Military Review

A mobile phone for a military man - friend or foe: examples and reflections

105
A mobile phone for a military man - friend or foe: examples and reflections

The topic of the use of mobile communication devices in the army at one time (after the adoption at the legislative level of a ban on the use of certain types of them in the Russian Armed Forces), which was the subject of the hottest discussion, has now been somewhat forgotten. What are modern gadgets for a person in uniform: irreplaceable helpers or sources of problems and threats, friend or foe?


The introduction of a complete "taboo" on the use of devices with photo and video functions, built-in dictaphones and other smart functions by military personnel serving in the domestic army, which provoked a rather violent reaction, hardly needs an explanation. In itself, the presence of a military unit on the territory of equipment capable of recording both secret samples of weapons and conversations that may contain "closed" information is already a serious step towards the disclosure of military secrets.

The same applies to the Internet connectivity of mobile devices. Here, in general, the widest opportunities open up for the enemy. You can start with such a seemingly innocent moment as social networks and instant messengers, to which we are all accustomed today as an integral part of modern life. Alas, not all warriors have enough intelligence to independently determine what information can be shared with them and what cannot. This problem concerns not only domestic conscripts. There are known cases when, under the guise of "charming women", strenuously "gluing" the American marines stationed in Afghanistan, bearded guys from the Taliban (banned in the Russian Federation) were hiding, who had no romantic intentions regarding servicemen.

The same goes for the GPS and geolocation transmission functions. Some "especially gifted" fighters lack the ingenuity to turn them off even when performing a combat mission or being at specially guarded objects. For the extremely accurate "covering" with mortar fire at once four "Apaches" at one of the bases in Iraq at one time, the US Air Force had to thank the would-be warriors who decided to make a spectacular selfie against the background of the "turntables", which appeared on Facebook. Without turning off geodata, of course ... It is for this reason that this year the smartphones of all personnel of the 82nd Airborne Division of the US Army, sent to the Middle East, remained at Fort Bragg - out of harm's way.

On the other hand, it was the Americans who were the first to attempt to "put into operation" the most ordinary smartphones, turning them into one of the most important parts of equipping soldiers, especially special forces. The corresponding plan for the use of mobile gadgets, as far as we know, was approved by the Pentagon back in 2012. Initially, they planned to create for their own needs a kind of "super-smartphone", which does not sink in water, does not burn in fire and is almost bulletproof. However, the very first developments showed that the cost of such a gadget would be comparable almost to the F-35 fighter. And they abandoned the idea, deciding to confine themselves to the special software Windshear (also by no means cheap).

According to the heads of the US defense department, it was supposed to have a wide range of functions. First of all, these are maps built into the device, with the help of which (with an Internet connection) the fighters could not only see the mutual disposition of their comrades, but also, for example, install markers on the detected enemy positions that will be available to the entire unit. In the event of an injury or injury to a soldier, high-quality images of the injuries received by him, transmitted using a smartphone, would allow doctors who are far from the battlefield to instantly make an initial diagnosis and give advice on saving the soldier's life. Moreover, a special application with the function of face recognition (using the appropriate databases), according to the developers' plan, would allow identifying terrorists posing as civilians. In a word, intelligence, medical and special department in one smartphone.

It is not known exactly how far the Americans have progressed in this direction. And the problem here is more likely not in technical aspects, but in the fact that the development of modern methods and methods of cyber espionage is going much faster than the development of methods to combat them. It has long been recognized that any modern mobile gadget is almost an ideal tool for tracking a person and collecting personal data about him. Almost no one can fully guarantee the absence of built-in spyware, both in the devices themselves and in their software. And the risk in this matter, you understand, is too great.

That is why, despite the tremendous opportunities provided by increasingly advanced mobile devices, more and more armies of the world are following the path of banning their use by their military personnel (we are talking not only about Russia or the United States, but also, for example, about South Korea) or introduce extremely strict restrictions on this issue. Another way is the use in the army of exclusively special mobile communication facilities only of domestic production and with domestic software, as well as significantly reduced functions. However, not all countries can afford this.

Thus, the question of the place and role of the usual mobile communication devices in the armed forces is still open and debatable. What will ultimately outweigh - the prospects they open or the threats emanating from them, time will tell.
Author:
105 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. Avior
    Avior 25 September 2020 10: 47
    +1
    The author is not aware of what protected smartphones do for fishermen, hunters and other extreme sportsmen?
    1. dzvero
      dzvero 25 September 2020 11: 02
      18
      Here it is more about software. Android under a googgle hat and further along the chain smile For military purposes, you need your own proprietary software (OS, communication protocols, etc.). "Iron" can be used cheap "civilian". They put Linux on smartphones and tablets.
    2. Boris ⁣ Shaver
      Boris ⁣ Shaver 25 September 2020 11: 06
      18
      Quote: Avior
      for fishermen, hunters and other extreme lovers

      Well fishing does not fit with this word.
      An extreme fisherman, Uncle Misha, today for 12 hours stared motionlessly at a motionless float, as a result he was devoured by mosquitoes by 9%.
      1. Avior
        Avior 25 September 2020 11: 34
        +4
        It was a joke. But I saw all kinds of fishermen.
        On Saturday, getting up at 4 am is not extreme? smile
        And what about winter fishing? Those generally ride on ice floes periodically ...
        1. The leader of the Redskins
          The leader of the Redskins 25 September 2020 21: 11
          +1
          How does a winter fisherman differ from a walrus?
          The fisherman bathes in clothes!)))
    3. ccsr
      ccsr 25 September 2020 12: 20
      +8
      Quote: Avior
      The author is not aware of what protected smartphones do for fishermen, hunters and other extreme sportsmen?

      It's not about security, but about the fact that any mobile phone or smartphone is tracked and the worst thing is that this information is not controlled by us. That is why the Americans did the right thing when
      It is for this reason that this year the smartphones of all the personnel of the 82nd Airborne Division of the US Army, sent to the Middle East, remained at the Fort Bragg base - out of harm's way.

      Moreover, thanks to mobile communications, all active (and even retired) servicemen of the Russian army are already identified by voice (and many visually) and are in the bases of the NSA, which is why the question of prohibiting the use of mobile communication systems in the service is quite rightly raised. I still wonder why what was known back in Soviet times cannot be adequately perceived by some people, including those in military uniform.
      1. tihonmarine
        tihonmarine 25 September 2020 12: 47
        +5
        Quote: ccsr
        It's not about security, but about any mobile phone or smartphone being tracked

        Smartphone in your pocket, your NSA and CIA files.
        1. ccsr
          ccsr 25 September 2020 13: 05
          +1
          Quote: tihonmarine
          Smartphone in your pocket, your NSA and CIA files.

          This is exactly how it should be approached - this was known even before Snowden, and he only voiced all this for the general public.
      2. pereselenec
        pereselenec 25 September 2020 15: 30
        0
        Yes, but on 08.08.08/XNUMX/XNUMX a lot of success was achieved thanks to the commands given by the mobile phone when the radio was closed.

        During the war, communications in the mountains were cut off, and the troops had to resort to mobile phones ...
        Communication between the commander of the North Caucasus Military District and the Air Force was poor, and their roles were unclear. Colonel-General Aleksandr Zelin, the Air Force Commander-in-Chief, did not step on the command post, but directed the Air Force operations by mobile phone from his work room without any help from his air defense assistants.
        1. Cube123
          Cube123 26 September 2020 14: 53
          +2
          Quote: pereselenec
          Yes, but on 08.08.08/XNUMX/XNUMX a lot of success was achieved thanks to the commands given by the mobile phone when the radio was closed.

