Everything that will be in this blog/post is based on real live in practice, means that everything is tested by my self. Mostly will be some tips on computer software, measuring, some home made gadget. Whole thing is JUST for better living, collecting evidence on daily basisc, and attempt to break myth about alien-space-shuttle technology, and endless power owned by some moron across the street or next building entrance.
This is first that publish on forum, something about OS, mostly for windows users, in that pdf I didn’t mention encryption which would be wise not because you have something that you need to protect and you are afraid that someone is going to steal your’s hard drive, MORE because it’s best software option for covering your’s track that’s floating everywhere around you (tempest), and you are not even aware of this, and I’m talking about EM emission which is generated with every hardware components inside computer, second software shielding would be filtered fonts.
On windows machine I’m using veracrypt, and for opensource (linux) LUKS is most used/easiest this days.
VeraCrypt is ease to use tool, with lots of option like hidden partition, encrypted whole volumes/partition, this software is next generation or even more substitution for truecrypt, which according by author is broken, mean he is the one discourage people to use some other tool, not truecrypt, and people on forum saying that he exaggerates, or that he is paranoic, so you can describe veracrypt like new release of truecrypt.
For start I fuck up things because choose whole hard encryption, and didn’t click for option that boot sector is open for another OS like linux, and beacuse of that can’t mount veracrypt container with LUKS under linux, and another thing is that need to put veracrypt rescue disc in boot folder under linux in ISO format, so if you plan to have dual boot choose option that veracrypt boot utility “stays” open for another OS.
For open source you can see in practice what is best encryption method for your hardware that you own, and again for me is not THAT important what is best secure encryption regarding to speed and vice versa, more what encryption broadcast lowest emission, and that information I don’t have right now.
For best encryption method you have command like
cryptsetup benchmark
and you will get something like that
# Tests are approximate using memory only (no storage IO).
PBKDF2-sha1 942964 iterations per second
PBKDF2-sha256 660312 iterations per second
PBKDF2-sha512 561336 iterations per second
PBKDF2-ripemd160 708497 iterations per second
PBKDF2-whirlpool 304818 iterations per second
# Algorithm | Key | Encryption | Decryption
aes-cbc 128b 153.3 MiB/s 160.0 MiB/s
serpent-cbc 128b 75.6 MiB/s 171.8 MiB/s
twofish-cbc 128b 166.0 MiB/s 205.0 MiB/s
aes-cbc 256b 118.4 MiB/s 124.5 MiB/s
serpent-cbc 256b 75.7 MiB/s 172.1 MiB/s
twofish-cbc 256b 165.7 MiB/s 204.7 MiB/s
aes-xts 256b 164.9 MiB/s 166.0 MiB/s
serpent-xts 256b 166.4 MiB/s 163.3 MiB/s
twofish-xts 256b 189.8 MiB/s 190.6 MiB/s
aes-xts 512b 124.7 MiB/s 127.0 MiB/s
serpent-xts 512b 166.4 MiB/s 163.0 MiB/s
twofish-xts 512b 189.2 MiB/s 190.4 MiB/s
More about linux encryption can be found in arch installation quick guide. This distribution I choose for testing, maybe little bit difficult for installing, but I will explain it latter.
I’m sure that smartphone is mine for sure, but with little digression, they are not in my phone, don’t have access, but they can simply shutdown phone with some electronic device which is used for jamming against me for sure, can mention example when try to take photo, and my phone was simply shut down couple of times exactly on one special event, sound that my phone made can describe like that someone tries to start car, but battery is empty, just fucking click. Because of phone protection have more broken phone calls than usually, and hear and there they beam my phone with frequency so that screen have lines across screen.
I have solid cheap droid Samsung maguro i9250, but behind that code name is real power, he is from nexus series, and because of that you can put everything on it, just imagine Firefox, Ubuntu, lot’s of custom images.
Ok let’s start in business, I give my self promise that they will not have ever more access in my smartphone, even if I have to take it of bluetooth and wi-fi out, but solution was really easier than I thought, but little about that later.
