Man
Professional
- Messages
- 3,046
- Reaction score
- 572
- Points
- 113
“I’ll tell you how they take it into development and how they check it. Everything depends on the situation. There are two approaches: on a stick or “as it goes”.
The first stage is obtaining information. If the drain comes from the clients of the platforms or competitors, it is important to what extent it is confirmed by facts. Sometimes they even bring video from cameras so that it is clear how the system of passage is carried out when receiving cash and storing documents.
If there is no verified information, no one will do anything, because the exhaust is unclear, and there are already plenty of things to do. If good information came from RosFin, they look at who is pouring non-cash, and you create problems for those who poured. As a rule, such problems are then resolved, but on the condition that the client drains the platform. Then everything depends on the intelligence of the operatives. Yes, in general, everything depends on the interest, literacy and agility of specific employees.
Then according to the circumstances. If there are phones, you immediately turn on wiretapping and SITC, burn all working duplicate phones. Now you can listen in and track not just one phone, but the entire server. And there can be a thousand. Personally, I haven't tried it, but the guys from Department K do it. I haven't figured out how it works, but I understood that you can monitor one number, and the operator gives access to the entire server to which the subscriber is linked. Well, and in parallel, you can rummage around in whatever you want.
The committee has it easier with technology. They can very quickly (the very next call) turn on the one they called or who called the monitored number. And they can drag the ruling to court retroactively. In short, regular communication is not a problem at all. With WhatsApp and other crap, everything is more complicated. The committee can duplicate WhatsApp through operators, but so far they use it only for operational purposes and for the court. They do not declassify it so that rumors do not start, and people do not start encrypting themselves in messengers.
There is an opinion that if there are two phones, and the second one is turned on for only 30 seconds to receive an SMS, then it is unrealistic to track.
Realistic!
You can burn both and establish the exact geolocation. When the phone is turned on, it is registered on the tower, and tracking is a matter of technology. Especially if it is turned on in the same place.
And you don’t always even need to run around the floors with the device. There are many towers and you can roughly position it. Each time the phone will jump to different towers, and you can estimate the entrance where the villain is. People run around the floors when they are looking for doubles or the exact location of the phone.
Is it possible to hide the GEO of a phone?I can't say for sure. IP telephony has been introduced now. And according to the K-shniks (they are all switching to them themselves), it's really hard to track a phone. The SIM card has no number, there is no number of your own (you choose which number to call yourself, it will be determined), the IMEI is not transmitted. But how long such a panacea will last is unknown. I haven't personally tried it. In theory, you can unravel this, but only if you are a real terrorist number one. And all countries are looking for you. Because everything is via VPN, and only through several countries.
« They learned to track mails and wallets a long time ago. No problems at all. All transactions, IP, etc. Services provide what you request. IP entry, exit, location, affiliation. Now about correspondence. Gmail provides data, the rest: Yahoo, Hotmail have no representative offices. But unofficially, through hacking, everything is possible.
Sometimes third-party hackers are involved.
Android is the most leaky OS. Screenshots from phones can only be obtained from those who have been given a virus or software installed. It is not so easy to do. Google certainly does not have such a function. Well, or certainly not for the Ministry of Internal Affairs.
I cannot give a virus to iOS. I personally have not heard of such a thing. I think the NSA has full access. The Americans can generally control any phone without any problems. The tales that Apple does not give out keys are only for the public. And if WhatsApp is registered to a left number in another country, this will not help you, the traffic still goes through a local operator.
Telegram numbers can only be determined unofficially.
Operators provide data to find out the exact apartment by IP without any problems, even if the IP is dynamic .
Installing equipment in an office or a car is not difficult. If you are lucky, it can be done without problems during maintenance at the official dealers. There are a lot of buts with the apartment... What about the neighbors? Are there any contacts? They can simply leak it. But this is the task of the BSTM (Bureau of Special Technical Measures), their structural division is the K department, and there everything is fine with technical measures. They are the ones who listen in and remove information: mail, websites, the entire Internet. The K department has departments for wiretapping and technicians for installation. Wiretapping is simply online listening and decoding. Technicians are those who install the equipment.
How to install is a field unplowed for imagination. Basically, if there is no way to enter the apartment (office), then they drill from the neighboring apartment and go ahead. Or they throw it through the air duct, but the problem is that usually you can only hear the kitchen and bathroom and the neighbors are disturbing.
