CarderPlanet
Professional
- Messages
- 2,552
- Reaction score
- 712
- Points
- 83
Amendment (For the Russian Federation, respectively, not the KGB, but other relevant services).
Let's start with the most important thing.
In addition to the identification chip from the Operator in the form of a sim card (+ / = KGB), each phone has a chip from the manufacturer of the mobile phone IMEI code (= FBI), and there is hardware / phone software (= FSB), plus there is software, such as chips , plus "DOS" software.
It is impossible (or almost impossible) to protect ourselves from wiretapping and access at the level of chips and the operating system of a mobile phone, we will consider the data that Anonymity and security in the cellular network "leaks" your phone to the FBI / KGB, and how to protect yourself at the level of "mobile" , from comrades with ksiva!
The basics of the basics:
To understand that a telephone in our country can work without a SIM card (you can call the rescue service, for example, at 112), how is this possible? Through a telecom operator (any signal of which is available at this point), but does this mean that such a call is "Anonymous" to number 112, if there is no SIM card in the phone? The answer is NO!
Why not? Any working telecom operator on the territory of the Russian Federation (as in any other country), under a license agreement with the state (why did you think you still need a license agreement, if not spying on you! ???), MUST connect to its hardware (PLATFORM) , "a box from the KGB".
In this case, your phone is a communication line (Rostelecom most often, and who else did you think?), The operator receiving the call - writes all the data that is available to them!
The minimum that they write is a conversation!
How much is the platform / billing? For those who are not experienced in mobile topics, the PLATFORM is a "server" that processes all your actions, and additionally calculates your call, for example, or the cost of SMS, Internet, etc., in order to allocate minutes for you according to the tariff plan, or so that you do not "Went into the minus."
ATTENTION! Many people confuse the concept of Billing with the concept of the Platform, even being employees of a telecom operator in a communication salon, you can hear from "first-class VIP customer service specialists" such nonsense that from the 1st to the 5th day you cannot reissue the contract into a megaphone of Moscow Spill, to another person (legal person, or an individual), since this is a feature of Billing, which calculates expenses for a month, and issues invoices (Billing only does this), but the Platform does not allow reissuing numbers, but not Billing, although everything is possible, just in Megaphone DULL (mediocre programmers , and poor owners - Hello YOU!).
The platform records ALL information about you
1) To whom the sim card is issued
2) SCAN of the contract form with a sample signature of course! And to those who, when issued a sim card, where they made a replacement, etc.
3) Data about the phone and the history in which phones this sim card was
4) Data on changing phone / sim card
5) Location, location, call history, SMS, all information on surfing the Internet (including logins and passwords, including from this forum). Plus, records of telephone conversations, SMS texts, the addressee of the SMS are stored (his addressee data - if he is in the same network, if not, then the data is with another telecom operator) and all other information that is available to the operator
The main thing about communication!
All your data: Location (movement), sim card number, mobile phone number, to whom the number is issued, IMEI of the phone (device), correspondence, Internet access (including logins / passwords), and all traffic is written and stored by the operator connections and the KGB!
Your conversations are also written, they say that the KGB has an additional system and if your voice is in the "Base", then if you called from any phone, and from anywhere in Russia (it doesn't matter even if you bought Simka , for example, from Ukraine, and a phone from China), then you automatically fall under the "cap", as well as your equipment, and sim card, and location. There are figures who offer "anonymity of iron", or "anonymity when making a call", or "substitution of a number during an outgoing call", most often this is a scam at the level of IP telephony (which is written - since this is normal Internet traffic (available to the telecom operator / Rostelecom / KGB and etc.), and they will first come to that IP telephony operator,
The KGB has a lot of opportunities to listen to / find / identify you, for example:
a) by voice
b) by location
c) for hardware / sim card
d) according to your contacts, does the person have security (especially if he knows you)?
e) in more rare cases (! ???), in the case of a notebook in the phone, by SMS, and other saved data, and files on the phone.
Who is leaking you, and your data, and where from a mobile phone?