          And a lot was written about the fact that an attempt to contact relatives on a mobile phone during those events in Tskhinvali led to the fact that within a minute a mine flew into this house.

          And also the fact that they tried to accuse Russia of unleashing this war on the basis of an alleged call on a mobile at the exit of the Roki tunnel even before the start of hostilities by Georgia.

          And one should not forget about the rockets that are guided by the radiation of the mobile phone.
      3. Astra wild
        Astra wild 25 September 2020 15: 43
        -3
        "prohibition of the use of mobile communication systems in the service" is all true, but put yourself in the shoes of your mother. We are always worried about how our children are there: are they healthy, and now we are especially worried.
        A friend told me: smartphones were taken away from the unit, and the guys have illegal ones: before demobilization, the "old" give the "young" worn out phones.
        Perhaps as an encouragement to give the kids a phone so they can talk to their parents sometimes?
        1. alstr
          alstr 25 September 2020 16: 25
          10
          For information there are landline phones and a certain time for calls.
          If you are not in the know, then usually a soldier is on duty and his personal time is only 1-2 hours in the evening.
          The rest of the time it WORKS (or should work).

          Now imagine the Mother calls her Son on her mobile phone, and he is on guard or what is even better on a combat mission. and then at the most crucial moment a call ...

          And now this may end badly for the son of such a mother.

          Therefore, there can be only one option - a serviceman has a personal phone only in private time. The service has only a service telephone.

          If we talk about digital assistants in the form of smartphones, tablets, etc., then at the moment there can be only one option - devices without a cellular connection (maybe even without cameras).
          After all, the main "unmasking factor" is communication and access to the global network.
          1. ccsr
            ccsr 25 September 2020 19: 36
            -3
            Quote: alstr
            Therefore, there can be only one option - a serviceman has a personal phone only in private time. The service has only a service telephone.

            I completely agree with your conclusions, except for this one:

            Quote: alstr
            If we talk about digital assistants in the form of smartphones, tablets, etc., then at the moment there can be only one option - devices without a cellular connection (maybe even without cameras).

            This should not even be allowed, if only because we do not know about all the functional capabilities of such gadgets, how to activate them, and what they can drop in super-high-speed mode on a flying civil aviation aircraft, which can be specially equipped for reconnaissance purposes. I'm not even talking about the fact that such gadgets can accumulate information for a long time, which will be used by foreign special services when a soldier leaves the army - this is technically a spit if the gadget falls within the limits of some kind of Wi-Fi router.
            1. alstr
              alstr 25 September 2020 21: 12
              0
              Here I mean conventionally civilian models with a military OS. purely specialized software.
        2. vVvAD
          vVvAD 27 September 2020 08: 30
          +3
          Quote: Astra wild
          put yourself in your mother's shoes

          For this, there are other types of communication. Wired, for example.
          Tell me, dear mother, what did mothers do about 30 years ago, when there were no smartphones, no mobile phones, or pagers?
          Put yourself in the shoes of your father and understand that your son's life is more precious than your communication with him. Always, not just in the army. Otherwise, you are not showing concern for him, but ordinary egoism.
          I will answer: they were less worried and accepted with a calmer heart what happened - no matter what happened. All the same, you can hardly influence anything or somehow help your son, but with your hysterics only worsen your condition and create problems for him when you need to make a decision or not worry about your peace of mind.
          Therefore, be patient and restrained.
          1. Beregovic_1
            Beregovic_1 27 September 2020 14: 32
            +2
            There is a published list of mobile phones allowed for use in the army by contract soldiers. Conscripts are also allowed, but 2-3 times a week at a certain time. Naturally, there are no smartphones in this list. Naturally, young guys, whose whole life is on the phone, try to hide their smartphone to hang out in social networks and instant messengers. Naturally, the officers take them away and hide them in a safe, giving them away upon demobilization. (this is a light option, you can ring out to the guardhouse, and quit the officer from the service). From smartphones, IMHO, one evil. The fighter hanged himself, the whole part was on his ears, but it turns out that his girlfriend wrote on Twitter that she did not wait. Etc.
            1. Egor-dis
              Egor-dis 27 September 2020 14: 59
              0
              Quote: Beregovyhok_1
              From smartphones, IMHO, one evil.

              With the same success we can say that from the weapon is one evil. Because it shoots, sometimes even where you did not want to, sometimes even at the owner. Does this mean that weapons should be banned? Or maybe you just need to teach them to use it CORRECTLY? All the evil is not from weapons and smartphones, but from the fact that they did not put into their heads how to handle it. Why doesn't ZGTam gather gadget owners in the hall and demonstrate with illustrative examples how VK / OK / Fb / Tw is tracked, how geolocation works. So this is the brain itself must have, and knowledge. Nope, it's easier to have a shit and smartphones / tablets to seize because "down-zya".
              And, conversely, why not bring up the soldiers' knowledge of history, political science, economics so that they do not just hang out on social networks, but quite purposefully.
              Who prevents you from putting your own server on a part and distributing the Internet through it so that all traffic is monitored?
              Everything can be solved. All problems, with the presence of brains and desire, can be turned to benefit. But ... we have what we have.
              1. Beregovic_1
                Beregovic_1 27 September 2020 18: 21
                +1
                Several years ago, Varshavyanka from the 19 brigade was tracked by the geolocation of the phone. The officer!!! Not even a sailor, he wrote to his wife from military service. What are you talking about? What servers? This time. Second: You perfectly understand how much time a gadget takes from young people. There is simply not so much time in the army, the schedule is licked up to a minute. Therefore, call home 3 times a week for 1 hour. Third: A gadget is a constantly dead battery and a struggle for an outlet. Fourth: the private absolutely does not care about the secrecy regime, because he will not get anything for violation. In the worst case, they will send ns 10 days to the guardhouse (provided that the lip is not filled and the commander wants to hang the rude man on a part). An officer at someone else's phone in his unit may lose his security clearance, which automatically means dismissal. Bottom line: 1. In the Ministry of Defense of the Russian Federation everything is provided, there is a connection with relatives. 2. It is not our problem to provide the needs for likes among puberty. 3. Shmonali, we shmona and we will shmonat)))
                1. Egor-dis
                  Egor-dis 27 September 2020 21: 33
                  +1
                  Quote: Beregovyhok_1
                  The officer!!! Not even a sailor, he wrote to his wife from military service.
                  Which once again proves what ignorance of materiel and inability to turn off geolocation leads to. Why didn't you teach ZGT? Why didn't you conduct a security audit of the gadget? Oh, yes, his "down-zya" in principle. It is because of such prohibitions that such flights happen.
                  You perfectly understand how much time a gadget takes away from young people. There is simply not so much time in the army, the schedule is licked up to a minute.
                  And in this schedule from 14:30 to 15:00 there is personal time.
                  A gadget is a constantly dead battery and a struggle for an outlet.
                  This, in turn, provides additional leverage in personnel management.
                  an ordinary man absolutely does not care about the secrecy regime, because he will have nothing for violation.
                  To some extent I agree. If a soldier is immortal enough to frame his sergeant, KV, KR, etc. But, here the legislators hold the cards in their hands. The introduction of individual responsibility for violation of GT, secrecy, with demonstrative arrests, landings and bringing about them l / s would have an effect much stronger than just a stupid ban.
                  It is not our problem to meet the needs for likes among puberty.
                  And as long as you think so, they will create problems for you.
                  Shmonali, we shmona and we will shmonat)))
                  Who would doubt that. laughing
  2. Grandfather
    Grandfather 25 September 2020 10: 50
    13
    from the point of view of secrecy, mobile phones are definitely a "wasted thing", in such units there should be an opportunity to contact the family without a "zashkvar", and indeed, linked his life with the army, consider that "hardships and adversities" are part of the job and part of life. on "Shtirlitsa", look, who has not seen (from the young).
  3. iouris
    iouris 25 September 2020 10: 52
    +4
    "If a friend suddenly turned out to be neither a friend, nor an enemy, and so,
    If you can't tell right away - is he bad or good ... "
    Which means "doubt" in translation.
  4. KVU-NSVD
    KVU-NSVD 25 September 2020 10: 55
    19
    The simplest dialers in the service for tonsils, and gadgets must be left at home. Yes, and it is better to have dialers of their own production and give them out to the military when signing a contract or when conscripted. The state will not become impoverished from a dialer for five hundred thousand rubles to each serviceman, but to a certain extent it guarantees itself from nonsense and the human factor ... Although it certainly will not protect itself from intent, but that's another story. Disabling geolocation and other "spyware functions" was amusing - turn them off, do not turn them off, but it all comes down to the software of the device, which can ensure their operation even after the "shutdown" - not in vain in modern smartphones even batteries are not removable.
    1. Ragnar Lodbrok
      Ragnar Lodbrok 25 September 2020 11: 13
      25
      Quote: KVU-NSVD
      The simplest dialers in the service for tonsils, and gadgets must be left at home

