Hacker
Professional
- Messages
- 1,041
- Reaction score
- 852
- Points
- 113
The bandits, I am sure that many who are engaged in not entirely legal activities, are worried about the question: "Will they be looking for me?" Today, in how criminal cases are actually conducted.
So, as befits gentlemen, before starting a discussion, you need to "define the concepts"
OSA (ORM) - operatively search activities
Swindler - a person who is on the side of the law opposite to the Ministry of Internal Affairs
Garbage (cop) - a person serving in the Ministry of Internal Affairs
M-ka (cop car) - a car equipped with equipment "containing a base station"
Fraudster (scammer) - a person who has committed one or more crimes under Article 159, Part 2 and above
Let's get down to the topic of interest to us. How are scammers caught?
The process looks simple enough.
Step one - it endured, as they say garbage: "no body - no work." So on 159 there is no victim - no case. Comes endured to write a statement that he was divorced.
So, what will the victim write in the application? And nothing interesting: "I ask you to bring to justice an unknown person who, having abused my trust, misled me ...." And then all the details that she suffered knows about the swindler: phone number / card / kiwi / features of appearance, etc.
Actually, the first important detail that a swindler should understand is the amount of damage caused to the victim. The damage can be significant or not significant. Significant damage is regulated by note 2 to article 158 of the Criminal Code of the Russian Federation and cannot be less than 2500 rubles. Here is an important detail that our brother should know: if the damage is less than 10 thousand rubles. despite the fact that a series of crimes is not obvious for garbage, the case is initiated at 159 part 1 and sent to the inquiry department for investigation. What should we understand from this that if the damage is less than 10 thousand, then the rogue is relatively safe, because all that the inquiry department is capable of is to request a part by number after a month of keeping the case on the shelf, as a rule after that,
So the next point. suppose the damage caused to victim is more than $ 150. and it is considered significant (the significance of the damage is determined by the garbage at the place based on a number of factors) that we have: the case is opened and it is investigated by the opera. Everything here will depend on the district, region, city, specific garbage, and on anything, even if from that to the left by the garbage today lay in the morning or to the right. So much options. What is important to know here: by order of the Minister of Internal Affairs of the Russian Federation, all cases of fraud are initiated at the place of committing (APPLICATIONS). That is, they set up a fraudulent person in Moscow while sitting in St. Petersburg, they will initiate a case in Moscow, in a week they will knock out that the number of St. Petersburg and send it to St. Petersburg, they will say that the material has been worked out badly and will be sent back, in less than a couple of weeks the swindler has iron. The second point, when working in your region, be careful. Details on the phone number are obtained by sending an official request by the employees of the authorities to the cellular company, but, in almost any anti-fraud department, there is garbage whose wife / sister / lover works in a cellular company, and in this case, your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. The second point, when working in your region, be careful. Details on the phone number are obtained by sending an official request by the employees of the authorities to the cellular company, but, in almost any anti-fraud department, there is garbage whose wife / sister / lover works in a cellular company, and in this case, your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), qiwi, poison, etc. The second point, when working in your region, be careful. Details on the phone number are obtained by sending an official request by the employees of the authorities to the cellular company, but, in almost any anti-fraud department, there is garbage whose wife / sister / lover works in a cellular company, and in this case, your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc.
The third point of our saga. OSA The Phantom Menace.
First of all, the garbage will be asked for details on the rogue's phone numbers and the history of the movement of funds over the past six months for wallets / cards that have been lit up in the case.
What is the detail? This is a fucking table in Excel, where there is information about the Date of the event, the duration of the event, the type of event (sms, call in / out, Internet) IMEI of the subscriber, the subscriber number of the remote subscriber (who was called) IMEI of the remote subscriber, the address of the base station. In fact, there is still a fucking bunch of data flashing, but they are not important for understanding the process.
In the history of cash flow, everyone will see. And deposits and withdrawals and transfers within the system + IP address from which each transaction was made. That is, in the worst case, at this stage, the garbage knows at what point from what point (within a radius of 500 meters) what operations from the mobile the rogue did and knows from which IP addresses the operations in the wallets were carried out. That is, if the swindler did not use the means of anonymization, then he was already figured out. Home Internet operators keep logs of connections with weekend nodes for a month. That is, if point 2 was completed in less than a month, then the swindler burned down the hut (conditionally).
Fourth point. OSA Attack of the Clones.
Let it seem to many on this resource that I am exaggerating the capabilities of the Ministry of Internal Affairs, but the hare never fuck and these are scissors.