According to the standards, two crews follow the car, but now it’s easier – throw a beacon and you drive at least a kilometer away. It’s hard to whip. The cars are different, inconspicuous. They don’t give certificates, they’re all legends, the numbers can’t be checked. All attempts by employees to check – the special service will immediately ask the question: what the hell. The traffic police will tell you that the car is registered to the company. Such a cover.
The beacon is an ordinary small box, but there are different ones. The easiest way is to put it on a magnet under the bumper. If the car has a satellite, for example, Caesar, Arkan, etc., then they track via satellite. By the way, all satellites have a microphone and it’s easier to listen. I haven’t heard about GLONASS in practice, but I’m sure that there is a microphone too. Nobody bothers that much.
To listen to the car, you need to equip it. This is done either during maintenance, when they agree with the dealer, or they simply open the door when the owner is far away and install a scanner.
Wiretapping in public places is also used. Recording equipment can be different, depending on the purpose. If a bug and a dictaphone, then they are also different, depending on the recording time. The longer the recording and the range, the larger the device. If everything is spontaneous and they don’t know the point, then they won’t be able to record. There’s simply no one.
Let’s imagine a situation: they’re listening to you through 3-4 tables in a cafe, you’re not speaking very loudly. Yes, there are devices that amplify the sound. But if they couldn’t install anything in advance, then you can programmatically remove the noise and stretch the sound by frequencies. That’s why they record any sound. But if they’re working on you and they know which restaurant you chose, they’ll seat you at a charged table or charge it during the play. Well, or they’ll record the sound with a directional microphone. But it’s easier to stick a microphone under the table.”
“I’ll give you some advice.
You can hide your accounting in any country except Russia. And you need to make a virtual machine in the cloud and store the information there. There was a case when some smart guys stored servers at the Kurchatov Institute. You can’t just go there, everything is secret. While they were going in, the servers had already been extinguished and taken out.
When the servers are abroad, it’s a question of resonance and the presence of evidence. If they work on terrorism, corruption at the level of regional leaders, they will ask. But no one will bother with this much, although you can work through Interpol. In fact, complete carte blanche, complete mutual assistance and support from almost all countries only on terrorism. They don’t give such opportunities for cash.
Regarding the evidence base, open the sentences under Article 172 of the Criminal Code of the Russian Federation in the Moscow City Court and read them. All the evidence will be described there. Accordingly, everything on which the accusation was based must be skillfully avoided. But usually, if the site is large, there is always a former employee of the authorities on staff, he should be in the know. By the way, if the casher is no longer working, it is almost impossible to pull him up for the past. I do not remember such a thing from practice. Usually they slap active ones. There are enough blockheads as it is, without having to deal with former ones.
For the cashers to take prepayment to filter out the operatives is complete nonsense. The employees have thrown real money hundreds of times to control the flows. The committee members and the Central Administration of the Ministry of Internal Affairs generally have trap offices. And there is also an apparatus of infiltrators. These are guys who live a completely different life. If you need an office with a turnover - they register it, you need an expensive car - they give it to you. With a serious turnover, a torpedo will be driven in without problems.
If there is no trap office, then you take a businessman under your control, and pull it from his accounts. You can even write a letter to the tax office (but we've only asked once in all this time) that for the purposes of operational search activities we ask for assistance and to send money there. VAT is also of interest to the Economic Security and Defense Ministry. And in both forms: when you take it as an offset or reimburse it (this is a separate branch of swindlers). If the first option is 199 of the Criminal Code, then the second is 159, part 4.
Regarding bribes. It's better not to offer a bribe if you don't know how or don't have connections. You can get caught for giving a bribe to an official, and that's a different sentence. Until 2017, there was a practice for any topic where money is involved. A trained operative interviewed the detainees, who could change the subject of the conversation to giving a bribe without a direct demand. Thus, leading the person to offer a bribe. This process was secretly recorded on video.
After handing over the money, the person received a criminal case for the first crime and for trying to sort things out. But now this shop has been closed down on the orders of the prosecutor's office. But just as they closed it, they can open it again.
It is better to wait and in three or four days someone will definitely come to you and offer to resolve the issue. The terms, prices and quality of this offer are strictly individual. Look at the situation to see whether you can trust this person. If this is a former employee, then rest assured that he did not come just like that, and most likely, he will resolve the issue.
If no one came, then you should look for a way out to the security officials occupying key links, for example, the head of the department and above, who can influence the situation. And it is better to contact trusted persons.
Doing it yourself is a thankless task. Offer little - they will consider it an insult, too much - they will be afraid of provocation from the office. As a rule, familiar lawyers or former employees are used for this.