      I agree, to talk to relatives and an ordinary push-button cell phone is enough. Otherwise, they took pictures of everything and put the fashion on the network - the imperialist spies don't need to make life easier. We didn't have telephones at all, but how lucky it was to receive a letter from home - young people now and will not understand .. And to go to the post office for negotiations on long-distance - it's just some kind of holiday !!! All day worrying about the uniform of the front dressing and polishing your shoes, as if someone will see you at home so beautiful)))
      1. BARKAS
        BARKAS 25 September 2020 11: 53
        +3
        When I served as a mobile phone, there was no, but I was a signalman, and one fine day our unit was completely disconnected from the outside world, it was necessary to urgently remove the GAZ-66 from the p-405 from storage, to reactivate and dismantle one, put the other in the division. Only then did we go to lay a new cable. Cellular communication would definitely make life easier for us, even just in everyday work.
        1. KVU-NSVD
          KVU-NSVD 25 September 2020 11: 59
          +6
          Quote: BARKAS
          When I served as a mobile phone, there was no, but I was a signalman, and one fine day our unit was completely disconnected from the outside world, it was necessary to urgently remove the GAZ-66 from the p-405 from storage, to reactivate and dismantle one, put the other in the division. Only then did we go to lay a new cable. Cellular communication would definitely make life easier for us, even just in everyday work.

          You had a strange communication center in your unit, where, due to the failure of one cable channel, communication with the world was closed. But what about the exit to the division's communications center through a wire connection with "bypassing" through neighboring units? And what is a US without standard radio and radio relay equipment?
          1. BARKAS
            BARKAS 25 September 2020 12: 37
            +4
            You had a strange communication center in your unit, where, due to the failure of one cable channel, communication with the world was closed. But what about the exit to the division's communications center through a wire connection with "bypassing" through neighboring units? And what is a US without standard radio and radio relay equipment?

            Nothing happened, everything was covered even earlier, the last working pair remained in the cable. But now everything is there with the latest technology, the regiment has been disbanded and instead of its training center, the FSB of the local border school was rebuilt
      2. dauria
        dauria 25 September 2020 12: 01
        13
        I agree that I’ll talk to my relatives and a regular push-button cell phone will be enough.


        Anxiety. Messengers began to stir, officers ran to the airfield, a ground column lined up and drove off. And ordinary dialers, lying in your pocket, were all the time registered in the cellular network. That, as usual, transmitted their coordinates from base to base. And everyone on the planet knows that this IMEI spent the night in the barracks yesterday, ran AWOL, and now went on his APA in a convoy.
        No guys. This is not the case. The MO control over cell towers should be. At least in the areas of serious units. And "powder up" the local piece of territory so that the Pentagon would go nuts "What is Monica Lewinsky doing in Uryupinsk with Donald Trump?"
        1. Tavrik
          Tavrik 25 September 2020 14: 19
          +1
          How do you imagine the MO control over the infrastructure of a cellular operator? For the military to turn off all cellular communications in the area when entering an exercise, which is already some sign?
          1. dauria
            dauria 25 September 2020 15: 55
            +6
            How do you imagine the MO control over the infrastructure of a cellular operator?


            Do you think that operators work without "curators"? Yes, this is how you have to be a careless leader of the country. Surely there are big-headed guys and hardware and programs. And all unusually behaving subscribers are monitored. For various reasons. And one can only laugh at the "guaranteed anonymity".
            And I think that Megafon's management is very respectful of these guests and their sealed boxes.
            1. Cube123
              Cube123 26 September 2020 15: 12
              +1
              Quote: dauria
              Yes, this is how you have to be a careless leader of the country.

              Remember the happy face of the LADY when Jobs gave him the latest iPhone. And at that time he was the President of the country. Even Zadornov publicly laughed at this. From 2:50
          2. Egor-dis
            Egor-dis 27 September 2020 15: 08
            +1
            Quote: Tavrik
            How do you imagine the MO control over the infrastructure of a cellular operator? For the military to turn off all cellular communications in the area when entering exercises

            Elementary. By creating an army sub-operator based on the main operator and allowing you to use it only. With the issuance of SIM cards (and ideally dialers) for the duration of the service / contract. Then it will be easy to turn it off, if necessary, and the civilian population will not have any problems.
      3. tihonmarine
        tihonmarine 25 September 2020 12: 53
        +7
        Quote: Ragnar Lothbrok
        I agree that I’ll talk to my relatives and a regular push-button cell phone will be enough.

        The telephone is a means of communication, and the smartphone is a means of entertainment. A serious person should know this, and for children of the "Pepsi generation" they have a smartphone, selfies and social networks just right.
        1. Saxahorse
          Saxahorse 25 September 2020 22: 01
          +4
          Quote: tihonmarine
          The telephone is a means of communication, and the smartphone is a means of entertainment.

          A phone is easy to chat, and a smartphone is both a map, and locating, and encrypted communication, and a ballistic calculator for the battery, and photographic recording of the results of fire .. A lot of things.

          But alas and ah. There are always idiots who carefully post the most secret data on Instagram .. Just to show off. These are the ones that need to be treated.
    2. Glory1974
      Glory1974 25 September 2020 11: 25
      +1
      Yes, and it is better to have dialers of your own production and give them to military personnel when signing a contract or upon conscription

      But what about a photo for memory? I also propose to issue cameras, but film, such as "Change" for privates, such as "Zenith" for sergeants.
      Then there will be an opportunity to make a demobilized photo album, and not to reveal a military secret, which means that the balance of interests is observed.
      1. KVU-NSVD
        KVU-NSVD 25 September 2020 11: 29
        +6
        Quote: glory1974
        But what about a photo for memory?