Mobile phone:
a) The manufacturer (theoretically) of any electronic filling.
b) Manufacturer of software (software)
c) To the telecom operator (they even write encrypted data, and decrypt how much everything can be decrypted, I don't know)
d) KGB (various sources of information), including wiretapping, and through a telecom operator.
e) The telecom operator writes all your activity.
f) Manufacturers of equipment for a telecom operator. For example NOKIA - which supplies equipment to telecom operators, in the form of base stations
g) manufacturers of software for a telecom operator: Platforms, to a lesser extent Billing
j) Server manufacturers
h) software for Servers, in the form of Windows - which, of course, does not monitor the user, and does not write anything!
i) Other companies that have a "slice" of access to your data. For example, Banks - which know your personal data, and sim card data, and the fact that, for example, there was a replacement of a sim card, payment systems have similar data, including QIWI (a separate topic, if anyone is interested , ask)! The CAM subscriber, upon signing the banquet agreement, agrees with the transfer of such data.
Whom does Simcard lease information to?
a) To the telecom operator
b) KGB through connection to the operator / wiretapping through a fake BS (base station) / through wiretapping on the car (under the car) / house / apartment ("bookmark"), and / or by other means.
It must be remembered that if the operator sees (and he sees) that an anomaly is happening at some base station (for example, excessive load at night, although on average there is no such load on the network), then they begin to figure out what and how (depending on what criteria are from the KGB, and from the security service operator, this system is also used to prevent Fred, for example, termination, "call points" and other "gray schemes of earnings / work") ...
The operator is often the initiator of the investigation! When he sees a "non-standard situation" with traffic (encrypted grass), with minutes (termination / Ford), "doubling phones", or through other Suspicious activity.
There are situations when, in addition to the fact that the KGB receives information from other sources (for example, from the Internet), it "tortures the operators" (although they have the data, but not always, and not everyone in uniform has access to the COMP).
That is, people can come to you from two sides (the operator leaks the KGB data, or the KGB requests data from the Operator), depending on how you work!
Main dangers and mistakes:
1) Even if you have 1 phone that changes the IMEI code (are you sure that the phone CHANGES this IMEI code, and does not imitate what it changes?), Then you are "firing" anyway.
2) If your IMEI repeats the IMEI of another iron (PALEO, especially if one operator). For example, a broken IMEI by 13 ZEROS IS A BIG PALEO !!! Phones with the same IMEI code, or with a non-standard code, or with zeros are put on control, you MUST BE CAREFUL!
3) Using the phone for private life (calls, Internet, SMS), and then for "gray deeds" is dangerous! Because on the phone all the Sims who were in it break through!
4) Using Your phone (tablet, Internet, other equipment, including WITHOUT the Internet) near a "gray phone" is dangerous! Determine the location up to a meter (there is a possibility of up to mm., Even from an external antenna!).
5) Using for a computer in a sim modem (together with a "gray PC") can be dangerous! Insofar as:
a) all the herbs are recorded and seen by the telecom operator (there is evidence that if there is an encrypted herb, then it is tracked, intercepted, and decrypted!) !!
b) by the location of the mobile, you can determine the location, and "unwind" the further chain (together with other "prints" in the network, it may be a reason to come to you).
6) If you use a sim card and a modem to access the Internet, then you should issue a sim card for someone else's data, or buy one, and it is better to reflash the modem under a different IMEI (for example, tablet, or phone, and unblock it from the operator, since there is their "bookmarks" by which you can then be calculated)
7) If you put a sim card of another operator (even from another country), you should not assume that this will allow you to remain in the shadows, with the same hardware! Since Traffic (including voice), all one goes through the LOCAL Operator (RF for example) voice, or Internet traffic (IP telephony), which means it IS WRITTEN and “surrendered” to the KGB for eternal storage!
About security in the mobile network How to ensure maximum security?
