How do calculate who works from the fake sim card?

10 minute read
0

   


Y
ou will not believe: by the "leading" phone - your present. Having attentively read the following paragraph you will understand how everything easy, simply and quickly. In the description the term "inclusion" is used - it is the moment when the "anonymous" device connected to the web. So, went, we will consider different situations: The first situation: You use the "anonymous" mobile phone, and real is nearby and is included. Investigators request the log of all cell in which works the "anonymous" device (worked). All this that will be required to them that you to calculate (and not only "without delay", but also in a week, month, slowly, in a chair of the office behind a coffee cup).

Do recursive selections on intervals of inclusion and look who else was in a cell except the "anonymous" device. For example in one cell there were 1000 more switched-on phones. At the following inclusion 500 of those that were for the first time. At the following - 20 of those who were for the first and second time. Most often it is possible to find from dens of three-four inclusions precisely pair of phones which do not leave a cell. Less often than inclusions it is required more: in it cases it is possible to try to punch history by numbers of sets of coincidence, and also their owners. If it is the granny of 90 years from which at her 10 years and the apartment she did not leave number 5 years - that, obviously, the option disappears. Thus investigators quickly enough come to the present phone number, a story of calls by which will reveal any and all secrets. Quite often intelligence agencies are lucky also about 2 inclusions: to quickly study and sweep aside hundreds of numbers - business only in number of employees. Happens even that come to the present number from the first and only inclusion "anonymous"! Do not you trust? And in vain.

Dynamics in a cell, the behavior of other devices, an everyday life / holidays can significantly simplify work of security officers. All others can leave during operating time of the "anonymous" mobile phone a cell, except yours (well other people took and moved somewhere) or to do outgoing, to send SMS. Now such time, when all minutes without mobile phone. And it you scorches: You cannot do at the same time proceeding from two phones. Means you so far "you work" from "anonymous" all who call in your cell - leave from under suspicion and narrow a ring around you. Besides mister Case not on your party: intelligence agencies the log in which all data completely, and at you have a normal life with all not predictabilities.

Example: You surf "anonymously" on the Internet and here you are called on the real phone. You begin to speak and traffic of data on the Internet falls for a while, statistically other than time between average loadings of pages. Compare all calls in a cell on exact coincidence to a traffic failure - business of seconds - and your number is found. Perhaps, of course, that you just went to a toilet whether but to check the necessary number "is found" not difficult. And if you are called by two times?

The criminal turned on the device, sent SMS with the requirement of repayment, switched off. Every other day included, called to discuss repayment conditions, switched off. The third time included - reported the meeting place and time, switched off. We studied the log on three "inclusions", - who at this moment was in a cell all three times. From second "verification" there were four numbers, from the third - one.

The second situation: You use the "anonymous" mobile phone, and real providently in advance switch off. Incredibly, but you only simplified a task to investigators. They will just look who was disconnected - was disconnected (phone transmits a signal of shutdown to network), but did not leave network shortly before emergence "anonymous". It is possible to say safely that such in a cell there will be units or even you one. For specification of data it is possible to compare who joined after shutdown of "anonist". And, also, to punch on grannies and other. As you can see shutdown of the real device when using "left" only worsens anonymity.

The third situation: You leave the real phone at home included, and go to other cell, and only there include "anonymous". Do you think the cunning plan? And here bloody anything. Three factors all the same give your real device. First the same scheme, as in the first situation, only any more not on one cell, and on several is fulfilled. At first on one, then on next and so on will not reach comparison of cell of the present, "anonymous" with a cell, yet. Secondly and in main: Your device is without owner at home and cannot answer calls. Therefore sooner or later will be passed which are also visible in the log. It were only necessary to compare on what device the "inclusions" which are missed at all times anonymous. How do you think, many of subscribers constantly do not take the call just when you leave from anonymous? Yes anybody, except your real phone! Besides this way well helps with the general search: investigators can ring round very quickly numbers that remain after comparison of dens of cells. And if phone is not taken - in suspected. Thirdly you cannot leave the real device anywhere - every time in different places. Most likely it at your place. That is in one place on each inclusion. On it it is possible to construct additional selection for the filter: how many same devices were in the same cell. In general all this will lead to fast, though to slightly less fast, than in the previous cases, to an exit to the present number.