        Nefig to be photographed in the service, and even more so against the background of equipment and structures. The long-known correct army axiom, however, has been violated just as long ago.
      2. tihonmarine
        tihonmarine 25 September 2020 13: 01
        +2
        Quote: glory1974
        Then there will be an opportunity to make a demobilized photo album, and not to reveal a military secret, which means that the balance of interests is observed.

        Well, remember the 70s and later, there were no phones, no cameras, and we talked with relatives, and the Bembel albums were no worse. Now I ask myself, "When was the last time you wrote a letter with a pen and sent it by mail?", It seems in the early 90s. You feel sorry for yourself and your loved ones.
        1. Sergey Averchenkov
          Sergey Averchenkov 25 September 2020 15: 06
          +1
          There were cameras, of course, everything depended on the type of troops. Personally, I (the Air Force) had about twenty of them (objective control), from the TTL zenith to ... well, in general, there the film was a meter wide - on the bottom of the 8-ki this camera clung.
    3. Lopatov
      Lopatov 25 September 2020 11: 39
      +4
      Quote: KVU-NSVD
      The simplest dialer in service for tonsils

      I would not say...
      For example, a bunch of artillery programs have been created for Android.
      1. KVU-NSVD
        KVU-NSVD 25 September 2020 11: 49
        +4
        Quote: Spade
        I would not say....

        And what is it not enough for? Perhaps you are talking about the need for some smart functions for the daily needs of the command staff (conference calls, for example), then this contingent also needs a domestic smartphone with a set of such functions for the military and the like. This has been discussed for a long time and there are examples, but there is no widespread adoption. A former colleague, for example, a colonel. And in a considerable position with a high tolerance, drives with a gadget from the "Ogryzka". In response to my words about the stuffing of the stub with dangerous programs, he only smiles and says that he knows where, what to say and where in the presence of this phone.
        for example, artillery programs for "Android" created a bunch
        Such programs should not be on civilian OSs in the army, but on specialized military gadgets, like the commander's tablet.
        1. Lopatov
          Lopatov 25 September 2020 12: 01
          +4
          Quote: KVU-NSVD
          And what is it not enough for?

          The smartphone completely replaces the previously used programmable calculators and microcomputers

          Quote: KVU-NSVD
          then this contingent also needs a domestic smartphone

          Need a normal microcomputer with communication functions
          1. Simargl
            Simargl 27 September 2020 19: 35
            -2
            Quote: Spade
            The smartphone completely replaces the previously used programmable calculators and microcomputers
            No. This and the button-phone can. A smartphone (average in price) can replace a computer 10-15 years ago in performance (average).
    4. bar
      bar 25 September 2020 11: 48
      +6
      The simplest dialers in the service for tonsils, and gadgets must be left at home

      Geolocation is performed not only by ZHPS / GLONASS, but also by signals from base stations, which are connected by the same "simple dialer".
      1. tihonmarine
        tihonmarine 25 September 2020 13: 10
        +2
        Quote: bar
        Geolocation is performed not only by ZHPS / GLONASS, but also by signals from base stations, which are connected by the same "simple dialer".

        Dudayev called And ...........
    5. ccsr
      ccsr 25 September 2020 12: 30
      +1
      Quote: KVU-NSVD
      Yes, and it is better to have dialers of your own production and give them to military personnel when signing a contract or upon conscription


      This does not save you from wiretapping - it is enough to place small-sized P and RTR equipment at a distance of 100-200 meters from any military facility and everything will be recorded and identified. You can also control radio relay lines that are installed on the masts of mobile operators - a few kilometers from them. Even a wired civilian automatic telephone exchange does not save - the equipment on them is now imported and connected to the Internet. Therefore, in serious organizations it remains to use the old old-fashioned means - their own secure automatic telephone exchange without access to other networks, or according to the type of "Kremlin", where all connecting lines to subscribers are guaranteed to be closed.
      Quote: KVU-NSVD
      Disabling geolocation and other "spyware functions" amused

      These are generally fairy tales for the illiterate - the very presence of a telephone in a certain place is monitored without the inclusion of geolocation.
      1. ZAV69
        ZAV69 26 September 2020 09: 08
        +2
        Quote: ccsr
        Even a wired civilian automatic telephone exchange does not help - the equipment on them is now imported and connected to the Internet.

        In general, there is a Russian-made ATS. For example ALS 7200 from Saratov alsitek. There is OMEGA made by Raskat. And even an imported huavei or isted no one connects to the Internet. Yes, they work internally via the ip protocol, but there are no fools to expose them to the Internet.
        1. ccsr
          ccsr 26 September 2020 09: 53
          -3
          Quote: ZAV69
          In general, there is a Russian-made ATS. For example ALS 7200 from Saratov alsitek. There is OMEGA made by the NGO Raskat.

          Yes, I do not argue. But if they have an exit outside the controlled area, then consider that the conversations of everyone they serve can be monitored.
          Quote: ZAV69
          And even an imported huavei or isted no one connects to the Internet.

          But here it does not matter anymore, because no one knows where the bookmark was made, in what range it works, and how it can be externally activated.
          Quote: ZAV69
          Yes, they work internally via the ip protocol, but there are no fools to expose them to the Internet.

          How do you calculate all the spurious emissions?
          1. ZAV69
            ZAV69 26 September 2020 11: 53
            0
            Quote: ccsr
            Yes, I do not argue. But if they have an exit outside the controlled area, then consider that the conversations of everyone they serve can be monitored.

            neither ox7, nor sip-t, nor dss allow to control the station. The conversation can only be heard through the legal monitoring function, which, according to the law on communications, is, but is connected to whom? suggest or guess yourself?
            But here it does not matter anymore, because no one knows where the bookmark was made, in what range it works, and how it can be externally activated.

            Have you ever seen a softswitch board in your eyes? And where does the basket and cabinet go? Anything that can be inserted there imperceptibly can be activated only from a very short distance, it's easier to put the console cable into the service port.
            How do you calculate all the spurious emissions?

            When you have a trunk huawei x600, a dozen huawei 5300, a couple of zyxel, the softswitch itself in your hole, you will be able to find a conversation by spurious radiation that goes with msan standing 20 km away through the media gateway card from iskratel, taking into account the fact that this board has E1 ports 3 more different links with ss7 and dss protocols are connected
            ?
            1. ccsr
              ccsr 27 September 2020 15: 31
              -1
              Quote: ZAV69
              suggest or guess yourself?

              Have you heard anything about the concept of "controlled area"? I think it’s unlikely, because then they would know that this is still observed at many facilities.

              Quote: ZAV69
              When you have a trunk huawei x600, a dozen huawei 5300, a couple of zyxel, the softswitch itself, you will be able to find a conversation by parasitic radiation

              In general, "spurious radiation" can be activated purposefully on command and with a sufficiently high radiation power at a certain frequency. You are probably too far from all this, which is why you have no idea how to do it. It is easy to guess that certain categories of officials are interesting, and it is not difficult to calculate them. By the way, the ISSB trunk cables are still connected to some serious objects and K-60 are used, and what is interesting, they do not even think to let them go for scrap, but are kept as a reserve. And the coordinate stations are in working order, although they use modern ones. Why would you not wonder?
              1. ZAV69
                ZAV69 27 September 2020 22: 48
                0
                There is no need to trump with special terms here. Can you explain how you will intercept the conversation from an ordinary civil automatic telephone exchange by reading spurious radiation without having administrative access to the equipment?
                1. ccsr
                  ccsr 28 September 2020 12: 52
                  +1
                  Quote: ZAV69
                  Can you explain how you will intercept the conversation from an ordinary civil automatic telephone exchange by reading spurious radiation without having administrative access to the equipment?

