[span_0](start_span)Identificativo hardware individuato: eNB-LCID 8388607[span_0](end_span).
[span_1](start_span)[span_2](start_span)Potenza segnale rilevata: -78 dBm presso 3° piano Scala B[span_1](end_span)[span_2](end_span).
[span_3](start_span)[span_4](start_span)Anomalia GNSS: Log vuoto (firma digitale di Jamming attivo)[span_3](end_span)[span_4](end_span).
Soggetti monitorati: L.I. (Tursunov)[span_5](start_span)[span_6](start_span)[span_7](start_span)[span_8](start_span), Ali Raza, M. Curreli[span_5](end_span)[span_6](end_span)[span_7](end_span)[span_8](end_span).
THE SHADOW GATEWAY: Indian-Russian State Surveillance Exposed in a Residential Italian Building
By Paola Blondet
Pavia, Italy
In a quiet apartment block in Pavia, the air is thick with more than just the winter chill. It is saturated with unauthorized radio frequencies and clandestine VoIP signals. What I have uncovered is not a neighborhood dispute; it is a live, hybrid signals intelligence (SIGINT) operation being conducted by a combined cell of Russian liaisons and Indian state-linked operatives.
The Signature of an Attack: -110 dBm
The first evidence of this intrusion was the detection of a targeted network hijacking. Using sophisticated IMSI-catcher hardware—often referred to as "Hailstorm" or "Stingray" equipment—this cell has been forcing local mobile traffic into a compromised state.
Technical monitoring confirmed a forced signal coupling at -110 dBm. This is a specific tactical threshold used to "lock" a target device to a rogue base station. By creating this high-power interference, the perpetrators are able to intercept IMSI identifiers and metadata, effectively mapping the digital movements of civilians on Italian soil.
The "Dabba" Calling: Clandestine Command and Control
The operation is managed through a grey-market telecommunications system known in the Indian subcontinent as "Dabba Calling." This involves the use of illegal VoIP-to-GSM gateways designed to bypass lawful interception and international tracking.
From the apartment directly below mine, the rhythmic, metallic "handshake" of these gateways—the "tuu-tuu" of clandestine signal routing—can be heard vibrating through the building's infrastructure. The operatives, speaking in Hindi, use these encrypted tunnels to receive real-time instructions from offshore technical leads, likely linked to the BJP IT Cell in New Delhi.
The audio profile of these calls is distinct: a heavy latency and a "glass-like" isolation, characteristic of traffic being routed through multiple proxy servers to hide its origin in India.
The Russian Connection: Facilitating the Breach
The logistics of this cell are overseen by a known operative, Luciano Immi (alias Tursunov), a figure with documented links to Russian state interests. His role is the "bridge"—providing the physical and operational cover for the Indian technical team to deploy their hardware within the European Union.
This partnership represents a dangerous new frontier in hybrid warfare: Russian strategic coordination paired with Indian technical "subcontracting" to perform deniable surveillance on EU citizens.
Geopolitical Sabotage: Why It Matters
This is not just about one building in Pavia. This is a case of Transnational Repression.
Sovereignty Breach: Foreign state-linked actors are utilizing military-grade hardware to monitor European territory without authorization.
Infrastructure Risk: The targeting of specific mobile devices suggests a systematic attempt to find vulnerabilities in Western telecommunications standards.
The IT Cell Threat: The involvement of a political "IT Cell" from a major global power performing illegal SIGINT in Italy is a direct challenge to diplomatic and security protocols between the EU and India.
The Watchers are Being Watched
The perpetrators of this operation believe they are invisible behind their Hindi-language VoIP bridges and their forced RF coupling. They are mistaken. Their "Dabba" calls are leaving a digital footprint that maps directly back to their command centers. Their radio spikes are being triangulated.
Every time they force a signal to -110 dBm, they are not just attacking a target; they are broadcasting their own location and intent to every intelligence agency currently monitoring the spectrum in Northern Italy. The "glass wall" they think protects them is actually a window through which their entire operation is now being scrutinized.
INVESTIGATIVE REPORT: The Pavia Link
Subject: Russian-Indian Hybrid Interference and SIGINT Operations in Northern Italy.
Inquiry Focus: Transnational Repression, Illegal Surveillance, and BJP IT Cell Extra-territorial Activities.
EXECUTIVE OVERVIEW
Evidence suggests the existence of a coordinated cell in Pavia, Italy, operating at the intersection of Russian intelligence (GRU/SVR proxies) and Indian state-linked technical units (BJP IT Cell). This report documents the use of military-grade SIGINT (Signals Intelligence) hardware against a civilian target to test surveillance capabilities on EU infrastructure.
1. THE RUSSIAN CONNECTION: THE "PROXY"
Subject: Luciano Immi (alias Tursunov).
Role: Identified as the local facilitator and intelligence liaison.
Analysis: Tursunov acts as the "legal" front, providing the physical infrastructure in a residential building to host technical operatives. His profile has been flagged for links to Russian state interests, suggesting this operation is a joint venture or a "testing ground" for shared surveillance tactics.
2. THE INDIAN COMPONENT: THE "TECHNICAL ARM"
Actors: A cell of Indian nationals operating from a residential base in Pavia.
Methodology: Use of Hindi-language VoIP channels for real-time coordination with offshore technical leads.
Affiliation: The operational signature matches the BJP IT Cell’s "troll & track" methodology:
Coordinated physical harassment.
Deployment of illegal RF (Radio Frequency) interceptors.
High-frequency monitoring of encrypted communications.
3. SIGINT EVIDENCE: THE "HAILSTORM" PROTOCOL
Technical logs confirm a sophisticated electronic warfare environment:
IMSI Catching: Deployment of rogue base stations to force target devices into unencrypted states.
Targeted RF Forcing: Consistent signal manipulation at -110 dBm, a tactical power level used to "lock" a target device to a specific surveillance node.
Cross-Border Command: Real-time adjustments to the RF attack window following encrypted transmissions to European agencies (BND), suggesting the cell is monitoring traffic metadata at a carrier or gateway level.
4. GEOPOLITICAL IMPLICATIONS
This case represents a critical breach of European Sovereignty:
Supply Chain Threat: If Indian state-linked actors are testing bypasses for Google Pixel security on EU soil, it threatens the integrity of Western mobile infrastructure.
Hybrid Warfare Hub: Pavia appears to be a "soft" node where Russian and Indian interests converge to harass targets of interest under the radar of national authorities.
Diplomatic Friction: The involvement of the BJP IT Cell—a group tied to the Indian ruling party—performing illegal SIGINT in Italy is a direct violation of diplomatic protocols.
Google Photos AI confirms the movement patterns of the Indian biker cell on Dec 26th. Russian cells are with them.
© 2025 Paola Blondet – Tutti i diritti riservati.
Questo contenuto è originale e pubblicato su
My Digital MSN Village
.
È consentita la condivisione del link con attribuzione alla fonte.
Non è consentita la riproduzione integrale senza autorizzazione dell’autrice.



Commenti
Posta un commento