In general, it is better not to give money. Spend it on a smart lawyer, it is many times more useful. And, as practice shows, less expensive."
The first stage is obtaining information. If the drain comes from the clients of the platforms or competitors, it is important to what extent it is confirmed by facts. Sometimes they even bring video from cameras so that it is clear how the system of passage is carried out when receiving cash and storing documents.
If there is no verified information, no one will do anything, because the exhaust is unclear, and there are already plenty of things to do. If good information came from RosFin, they look at who is pouring non-cash, and you create problems for those who poured. As a rule, such problems are then resolved, but on the condition that the client drains the platform. Then everything depends on the intelligence of the operatives. Yes, in general, everything depends on the interest, literacy and agility of specific employees.
Then according to the circumstances. If there are phones, you immediately turn on wiretapping and SITC, burn all working duplicate phones. Now you can listen in and track not just one phone, but the entire server. And there can be a thousand. Personally, I haven't tried it, but the guys from Department K do it. I haven't figured out how it works, but I understood that you can monitor one number, and the operator gives access to the entire server to which the subscriber is linked. Well, and in parallel, you can rummage around in whatever you want.
The committee has it easier with technology. They can very quickly (the very next call) turn on the one they called or who called the monitored number. And they can drag the ruling to court retroactively. In short, regular communication is not a problem at all. With WhatsApp and other crap, everything is more complicated. The committee can duplicate WhatsApp through operators, but so far they use it only for operational purposes and for the court. They do not declassify it so that rumors do not start, and people do not start encrypting themselves in messengers.
There is an opinion that if there are two phones, and the second one is turned on for only 30 seconds to receive an SMS, then it is unrealistic to track.
Realistic!
You can burn both and establish the exact geolocation. When the phone is turned on, it is registered on the tower, and tracking is a matter of technology. Especially if it is turned on in the same place.
And you don’t always even need to run around the floors with the device. There are many towers and you can roughly position it. Each time the phone will jump to different towers, and you can estimate the entrance where the villain is. People run around the floors when they are looking for doubles or the exact location of the phone.
Is it possible to hide the GEO of a phone?I can't say for sure. IP telephony has been introduced now. And according to the K-shniks (they are all switching to them themselves), it's really hard to track a phone. The SIM card has no number, there is no number of your own (you choose which number to call yourself, it will be determined), the IMEI is not transmitted. But how long such a panacea will last is unknown. I haven't personally tried it. In theory, you can unravel this, but only if you are a real terrorist number one. And all countries are looking for you. Because everything is via VPN, and only through several countries.
« They learned to track mails and wallets a long time ago. No problems at all. All transactions, IP, etc. Services provide what you request. IP entry, exit, location, affiliation. Now about correspondence. Gmail provides data, the rest: Yahoo, Hotmail have no representative offices. But unofficially, through hacking, everything is possible.
Sometimes third-party hackers are involved.
Android is the most leaky OS. Screenshots from phones can only be obtained from those who have been given a virus or software installed. It is not so easy to do. Google certainly does not have such a function. Well, or certainly not for the Ministry of Internal Affairs.
I cannot give a virus to iOS. I personally have not heard of such a thing. I think the NSA has full access. The Americans can generally control any phone without any problems. The tales that Apple does not give out keys are only for the public. And if WhatsApp is registered to a left number in another country, this will not help you, the traffic still goes through a local operator.
Telegram numbers can only be determined unofficially.
Operators provide data to find out the exact apartment by IP without any problems, even if the IP is dynamic .
Installing equipment in an office or a car is not difficult. If you are lucky, it can be done without problems during maintenance at the official dealers. There are a lot of buts with the apartment... What about the neighbors? Are there any contacts? They can simply leak it. But this is the task of the BSTM (Bureau of Special Technical Measures), their structural division is the K department, and there everything is fine with technical measures. They are the ones who listen in and remove information: mail, websites, the entire Internet. The K department has departments for wiretapping and technicians for installation. Wiretapping is simply online listening and decoding. Technicians are those who install the equipment.
How to install is a field unplowed for imagination. Basically, if there is no way to enter the apartment (office), then they drill from the neighboring apartment and go ahead. Or they throw it through the air duct, but the problem is that usually you can only hear the kitchen and bathroom and the neighbors are disturbing.
According to the standards, two crews follow the car, but now it’s easier – throw a beacon and you drive at least a kilometer away. It’s hard to whip. The cars are different, inconspicuous. They don’t give certificates, they’re all legends, the numbers can’t be checked. All attempts by employees to check – the special service will immediately ask the question: what the hell. The traffic police will tell you that the car is registered to the company. Such a cover.
