telecom towers along the Line of Control (LoC) in Pakistan-occupied Kashmir (PoK). These towers are believed to assist terrorists and their associates in infiltration activities, as reported by news agency PTI.
Use of Encrypted YSMS Services by Terrorists
Terrorist groups reportedly utilize highly encrypted YSMS services, combining smartphones and radio sets for covert communication. This information stems from a study of infiltration attempts and recent terrorist attacks, particularly in the Jammu region south of the Pir Panjal range.
Strategic Positioning and Violation of International Law
The strategic positioning of these towers near the LoC and the international border, aiding terrorists and their associates in infiltration, violates Article 45 of the International Telecommunication Union (ITU) constitution, a United Nations body. This article mandates member countries to prevent the transmission or circulation of identification signals and cooperate in locating and identifying stations transmitting such signals.
Telecom Towers Operate on CDMA Technology
The new telecom towers in PoK operate on Code-Division Multiple Access (CDMA) technology, with encryption done by a Chinese firm primarily for YSMS operations. This infrastructure supports infiltrating terrorists and their contacts in Jammu and Kashmir regions.
Challenges in Monitoring and Countermeasures
The deployment of CDMA technology complicates monitoring efforts, allowing multiple signals