How intelligence agencies calculate by mobile phone

Lord777

Professional
Messages
2,578
Reaction score
1,520
Points
113
There are a huge number of myths and conjectures about how exactly an anonymous mobile phone number can be found. We know the truth and now we will share it.

In reality, the main tool of the investigator: statistics, phone and head.

There are three common versions: direction finding, i.e. determine the source of the radio signal, calculate it with special equipment at the base stations of the cellular network, and calculate it through various hidden features that are supposedly specially available in each phone.

We participated in a real investigation of a real case, where the criminal was identified by his mobile phone. And let's say this: the first version contains a little truth, but the main method of capture has nothing to do with all three.

Generally speaking, the investigation and criminologists only use cool special equipment and expensive equipment in movies. In reality, the main tool of the investigator: his head and pieces of paper. And the main method - the language will not turn to say "deduction" - let's call it "search for patterns" or "statistics". And then there's such a thing as Time. Time is always against anonymity: we do some things too timely, and some things not at all on time. And if there are logs of our cases with timestamps somewhere , we can't hide. And logs in mobile communication are kept for each byte. Read more later.

How do they calculate who works with the left SIM card?​

You won't believe it: on the "leading" phone - your real one. After carefully reading the next paragraph, you will understand how easy, simple and fast everything is. The description uses the term "activation" - this is the moment when the "anonymous" device went online. So, let's go, let's look at different situations:

Situation one: You use an "anonymous" mobile phone, but the real one is nearby and turned on. Investigators request logs of the entire cell in which the "anonymous" device works (worked). That's all they'll need to track you down (not just in hot pursuit, but in a week or a month, slowly, in their office chair, over a cup of coffee). They make recursive samples based on the power-on intervals and see who else was in the cell except for the "anonymous" device. For example, in one cell there were 1000 more phones turned on. The next time you turn on 500 of those that were the first time. At the next stage-20 of those who were in the first and second time. Most often, it is possible to find exactly a couple of phones that do not leave the cell from the logs of three or four inclusions. Less often, more inclusions are required: in this case, you can try to break through the history by the numbers of multiple matches, as well as their owners. If this is a grandmother of 90 years, of which she has had the number for 10 years and she has not left the apartment for 5 years-then, obviously, the option disappears.

The criminal turned on the phone, sent a text message demanding a ransom, and turned it off. A day later, I turned it on, called to discuss the terms of the buyout, and turned it off. I turned it on for the third time, gave you the meeting place and time, and turned it off. We studied the logs for three "inclusions" - who was in the cell all three times at that moment. From the second "reconciliation" there are four numbers left, from the third - one.

Situation two: You use an "anonymous" mobile phone, but you carefully turn off the real one in advance. Incredibly, you've only made it easier for the investigators. They will simply see who is disconnected - it is disconnected (the phone sends a signal about disconnection to the network), and did not leave the network shortly before the appearance of "anonymous". We can safely say that there will be only a few of them in the cell, or even you alone. To clarify the data, you can compare who turned on after disabling "anonymous". And, just, punch on the grannies and others. As you can see, disabling this device when using the "left" only worsens anonymity.

Situation three: You leave the real phone at home turned on, and you go to another cell, and only there turn on "anonymous". Think it's a clever plan? But nifiga. Three factors still give away your real device. First, the same scheme is being worked out as in the first situation, only not for one cell, but for several. First one at a time, then the next ones, and so on until they come to comparing the cell of the "anonymous" with the cell of the real one. Secondly and most importantly: Your device is at home without an owner and cannot answer calls. Therefore, sooner or later there will be missing ones, which are also visible in the logs. You just need to compare which device was missed at all times "inclusion" of anonymous. Do you think many of your callers don't pick up the phone all the time when you leave anonymous? No one but your real phone! In addition, this method is very useful in general search: investigators can very quickly call the numbers that remain after comparing the cell logs. And if the phone is not taken - in the suspects. Third, you can't leave a real phone anywhere - in different places every time. It's probably at your home.