In part four of the Marlezon ballet, the fun begins. As a rule, most of the swindlers by this moment have already been approximately figured out. How? By detail. Few know how to use the left phone. Someone does not turn it off at night. Someone (especially gifted) turns it off, but does not know that when it is turned on and off, the phone sends a special kind of signal to the base station and it is not difficult to figure out where such a smart guy stores the phone. Plus, as a rule, the crook works from the same place, from a hut / cafe. Most people avoid public places such as shopping centers (and rightly there are cameras up to the ass), but it is much easier to sleep in a hut. What happens at this stage? And at this stage, the "face" is established. Garbage having data on the movements of the subscriber on base stations in a period of time can roughly estimate where and at what moment the "face" located. And here we turn to our dictionary of terms, M-ka is connected. Technically written out measures for the calculation of the "face" with the help of cop car. The last base station where the "face" was beating is determined (it is logical that the rogue acts according to the usual pattern and works from one place, or spends the night in the same place). M-ka drives up to the base station and gets into the monitoring and search mode for the known IMEI, after the rogue commits any transaction in the coverage area of the base station, control over his further gestures falls on cop car. And here's an interesting moment. M-ka begins to receive the most interesting: azimuth and distance of the tube. The crew moves towards the "face". When the House in which the "face" has settled is determined, the marching component of cop car (such a small suitcase, who leads the operator all the way to the rogue's phone). Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. When the House in which the "face" has settled is determined, the marching component of M-ki (such a small suitcase, who leads the operator all the way to the rogue's phone). Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. When the House in which the "face" has settled is determined, the marching component of cop car (such a small suitcase, who leads the operator all the way to the rogue's phone). Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office.
Bonus: M-ka does not work in 4G networks, and cannot call a 3G modem. So in this way you cannot find a tablet and a modem (they tried to find a stolen tablet in this way - it did not work)
Note: Information obtained by ORM is not evidence, serves only to establish something there, is not strong in jurisprudence. For the most part, ORMs are illegal to shit, therefore they are classified.
Stage five. OSA Revenge of the Sith.
You, dear readers, have probably guessed that now they will let "legs" go after the swindler. Yes sir. At the fourth point of the garbage, they found where the "face" sits, after which they copied it (perhaps even installed it). Next, the legs are exposed behind the face (PTP). Legs can be set for a maximum of 20 days (in the case of part 3 of Art. 159) or 7-14 in the case of part 2. What are legs: the legs are specially trained garbage, which at the Institute of the Ministry of Internal Affairs have been learning to graze crooks for five years, if anyone -that to you, comrades, he will tell you that he burned the surveillance of the PTP - he is liar. These people are pros. Even the most seasoned crooks cannot burn them with all their pumped up senses. In the case of exposing the legs for 20 days.
So our "face" was retreating. Now the garbage has, in addition to the information on the "left pipe", data about where the "person" actually goes and where he lives. Further, it is not a problem to calculate the real pipe. (if it's necessary)
Stage six. ORM New Hope.
So, everything is known about the swindler. where he lives, with whom he communicates, with whom he meets, whom he fucks in between the first and second, in other words EVERYTHING. For reference, the results of the PTP are for evidence in court. That's a twist, isn't it? Let's continue about our ORMs. What will the curious reader ask next? And then trash and waste begins. Everything that is stated below will not be confirmed in any official public document and is the personal experience of the author of the topic or his fiction, hello. What else can the garbage find out. And what else:
For example, I authoritatively notify you, dear colleagues, that Vkontakte responds to any letters drawn up on a letterhead indicating a pretentious heading like ORCH No. 10 of the MOSCOW Department of Internal Affairs, etc. I personally sent a letter with a request to provide the history of correspondence for the user from mail such as ivan76mamkutvoyu***@mail.ru and received an official response to this with the data of interest. Plus, there are ORMs providing garbage with the entire history of viber, icq correspondence from a swindler's mobile device during arrest. And even if everything is encrypted as shit, give a shit. The pipe was seized from the swindler, ICQ is tied to this pipe. find out the UIN and request a correspondence at the head office, who will argue that this is not so - get caught in the trash - you will find out. Also with the vibe. I'm not sure about Whatsapp it is not popular with crooks in my region. In extreme cases, they expose **** ets what tough measures, I personally saw how one swindler was put under control, his messages in the vibe were first read by a trained person, asserted, and only then they were sent to the addressee ...
Stage seven. OSA The Empire Strikes Back.
Let's talk about wiretapping.