                  Our station equipment is usually imported, which means that the software is not ours. It needs updating, which means it has access to the manufacturer of such stations, the same
                  Huawei Technologies Co. Ltd. Is a Chinese company, one of the world's largest telecommunications companies.

                  As for the stations produced by us, I do not know whose components they use and what software is installed, but even if it is ours, anyway any subscriber outside the controlled area can be used to introduce spyware into this PBX. All this was known even under Tsar Pea, it is strange that this surprises you.
                  Quote: ZAV69
                  There is no need to trump with special terms here.

                  And I thought you at least understand this ...
                  1. ZAV69
                    ZAV69 28 September 2020 19: 17
                    0
                    Our station equipment is usually imported, which means that the software is not ours. It needs updating, which means it has access to the manufacturer of such stations

                    It has no way out. If there are problems, a letter is written. Send a patch. Well, sometimes a representative can come. And there is no direct exit.
                    As for the stations produced by us, I do not know whose components they use and what software is installed, but even if it is ours, anyway any subscriber outside the controlled area can be used to introduce spyware into this PBX. All this was known even under Tsar Pea, it is strange that this surprises you.

                    A subscriber can only call another subscriber, taking into account the prescribed prefixes for the automatic telephone exchange, and manage his permitted services. And it's all. He can't do anything else. But no, he can listen to a three-tone speaker in the receiver until it drops.
                    1. ccsr
                      ccsr 28 September 2020 20: 33
                      +1
                      Quote: ZAV69
                      It has no way out. If there are problems, a letter is written. Send a patch. Well, sometimes a representative can come.

                      And where is the guarantee that he will install the patch that the company released, and not the one that was handed to him by the NSA and which does not differ much from the proprietary one? Or the sent patch does not have additional functions - after all, you did not develop it.

                      Quote: ZAV69
                      A subscriber can only call another subscriber, taking into account the prescribed prefixes to the automatic telephone exchange, and manage his permitted services. And it's all.

                      If the subscriber's device is outside the controlled area, then it can simply be replaced with the filling of the device, and you will hardly know how the exchange with stationary equipment will continue.
                      Quote: ZAV69
                      But no, he can listen to a three-tone speaker in the receiver until it drops.

                      He will not listen to anything at all - information will be removed from his apparatus without his knowledge.
                      1. ZAV69
                        ZAV69 29 September 2020 07: 42
                        0
                        And where is the guarantee that he will install the patch that the company released, and not the one that was handed to him by the NSA and which does not differ much from the proprietary one? Or the sent patch does not have additional functions - after all, you did not develop it.

                        And what prevented the ANB from organizing the backdoor when supplying equipment? And what prevents you from checking the sent patch? In general, the control network does not look outside.
                        If the subscriber's device is outside the controlled area, then it can simply be replaced with the filling of the device, and you will hardly know how the exchange with stationary equipment will continue.
                        Yes, let them at least be substituted. The subscriber's fee understands only the numbers in the pulse or tone dialing when switching, and what to do with these numbers is decided by the softswitch based on the prescribed prefixes.
                        He will not listen to anything at all - information will be removed from his apparatus without his knowledge.
                        The port is not connected, what will it remove from there?
                  2. ZAV69
                    ZAV69 28 September 2020 19: 31
                    0
                    Quote: ccsr
                    any subscriber outside the controlled area can be used to introduce spyware into this PBX

                    When making a call, the automatic telephone exchange compares what comes from the subscriber unit with the prefix table and, based on this, performs switching or controls the service allowed to this subscriber. And it's all. The subscriber is not able to enter any program.
        2. Tavrik
          Tavrik 27 September 2020 20: 46
          0
          And which of these stations has the letter O1, were supplied and supplied under the control of the VP?
      2. Simargl
        Simargl 27 September 2020 19: 37
        -2
        Quote: ccsr
        You can also control radio relay lines that are installed on the masts of mobile operators
        The GSM signal seems to be encrypted.
        1. ccsr
          ccsr 28 September 2020 12: 55
          +1
          Quote: Simargl
          The GSM signal seems to be encrypted.

          Back in ancient Soviet times, closed digital satellite and radio relay communication lines were decoded, and now this is not a problem at all for those who will be given such a task - Snowden told all about it.
          1. Simargl
            Simargl 28 September 2020 18: 53
            -3
            Quote: ccsr
            Also in ancient Soviet times decoded closed digital satellite and radio relay communication lines
            In the days when dinosaurs roamed the earth ... everything was simpler ...
            Quote: ccsr
            and now this is not a problem at all for those who will be given such a task - Snowden told all about it.
            What did he say then? The problem is not in the direct interception, but in the bookmarks.
            1. ccsr
              ccsr 28 September 2020 20: 27
              +1
              Quote: Simargl
              In the days when dinosaurs roamed the earth ... everything was simpler ...

              Then, too, guaranteed encryption existed - you probably do not know why the genuine cipher telegrams even from the Great Patriotic War have not yet been discovered.

              Quote: Simargl
              What did he say then? The problem is not in the direct interception, but in the bookmarks.

              Generally, if the bookmark is activated, then you must at least accept what it will transmit when emitted. And direct interception is always important - there are technical failures, there are errors in work, there is even the transfer of information through weakly protected channels, and all this can lead to the desired results.
              1. Simargl
                Simargl 29 September 2020 04: 24
                -2
                Quote: ccsr
                you apparently do not know why the genuine cipher telegrams, even from the Great Patriotic War, have not yet been discovered.
                No, what is your answer - not in the know. If you think that this is so that the encryption method is not broken - this is nonsense: in 70 years then ...

                Quote: ccsr
                Generally, if the bookmark is activated, then you must at least accept what it will transmit when emitted.
                Are we talking about cellular communications? Then it's not a problem at all. You do not understand at all what it is about. Read how smart TV leaks little information. Smart backgrounds are also noticeable. But it's easier for them: the average person has constant traffic.

                Quote: ccsr
                Direct interception is always important.
                Certainly. However, the problem is not with him: when transmitting information, one must act as if the interception had taken place, i.e. encrypt appropriately. You seem to understand this:
                Quote: ccsr
                there is even a transfer of information through weakly protected channels
                ... but how does it work ... no, it's not yours ...
                1. ccsr
                  ccsr 29 September 2020 12: 14
                  +1
                  Quote: Simargl
                  No, what is your answer - not in the know. If you think that this is so that the encryption method is not broken - this is nonsense: in 70 years then ..

                  It's not about the method, it's about the keys. If some genuine declassified texts appear and there is radio interception information, then at least daily keys will be easily restored from them, which means that they will be able, on the basis of radio intelligence data, to reveal information that will never be declassified due to the fact that there is information of state importance.
                  Quote: Simargl
                  Are we talking about cellular communications?