Some hardening phone sites with secure apps “designed” for special people like us, whistle blowers or activists.
https://guardianproject.info/home/use-cases/
http://forum.xda-developers.com/showthread.php?t=1840929
3_Xposed – General info, versions & changelog – XDA Forums
Recommended apps:
Red phone, ES file explorer, secure SMS, k9 mail, droid wall, xprivacy MUST HAVE, keepass MUST HAVE (with database on cloud, but only commercial is supported like drive, skyone, dropbox,), titanium backup MUST HAVE, android IMSI catcher, sshdroid, prey, busybox, APG (good colaboration with k9), orbot, orweb.
AromaFM is file browser in recovery mode, can be in root partition, or USB stick, think that have limits to work up to 4.4 version droid.
I choose for my phone cyanogenmod (stable version) custom image, phone have to be rooted, can’t help you with that, every model is almost unique. For maguro you have on XDA developer at least 2 cmd line software utility, but easy guided tool for that. Phone need to be put in developer mode, usually if you don’t have that option under settings can be reached if just click 5 quick times on settings > about phone > and on the bottom last, or before last option, in my case is before last option build number (but it’s just beacuse of cyanogenmode custom image). Phone have to be put in recovery mode, but before need to put custom image in root internal/external SD card, also put there supersu.zip file. For boot image you have also lot’s of option like, touch screen feature, or manual vol +/-, and power as enter. For installing boot image, you have to put phone in recovery mode, and that can be done on software or hardware way, and of course phone have to be rooted. You need to have droid SDK tool ADB tools installed, on ubuntu is easy just apt-get, and for windows you have some lame small version with couple of executable commands.
adb reboot bootloader
install cwm recovery
fastboot flash recovery ‘name_recovery.img’
HARDWARE WAY to put phone in recovery mode is usually with some combination vol +/- buttons and power button.
Next is attach about phone hardening in details, based on this link.
TIP: put su before type any command.
Same thing from txt document can be achieved (phone have to be rooted of course) with ES file explore, or file manager if you have option show hidden files, and super su will ask you if you want root permission (YES), than you can do all deleting or just move apk from /system/apk folder.
BUT ONLY 1 THING IS NECESSARY THAT PHONE BECOMES YOURS.
Simply encryption, in droid and fuckers can’t reach into your phone.
WARNING!!!
This was done based on cyanogenmod 11 for maguro samsung, 11 =4.4 KitKat. On KitKat encryption process on empy phone can last up to 1.5 h, recently I install cyanogenmod 12=5.1 Lollipop, and encryption was made for 20-25 min. , on the same phone. Shortly after I begin to notice, problem with sound, keyboard pressing randomly, etc. Encryption on Lollipop will not stop perps, and you will have bluetooth problem again!!!
Encryption is recommended on new system (fresh install image), if you want to do encryption anyway, you need to backup your files, best utility is titanium backup, but phone have to be rooted.
you need to change screen security lock to PIN/PASSWORD
think that max. letters for encryption is 16 or 17 letters, you don’t NEED that long key for that, means that after encryption you CAN change encryption key, so that you have different key strenght for screen security and encryption another one, wich will you have to enter every time, when you restart phone.
More:
http://nelenkov.blogspot.hr/2012/08/changing-androids-disk-encryption.html
option to start encryption is under
settings > security > somewhere near bottom.
Encryption means also slower phone, you can’t FILES browse or mount partition access in recovery mode beacuse of that, so if you have backup, you need to put that TWM backup on USB stick, or create other partition on SD card which is not encrypted.
TI needs to constantly SEARCH for “keywords”. Scraping apps. allow to get extracted just what you want from web. Mostly based softawre for scraping is made in Python an Java. Python best program would be scrappy, beautifull soup, and I found 1 program that do most of scraping beacuse it’s made in Java can be used on any platform OpenSearchServer. You need only java 6 or newer to start program. All scrapping data are stored in data folder inside PATH where did you copy/extract zip archive. For quick start you can just select html from set up search index.
I found some interesting artticle regarding PC security from USA goverment documents, also interesting study about how much sleeping can affect solders on the field (human), or new patents from NSA in production stage or just developing. If you are going to look true that file you will become aware that FREEDOM is still possible, because in section for data searching you will find couple of times that they have problem with lots of data, and they are ALL crying for KEYWORDS.
