I have several gigabytes of raw complex I/Q captures taken across C, X, Ku, Ka and millimetre-wave bands, and I need the information hidden inside them extracted within a week. The job starts with demodulating the bursts, moves through full protocol reversing, and finishes with packet-level inspection that pinpoints the signal type, service provider and any network identifiers. Scope of work • Focus on satellite and MMWave waveforms—no vendor documentation is available. • Wireshark is the preferred environment for final packet dissection; use any supporting tools you like (GNU Radio, URH, inspectrum, etc.) along the way, provided the workflow remains reproducible. • Convert the raw I/Q into clean baseband, map the frame structure, decode the traffic and load it into Wireshark for analysis. • Identify modulation parameters, channel coding, timing, and any higher-layer protocol fields that reveal network identity. Deliverables 1. Universal radio software csv to Wireshark capture files (.pcap/.pcapng) showing fully decoded traffic. 2. A step-by-step notebook or log explaining every stage—from initial demodulation through to the final packet view. 3. Reproducible scripts or flowgraphs (Python, GNU Radio Companion, etc.) so I can rerun the pipeline on new data. 4. A concise report naming the signal, its provider (when identifiable), and explaining each decoded field. Acceptance criteria: running your scripts on my own SDR workstation reproduces the same packet view and identity conclusions within ±1 dB SNR deviation. If you are fluent in SDR work, protocol reversing and in-depth Wireshark analysis, I’m ready to start right away and wrap up in one week.