                  I'm not talking about cell phone at all - it should have been banned long ago in the army and in the service. It was about the fact that some foreign-made service ATS can merge information without our control.
                  Quote: Simargl
                  but how does it work ... no, it's not yours ...

                  How do you know what is mine and what is not?
                  1. Simargl
                    Simargl 29 September 2020 19: 15
                    -2
                    Quote: ccsr
                    It's not about the method, it's about the keys
                    Now we're talking about cryptographic strength ...
                    A simple example: when they just started to decipher the human genome, they took about 25 years to do it. How long does it take now? Clock?
                    Quote: ccsr
                    some foreign PBXs may leak information without our control.
                    Here! There is such a thing - a hardware tab: it is made invisible to the software shell. If the bookmark works before encryption - this is one thing, if after - you need to look.
                    Quote: ccsr
                    I'm not talking about cell phone at all - it should have been banned long ago in the army and in the service.
                    If you cannot destroy - lead! tongue

                    Quote: ccsr
                    How do you know what is mine and what is not?
                    I guess.
                    Today, both computing capabilities and techniques have grown a little.
                    1. ccsr
                      ccsr 29 September 2020 19: 34
                      +1
                      Quote: Simargl
                      A simple example: when they just started to decipher the human genome, they took about 25 years to do it. How long does it take now? Clock?

                      What does this have to do with a one-time key that was longer than the transmitted signal or short message?
                      Quote: Simargl
                      Here! There is such a thing - a hardware tab: it is made invisible to the software shell. If the bookmark works before encryption - this is one thing, if after - you need to look.

                      Once again I affirm that we are not even now able to understand whether there is a bookmark in this or that product (or it will cost a lot of money), which is why we should focus only on our own developments - we knew this alphabet back in the days of the USSR.
                      Quote: Simargl
                      Today, both computing capabilities and techniques have grown a little.

                      Nobody denies this, but nevertheless, cryptographers are not sitting idly by either, so it is not yet known how the confrontation will end, at least in the near future.
                      1. Simargl
                        Simargl 29 September 2020 19: 46
                        -2
                        Quote: ccsr
                        What does this have to do with a one-time key that was longer than the transmitted signal or short message?
                        It's about computing power.

                        Quote: ccsr
                        Once again I affirm that even now we are not able to understand whether there is a bookmark in this or that product.
                        I repeat once again: no need to guess! You need to act as if all the bad things have already been done: the bookmark is set, the packet is intercepted. If we proceed from these inputs, encryption should be performed before the packet appears in the device with a "possible" tab (as well as decryption after). Here comes another problem - the possibility of introducing failures and shutdown.

                        Quote: ccsr
                        nevertheless, specialists in cryptographers also do not sit idly by
                        So far, the weak link in the strength of the cipher is the person who has hammered into the rules.
                      2. ccsr
                        ccsr 1 October 2020 11: 32
                        +1
                        Quote: Simargl
                        I repeat once again: no need to guess!

                        Nobody even wonders, but simply analyzes information about the capabilities of modern technology:
                        Foreign irons with wiretapping found in Russia
                        The fate of household spies remained unknown.
                        The Ministry of Industry and Trade has discovered a means of wiretapping users' conversations in foreign-made irons. The head of the department of radio-electronic industry of the department Vasily Shpak made a corresponding statement, RIA Novosti reports.
                        According to Shpak, they found several irons in which microphones were built in - the official calls them "tabs." At the same time, the irons need a way to transmit the signal in order to send information “somewhere”, Shpak added, without specifying whether they found the transmitters along with the microphones. However, he stressed that such “bookmarks” are not fiction.
                        The representative of the Ministry of Industry and Trade did not specify which models of irons were in question. It is possible that new models with support for voice control could arrive in Russia - this is a completely standard function for modern smart devices.

                        https://hi-tech.mail.ru/news/utyug_s_proslushkoi/?fromnews=1&frommail=1
  5. Astra wild
    Astra wild 25 September 2020 16: 00
    0
    "dialers to have better than their own production" my son told me that it is not difficult to arrange the assembly of phones, and developing an OS is much more difficult. In fact, now there are no more than 3 operating systems for the whole world, and everything else is an imitation or modernization of existing ones.
    I remember there was a lot of noise on the site that from 1.07 ALL smartphones sold with us must have some kind of domestic software. Colleagues were very indignant that there would be no proprietary filling. It seems that the iPhone left the Russian market because of this.
    Do you know how in reality now?
  • rocket757
    rocket757 25 September 2020 11: 03
    +3
    What are modern gadgets for a person in uniform: irreplaceable helpers or sources of problems and threats, friend or foe?

    As always, a double edged sword.
    You can't live without them, it's even more difficult with them!
    1. tihonmarine
      tihonmarine 25 September 2020 13: 23
      +3
      Quote: rocket757
      As always, a double edged sword.

      And he pounds with both ends, but on the back. Wife calls late at night "Dad where are you?" and I'm sitting in a restaurant, the voice is no longer the same, the damned cell phone gave me away. Debriefing, and two ends on my back.
      1. rocket757
        rocket757 25 September 2020 13: 49
        +1
        Quote: tihonmarine
        And he pounds with both ends, but on the back.

        In general, the standard situation .... it can be even cooler when the trembling half with the smartphone treats better than you! I only explain the most necessary things to mine ... but there are cases just the opposite. the floor of the department of such ladies is sitting, some in this area understand quite at the level of a competent user.
        The emancipation of feminism is a striking force.
        1. tihonmarine
          tihonmarine 25 September 2020 15: 15
          0
          Quote: rocket757
          In general, the standard situation .... it can be even cooler when the trembling half with the smartphone treats better than you!

          Therefore, I never use a smartphone, only a phone is WTO and now just a Chinese "Xenium", IT IS DANGEROUS FOR HEALTH TO HAVE A SMARTPHONE,
          1. rocket757
            rocket757 25 September 2020 18: 15
            0
            If you don't flatten your ear with the phone all the time, you can.
          2. Tavrik
            Tavrik 25 September 2020 20: 23
            +1
            What is the difference between a phone and a smartphone with T.Z. health effects?
  • Alien From
    Alien From 25 September 2020 11: 11
    +4
    In the hands of a fool and a stick a gun ...
  • BARKAS
    BARKAS 25 September 2020 11: 19
    +2
    Of course, a mobile phone in the army is needed as an additional communication channel, navigation and data transfer are better in a separate device, and the battery on the phone will last longer.
    1. iouris
      iouris 25 September 2020 11: 25
      +4
      Now, do whatever you want, and at a meeting of the Security Council, someone with an iPhone will still take a selfie and post it on the telegram channel.
    2. tihonmarine
      tihonmarine 25 September 2020 13: 16
      +1
      Quote: BARKAS
      Of course, a mobile phone in the army is needed as an additional communication channel, navigation and data transmission

      In general, "mobile" is a terrible thing, although it is necessary to facilitate the work, but if you think well, then you can do without it.
  • Knell wardenheart
    Knell wardenheart 25 September 2020 11: 30
    -3
    If a person is on guard at the entrances and then exiled to Hellskaya Perd without bothering at all whether he has the qualities that a soldier should have - then fuck it and wave his pincers that he will take a picture and record something on the recorder. A good and trusting relationship is always mutual.
    If a person deliberately chooses an army and goes there under a contract - you are welcome, the terms of the contract are all business.
    If a furry paw grabs him and drags him into an unknown direction - where is the guarantee that there will be no hazing or conditions unsuitable for life? Who will help a person in such a situation, if not proof?