Depends on the type of activity you have. There are some Fundamental security measures (mobile firewall):
1) Never use YOUR SIM cards (and relatives), phones where you inserted SIM cards, your real data, go to your phone (computer) to your social accounts. Networks, mail, ETSK (Wallets), and other "lit up for you / place / hardware, etc.", or for example, lit up on other matters, and so on. Always start your "electronic life from scratch"! In a bundle - Phone + Sim Card!
2) Never use near your phone (iron), "gray iron"
3) Do not use HOME or in those places where you are known, and can "pass" gray iron!
4) For different "themes" it is better to use different phones - not overlapping in time, or location, in design (DROPA), or in hardware. Since if you burn "one topic", then others can also be unleashed on hardware (drop, etc.).
5) When the phone is not in use - Switch it off and remove the Battery! Better yet hide an isolated safe or something like that in the noise!
6) If you call from a car / public transport - Call not from your car, and the cars of relatives (may fold the position, and video recordings from cameras).
7) Do not use Directions Routes from / to your home (work, etc.) for movement, as they can be calculated in the end by the method of "overlaying" data 8) Do not use the same places / routes! They can be stacked on top of each other!
Note! There is evidence that the Operators store user data, and what they have been doing (doing) for more than 7 years (including logins, passwords, activity, SMS, calls, etc.), although "sort of like" according to the law must be stored for 3 years. Even if the operator “does not store data about you”, then the State does it IN ADDITIONALLY. Believe me There is enough power, and any of your "jamb" 14 years ago - can go sideways if you sleep with your phone number / hardware, and so on! ASKING QUESTIONS MORE ACTIVELY, the more will be
Security measures! When buying a sim card / phone / when making payments!
1. NEVER buy sim cards for different cases (and even for one case), from one seller in real life (of course, not from the official communication store about this below), buy from Different, best of all, from different regions of the sim card (for example, the Carrier tariff), and different operators (your "love", for example, to the operator "MTS" may be critical for your search)! As for the different regions ("not native", it may be bad that the SIM card is "guest", since they are probably monitored separately - at least at the roaming level).
2. Buy sim cards already with a balance (starting) because then you will need to replenish the balance! And here there is already a surprise for you, and your data for RSKK! The telecom operator with the payment system has an agreement and a GATEWAY through which all interaction goes, I do not know if the point data is transmitted (transmitted) to the operator, but all other data is transmitted, and then contact the Payment system and find out the location of the Dealer outlet where you are replenished the balance, has no difficulty! Especially if you replenished your mobile phone (and what mail did you do it, or the mobile phone, from what IP address you went online, from whose computer, if in the Internet club you did it under video cameras!). Further, if the site was replenished, from which bank card (then RSKK has data about all accounts and cards, did you think otherwise?), or from which ATM / terminal, for example, a qiwi wallet was replenished (Are you sure that there were no cameras in the ATM or the place where you replenished, or nearby?). Moreover, there is evidence that all telecom operators "belong to the guys from RSKK", and your favorite QIWI wallet is the same!). Etc. There are many situations. You just have to THINK with your head always! There are many situations. You just have to THINK with your head always! There are many situations. You just have to THINK with your head always!
The most secretive replenishment of the balance is the payment cards "EKO" Unified Payment Card. Each operator has one. These cards have several advantages:
a) All EKOs have the same number (aka barcode), that is, it is almost impossible to determine where you have EKOs from, almost "anonymity"!
b) You can buy EKO almost everywhere (in any communication store), from a dealer, including at the bazaar (there are already few such places in Moscow / St. Petersburg).
Disadvantage: there are not many places where these cards are sold (in large cities).
In fact, telecom operators, and Kiwi is one but a legal organized criminal group.