A lot of fucking people don't understand how it works. So,% username%, it's time for revelations. The pipe is put on wiretapping only with the permission of a federal judge, provided that the operatives have proved to him such expediency by the results of previous ORM, but then the opera can use its authority or mislead to obtain a warrant. What does wiretapping look like? You gentlemen will NEVER find yourself being listened to. it is possible to determine that they are bearing, but that they never listen. Trash is usually listened to a specific IMEI, it looks like this: when a signal arrives at the connection with the listener, the recording from the microphone and the phone speaker is turned on. When listening to such recordings, it is clearly clear that the recording begins a few seconds before the beeps and goes exactly from the microphone, since all extraneous noises are heard. Hence the wiretapping method, which some of you could burn on your pipes, when the pipe heats up, blinks, quickly sits down, etc. there are artificial connections with the pipe to listen to the microphone. You need to get rid of such a pipe without regrets, since the SIM card will then be punched and a new pipe will be calculated, then the SIM card is also in the furnace. The easiest way to deal with wiretapping is a Bluetooth headset. from her nichrome will not be able to write. The main thing is to keep the pipe away so that the microphone cannot give out the essence of the conversations. Faces in such cases can simply wiretap the subscriber's number from the operator, it is sooo hard for garbage to do this. Wiretapping will be evidence in court, subject to a phonoscopic examination. Here you can chew on legal details for a long time, if there is an intelligent criminal lawyer on the forum, let him chew, I don't want to, I will heap up mistakes, they'll christen an * good,
Stage eight. OSA Return of the Jedi.
Now, my dear readers, who have not decided that I am a blunt paranoid, I will tell you the truth about how "paired" phones and other subtle points are calculated.
It's no secret for you that there is such a type of operator report as a detail. By the detail of the garbage, they can determine who, when with whom and for how long they talked. They have software that allows you to conveniently visualize the data of such an analysis in order to show them to the judge and request data on the rogue's accomplices.
But this is all bullshit. Trash frenzy and sadomy occurs when garbage turns to data analysts for help.
So, specialists of this kind usually work with two types of reports from mobile operators: billing and I do not know what this shit is called.
Billing is a document containing the following information - the time of the transaction, subscriber number, type of operation, IMEI, target number and a bunch of other junk. Such billing is exported from each base station for a certain period of time is just a list of IMEIs that appeared in the coverage area of the base station and it does not matter whether they were used for actions such as SMS calls, etc.
Here's an example of a recent investigation:
Men of non-traditional sexual orientation were bred to the grandmother of pensioners.
OCG from drug addicts. One was sitting in the hut, using the phone book, pecking at the numbers of pensioners and instilling in them that he was from the social service, I would not publish the details of the divorce, so that other sadomites would not learn anything for themselves. The shit accomplices went to the addresses to take out bucks from the huts of pensioners.
Drug addicts were "real pros" used only left-handed "disposable phones"
How were these clay-slugs caught? I'll tell you friends, for a bottle you can calculate not such pros.
Item times: Billing and huiling is taken from all base stations in the area of crime scenes.
Point two: An analysis is carried out in order to weed out permanent residents like those who are sitting at home and working (a week's history is taken for comparison) - only stray telephones remain. The names of who called or who were called are calculated. Thus, there are some Sadomites who walked around the huts. In this investigation, the sadomites each time used new clean phones, which did not prevent them from figuring out which ones. Then all the phones of the caller were calculated.
Point three: Requests for billing details and everything else for calculated phones in search of patterns: two phones were bought in one pawnshop. The pawnshop is taken out by the OMON forces, the pawnshop employees hand over the purchases, the pawnshop hands over the accomplices - the organized criminal group goes to the bunk for the next 10 years.
What should we take away from what has been said? There can always be weak points in any scheme. The roosters did not even have sopara telephones (personal) with them, only muddy pipes and then there was a clue. Companions are calculated once or twice according to such data, if someone did not understand how - welcome to the comments, I will explain in more detail.
Stage nine. OSA The Force Awakens.
In this section I am not going to tell you how ip and other things make their way. For online safety, read thematic resources. In this chapter, I'll talk about what else is in your garbage pocket and how to keep yourself safe.
It all depends on the laziness of the garbage. I give a guarantee, if you bred pensioners serially or, God forbid, threw a woman with a disabled child, they will take care of you with all their might. All rise up against such fallen ones.
Garbage has very funny things, as in the army they give blunt names to equipment, for example, they have two adjacent systems "hall" and "magnifying glass" well, isn't it a circus? So the "magnifying glass" system is designed to search for a subscriber in a crowd. You cannot resist this thing in any way. Just paranoid. I saw how it was used to calculate a swindler who was elusive as fucking Joe with other methods. They caught him with live bait and let his feet go.
Your safety is the lack of evidence at the time of your arrest, because if you WISH, sooner or later, you will be identified anyway. Scared to help analysts like in the case of junkies and still figure it out. Less evidence is your trump card. Black scheme? Change tubes and SIM cards as often as possible. Change the cards the same way. The fewer episodes you can prove, the better for you.