    So, in my opinion, everything is simpler than a steamed turnip - in the issue of the Rights to use mobile devices, recruits should have a head start, in view of the numerous precedents of violations of their rights and the extreme flexibility of the system in matters of denying such.
    1. kit88
      kit88 25 September 2020 18: 11
      +6
      What a cry for Yaroslavna.
      As if the Grandfathers are some kind of aliens that sit in every barracks and offend conscripts. Those who cry about hazing, in a year, or like now, six months later, they themselves become "grandfathers" and suddenly stop crying. Why don't we hear Grandfathers anywhere? After all, these are the same people who scribbled cute letters six months ago, and now they have matured, wised up, fledged and abruptly fell silent.
      And by the way, about "grabbing, sending ...." poor boys from mother's skirt and favorite toys. We have universal military service in our country. This is the Law. If you don’t want to serve, go put the pots on the alternative. Against such a law - please protest peacefully, seek change ... but that does not give you the right to break this law.
      1. Knell wardenheart
        Knell wardenheart 25 September 2020 19: 00
        -6
        Irregular relations contradict the very "Law" which you so snobbishly singled out. It turns out a kind of doublethink, which, however, does not surprise me ..
        The conscription system is an anachronism of a state that has long since sunk into oblivion. We now live in a country with "de jure" normal human rights and capitalist relations. Taking a person for a year from their usual places and way of life, taking away from him the means of communication and protecting his rights and shoving him into one bottle with a jumble of such people - is this definitely what we deserve in the 21st century? Or maybe it's still worth crawling away from this? -)
        1. kit88
          kit88 25 September 2020 21: 20
          +7
          And what do you mean by the words "in one bottle with a mash". A person serves exactly with the same guys, citizens of the Russian Federation like himself. The same age. A criminal element is not conscripted into the army.
          Explain your words, please.
          In the same Israel, even women serve urgently, if my memory serves me right.
          Scary, of course, from the life of the capital and to the barracks with ordinary village guys ... Well, it will rustle for half a year, then it will be easier, he will come home - there will be something to remember.
          Not, of course, a professional army capable of defeating a country like, for example, in a war ... / for example / ... China is very cool. But for now, the realities are such that time is indispensable.
          1. Knell wardenheart
            Knell wardenheart 25 September 2020 22: 47
            -9
            I mean "for my words (s)" that in this bottle there will be "the same people from different places and cities, different standards of living, religion, morality and traditions." If you are an independent theorist of class equality - you may not perceive this as a problem, if you happen to work in a multinational random team - you should understand the degree of potential hardcore and the weak regulation of this by some kind of abstract rules. In the case of the state, this is just a remnant of Soviet thinking, expressed in a carriage of formalism, which is driving up the Reality Mountain at full speed, and the awful passengers are required to portray with all their might that everything is normal. In isolated, egregious cases, however, it does not seem so.

            Let's not compare the Russian Federation with Israel "Where even women serve". Israel is a mono-national and mono-religious "de facto" belligerent country. There are no such problems. Even close. Not to mention the size of the territory and the degree of freedom of a soldier in the process of military service.

            As a rule, in life, normal people love the category of memories that are pleasant. A picture in which you are forcibly sent to hell in the company of strangers of different social strata - a priori pleasant cannot be. In hindsight, of course, you can call it whatever you like - for this there is even a similar psychological term "Stockholm syndrome". Nothing good. Nothing pleasant. Solid relic.

            I am very interested in how you are going to defeat China with conscripts who serve for 1 year, despite the fact that the same China will put out as many contingents in 1 generation as we have all reservists. Probably nuclear weapons. But wait - conscripts aren't being put into nuclear weapons, are they? Why are they needed then ...?
            Good - USA. I have no doubt that the picture of comparing a Russian conscript with an American professional military man will be very memorable, but alas, our demography will hardly stand again the attempts a la what was 80 years ago, when the morality of reasoning was similar, but the non-fired units faced professional and experienced ...

            So no - this is not logic, of course. It is high time for our country to follow the path of technological / economic modernization of this issue. And we still have a kind of specific form of serfdom.
            1. kit88
              kit88 25 September 2020 22: 58
              +8
              A young man, with your "hardcore" and "random team", the really village people can even change their face, considering your words as insults addressed to them. belay
              And so, write normally. Theory, theory, for all good versus bad. When you are 17 years old, you want to change everything for the better, and you are sure that you know 100% exactly how to do it ... fellow
  • Galleon
    Galleon 25 September 2020 11: 55
    +5
    Unfortunately, the issue of imitation of a GSM base station by an adversary, incl. with UAV. Such a technique can reveal both the deployment of forces, the interception of negotiations, and activate channels of information leakage from other special devices.
    1. AML
      AML 25 September 2020 13: 32
      +2
      There is no need to imitate anything, it is already available.

      Google's mobile device management section will help you. You can call phones even if they don't have a SIM card. In this matter, we must take an example from the Chinese. I once had a Xiaomi released for China. In their androids, everything that can communicate with non-Chinese resources is completely cut out.
    2. Tavrik
      Tavrik 25 September 2020 20: 30
      0
      How close should an enemy UAV with such a wonderful technique fly to our location?
      1. Galleon
        Galleon 25 September 2020 22: 52
        0
        Quote: Tavrik
        How close should an enemy UAV with such a wonderful technique fly to our location?

        It depends on a number of factors related to both the relief, atmospheric conditions, the required degree of detail, and the tactical situation, the availability of air defense, etc. But the technology is not wonderful - it is already installed on reconnaissance UAVs.
      2. ccsr
        ccsr 26 September 2020 10: 04
        -1
        Quote: Tavrik
        How close should an enemy UAV with such a wonderful technique fly to our location?

        It is not at all necessary to use UAVs, it is enough to use foreign civil aviation, the routes of which pass not only near large settlements, but also throughout Siberia and the Far East. Moreover, our airlines use foreign planes and constantly send them abroad for service. Nobody is able to assess what is being "programmed" and what blocks are being "modernized", so even without the UAV our enemy collects a huge amount of information, and we can do nothing to counter this until we switch to the domestic aircraft fleet. Everything is much more serious than it might seem if you think about it. By the way, the Americans have long abandoned the SR-71 strategic aviation reconnaissance aircraft due to its uselessness - they have learned to collect the information they need in a different way, and they no longer need this aircraft.
        1. Tavrik
          Tavrik 27 September 2020 20: 49
          0
          And what do you think, will the smartphone "reach" an altitude of 9-10 km, where airliners usually fly to "remove" information from it?
          1. ccsr
            ccsr 28 September 2020 13: 10
            +1
            Quote: Tavrik
            And what do you think, will the smartphone "reach" an altitude of 9-10 km, where airliners usually fly to "remove" information from it?