3. Use mobile phones from different regions in your work, and purchased not in a communication salon (everything is recorded on video cameras, and transmitted as you should understand in RSKK, upon request, or even without a request). Buy mobile phones, either Chinese, or something else (although if you order from the Internet, these are additional "prints" in the form of Computer traces from the operator and from the site, plus you will receive a parcel from China. Why do you think goods from China for so long Do you think it right! Buying from "hands" in a tent can also be pale, because always when buying a mobile phone from a seller, a "tentman" takes a copy of his passport and takes passport data. And you are sure that he (or near), if there are no video cameras? and then they can immediately leave for you! Phones with "insignia" are pale! PCT, and so on. Since such phones are shipped from the Official Manufacturer to the Distributor, he imports into Russia (submits a customs declaration, do you think to pay taxes? NO, to control YOU, since the declaration contains IMEI codes, including, then the company sells phones for example Euroset (taking into account the same IMEI codes), then these phones come from the warehouse "at retail", where, when selling to you, they again remove the IMEI code that gives you out, since there are CAMERAS in all communication shops!
4. What technical means does RSKK have? ALL and Any!
a) And the means of wiretapping (for example, a "box" is attached to the bottom of the car, in which, among other things, a mobile phone, and this is a recording of movement (plus outdoor cameras from the roads), plus it is possible to record conversations (although they can also be filmed from telecom operators on Logs !
b) Signal jammers / communication signal jammers
c) Manual direction finders (although they are not always needed, because the operator has data on your current location), but it helps, for example, with special operations, when requesting data from a Person from the central office is "pale"
d) Scanning equipment (any range)
e) Any device that can be bought on Chinese sites, or in China. Plus there is hardware that you cannot buy on the Internet. For example, there is a "rumor" according to which - you can recover data from hard drives that are "erased" and burned-out hardware (not everything seems to be restored) Have you seen such hardware on sale?
4. Use software that changes the voice, location ("transferring you to another base station"), hardware numbers (although in some cases this is "pale", because if the operator "hooks" on the suppose voice, he will see that the phones are often changed / flashed - This will be a real "pale"!
5. Is the Skylink operator safe? And safe and not at the same time (compared to other mobile operators).
Pros:
A) Iron on Skylink's wiretapping - less.
B) You can use an external antenna and a cellular signal booster to hide your location!
Minuses:
A) Skylink is Rostelecom (state = KGB).
B) A small coverage area in Russia, and few subscribers find it easier to find you.
Let's start with the most important thing.
In addition to the identification chip from the Operator in the form of a sim card (+ / = KGB), each phone has a chip from the manufacturer of the mobile phone IMEI code (= FBI), and there is hardware / phone software (= FSB), plus there is software, such as chips , plus "DOS" software.
It is impossible (or almost impossible) to protect ourselves from wiretapping and access at the level of chips and the operating system of a mobile phone, we will consider the data that Anonymity and security in the cellular network "leaks" your phone to the FBI / KGB, and how to protect yourself at the level of "mobile" , from comrades with ksiva!
The basics of the basics:
To understand that a telephone in our country can work without a SIM card (you can call the rescue service, for example, at 112), how is this possible? Through a telecom operator (any signal of which is available at this point), but does this mean that such a call is "Anonymous" to number 112, if there is no SIM card in the phone? The answer is NO!
Why not? Any working telecom operator on the territory of the Russian Federation (as in any other country), under a license agreement with the state (why did you think you still need a license agreement, if not spying on you! ???), MUST connect to its hardware (PLATFORM) , "a box from the KGB".
In this case, your phone is a communication line (Rostelecom most often, and who else did you think?), The operator receiving the call - writes all the data that is available to them!
The minimum that they write is a conversation!
How much is the platform / billing? For those who are not experienced in mobile topics, the PLATFORM is a "server" that processes all your actions, and additionally calculates your call, for example, or the cost of SMS, Internet, etc., in order to allocate minutes for you according to the tariff plan, or so that you do not "Went into the minus."
ATTENTION! Many people confuse the concept of Billing with the concept of the Platform, even being employees of a telecom operator in a communication salon, you can hear from "first-class VIP customer service specialists" such nonsense that from the 1st to the 5th day you cannot reissue the contract into a megaphone of Moscow Spill, to another person (legal person, or an individual), since this is a feature of Billing, which calculates expenses for a month, and issues invoices (Billing only does this), but the Platform does not allow reissuing numbers, but not Billing, although everything is possible, just in Megaphone DULL (mediocre programmers , and poor owners - Hello YOU!).
