VULNERABILITY: LET’S START THE CONVERSATION WITH CELL TOWERS. Its almost impossi

VULNERABILITY: LET’S START THE CONVERSATION WITH CELL TOWERS.

Its almost impossible to collect good information on cell towers because of the way the data is collected and categorized. However, they are easily found with a smartphone and software. Their range depending upon a wide variety of factors can be as far as 45 miles, or as short as two or three.

There are obvious cell towers, hidden or disguised towers, buildings, and billboards. The signals are transmitted between towers by transmitters, by standard cables, and by fiber cables.

Most of the time the link between the big international carrier’s cell equipment, and the main communications trunks, are run by local phone companies (the last mile companies). These companies do not have the financial resources to put redundancy in place. They employ local people to perform repairs. And they are dependent upon rapid shipment networks for new supplies of parts.

These towers are supplied by local power lines, but usually have local generators if they are in key locations.

STRATEGIES

Annoy

Occupy

Overwhelm

Entrap


Source date (UTC): 2016-11-05 21:07:00 UTC

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *