I’ve spent more than 20 years inside the world of wireless security, electronic warfare, and counter-surveillance. In that time I’ve built and patented technologies used to protect national security, advised on cellular security standards, trained and briefed U.S. and allied military and intelligence agencies, and was recognized at RSA 2020 as Mobile Privacy Expert of the Year. My work has been featured in FastCompany, Cyber Defense Magazine, and even portrayed on screen in the Keanu Reeves film Siberia for its realism. I’ve co-authored an international bestseller on cybersecurity and am finishing a new book on surveillance and privacy that exposes how deep these systems really go.
This channel is where I bring that experience to you. The goal here is to explain the technologies shaping our lives in plain English so you can better understand your technology, and how it affects you.
Become a member: www.youtube.com/securityresearcher/join
Security Researcher
Most people use cellular infrastructure every day without thinking about how little we actually understand its real-world behavior.
This research is being developed by industry professionals who operate in and around that infrastructure - not from the outside looking in.
The goal is to better understand how these systems behave in the real world, and where improvements in security and structure may be needed.
If participation opens up, contributors will be part of that effort and those who provide meaningful data may be recognized in the resulting work.
If that means something to you, you already know where this is going.
The deeper discussion is happening on the member side.
youtube.com/securityresearcher/join
15 hours ago | [YT] | 5
View 1 reply
Security Researcher
Anyone who has ever done a cellular drive test already knows:
static measurements only tell part of the story.
The real behavior shows up in motion.
Handoffs.
Transitions.
Coverage shifts.
Carrier differences.
Now imagine studying that systematically.
That’s where this is going.
This isn’t theoretical. This is coming out of real-world cellular infrastructure and security work.
If this opens up, contributors will be assisting in collecting data that may be used to improve how these systems are understood and secured.
Those who contribute usable data may be formally acknowledged as part of the research.
Since contact information of the responsible parties will be shared, the deeper discussion is happening on the member side of this channel.
youtube.com/securityresearcher/join
1 day ago | [YT] | 6
View 3 replies
Security Researcher
Quick reality check:
This cellular infrastructure research effort is already underway.
This isn’t an idea, or concept.
This is active work, in process.
What I’m deciding now is how many people from this community get pulled into the next phase.
Since contact information of the responsible parties will ultimately be shared, the deeper discussion is happening on the member side of this channel.
If you're interested in participating follow the link below.
youtube.com/securityresearcher/join
3 days ago | [YT] | 3
View 0 replies
Security Researcher
This is one of those projects where the right people will immediately understand why it matters.
If you’ve worked around telecom infrastructure, RF systems, drive testing, radio analysis, or security research…
you already see the angle.
If not, that’s fine.
But this is the kind of work where the people already paying attention tend to get in early.
Since contact information of the responsible parties will ultimately be shared, the deeper discussion is happening on the member side of this channel.
youtube.com/securityresearcher/join
4 days ago | [YT] | 6
View 0 replies
Security Researcher
There is a cellular infrastructure security research project underway right now that may open up to community participation.
Not “someday.”
Not “I’m thinking about it.”
Now.
The focus is simple, but the implications are not:
Instead of treating cellular behavior like a static lab problem, this work examines how infrastructure actually behaves as devices move through the real world.
Cities.
Highways.
Transit routes.
Different carriers.
Different deployments.
Different regions.
That is where you start seeing the system behave like a system.
A small group is already working on it.
The reason I’m mentioning it publicly is because some of you may have exactly the background or hardware needed to help once the collection protocol is released to members.
Paid members will get the next update with more detail.
So if you want access to the actual project discussion, and a possible chance to participate while this is still being shaped, now is the time to join.
youtube.com/securityresearcher/join
Because once this moves forward, the people already in the room will be the ones who get first shot at contributing.
5 days ago | [YT] | 13
View 3 replies
Security Researcher
Cutting-Edge Cellular Security Research - Community Participation
Over the past couple of years I’ve been advising on a cellular security standard being developed by an engineer working deep inside telecommunications infrastructure.
That work has now expanded into a broader research effort involving a small team studying how cellular infrastructure actually behaves in real-world environments.
The approach being used here is very different from how cellular networks are normally studied, and the goal is to better understand the structural behavior of these systems in order to improve cellular security and infrastructure resilience.
The next phase of the research requires observations from multiple geographic regions, which means we may open participation to a small number of volunteers from this community.
If you're interested in contributing to cutting-edge cellular infrastructure security research, let me know.
Poll
Would you be interested in participating in a cellular infrastructure research project?
3 weeks ago | [YT] | 5
View 4 replies
Load more