The beacon is an ordinary small box, but there are different ones. The easiest way is to put it on a magnet under the bumper. If the car has a satellite, for example, Caesar, Arkan, etc., then they track via satellite. By the way, all satellites have a microphone and it’s easier to listen. I haven’t heard about GLONASS in practice, but I’m sure that there is a microphone too. Nobody bothers that much.
To listen to the car, you need to equip it. This is done either during maintenance, when they agree with the dealer, or they simply open the door when the owner is far away and install a scanner.
Wiretapping in public places is also used. Recording equipment can be different, depending on the purpose. If a bug and a dictaphone, then they are also different, depending on the recording time. The longer the recording and the range, the larger the device. If everything is spontaneous and they don’t know the point, then they won’t be able to record. There’s simply no one.
Let’s imagine a situation: they’re listening to you through 3-4 tables in a cafe, you’re not speaking very loudly. Yes, there are devices that amplify the sound. But if they couldn’t install anything in advance, then you can programmatically remove the noise and stretch the sound by frequencies. That’s why they record any sound. But if they’re working on you and they know which restaurant you chose, they’ll seat you at a charged table or charge it during the play. Well, or they’ll record the sound with a directional microphone. But it’s easier to stick a microphone under the table.”
“I’ll give you some advice.
You can hide your accounting in any country except Russia. And you need to make a virtual machine in the cloud and store the information there. There was a case when some smart guys stored servers at the Kurchatov Institute. You can’t just go there, everything is secret. While they were going in, the servers had already been extinguished and taken out.
When the servers are abroad, it’s a question of resonance and the presence of evidence. If they work on terrorism, corruption at the level of regional leaders, they will ask. But no one will bother with this much, although you can work through Interpol. In fact, complete carte blanche, complete mutual assistance and support from almost all countries only on terrorism. They don’t give such opportunities for cash.
Regarding the evidence base, open the sentences under Article 172 of the Criminal Code of the Russian Federation in the Moscow City Court and read them. All the evidence will be described there. Accordingly, everything on which the accusation was based must be skillfully avoided. But usually, if the site is large, there is always a former employee of the authorities on staff, he should be in the know. By the way, if the casher is no longer working, it is almost impossible to pull him up for the past. I do not remember such a thing from practice. Usually they slap active ones. There are enough blockheads as it is, without having to deal with former ones.
For the cashers to take prepayment to filter out the operatives is complete nonsense. The employees have thrown real money hundreds of times to control the flows. The committee members and the Central Administration of the Ministry of Internal Affairs generally have trap offices. And there is also an apparatus of infiltrators. These are guys who live a completely different life. If you need an office with a turnover - they register it, you need an expensive car - they give it to you. With a serious turnover, a torpedo will be driven in without problems.
If there is no trap office, then you take a businessman under your control, and pull it from his accounts. You can even write a letter to the tax office (but we've only asked once in all this time) that for the purposes of operational search activities we ask for assistance and to send money there. VAT is also of interest to the Economic Security and Defense Ministry. And in both forms: when you take it as an offset or reimburse it (this is a separate branch of swindlers). If the first option is 199 of the Criminal Code, then the second is 159, part 4.
Regarding bribes. It's better not to offer a bribe if you don't know how or don't have connections. You can get caught for giving a bribe to an official, and that's a different sentence. Until 2017, there was a practice for any topic where money is involved. A trained operative interviewed the detainees, who could change the subject of the conversation to giving a bribe without a direct demand. Thus, leading the person to offer a bribe. This process was secretly recorded on video.
After handing over the money, the person received a criminal case for the first crime and for trying to sort things out. But now this shop has been closed down on the orders of the prosecutor's office. But just as they closed it, they can open it again.
It is better to wait and in three or four days someone will definitely come to you and offer to resolve the issue. The terms, prices and quality of this offer are strictly individual. Look at the situation to see whether you can trust this person. If this is a former employee, then rest assured that he did not come just like that, and most likely, he will resolve the issue.
If no one came, then you should look for a way out to the security officials occupying key links, for example, the head of the department and above, who can influence the situation. And it is better to contact trusted persons.
Doing it yourself is a thankless task. Offer little - they will consider it an insult, too much - they will be afraid of provocation from the office. As a rule, familiar lawyers or former employees are used for this.
In general, it is better not to give money. Spend it on a smart lawyer, it is many times more useful. And, as practice shows, less expensive."