            It depends not only on the smartphone, but also on the sensitivity of the receiving equipment on the plane. The trouble is that we do not know all the functional capabilities of smartphones, including working at increased power according to certain commands. By the way, liners near airfields fly at very short distances, and they also have communication facilities on board that allow mobile operators to provide services to the crew and passengers. If some American hacker climbed from his tablet into the on-board computing complex of a large liner, and this was written about in the media, then you can imagine the possibilities of those who are specifically working in this direction.
  • bar
    bar 25 September 2020 13: 35
    0
    Quote: Spade
    Need a normal microcomputer with communication functions

    And for communication functions, at least a radio transmitter of signals is needed, and these signals can accordingly be intercepted and the position of their source determined. This was easily done even in WWII with those technical capabilities.
  • AML
    AML 25 September 2020 13: 36
    0
    Quote: bar
    The simplest dialers in the service for tonsils, and gadgets must be left at home

    Geolocation is performed not only by ZHPS / GLONASS, but also by signals from base stations, which are connected by the same "simple dialer".


    And also by hotspots.
  • bar
    bar 25 September 2020 13: 42
    +5
    Quote: Spade
    For example, a bunch of artillery programs have been created for Android.

    Well cool, what. You haven't hammered a shell into a cannon yet, but googol already knows where you are going to bang. I think he is able to enter the necessary "correction" into the data for shooting, so that he does not get where it is necessary.
    1. rocket757
      rocket757 25 September 2020 13: 51
      +2
      Agent Google, definitely not OUR agent!
  • Free wind
    Free wind 25 September 2020 13: 53
    +1
    Any communication device is disengaged at a time. As soon as radios appeared, direction finders appeared almost immediately. And almost any electronic device can be tracked. Therefore, we throw out the radio, they can be tracked and listened to, messengers and pigeon mail, it will be enough, we throw out the electronic clock, our cuckoo walkers are everything. Navigators, although already rockets with navigators, sideways, can be determined by trees. Fir-trees mean north, palms mean south.
    1. BastaKarapuzik And
      BastaKarapuzik And 25 September 2020 18: 34
      0
      The soldier has a family and children. One way or another, some kind of information leakage is possible through home computers. I was late at work - that's all, it means there is an emergency, or emergency.
      In the USSR, they fought with radio communications, with hooligans, and this did not lead to anything. We were catastrophically behind in civil communications at that time. And one could even read about military incidents, when the militants have compact radios for communication, but the army does not have its own equally effective means.
      Fir-trees mean north, palms mean south - our everything.
      For some reason it was believed that any radio transmitter is capable of disrupting the work of air dispatchers, police and other services. That is, these services are reliably protected from intentional actions of a potential enemy, but not from an amateur transmitter. Even if it is of scanty power, it is still low.
    2. ccsr
      ccsr 25 September 2020 19: 45
      -3
      Quote: Free Wind
      Fir-trees mean north, palms mean south.

      Not everything is so sad - there is a compass and a map, and this was already enough for any Soviet special forces soldier.
      Quote: Free Wind
      And almost any electronic device can be tracked. Therefore, we throw out the radio,

      Low-power VHF radio stations are not so easy to find even in the city, and the HF range has dead zones, so it's not so simple, you need to have the strength and resources to accurately track low-power. But the most important thing is to know the operational situation before using communications - this is what needs to be taught first.
  • Tavrik
    Tavrik 25 September 2020 14: 25
    +2
    The problem is that the Americans can make their own military cellular communications, but we cannot. For there is no domestic equipment, starting with base stations, no subscriber devices, no operating systems, no specific software for building a network, no understanding of how to build it, no desire to do something. It remains only to prohibit everything, so that again security will win over communication.
  • Tavrik
    Tavrik 25 September 2020 20: 21
    0
    Quote: dauria
    And I think that Megafon's management is very respectful of these guests and their sealed boxes.

    What does control over the Ministry of Defense have to do with it? SORM is a slightly different system ...
  • Tavrik
    Tavrik 25 September 2020 20: 27
    0
    Quote: Astra wild
    "dialers to have better than their own production" my son told me that it is not difficult to arrange the assembly of phones, and developing an OS is much more difficult. In fact, now there are no more than 3 operating systems for the whole world, and everything else is an imitation or modernization of existing ones.

    And there is. And do not forget that the subscriber device in our hands is only the tip of the iceberg of telecommunication systems. And then there are base stations, switches, servers, gateways, process control systems, antenna devices, etc. And all this with its own special software.
  • Egor-dis
    Egor-dis 25 September 2020 22: 17
    +1
    Thus, the question of the place and role of the usual mobile communication devices in the armed forces is still open.
    The issue was closed with a complete ban. For brains and desire for more are not enough. A purely army approach.
    What will ultimately outweigh - the prospects they open or the threats emanating from them, time will tell.
    Time will tell nothing. It all depends on what is in the minds of smartphone users. And what is in the heads of users depends on who and what content is putting into these heads.
  • shtatsov
    shtatsov 25 September 2020 22: 42
    +1
    Quote: Free Wind
    Any communication device is disengaged at a time. As soon as radios appeared, direction finders appeared almost immediately. And almost any electronic device can be tracked. Therefore, we throw out the radio, they can be tracked and listened to, messengers and pigeon mail, it will be enough, we throw out the electronic clock, our cuckoo walkers are everything. Navigators, although already rockets with navigators, sideways, can be determined by trees. Fir-trees mean north, palms mean south.

    Messengers were intercepted or bought back in Ancient Rome. So the variant was dropped!
  • Mikhail3
    Mikhail3 26 September 2020 13: 35
    0
    Have a topic for discussion? Seriously?!
    What discussions can there be on this issue? If only those who are discussing all the brains are dumb ... The examples given in the article are ridiculous. Analysis of the data flow that a smartphone gives, any smartphone, even if all additional functions are disabled on it and access to the network is allegedly blocked, gives huge amounts of data. For example, because in fact, most of these functions cannot be physically disabled, instead of disabling the functions, they simply become unavailable to the user. But certainly not a provider for example. The data that the most primitive cell phone provides is only slightly less. Suddenly? For whom?! Who are these mindless creatures who do not understand the most obvious?
    As a matter of fact, that's why the project of the American military smartphone was covered. There is nothing so expensive in the production of an extra-strong and covered, say, encryption smart. But for this very cover to become a reality, you need to spend money on a radical modernization of the cellular network itself. Moreover, these funds should be such that the budget of the same USA will not be seen through a microscope. And with all the hundreds of trillions that it is not clear who would spend on this, the ways of hacking such a network still cannot be completely blocked.
    The use of telephones, any cordless telephones, by anyone, from a pig to a marshal, on military sites is treason. The same, without exception, can be said about any military unit. Those who think differently simply do not have enough balls in their heads.
  • evgen1221
    evgen1221 27 September 2020 20: 01
    0
    In all its software and components, the phone is useful but not on the front lines. And somewhere for 150-200 km.
  • Tavrik
    Tavrik 27 September 2020 20: 53
    0
    Quote: Galleon
    Depends on a variety of factors

    There are exactly two factors: the power of the transmitter, i.e. smartphone and the sensitivity of the base station receiver. Given the decrease in the power of new smartphones, the base station must be slipped very close to the receiver. So your proposal does not go through ...
  • Baron pardus
    Baron pardus 27 September 2020 21: 32
    0
    We were openly told in Iraq that they could track you on the phone, especially if you play all sorts of games, moreover, you can, like the last ones, take pictures on your phone that you will let yourself and others under demand. At the very least, making a Big Chicken Dinner is easy. Do you need it? We were openly told "the phones should be in the barracks at the base." So my personal mobile phone, when I was in Iraq and Afghanistan, never left the base.