Saturday, December 06, 2014

Santa Arrest

Olden but golden. Still a good laugh to watch.

Thursday, October 09, 2014

Fast moving wireless world

I have been working on research for as the changing landscape for cell site analysis (CSA) requiries comprehending the complex involvement with the various wireless connectivity creating a universal point-of-presence for mobile users. Moreover, CSA is equally being impacted with the architecture defining internet of things (IoT) causing a growth expansion for M2M wireless devices, naturally wireless forensics in this area will grow, too.

M2M was highlighted back in 2011

M2M Crime

Mobile Markets: Nokia 'Mobile Man' tells of a story


Reverse Engineering For Beginners

Steve Hailey*, who kindly sent out a reminder about Reverse Engineering for Beginners, that this is guide with "Lots of great information that will be especially helpful for reverse engineering malware that you come across in your investigations......" It is  "652 pages, all free. You do not need to give out your personal information or subscribe to anything..."

The original link to get the publication is no longer current. However, a copy can still be downloaded using the following link: 

*Steve is President/CEO CyberSecurity Institute, a practicing Consultant, Digital Forensic Examiner and works also as an Educator, InfoSec Author & Lecturer

Tuesday, July 22, 2014

LTE-WiFi Aggregation

LTE-U workshop: LAA (Licensed Assisted Access) - Use cases and scenarios


LTE workshop: LAA (Licensed Assisted Access)

Saturday, July 19, 2014

International Telecommunications Union and CSA

International Telecommunications Union and CSA

Were the standards to be made binding that could have political implications / ramifications regarding national sovereignty etc. However, a standard adopted by the ITU are called "recommendations". The recommendations carry a voluntary adoption by members states. The recommendations can though become directly or indirectly binding if it is incorporated into member states legislation where the legislation refers to a particular ITU recommendation. That would have a direct binding agreement. An indirect binding agreement could be where European legislation does not mention ITU recommendation per se but refers to CEPT or ETSI standards that become recorded that are in-turn derived from ITU recommendations. Were there to be an inextricable link requiring identical wording for CEPT/ESTI standard/ITU recommendation then that may amount to an indirect binding agreement with or to the ITU recommendation.

CSA - Site Survey Method 2/ITU -

As this discussion relates to CSA and identified recommendations listed here ( ) the detail below highlights the radio subject matter from the division ITU-R.

Sunday, July 13, 2014

CSA, propagation and keeping norms

CSA, propagation and keeping norms is an in-for-the-long-haul series of discussions about CSA (cell site analysis) and highlighting all the wider area topics of CSA that seldom get discussed. The first three discussions can be found here:

CSA - Site Survey Method -

CSA - Site Survey Method 1 -

CSA - Site Survey Method 2 -

Sunday, June 08, 2014

GSM Normal Burst Power/Time Template

The image (below) is of the power/time template to illustrate a GSM Normal Burst (GSM05.01/05.02). A single burst when transmitted may contain up to 114-bits of useful speech data. Given the speed at which GSM radio signals traverse the ether calculated in micro-seconds to be received at a destination handset and processed by that handset in milli-seconds and converted into audible speech within one or seconds opens possibilities for examiners to demonstrate the power of mobile communications.

For instance, an attacker communicating a single 'provocative' word consisting of 80-bits in a normal burst to an accomplice could be:

D               E              T              O              N             A              T               E
01000100 01000101 01010100 01001111 01001110 01000001 01010100 01000101

The entire timing of this event may last no longer that 2 seconds. When you get time try a simple test to see how many clearly audible words you can speak within 2 seconds and what messages can be communicated in that time. Moreover, the clock for recording call records can be operated in 1000-ths of a second separated into 5 x 200-ths of a second. Whilst it is possible to see a call detail record showing a 0-second call duration and it is generally accepted there is no meaningful communication taking place, what about call that lasts 1, 2 or 3 seconds?

The knowledge tool to demonstrate the GSM Normal Burst power/time template, the power output of MS and BTS etc can be found in 3GPP TS 05.05 V8.20.00 (2005-11) Release 99.

Friday, June 06, 2014

D-Day 6th June

On the 6th June 2011 I wrote about D-Day at this blog. I did so because much of history was being forgotten by the younger generation. When I posted the thread below the blog received nearly 3000 hits in a few days. In 2014, we are now seeing a substantial increase, reported in the papers and on television, raising awareness about this day and other important historical dates that allow the young generation to re-connect with their heritage. It is so important to keep this knowledge flowing from generation to generation if the mistakes of the past are not to be forgotten but, worse still, to be repeated.

Today, this day, is remembrance of those men and women who fought, and so many gave their lives, to bring hope that we could enjoy our sunny days of freedom. 

This photo reminds me of how appropriate it is to use the words real heros.  

D-Day 6th June

I mentioned today's important date to a number of people. Quite a few had forgotten the date and mainly the younger generation didn't know about events that took place on this date back in 1944.

For anyone who may have missed it or might want to know more, here are some links providing the historical background.

British Legion Remembrance d-day-65
Wikipedia Normandy Landings
Britannica DDay
Remembrance D-Day.html
Lifeformation D-Day