Situation four: You turn off the real phone at home, and you go to another cell, and only there turn on "anonymous". See situation #3 + situation #2

It turns out that the whole scheme works on the fact that several inclusions are made from one number. That is, if you leave the number only once and then throw out the SIM card and phone , it will be impossible to find it?

This will only help if the "case" is yours for one time and there were no other similar cases and will not be any more. That is, the reality of all real "cases" - will not help. Changing phone numbers doesn't make it any harder to find a real phone number. For example, in the same example about blackmail: how to change the number will help - after all, the victim is the same calls are made. Investigators will simply break through not one number of 3 inclusions, but three inclusions of different numbers. Similarly, "dark deeds" on the Internet - numbers are easily combined in a common "case". Let's say more-frequent number changes only worsen security because investigators will get groups of numbers and will be able to easily break through, for example, where the SIM cards come from. And cover you red-handed during the purchase of new ones or go to the "seller" who will make a "robot" or merge the number from which you called him. Anonymity is not a lack of identification data. This simply cannot happen in the modern world. Anonymity is a good imitation of an ordinary, but not a real person.

What will give the security services a real phone number?​

We looked at how easy and simple it is to "break through" the real number of a suspect to the security forces using his "anonymous" one. But what will give you information about the real phone? Yes, all. In addition to information about who the number is issued to, investigators will see who you called. There are probably many of them who know you personally. They will see who added funds to your account and how. Most likely, there are also payments from a real card via an ATM or from a real Webmoney wallet, etc. That is, in fact, you have arrived.

How do I track my mobile phone?​

A task force with a manual direction finder is being moved to the location of the cell where the suspect's phone is located. This is not a screen with a dot, as shown in movies, but a simple radio receiver with an arrow that shows the signal strength and an antenna in the shape of the letter H, letter W, tricky tube or hyperbolic / parabolic dish (often several antennas are included for different operating conditions). The base station has information about the exact frequency that the desired device is currently operating on. The operator adjusts the receiver to this frequency, twirls the antenna around and looks at the arrow. Where the signal is strongest is where it goes. Enters the entrance, climbs the stairs and measures the signal. It finds the desired floor, then the apartment, and that's it, "anonymity" is over. In the case we observed, the time from the entrance of the "gazelle" operas to the exit under the white handle was 25 minutes.

So what should I do? Is anonymity a myth?​

Above, we discussed in detail that having a real personal mobile phone, we will never be anonymous, even from a newly purchased new phone and a SIM card just bought in the alley without registration. As we have already said, accessible anonymity is a good imitation of an ordinary, but not a real person. And the absence of personality in general in our modern information realities is simply impossible. After all, here you are, a person, sitting right here and reading this article. And there are Life Internet counters and others at the bottom.

Real hackers, whose freedom, and perhaps even their life, depends on anonymity, do not use mobile phones in everyday life. They don't use it at all. Only one-time calls, Skype, etc.And they do not have a "daily" life. Eternal darkness, non-existence. No friends, no relatives, no habits and "favorite" places. That's what anonymity is. But, in fact, the Network has a full-fledged other life, other friends and other "places". And, often, it will not only be no worse, but also better than in real life. So not everything is so sad. Just not like most people. However, this is no longer "anonymity". You have a name, even a nickname, but they know you by it, you have Internet friends and places where you can be found online. You can even be "punished" even without a trip to Siberia. Thus, it is easy to understand that not only anonymity is conditional, but also freedom, and "crime" and "laws" are not the same, but relative to society. And "societies" are different.

After learning a little about how investigators work, you can take steps to improve security on a case-by-case basis: for example, in situation # 3, you can install an answering machine on a real phone or ask a friend to answer if they call. Register a real phone number for a real grandmother to pass the "filter for grandmother". Try to randomly combine situations, leave your phone in different places, and so on. This will somewhat complicate the work of the investigators, but it will also complicate your "dark activities". Will X-hour help? Far from a fact.
 
Top