@RowlandCorr and I cover what may happen in the future. In particular we look at the little-known Russian separatist Mobile Operators Phoenix (Фенікс) and Lugacom (Лугаком)
2/10
The unlicensed Phoenix (Фенікс) & Lugacom (Лугаком) opcos were formed from the separatist seizure of Ukrainian Mobile Operator equipment after 2014 invasion of the #Donbas
They have been growing as the licensed Ukrainian Operators have pulled out
3/10
Since the new 2022 invasion started, there have been reports of them expanding into newly occupied areas of #Luhansk & #Donetsk
Plotting these reports against current frontlines shows this seems plausible. Credit to @nrg8000 for making the frontlines shapefiles available
4/10
Furthermore, the separatist #Phoenix operator in Donetsk makes coverage information available, we can see a southwestern expansion across the pre-2022 ceasefire lines showing this growth.
5/10
There are also reports of the separatist #MNC (Mobile Network Code) 99 being observed in #Kherson in the south, as well as reports of Russian mobile expansion near #Kharkiv
6/10
These all add up to a potential reduction in Ukraine’s #mobilenetwork ‘edge’ over the Russian forces to date, especially now that fighting shifts to the Donbas. Except for two things:
7/10
These separatist operators are not generally reliable. And they seem to have a large number of recent outages. Sanctions on Russian mobile operators will only make things harder
8/10
The room for Russian forces to use Ukrainian Mobile networks in the Donbas seems to have closed further. Vodafone Ukraine was previously active in the Donbas - see image - however since the invasion it seems to have stopped
🧵A good recent example of #Ukraine contesting the Mobile Network / InfoSec battlespace.
Multiple #SIMBox seizures as part of an "enemy bot farm" network were announced yesterday by the Security Service of Ukraine. 1/6 ssu.gov.ua/novyny/z-pocha…
Technically this is a much bigger setup that the #SIMBox relay discovery from 2 weeks ago, (see my previous thread) which is not surprising as these are more traditional ‘bot farms’ used for signups for social media 2/6
According to the #SBU, the 5 enemy bot farms in the network used social media (including some banned in Ukraine) to “spread disinformation about a full-scale Russian invasion of our state and spread distorted news from the front”.
1/5 Another significant capture in #Ukraine. Reported discovery today of a #SIMBox being used to relay Voice calls & SMS and other info to Russian forces (including top leadership of Russian army) & other individuals in #Ukraine. I will explain what this is and how it works.
2/5
First the system is comprised of 3 main parts, 1) the SIM Box server - in this case a Hypertone SMB-128 . This handles the control of up to 128 SIM Cards, cycles them when detected etc , and co-ordinates interaction with the #GSM Gateways hybertone.com/en/pro_detail.…
3/5 Next the GSM Gateways, there are two Hypertone types being used here:
- There are 3x GoIP 8 - VoIP Gateway for 8 Channels being used,
- along with 1x GoIP-4 4 SIM VoIP GSM Gateway.
Both can be used for SMS or Voice