The fourth situation: You switch off the real phone of the house, and go to other cell, and only there include "anonymous". See situation No. 3 situation No. 2

All scheme turns out works that several inclusions from one number become. That is, if to leave from number only once and then to throw out a sim card and phone - it will be impossible to find? It will help only in volume cases if your "business" on once and another similar matters was not and will not be any more. That in is realities of all real "affairs" - will not help. Change of numbers will not complicate a problem of search of the real phone at all. For example in the same example about blackmail: as change of number will help - to the victim same calls are made. Investigators will just punch not by one number 3 of inclusion, and three inclusions of different numbers. Similar to "shady business" on the Internet - numbers easily unite on general "business". Let's tell more - frequent change of numbers only worsen safety since investigators will get groups of numbers and will be able to punch easily, for example, from where sim cards. And to cover you in the act during purchase of new or to contact "seller" who will make "robot" or will merge number from which you called him. The anonymity is not lack of data for identification. It in the modern world cannot just be. The anonymity is a good imitation of the ordinary, but not the real personality.

WHAT WILL GIVE TO INTELLIGENCE AGENCIES NUMBER OF THE REAL PHONE?

We considered how easily and just "to punch" to security officers the present number of the suspect on his "anonymous". But what information about the real phone will give? Yes all. Except information on whom number is issued investigators will see to whom you called. For certain among them there are a lot of those who know you personally. Will see who and as recharged. Most likely there are payments and from the present map via the ATM or from the real WebMoney purse, etc. That is, actually, you came.

HOW DO TAKE THE BEARINGS OF THE MOBILE PHONE?

Into place to the area of work of cell in which there is the suspects phone the task force with a manual direction finder moves forward. It is any not the screen with a point as show in movies, and the simple radio receiver with an arrow which shows signal power and the antenna in the form of letter H, letter Zh, a cunning tube or a hyperbolic / parabolic dish (often in a set there are several antennas for different working conditions). Information on what precisely to frequency works now the required device is available for the base station. Operas configures the receiver on this frequency, twists around itself antenna and looks at an arrow. From where the signal is the strongest - there and goes. Comes into an entrance, walks upstairs and measures a signal. Finds thus the necessary floor, then the apartment and everything, "anonymity" is finished. In observed by us cases time from an entrance of "gazelle" of cop to an output under handles are white made 25 minutes. Considering how many left them on the recommendation "open because we will open in any cases", collecting and the suspects output - can be estimated for how many among dozens of houses, hundreds of entrances and thousands of apartments found necessary.

SO TO DO? ANONYMITY - THE MYTH?

Above we in detail considered that having the real personal mobile phone we will never be anonymous even from just bought new phone and the sim card which is just bought in a gate without design. As we already spoke, the available anonymity is a good simulation of the normal, but not the real personality. And the absence of the personality in general in our modern information realities is just impossible. Here you, the personality, sit directly here and read this article. And from below there are Layfinterneta counters and other.

The real hackers, whose freedom, and, perhaps, and life, depends on anonymity do not use mobile phones in everyday life. Do not use at all. Only disposable calls, Skype, etc. And "daily" they have no life. Eternal haze, non-existence. There are no friends, there is no family, there are no habits and "favourite" places. Here what is anonymity. But, actually, in Network there is full-fledged other life, other friends and other "places". And, often, not only it is not worse, but also it will be better, than in real. So not everything is so sad. Simply not as at the majority. However it is not "anonymity" any more. You have a name, let and a nickname, but on it know you, you have Internet friends and places where you can be found in network. You can even be "punished" though without trip to Siberia. Thus it is easy to understand that not only the anonymity, but also freedom, and "crime" and "laws" is conditional - are not uniform, and are relative to society. And "societies" are different.

Having learned a little about methods of work of investigators you can take measures for improvement of safety in everyone specific cases: for example in situation No. 3 it is possible to install the answering machine on the real phone or to ask the friend to answer if call. Register the real phone on the real grandmother to pass "the filter on the grandmother". Try to combine randomly situations, leave phone in different places, etc. These are will complicate work of investigators a little, but also will complicate yours "dark activity". And whether hour X" will help in "? Not fact.

Tags

Post a Comment

0Comments
Post a Comment (0)