Mabere Marando asema Meseji zilizodaiwa kutumwa kwa Mwigulu ni za kuchonga!

Kuna gazeti moja limeandika kuwa baba wa yule kijana aliyeuwawa huko Singida ni kiongozi wa CHADEMA huko Singida. Na tukurudi nyuma tunaambiwa kuwa CHADEMA walikuwa na taarifa juu uwepo wa vijana wa UVCCM waliotayarishwa kuleta fujo kwenye huo mkutano. Sasa hili linaleta swali, je marehemu ambaye alikuwa ni UVCCM anaweza kuwa 'alishughulikiwa' na CCM kwa kudhani kuwa yeye nduye alitoa 'siri' za mpango wa kuleta fujo kwenye mkutano wa CHADEMA?

Mkuu hii kitu ungeianzishia uziwake ingekaa vyema sana kaka...maana naona kuna hoja ya kuidiscuss hapa.
 
Mwanasheria wa Chadema Mabere Marando ameieleza Clouds Tv muda huu kuwa katika uchunguzi uliofanywa wamegundua kuna teknolojia ambayo mtu anaweza kukutumia msg kwa namba yoyote na ikaonesha kuwa ametumiwa na mtu mwingine tofauti na mtumaji wa awali kwa kutumia mtambo maalumu.Inaaminika mtambo huo umenunuliwa tangu mwaka jana na kigogo mmoja wa serikali kutoka Israel.

Hawa jamaa sijui wanafikiria kwa kutumia masaburi walidhani kuwa hakuna technolojia ya kugundua spoofing sms
 
Kwa mujibu wa taarifa ya habari ITV saa mbili siku,ndg Mabere Marando amesema pana mtoto wa kigogo mmoja wa serikali ya ccm amenunua mtambo wa kuingilia mawasiliano ya simu bila wewe mwenyewe kujua.Asema mtambo huo unaweza kutumika kutuma ujumbe kwa mtu mwingine bila wewe mwenyewe kujua na kuonenakana ya kuwa ujumbe huo umeutumwa nawe.Pia kasema ushahidi anao na anaweza kumtaja siku nyingine na yupo tayari kufikishwa mahakamani.Ndio huo ulitumika kuwahujumu wabunge wa CHADEMA,mtambo huo kaununua nchi Israel.

Nawasilishaa.
 
Naamini huu ni ushahidi mwingine unaoonyesha kuwa ccm ni mfumo uliooza tayari na unaanguka taratiibu kama tunavyoshughudia.hivi kweli kwa akili ya kawaida ni nani anayeweza kutumia namba yake tena iliyosajiliwa kutuma ujumbe wa kumtisha mwenzie ilihali akijua jina lake limesajili namba husika?siamini kama huku ni kuchoka kwa akili bali huku ni kuoza kwa akili kwani hata akili iliyochoka haiwezi kabisa kufikiri chini ya kiwango kwa kiasi hiki. Naswikitika kusema kuwa ni maiti tuu inayoweza kutenda haya.
 
Haaa, ndo naipata hii ITV Kamanda Mabere akitoa ufafanuzi kuwa huyu ni mtoto wa kigogo nchini.......yule kijana aliye maliza chuo juzi tu na leo ni tajiri kupindukia lazima anahisika hapa, na hatimae kamuingiza king Mchemba......kiukweli CDM inapendwa na Mungu baba wa Mbinguni
 
Safi sana. Hata usalama wa taifa tunao chadema, chadema ni chama cha watu na taarifa nyingi zinaletwa na watu wa usalama wa taifa
 
[h=2]How SMS spoofing is carried out[/h] SMS Spoofing occurs when a sender manipulates address information. Often it is done in order to impersonate a user that has roamed onto a foreign network and is submitting messages to the home network. Frequently, these messages are addressed to destinations outside the home network – with the home SMSC essentially being "hijacked" to send messages into other networks.
The impact of this activity is threefold:

  1. The home network can incur termination charges caused by the delivery of these messages to interconnect partners. This is a quantifiable revenue leakage.
  2. These messages can be of concern to interconnect partners. Their customers may complain about being spammed, or the content of the messages may be politically sensitive. Interconnect partners may threaten to cut off the home network unless a remedy is implemented. Home subscribers will be unable to send messages into these networks.
  3. While fraudsters normally used spoofed-identities to send messages, there is a risk that these identities may match those of real home subscribers. The risk therefore emerges, that genuine subscribers may be billed for roaming messages they did not send. If this situation occurs, the integrity of the home operator's billing process may be compromised, with potentially huge impact on the brand. This is a major churn risk.
The legitimate use cases for SMS spoofing include:

  1. A sender transmits an SMS message from an online computer network for lower more competitive pricing, and for the ease of data entry from a full size console. They must spoof their own number in order to properly identify themselves.
  2. A sender does not have a mobile phone, and they need to send an SMS from a number that they have provided the receiver in advance as a means to activate an account.
  3. A sender adopts the default network gateway identifier provided by an online service,[SUP][1][/SUP] in order to send an anonymous sms, rather than specifying a number of their own choosing.
An SMS Spoofing attack is often first detected by an increase in the number of SMS errors encountered during a bill-run. These errors are caused by the spoofed subscriber identities. Operators can respond by blocking different source addresses in their Gateway-MSCs, but fraudsters can change addresses easily to by-pass these measures. If fraudsters move to using source addresses at a major interconnect partner, it may become unfeasible to block these addresses, due to the potential impact on normal interconnect services.[SUP][2][/SUP]
[h=2]Legality[/h] In 2007, The UK premium rate regulator, PhonepayPlus (formerly ICSTIS) concluded a public consultation on anonymous SMS, in which they stated they were not averse to the operation of such services. However, from 2008 PhonePayPlus are introducing new regulation covering anonymous SMS which will require anonymous SMS service providers to send a follow-up message to the recipient stating that a spoofed SMS has been sent to them, and operate a complaints helpline. It is illegal in Australia.[SUP][citation needed][/SUP]
[h=2]Protecting users from SMS spoofing[/h] If a user can prove that their SMS sessions have been spoofed, they should contact both law enforcement and their cellular provider, who should be able to track where the SMS messages were actually sent from. A user may also modify the phone's settings so that only messages from authorized numbers are allowed. This is not always effective since hackers could be impersonating the user's friends as well.
[h=2]Examples of SMS spoofing[/h]
  • Messages sent from Google are sent with the Sender ID "Google".[SUP][citation needed][/SUP]

  • Skype sends messages from its users with the mobile number they registered with. Note that when a user attempts to "reply" to the SMS, the local system may or may not allow the replying message to be sent through to the spoofed "origin."[SUP][citation needed][/SUP]

  • A user who does not have a mobile phone attempts to sign up for a Foxytag account, which requires an SMS from a phone number that the user registers with. A dynamically assigned number from an anonymous SMS service will not work because the user is not given the dynamic number in advance to register with.
The Asian School of Cyber Laws (Pune) recently conducted experiments in SMS spoofing at the national and international level. They were able to successfully spoof SMS messages and make them appear to come from other people's cellular phones. These people were using GSM based cellular phone services in various parts of India and other Asian as well as African countries.[SUP][citation needed][/SUP]
Sammer Mehra discovered a security vulnerability when sending a spoofed SMS message to Facebook used the SMS originator to authenticate the user. Sammer used hoaxMail to spoof the SMS message and therefore could trick Twitter to post the message on the victim's Twitter page.[SUP][3][/SUP]
At the moment there are many websites offering the service to send spoofed text messages. Examples of capabilities and information about the legal rules can be found in the terms and conditions (e.g. SMS Spoofing Terms ). You will find answers to frequently asked questions, whether it is legal, how it works, etc.
 
Source ITV habari

Adai ushahidi anao ni mtambo ulio nunuliwa Israel una uwezo wa kuingiliana namba na mtu kwa umbali wa Kilometer 5 na unauwezo wa kuandika sms na kuituma na sms ikaingia kama inetoka kwa mbaya wako.

Kasema mtambo huo umenunuliwa na mtoto wa kigogo aliyeko Ikulu na baba yake ni mtu mkubwa sana nchini.

Na kinachofanyika ni kuwachafua CDM

Marando asitake kujitafutia umaarufu yeye asubiri wabunge wake wapelekwe mahakamani na ataenda kutoa ushahidi wake huko, asitafute huruma ya kitoto. Na kwa kauli yake hii makampuni ya simu yatamvaa kwa ***** wake
 
Mwanasheria wa Chadema Mabere Marando ameieleza Clouds Tv muda huu kuwa katika uchunguzi uliofanywa wamegundua kuna teknolojia ambayo mtu anaweza kukutumia msg kwa namba yoyote na ikaonesha kuwa ametumiwa na mtu mwingine tofauti na mtumaji wa awali kwa kutumia mtambo maalumu.Inaaminika mtambo huo umenunuliwa tangu mwaka jana na kigogo mmoja wa serikali kutoka Israel.

Nakubaliana na maoni ya Mwanasheria wa CDM Bwana Mabere Marando. Kama wanataka kuthibitisha ukweli huo basi huo uongo uwekwe hadharani kwa kuwatumia IT Engineers pamoja na Mobile operators ili Mwigulu Nchemba na hao Vigogo wa CCM wafikishwe Mahakamani kwa UCHOCHEZI NA UDANGANYIFU.

Mwigulu Nchemba thinks he is smart, but in reality CHADEMA Law makers and IT Engineers are more smart than him. Let the law takes its course to silence these Nchemba's rubbish!
 
Hizi ni taarifa za kiinteligensia za CDM hakuna haja ya kumwaga kuku kwenye mchele mwingi! Its sealed n confidential, period.
 
Source ITV habari

Adai ushahidi anao ni mtambo ulio nunuliwa Israel una uwezo wa kuingiliana namba na mtu kwa umbali wa Kilometer 5 na unauwezo wa kuandika sms na kuituma na sms ikaingia kama inetoka kwa mbaya wako.

Kasema mtambo huo umenunuliwa na mtoto wa kigogo aliyeko Ikulu na baba yake ni mtu mkubwa sana nchini.

Na kinachofanyika ni kuwachafua CDM


Duuuuu!this is another new series called "PERSON OF INTEREST" yaaani ukitamani kumchafua yeyote yule we unahack simu yake then unasend sms teeehhhh!teeeehhh! hii technolojia iliwatesa sana raia wa bara la ulaya na mitandao wakafunga huduma hii hasa kwa simu za kisasa kama iphone,ipad na zinginezo,hapa kwetu bongo ni kitu kipya sana something need to be done maana ukifika muda wa kampeni 2015 tutachafuana sana
 
Marando na wenzie watakuwa wamelewa huwezi ukaongea hewa kama ile nna wacwac kamA hawakuwa wametokea baa kwanza
 
kweli nyinyiem hawajitambui, kifo cha mende!! CDM real M4C hata intel yao ipo juu!!
poleni magamba
 
Back
Top Bottom