The platform records ALL information about you
1) To whom the sim card is issued
2) SCAN of the contract form with a sample signature of course! And to those who, when issued a sim card, where they made a replacement, etc.
3) Data about the phone and the history in which phones this sim card was
4) Data on changing phone / sim card
5) Location, location, call history, SMS, all information on surfing the Internet (including logins and passwords, including from this forum). Plus, records of telephone conversations, SMS texts, the addressee of the SMS are stored (his addressee data - if he is in the same network, if not, then the data is with another telecom operator) and all other information that is available to the operator
The main thing about communication!
All your data: Location (movement), sim card number, mobile phone number, to whom the number is issued, IMEI of the phone (device), correspondence, Internet access (including logins / passwords), and all traffic is written and stored by the operator connections and the KGB!
Your conversations are also written, they say that the KGB has an additional system and if your voice is in the "Base", then if you called from any phone, and from anywhere in Russia (it doesn't matter even if you bought Simka , for example, from Ukraine, and a phone from China), then you automatically fall under the "cap", as well as your equipment, and sim card, and location. There are figures who offer "anonymity of iron", or "anonymity when making a call", or "substitution of a number during an outgoing call", most often this is a scam at the level of IP telephony (which is written - since this is normal Internet traffic (available to the telecom operator / Rostelecom / KGB and etc.), and they will first come to that IP telephony operator,
The KGB has a lot of opportunities to listen to / find / identify you, for example:
a) by voice
b) by location
c) for hardware / sim card
d) according to your contacts, does the person have security (especially if he knows you)?
e) in more rare cases (! ???), in the case of a notebook in the phone, by SMS, and other saved data, and files on the phone.
Who is leaking you, and your data, and where from a mobile phone?
Mobile phone:
a) The manufacturer (theoretically) of any electronic filling.
b) Manufacturer of software (software)
c) To the telecom operator (they even write encrypted data, and decrypt how much everything can be decrypted, I don't know)
d) KGB (various sources of information), including wiretapping, and through a telecom operator.
e) The telecom operator writes all your activity.
f) Manufacturers of equipment for a telecom operator. For example NOKIA - which supplies equipment to telecom operators, in the form of base stations
g) manufacturers of software for a telecom operator: Platforms, to a lesser extent Billing
j) Server manufacturers
h) software for Servers, in the form of Windows - which, of course, does not monitor the user, and does not write anything!
i) Other companies that have a "slice" of access to your data. For example, Banks - which know your personal data, and sim card data, and the fact that, for example, there was a replacement of a sim card, payment systems have similar data, including QIWI (a separate topic, if anyone is interested , ask)! The CAM subscriber, upon signing the banquet agreement, agrees with the transfer of such data.
Whom does Simcard lease information to?
a) To the telecom operator
b) KGB through connection to the operator / wiretapping through a fake BS (base station) / through wiretapping on the car (under the car) / house / apartment ("bookmark"), and / or by other means.
It must be remembered that if the operator sees (and he sees) that an anomaly is happening at some base station (for example, excessive load at night, although on average there is no such load on the network), then they begin to figure out what and how (depending on what criteria are from the KGB, and from the security service operator, this system is also used to prevent Fred, for example, termination, "call points" and other "gray schemes of earnings / work") ...
The operator is often the initiator of the investigation! When he sees a "non-standard situation" with traffic (encrypted grass), with minutes (termination / Ford), "doubling phones", or through other Suspicious activity.
There are situations when, in addition to the fact that the KGB receives information from other sources (for example, from the Internet), it "tortures the operators" (although they have the data, but not always, and not everyone in uniform has access to the COMP).
That is, people can come to you from two sides (the operator leaks the KGB data, or the KGB requests data from the Operator), depending on how you work!
