、转换国际电话当地的,导致一个巨大的收入损失和对国家安全构成威胁。

32 SIM盒设备,可以使用960 SIM卡,被抓,他们说。

易卜拉欣Mullatti本·穆罕默德,当时来自Malappuram喀拉拉邦,在B Vishwanathan在泰米尔纳德邦Tirupur把城市的32个设备在六个地区进行非法活动。

终止后的VoIP电话,进一步生成相同的调用目的地电话的号码出现的一个印度号码。

印度军队已经发布了许多报告,起草标准作业程式通过这样的手段,防止泄漏。然而,很多平民人员仍然反对的牺牲品。

  • 发表在2021年6月10日12:26点坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序
\"\"
<\/span><\/figcaption><\/figure>A call from a Pakistani spy agency to an Army installation in eastern India has led to the unravelling of an illegal telephone exchange<\/a> in Bengaluru, raising questions whether similar systems were operational in other parts of the country, officials said on Thursday.

The entire racket was busted by the Military Intelligence wing of the Army's Southern Command which had intercepted the call received at the Army installation in eastern India a few weeks back.

During the call, a spy from Pakistan was asking about general details while posing as a senior officer.

On further investigation, the intelligence sleuths found that some other offices located in various formations such as the Movement Control Office (MCO) as well as the Principal Comptroller of Defence Account (PCDA) were also receiving such calls seeking details from them.

A deeper probe led to uncovering of the scam in which Pakistan-based intelligence operatives exploited such illegal exchanges to route their calls to connect with Indian citizens and obtain information of military installations.

The officials said Pakistani intelligence operatives have adopted the modus operandi of investing in illegal call exchanges that switch Voice over Internet Protocol (VoIP) calls to normal Indian mobile calls.

To execute this illegal operation, SIM boxes are used which run a parallel illegal telephone exchange.

The officials explained that a Subscriber Identity Module (SIM) box, also known as a SIM bank, is a hardware-based device used in the telecom sector for termination of direct Global System for Mobile Communications (GSM) communication.

An operator uses a technology called 'migration' of the SIM cards, wherein the registration of the SIM cards jumps on different GSM modules with a specific frequency, leading to multiple GSM gateways located throughout a city or a town, and the system creates an illusion of a real user's movement by showing the call being conducted from different gateways.

This helps in prevention of a SIM card from being blocked by service providers or detected by government agencies.

Operation of these illegal exchanges not only incurs losses to the cellular networks but also to the government as it is an un-registered operation, and the money generated is un-accounted and non-taxable which can further be utilised to support anti-national activities without leaving any money trail.

The officials said the \"adversary nation\" has been found using these illegal SIM boxes often to obtain sensitive information and maintain contact with their agents who have penetrated into the country.

The racket came to light after the anti-terror cell of the Bengaluru Police, with the help of Military Intelligence of the Southern Command, arrested two men who ran an illegal phone exchange, converting
international calls<\/a> to local ones, causing a huge revenue loss and posing a threat to national security.

Thirty-two SIM box devices, which can use 960 SIM cards at a time, were seized from them, they said.

Ibrahim Mullatti Bin Mohammed Kutty, hailing from Malappuram in Kerala, and Gautham B Vishwanathan from Tirupur in Tamil Nadu had placed the 32 devices at six areas of the city to carry out their illegal activities.

After termination of a VoIP call, the same call is further generated to the destination phone with the number appearing as that of an Indian number.

The
Indian Army<\/a> has issued many advisories and drafted SOPs to prevent leaks through such means. However, a lot of civilian staff still fall prey to the con.

<\/body>","next_sibling":[{"msid":83394019,"title":"Altice takes 12% stake in BT, says no plans to make takeover offer","entity_type":"ARTICLE","link":"\/news\/altice-takes-12-stake-in-bt-says-no-plans-to-make-takeover-offer\/83394019","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":83394271,"entity_type":"ARTICLE","title":"Pakistan spies ring illegal Indian telephone exchanges for secret info","synopsis":"The entire racket was busted by the Military Intelligence wing of the Army's Southern Command which had intercepted the call received at the Army installation in eastern India a few weeks back.","titleseo":"telecomnews\/illegal-telephone-exchange-used-for-spying-unearthed-in-bluru","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":1316,"shares":0,"engagementtimems":6017000},"Alttitle":{"minfo":""},"artag":"PTI","artdate":"2021-06-10 12:26:11","lastupd":"2021-06-10 17:14:50","breadcrumbTags":["illegal network","Indian Army","Spying","Telephone Exchange","Telecom Regulatory Authority of India","Industry","international calls","BTM Layout","electronic devices"],"secinfo":{"seolocation":"telecomnews\/illegal-telephone-exchange-used-for-spying-unearthed-in-bluru"}}" data-news_link="//www.iser-br.com/news/illegal-telephone-exchange-used-for-spying-unearthed-in-bluru/83394271">