Because I’m paranoid, my philosophy is that want to use software that is used “RIGHT NOW” approx. “1-2%” percent population in the world, personally can’t measure my self with NSA (tailor boys), but also know for sure that they are not that good, more using bullying methods or intimidation to get what they want, with of course secret deals with software/hardware leader’s company, don’t want speculate on that subject more, and of course if I’m correct ANY encryption that was made in USA have to go on authorization in NSA.
For firewall I choose VyOS, which is Vyatta fork, some project that is shutdown couple of years ago, so VyOS is aka veracrypt 😉 , They are using juniper syntax in router mode (configure mode), and behind scene is debian (operational mode).
LINKS:
This is everything about Vatta:
VyOS
http://vyos.net/wiki/Main_Page
Snort – is IDS (intrusion detection system)
https://https://www.snort.org/www.snort.org/
VyOS configuration is based on this manual:
http://soucy.org/vyos/UsingVyOSasaFirewall.pdf
Snort manual is based on this link:
https://www.snort.org/documents/snort-2-9-6-x-on-debian-7-6
TIPS for VyOS:
# in txt files means that I didn’t use that command
VyOS is using legacy from Vyatta some pre-defined configuration for dynDNS service, and they are all almost every PAID one, or more accurate companies core business is web-hosting, and they provide free account for that users, and if you want to use only dynDNS service, every company which is in that business have some pre-defined Pearl, or bash script, which can be in conjuction with cron (schedular command) give same result as you configure dynDNS true CLI mode.Personaly don’t have account for that, and I’m using DtDNS script
https://www.dtdns.com/dtsite/updateclients
and in VyOS something like this:
*/10 * * * * user perl /config/scripts/dyndns.pl sync 2>&1
Pearl script of course have to be adapted for your userID, pass and hostname.
2. First I insert bogons list and Spamhaus list in configuration mode like BOGONS-NETWORK,SPAMHAUS-NETWORK, and I was awarded for that of course. Every OS reboot was approx. 10 min. long to get in “function” state, so I just remove that option, after that I try with predefined spamhaus script which can be with cron or rc.init (run it on start), and this is better option because that offers fresh updates about spamhaus list, BUT personally I regret that, because that option starts scripts with ROOT, and after that I couldn’t change it with configuration user anymore, meaning that VyOS was locked with root, better option is to put bogons list in snort rules, and spamhaus can stay in config file, because is not that long, you just need to update spamhaus list hear and there.
3. You have option to install snort with apt-get, of course when you insert in /etc/apt/sources.list debian squeezy repository links, BUT again that was not wise, because that snort version is pretty old one, and you can’t update rules on regulary basics, cause snort have to be updated to be in function, just like every antivirus tool.
VyOS configure commands:
If someone wants still to play with spamhaus and bogons scripts
Snort:
Snort was build from source, based on link above, with some problem, VyOS is not full debian, but I manage to install it with google help. In the first place choose VyOS not just because is not that popular, also he can run on old machine, my first firewall was on Pentium III 1GHz with 96 MB RAM, if you are going to use snort you can forget about low hardware consumption, on little bit newer machine, after only couple of days only with 10 rules, he just freeze web service (apache-MySql), and on web you can find that Snort really “like” hardware resources.
OS open source ARCH
That was love on first sight, think that can’t fit in that 1-2%, BUT is open source, you can learn something because you almost start building from scratch, also it’s WELL documented, BUT what is most important it’s low hardware consumption, and can be running on oldest machine, with X windows mate(base+dev package), xorg, SSH, IPtables services mem usage is somewhere around 390 MB, and from arch constantly ask my self who pick up, fuck up games from who, software developers & hardware manufacturers from perps, or is it vice versa. YOU DON’T need to have i7 8 cores to run smoothly up to date apps. I didn’t finish that arch_cookbook.txt, but will publish it soon.
I also mention in previuse posts that want to build EEG machine, and find production AC/DC hardware, but I don’t have money right now, and can’t experiment with that, but I made GSR (galvanic skin response) from that link http://www.extremenxt.com/blog/?page_id=168, only can say that you FOLLOW description from that link/blog. I can’t purchase in my country proper al-foil, only really to thin, and because that ring that goes around finger will be broken really sun, or wire will break thin foil, little tip that you somehow fix area around wire which goes between 2 layers, because will broke foil pretty much soon, also try with drink cans, but think that is not pure Al, or maybe is too tick layer (don’t know), just know that my readings are not the same as was before when I use regular Al foil.