Main dangers and mistakes:
1) Even if you have 1 phone that changes the IMEI code (are you sure that the phone CHANGES this IMEI code, and does not imitate what it changes?), Then you are "firing" anyway.
2) If your IMEI repeats the IMEI of another iron (PALEO, especially if one operator). For example, a broken IMEI by 13 ZEROS IS A BIG PALEO !!! Phones with the same IMEI code, or with a non-standard code, or with zeros are put on control, you MUST BE CAREFUL!
3) Using the phone for private life (calls, Internet, SMS), and then for "gray deeds" is dangerous! Because on the phone all the Sims who were in it break through!
4) Using Your phone (tablet, Internet, other equipment, including WITHOUT the Internet) near a "gray phone" is dangerous! Determine the location up to a meter (there is a possibility of up to mm., Even from an external antenna!).
5) Using for a computer in a sim modem (together with a "gray PC") can be dangerous! Insofar as:
a) all the herbs are recorded and seen by the telecom operator (there is evidence that if there is an encrypted herb, then it is tracked, intercepted, and decrypted!) !!
b) by the location of the mobile, you can determine the location, and "unwind" the further chain (together with other "prints" in the network, it may be a reason to come to you).
6) If you use a sim card and a modem to access the Internet, then you should issue a sim card for someone else's data, or buy one, and it is better to reflash the modem under a different IMEI (for example, tablet, or phone, and unblock it from the operator, since there is their "bookmarks" by which you can then be calculated)
7) If you put a sim card of another operator (even from another country), you should not assume that this will allow you to remain in the shadows, with the same hardware! Since Traffic (including voice), all one goes through the LOCAL Operator (RF for example) voice, or Internet traffic (IP telephony), which means it IS WRITTEN and “surrendered” to the KGB for eternal storage!
About security in the mobile network How to ensure maximum security?
Depends on the type of activity you have. There are some Fundamental security measures (mobile firewall):
1) Never use YOUR SIM cards (and relatives), phones where you inserted SIM cards, your real data, go to your phone (computer) to your social accounts. Networks, mail, ETSK (Wallets), and other "lit up for you / place / hardware, etc.", or for example, lit up on other matters, and so on. Always start your "electronic life from scratch"! In a bundle - Phone + Sim Card!
2) Never use near your phone (iron), "gray iron"
3) Do not use HOME or in those places where you are known, and can "pass" gray iron!
4) For different "themes" it is better to use different phones - not overlapping in time, or location, in design (DROPA), or in hardware. Since if you burn "one topic", then others can also be unleashed on hardware (drop, etc.).
5) When the phone is not in use - Switch it off and remove the Battery! Better yet hide an isolated safe or something like that in the noise!
6) If you call from a car / public transport - Call not from your car, and the cars of relatives (may fold the position, and video recordings from cameras).
7) Do not use Directions Routes from / to your home (work, etc.) for movement, as they can be calculated in the end by the method of "overlaying" data 8) Do not use the same places / routes! They can be stacked on top of each other!
Note! There is evidence that the Operators store user data, and what they have been doing (doing) for more than 7 years (including logins, passwords, activity, SMS, calls, etc.), although "sort of like" according to the law must be stored for 3 years. Even if the operator “does not store data about you”, then the State does it IN ADDITIONALLY. Believe me There is enough power, and any of your "jamb" 14 years ago - can go sideways if you sleep with your phone number / hardware, and so on! ASKING QUESTIONS MORE ACTIVELY, the more will be
Security measures! When buying a sim card / phone / when making payments!
1. NEVER buy sim cards for different cases (and even for one case), from one seller in real life (of course, not from the official communication store about this below), buy from Different, best of all, from different regions of the sim card (for example, the Carrier tariff), and different operators (your "love", for example, to the operator "MTS" may be critical for your search)! As for the different regions ("not native", it may be bad that the SIM card is "guest", since they are probably monitored separately - at least at the roaming level).
