Showing posts with label security threat. Show all posts
Showing posts with label security threat. Show all posts

Measuring Silence: Anti‑Corruption Frequencies


Disclaimer:
This investigation involved no hacking, intrusion, or unauthorized access. Everything described here is legal, passive measurement of signals and activity. My intention was simply to understand whether the Fiscalía Anti Corrupción in Querétaro behaves like a functioning office by analyzing its technical footprint.

What I Set Out to Measure

Any office with staff and computers produces a measurable presence:

  •     Wi‑Fi traffic from routers and laptops.
  •     Bluetooth beacons from phones and peripherals.
  •     Cellular activity from employees’ devices.
  •     Electromagnetic noise from monitors, servers, and power supplies.


If an office is active, you’ll see it in the spectrum. If it’s quiet, that silence itself is data.
 

My Setup


  •     Operating System: Kali Linux — chosen for its robust toolkit for wireless and spectrum analysis.
  •     Software Tools:
  •         gqrx — a spectrum analyzer for SDR devices, used to visualize signal activity across frequencies.
  •         aircrack‑ng — not for intrusion, but to detect the presence of Wi‑Fi networks and measure traffic density.
  •         Wireshark — configured only to confirm packet presence, not to capture or inspect content.


    Hardware:

   

  • Software‑Defined Radio (SDR) dongle with wideband antenna — allows scanning across a broad range of frequencies to detect signals.
  • Portable EMF meter — measures electromagnetic radiation levels, useful for detecting whether multiple devices are powered and active.
  • Directional antenna — focuses on the building to isolate its footprint from surrounding noise.


Procedure


  •     Establish baseline readings in a neutral location nearby.
  •     Move closer to the Anti‑Corruption office and log spectrum activity over several hours.
  •     Compare expected office activity (steady Wi‑Fi, bursts of cellular, background EMF from multiple devices) with actual readings.


The Results


The activity was far too low. For a building supposedly full of staff, computers, and investigations, the spectrum was quiet. Minimal Wi‑Fi traffic, almost no Bluetooth presence, cellular signals flat. The EMF meter barely moved.

That’s how I reached my conclusion: the building does not behave like a functioning office. The technical footprint doesn’t match the story.
 

Visual Confirmation

To cross‑check, I placed a pencam under some garbage opposite the building. On a Tuesday in May 2025, I recorded from 5 a.m. to 11 p.m. Nobody entered. Nobody left.
 


The Bigger Question


Meanwhile, corruption news is endless. Cries for help are countless. So why isn’t there any noise from Anti‑Corruption?

The dumbest explanation I’ve heard: “They strictly operate undercover, top secret.”

But corruption doesn’t happen in the shadows. It happens in broad daylight, in front of everyone’s eyes. And corruption, like vampires, doesn’t require secrecy. Expose it to light — and it dies.


Two Chrome Extensions Exposed

chrome  extensions exposed

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials.

What is Penetration Testing: Complete Guide 2026

pentest

Penetration Testing Infrastructure is the best method to assess your firm’s security infrastructur

According to the latest cyber attack, there is a new way that attackers might gain entry into your system without triggering any alarm.

LinkedIn Attack: 1.2B Users at Risk

linkedin

LinkedIn As An Attack Platform

When you think of social media, it’s likely that Facebook, Instagram and X spring immediately to mind.

Flock Safety Ecosystem

Beyond the License Plate: Inside the Flock Safety Ecosystem

If you think of Flock Safety as just a camera that reads license plates, you’re only seeing the tip of the iceberg. In the world of modern public safety, Flock has evolved into a comprehensive "operating system" for neighborhoods and police departments. It isn't just a recording device; it’s a massive, interconnected intelligence network that combines hardware, artificial intelligence, and real-time communication to create what the company calls a "Safety Ecosystem."

To understand the full picture, you have to look past the lens and see how the various pieces of the Flock puzzle fit together.

Loading recent posts...