I play with GSR couple of weeks and, my readings are really unique, regular person don’t have plotting/diagram which have almost every seconds oscilations or UP/DOWNS, common people have almost linear plotting. I’m using java apps. called LiveGraph, you need of course java JAR or java JDK. If you install it true setup, it should work that you just double_click on livegraph.jar, or you can try this. Because it’s made it in java = platform FREE. CSV file is regular text file, but maybe best option would be some calc. apps like excell, libre office calc
java -jar c:\some_path\livegraph.jar
examples:
1. person plotting
2. person plotting
3. average me
All plotting data regarding GSR
I mention that apk in hardening droid section, and what if I tell you that I trace my friend, and that they are only 2 entrance in the building next to me, because I install IMSI CATCHER application, and when I was at home on day I play with phone on balcony trying to catch base station, and of course I did, but also I catch fake base station which later I put in google maps, and coordinates show Marice Baric 3, two entrance further than my. For someone that don’t know what is IMSI catcher, in USA they call him Stringray, shortly is man in the midlle attack, and this apk for droid is still in beta stage, and they have some test silent SMS, and silent SMS is actually made it for catching IMSI catcher, but didn’t find any more strings for silent SMS, maybe they using different string in Europe (don’t have that information YET). I didn’t know what I have in my net. One day I backup whole apk+data with titanium backup, and after that open database with sqlitebrowser, you have 2 interesting tables regarding BTS which is base station readings, that I catch in the net surfing accross city (dbi_measure and dbi_bts) and look number 51 BTS, that is base station in my street, but on the roof of course you can’t find any antenna (for GSM), if someone wants to go in details what gpsd_accuracy means can follow this link, shortly if show 15m (and this is value under accu), that means that acurracy is 95%, so 100% is 15.79 m.
picture one and two
picture three shows google map position when you enter data for longitude and latitude
On the roof you can’t find any base station
When I enter all that BIG data which represent fake BTS from line 51, you will get this on google maps
I recently move from one place (flat) to another, and that finally move was somewhere between 20-30 June. In Local portal for advertising, selling, etc, something like Craiglist was add dating from 12.08.15 ad, do I need to tell you that flat is in Marice Baric number 3, in basement so I know that it’s actually flat from ad, also can say THAT I never look anybody inside that flat, only that light is ALWAYS on, and I’m night bird and going out with my dog in 2,3,4:00 AM, I NEVER,NEVER, look someone inside, they also have white curtains drawn between 2 walls. How world can be small place.
This is still mistery for security IT department, for this topic I will give you all links that I find on net, and what can recommend for TI.
http://www.jammed.com/~jwa/tempest.html
book This is best book/measurement that find on net, more scientific oriented, but you can explain to your self with diagrams
All about tempest
Tempest is ONLY way that can enter into your PC, and I don’t mean by real hackers, more our friends, because they have gadget made for that purpose, if you take out from variable ALL WIRELESS, they only have tempest and fucking your mouse (pointers) with beams, presume that you all see when you point your mouse on some link, suddenly BEAM from god, and next scene, arrow (pointer) flying on screen without control, real power, I will explain it little bit later.
This is something that NSA have “ready to deliver” catalog 2008
NSA catalog, and comment on schneier.com about that subject, and here is EVOLUTION 7-8 years later, evolution in practise.
Mouse:
I try to do something with mouse, my effort to hide laser diode inside from beams didn’t achieve nothing for now, also I put ferrit ring over cable – zero effort, next I will put thin al-foil from can around all mouse side-view.
Mouse from inside:
Measuring emissions from DDRAM 3 PC – with new gadget cheap RTL- SDR card
PC case is basically Faraday cage, but when you see next pictures, something is not right. Simple experiment with antenna on a top of case (antenna that came in budle with RTL-SDR card) shows readings from my memory DDRAM3-PC1333 (2x4GB in Dual channel), that means that they operate actually with MB, and CPU effective on 667,5 MHz, exactly half of 1333. I will be honest with you even more and drug my self that I buy shielding paint HSF 64 paint, and paint PC case from inside. I will not tell you manufacturer, only if someone wants that intel on mail, but HSF 64 is unique world wide code name for shielding paint that must fit in norms, and all manufacturers have that paint for selling. Basically DDRAM leakage is extremely high, between -30 and -33 dB, something exactly that I get in quite days with antenna above pillow, or for another comparison, GSM signal who operates between 850-900 MHz have TOP -65 dB. I can tell you from practice that perps around 15-20 m (air distance) from me CAN have anything from MY PC if they have production equipment, jut as they have still my head on platter for now, we must be honest and put in variable length of frequency, DDRAM operates on 667.5 MHz, and I record readings from 1200-1450 MHz above my head, which means in practice that memory can be “catch” more easily from the air.