2. Buy sim cards already with a balance (starting) because then you will need to replenish the balance! And here there is already a surprise for you, and your data for RSKK! The telecom operator with the payment system has an agreement and a GATEWAY through which all interaction goes, I do not know if the point data is transmitted (transmitted) to the operator, but all other data is transmitted, and then contact the Payment system and find out the location of the Dealer outlet where you are replenished the balance, has no difficulty! Especially if you replenished your mobile phone (and what mail did you do it, or the mobile phone, from what IP address you went online, from whose computer, if in the Internet club you did it under video cameras!). Further, if the site was replenished, from which bank card (then RSKK has data about all accounts and cards, did you think otherwise?), or from which ATM / terminal, for example, a qiwi wallet was replenished (Are you sure that there were no cameras in the ATM or the place where you replenished, or nearby?). Moreover, there is evidence that all telecom operators "belong to the guys from RSKK", and your favorite QIWI wallet is the same!). Etc. There are many situations. You just have to THINK with your head always! There are many situations. You just have to THINK with your head always! There are many situations. You just have to THINK with your head always!
The most secretive replenishment of the balance is the payment cards "EKO" Unified Payment Card. Each operator has one. These cards have several advantages:
a) All EKOs have the same number (aka barcode), that is, it is almost impossible to determine where you have EKOs from, almost "anonymity"!
b) You can buy EKO almost everywhere (in any communication store), from a dealer, including at the bazaar (there are already few such places in Moscow / St. Petersburg).
Disadvantage: there are not many places where these cards are sold (in large cities).
In fact, telecom operators, and Kiwi is one but a legal organized criminal group.
3. Use mobile phones from different regions in your work, and purchased not in a communication salon (everything is recorded on video cameras, and transmitted as you should understand in RSKK, upon request, or even without a request). Buy mobile phones, either Chinese, or something else (although if you order from the Internet, these are additional "prints" in the form of Computer traces from the operator and from the site, plus you will receive a parcel from China. Why do you think goods from China for so long Do you think it right! Buying from "hands" in a tent can also be pale, because always when buying a mobile phone from a seller, a "tentman" takes a copy of his passport and takes passport data. And you are sure that he (or near), if there are no video cameras? and then they can immediately leave for you! Phones with "insignia" are pale! PCT, and so on. Since such phones are shipped from the Official Manufacturer to the Distributor, he imports into Russia (submits a customs declaration, do you think to pay taxes? NO, to control YOU, since the declaration contains IMEI codes, including, then the company sells phones for example Euroset (taking into account the same IMEI codes), then these phones come from the warehouse "at retail", where, when selling to you, they again remove the IMEI code that gives you out, since there are CAMERAS in all communication shops!
4. What technical means does RSKK have? ALL and Any!
a) And the means of wiretapping (for example, a "box" is attached to the bottom of the car, in which, among other things, a mobile phone, and this is a recording of movement (plus outdoor cameras from the roads), plus it is possible to record conversations (although they can also be filmed from telecom operators on Logs !
b) Signal jammers / communication signal jammers
c) Manual direction finders (although they are not always needed, because the operator has data on your current location), but it helps, for example, with special operations, when requesting data from a Person from the central office is "pale"
d) Scanning equipment (any range)
e) Any device that can be bought on Chinese sites, or in China. Plus there is hardware that you cannot buy on the Internet. For example, there is a "rumor" according to which - you can recover data from hard drives that are "erased" and burned-out hardware (not everything seems to be restored) Have you seen such hardware on sale?
4. Use software that changes the voice, location ("transferring you to another base station"), hardware numbers (although in some cases this is "pale", because if the operator "hooks" on the suppose voice, he will see that the phones are often changed / flashed - This will be a real "pale"!
5. Is the Skylink operator safe? And safe and not at the same time (compared to other mobile operators).
Pros:
A) Iron on Skylink's wiretapping - less.
B) You can use an external antenna and a cellular signal booster to hide your location!
Minuses:
A) Skylink is Rostelecom (state = KGB).
B) A small coverage area in Russia, and few subscribers find it easier to find you.