Cameroon – 20 May 2017: How Paul Biya spied the guests of the Unity Palace

Written by Deckson N.

According to Integration newspaper, the Presidency deployed a hyper-sophisticated security device to control the movements of people invited to the Unity Palace on the occasion of the 45th National Day of Unity.

Almost nobody refuses an invitation to the Unity Palace. Especially when it comes to sharing a few moments in the company of the presidential couple as part of the National Day of Unity. This year, as in the past, hundreds of people stormed the residence of the Head of State. But it had a price.

The security measures, already drastic, were reinforced during the 45th edition of the 20 May. The guests had been warned in advance: no one had the right to enter the Unity Palace with mobile phones. In going through the Integration newspaper published on May 22, 2017, it is learned that this measure announced through a press release signed by the Minister of Communication on May 19, was only the tip of the iceberg.

IMSI-catchers, black boxes, geolocation tags, keyloggers, microphones and cameras in all places, many barriers, metal chains , etc, were set up on sensitive sites, searches were made as soon as someone approached to a given perimeter.  “informs the weekly.

Our colleague informs us that this is the range recently provided by the Chinese company Nutech Hong Kong Company Limited. An anonymous source quoted by the newspaper, said that “for reasons of optimal security, this convivial sequence, now anchored in the calendar of many personalities deserved this arrangement with regard to the context.”

The device was mainly aimed at potential cell phone holders, says a telecommunications engineer that Integration met. “The IMSI-catchers capture all GSM traffic in a radius of 500 to 1000m. They know how to break the encryption of exchanges in 2G, and scramble 3G and 4G communications in ways that it can be reverted back to 2G. They listen to what you do on the Internet, the emails you send, and spy on your conversations. Installed in telecom operators, “black boxes”, have been specially tasked to examine the connection metadata (who calls who and connects to what, when, how long, and where). Keyloggers record anything typed on a keyboard, and are generally able to transmit this information remotely, “the expert said.

Facebook Comments

About the author

Deckson N.

Please wait...

Subscribe to our site and be Informed!

Want to be notified when our article is published? Enter your email address and name below to be the first to know.