memory information from CPUZ application
I will not start this section with what I feel right now, in what “measurement units” shielding gear that I buy HELPS ME, what my perps change from point when I didn’t have anything, or where is point when FUCKS UP from perps stops,and starts actually SHIELDING, or what is maybe placebo effect, what I will show is just PURE facts, you Americans like facts like statistic numbers. Recently I buy headgear which is made from (ysilver83), and will not tell you again from which manufacturer, only if you ask me explicitly, up to date I have 3 headgear. Idea came from this link, and before that link, suddenly bump on that here (page 82), also very interesting KEYWORDS are (bed of spikes [nails], target calibrating, direct calibrating), but let’s start with numbers.
Simple example is made with USB GSM stick who’s attached on monitor. GSM signal 850-900 MHz is strong, adaptive signal, with hopping channels (as security measure and also to distinguish upload from downloads) which is going to try “give” you signal almost every where. Software application is on PC, with option to show signal strength. First I record signal strength without headgear, and after that I attached one by one headgear above USB stick.
UPDATE SHIELDING!!!
This is gray area for every TI. Everybody looking solution, especially when older TI will say that nothing is help. Personally I deep in that space around 15.10.15, when I first order for my self headgear silver elastic.
I will explain what I think about that….
You really need to ask your self is it normal that someone fucks yours brain, and you sitting like a duck every day on the open, when they give you yours portion for that day, OR before 100K years, when people hear that storm is coming, do they stay on the open, or they find first appropriate shelter!!!.
YOU REALLY HAVE TO ASK YOUR SELF HOW MUCH OF THAT IS REALLY YOURS, THAT YOU GIVE UP FROM INVESTING IN SHIELDING, or maybe the truth is somewhere in the middle, you are simply “refreshed” from the perps side that you don’t invest in shielding, simply because you are more available for them, especially for sleeping time, or when you sitting in the bed, or in front PC.
IS IT WISE to invest in shielding???
OF COURSE IT IS, but you need to adapt to your finance power, and you need to mix it with endless testing, because you will get from perps simply, YOU WILL NOT GOING TO ACHIEVE NOTHING WITH THIS!!!, sure I want, and that is simply because they still can reach me with V2k, when I put everything on my self before sleeping.
Another thing, put aside all that decibels, frequency range that is suitable for that shielding material, but what tells you logic, if I put half decibels away from distributes, and he’s marketing, is it better that I have on my head nothing, or some gear that suppose to shield me from 50dB.
I start invest in shielding when I reach 65 Kg with my 186 cm of height, know after 12 month I have 7-8 kg more, starting from 01.09.15 I need to go shitting 10-13 times at intervals of one month, after 8 month, that story is simply gone. DO I still have V2K=yes, RNM=yes, BUT simply they do not have all, what they have before end of last year.
UP TODAY I INVEST IN SHIELDING AROUND 500$, and I’m not sorry for that, and to be honest, I’m the one of poorest TI for sure. I invest every month around 100$, and I’m planning to invest more
WHAT I achieve with shielding:
I have the whole head in shielding, and I need to breath with medicine silicone mask, on which I put flexy plastic tube, because of that I don’t have any more
closing jaws at night sleeping.
no more synthetic dreams, BUT of course they STILL can put me in best position (in sleeping), so that still can give me some of that.
much less burns on my body.
BUT
because of that, cause I have mask on my nose, they still have returning information from my head where is pressure on my body, so they give me burn nose regularly.
I’m farting every day in time when I prepare my self for bed, and when they awake me on force, mixing with burping, and that is simply, because they still can control amount of air in my bowels, and of course no sleeping and forced awakening. BUT today, perps have to do much more job, comparing with 8 month before, so they suffer with me also. If it’s good for them, it’s good for me also, their agenda from point that I start to invest in shielding, is of course that I stop with that “stupidity”, BUT of course I want do that.
I WANT PUT ANY SHOP AS COMMERCIAL AD HERE, I will post pictures of shielding, and if someone is interesting, please contact me.
Sugar came at last. This CHEAP gadget MUST have every TI. With that you can measure everything from 20-1780 MHz. But first some links for starts.
http://superkuh.com/rtlsdr.html
For TI possible especially valuable software application would be:
rtlsdr scanner with option “trace” source of frequency with GPS. That software is really hard to install if you have win7 64bit, beacuse it’s depends on python, and again python need some modules to import, which are 32bit, mixing with 64 bit modules, it’s really heavy to accomplish that. Thanks to authors, they offer also one executable file to run.
GPS UPDATE 28.06.2016!!!
If you are going to use GPS to track strongest signal, you will probably catch GPS spoofing signal from perps. Recently I play again with rtlsd_scan.py and GPS, and when want to determine the source of signal, always getting magic location near me Marice Barić 3, even when I try to catch KNOWN strong radio station signals in my city, weird!!!. But again not, someone who create this game need to determine location of target, if IMSI catcher fails, there is GPS spoofing https://www.pacw.org/no-cache/issue/september_2012_issue/news/technology_news/atomic_clock.html, which is basically same as IMSI catcher, when you try to find location and try to contact GPS satellite, perps using fake GPS who emit stronger signal than satellite, sure because they are ~33-35 m away from me, SO you will not determine true location of signal, but you will determine perps stupidity, which will reveal he’s position in yours neighbourhood.
I actually fix that because Python is platform free, but NEEDS to be run on the same platform., so I just compile rtl-sdr scanner on new win 7 32 bit, and than just copy all files on ubuntu, and it’s working, of course you need to have install python 2.7.10 on win, or 2.7 on linux ubuntu.
SDR-SHARP modular tool for windows aka linux tool OSMO-SDR
RTL_POWER is command line tool that I personally using for measuring frequency with 1 MHz UP shifting in dedicated frequency range, example command would be:
rtl_power -f 1200M:1500M:0.1M -g 50 -i 100 -p -18.697 -e 24h night.csv
and after that with heatmap.py script easily plotted to get graphic diagram or “water fall”, but this is just forehand GUI tool, MOST important is just measuring, with RTL_POWER.
GR-GSM, but this is big mistery for me ???
GR-GSM depends on GNU radio, but new version, think from 3.7.3 >, and again GNU radio is almost like OS.
Before I show you readings, first need to say that in my country roof agency for frequencies is HAKOM, and on this GSM1, GSM2 you can find what is authorized to broadcast something in ether, this links is for GSM providers, also arround 1.5GHz you have GPS, and from range 1-1000MHz everything that is broadcasting in Croatia is here.
Everything else is forbidden, BUT when I measure area above my head cca. 15-25 cm I got strange frequency from 1240-1450 MHz, that “BUSY” range is just above my head, in the same time when I do measuring approx. 3 m away with second RTL-SDR card, readings in that range didn’t show anything, also at my friends flat (air distance from my place approx 10 Km) readings in that range didn’t show nothing.
examples:
At my friend place
Above my head approx. 15-40 cm
Reason why they are using specially that frequency is just that
hardware made it in he’s hands MUST operate on that frequency
(radar encyclopedia page 110), look that table in the end of page.
Tube type is commercial product called 1AM10, and it’s operated in
this range 1.225–1.350 MHz, and again why they are using explicit
that tube type is just fucking SMALL SIZE 15cm3, and this is great
for door to door fucking, interesting pages about that subject is
64, 72, 109 OR if you prefer key word (bimatron,ecm, electronic
gun, crossed-field amplifier).
Some tests shows that RTL-SDR is really present ACTUALLY data. This is distributor for radiator in my flat, and they operate on 868 MHz, and this is my readings.
Recently I call HAKOM (they didn’t answer on mail), after long conversation I explained to them that someone in neigborhood operate on frequency from 1240-1460 MHz, violating rules that HAKOM takes from international agreement considering common licence. Common licence is let say wi-fi and for Europe is agreement to operate on 2.4 GHz, and in range from 1240-1460 they are a lot common licences, because they are using hopping channel (Own you that evidence), they just jumping from 1 common licence range to another. Look from page 32 forward. We agree that I need to show them some evidence before they “do actually” something.
ALL testing environment
Ubuntu machine that is running when I’m going to sleep, usually runs 1 rtl-card, but sometimes I run also 2 rtl cards. This is ubuntu 14.04 32 bit, out of the box installation latest GNU radio. Installation made it true pybombs are really long, on atom 525 arround 2.5-3 h, after that I install osmo-sdr, kalibrate, rtl-sdr suite, multimon-ng, volk, heatmap. On 1 card I always run just on command basically, but first kalibration for crystal warming.
rtl_test -d 0 -p
-d card number if you have more than one
-p you want to run ppm test, defaults is 10 s, and when calibration after the same readings 5-6 times are same, that means that is your average ppm value, which can be used in all commands that follows
rtl_power -d 0 -f 1220M:1480M:0.1M -g 20.7 -i 100 -p 69 -e 24h file_name.csv
-f frequency range with 100 kHz shifting
-g gain that cards can give (you can find out gain with rtl_test command)
-p ppm value
– how much time are you going to measure
-i intergration value
On second card I run just “standby mode”, for another machine who can get data from that card.
rtl-tcp -a ipadress -g 20.7 -P
-a ip-adress from host on which is rtl card
-g gain
-P correction factor
Second machine with win 7
This is front-end for ubuntu machine, and GPS receiver who is converted from USB to virtual serial port (follow this link).
commands;
adb forward tcp:50000 tcp:50000
after that you will need to open GPS gate (gateway), and set option localhost or 127.0.0 1 on 50000 tcp/tp and set output on some serial port comn, if everything goes fine you will get green light on icon
windows scedular set as new basic task (run wheter user is log on or not, TRIGGERS -on schedule – daily – repeat task every 30 min indefinitely – enabled, ACTION – start program – cmd.exe – add argument rt “” “c:\path name script\rtlsdr.bat”
rtlsdr scripts
If 1 machine is in “standby” mode you will get something like this
RTLSDR scanner readings
Network diagram about whole thing
I want to share another windows tool SDR sharp, you need to tune it frequency above 1240 MHz and just scrool with mouse until you get highest pike, or you can do same job with scanner plugin record all signal above xy dB, you will get something like this, and you can compare it with known signals.
SDRsharp in action
Panorama
Another GUI Windows tool, but behind the scene is rtl_power again
Sound records (mp3 format) from 1225-1350 MHZ
UPDATE 1225-1350!!!
They are using 1225-1350MHz or even wider frequency domain maybe more than 1479 MHz just because they are determine with power generator, imagine engine for washing machine, don’t mix it with programs function, google this TWT, and after that google major companies who build commercial generators CPI, L-3 and Teledyne in the US, e2v (you will find companies on that pdf link)…
Think that 1225-1350MHz are used for physical euphoria, burns, tickling, false mosquitoes, etc, you can see with let say SDRSharp you will get just high spike, NOT data, just pulse beaming. When I prepare my self for sleeping activity around ~1238-1239 MHz boosts, for a long time suspect that this is DEW, of course your chemistry in the head is disturb with another gadget, but this is high energy which cause uncomfortable feeling of dizziness, and they are using that a lot NOT let you going to sleep for 0.5, 1, 1.5, 2 hours when you lay down in bad.
mediafire1
mediafire2
mediafire3
mediafire4
My activity on web regarding that
ethicalhacker
This is only unofficial evidence, BUT again it’s much better then crying every day on forum like “they hit me with this and that”. It would be really nice to have collection readings from another TI’s WITH same option when we do actually measuring, and for the end, it’s unofficial but ham amateurs around the world using rtl card for lot’s of things, and this unofficial means only If I’m the owner of a state license, maybe this results could be official, we need more practice with software.
Latest revealing with rtl-sdr philosophy!!!.
Recently I discover with Sigmira, another tool for demodulation some known signals, strange activity on 1479 MHz, and yet on some other place, you can’t find this, but in my area you will find this mediafire link. This is first time that I discover activity with data floating around me, which really give me some thinking, maybe you have some hint!!! 😉 , I will continue in that direction, contact some people, and let you know about new information.