Rest assured that you will be divorced. Garbage only seems to be morons, they are subtle psychologists and will spin you so that it seems that you are not to blame and took you by mistake and caught a lump from the second floor - this is all a scam. After the very first meeting with the garbage, if they go free, they end up in the water. I understand that you are not idiots, but ENDS IN WATER. There are no exceptions. Tied up with all the affairs. no graters with accomplices nothing. They just went out. come up with a code word there, I don't know.
If you are stuck, do not confess. At least in my region there is a directive from the prosecutor's office that cases under Article 159 are accepted only if the swindler has confessed, since the garbage does not know how to investigate non-obvious crimes. There are too few experts on this topic, so use your legal right to remain silent. Article 51 of the Constitution of the Russian Federation. They will tell you if you are silent then you are guilty - be silent. You will be beaten - be silent, they will torture - be silent. And if they are sure of your guilt, they will torture you, believe me. I personally got a knee joint (so they wouldn't think that I was frightening here) in the process of torture (stretched like in the Middle Ages in the Inquisition), until I passed out from the pain, and then they overdid it a bit. And when I went to write a statement to the prosecutor's office, it turned out that the cameras did not work, and so I did and I went to be treated at my own expense. Keep in mind that they will only be tortured if you are certain that you are a criminal. They will try to break you, do not get fooled. Stand your ground, yours is silence. And how will the investigation go and figure out what is happening - bring up a lawyer and build a defense.
All the described methods may seem like a fairy tale to some forum participants. However, all the points were passed when the crooks were caught, who wrung out a total of less than 500k. The guys just stepped on, burned and did not want to change the phone. Garbage just began to take parts once a week, endured phoning and collected 70 episodes in two months. Plus, they proved to be organized crime groups because of their reluctance to change phones. I am silent about the roosters who bred pensioners, there it was a matter of principle to beat them up, but the swindler who was calculated in the crowd stole a little more than $ 3000.
Bonus pack.
About cameras. In shopping centers, cameras usually store a recording for a day (check for each specific shopping center). Outdoor cameras are up to a month, but the quality is such that everyone looks like Dzhigurda on them. Always be careful when approaching. I personally saw how the people were fired upon getting on the records of the registrars of vigilant citizens (security officers). That is, the cops came and looked at the recording, you can't see it, well, okay, and in the evening the employee was going to go home, and the swindler on his registrar showed up. Rarely, but it happens. When a card is punched in 100% of cases, they will ask for a video from an ATM. Bank stores 2 months. Banks of the first 10 month the rest in different ways. My recommendation is to buy a gauze bandage at the pharmacy. YOU are sabziro and no one will ever prove that sabziro is you, because read how to determine the correspondence of the "face" of a photograph. covering my face with a mask".
So, as befits gentlemen, before starting a discussion, you need to "define the concepts"
OSA (ORM) - operatively search activities
Swindler - a person who is on the side of the law opposite to the Ministry of Internal Affairs
Garbage (cop) - a person serving in the Ministry of Internal Affairs
M-ka (cop car) - a car equipped with equipment "containing a base station"
Fraudster (scammer) - a person who has committed one or more crimes under Article 159, Part 2 and above
Let's get down to the topic of interest to us. How are scammers caught?
The process looks simple enough.
Step one - it endured, as they say garbage: "no body - no work." So on 159 there is no victim - no case. Comes endured to write a statement that he was divorced.
So, what will the victim write in the application? And nothing interesting: "I ask you to bring to justice an unknown person who, having abused my trust, misled me ...." And then all the details that she suffered knows about the swindler: phone number / card / kiwi / features of appearance, etc.
Actually, the first important detail that a swindler should understand is the amount of damage caused to the victim. The damage can be significant or not significant. Significant damage is regulated by note 2 to article 158 of the Criminal Code of the Russian Federation and cannot be less than 2500 rubles. Here is an important detail that our brother should know: if the damage is less than 10 thousand rubles. despite the fact that a series of crimes is not obvious for garbage, the case is initiated at 159 part 1 and sent to the inquiry department for investigation. What should we understand from this that if the damage is less than 10 thousand, then the rogue is relatively safe, because all that the inquiry department is capable of is to request a part by number after a month of keeping the case on the shelf, as a rule after that,
So the next point. suppose the damage caused to victim is more than $ 150. and it is considered significant (the significance of the damage is determined by the garbage at the place based on a number of factors) that we have: the case is opened and it is investigated by the opera. Everything here will depend on the district, region, city, specific garbage, and on anything, even if from that to the left by the garbage today lay in the morning or to the right. So much options. What is important to know here: by order of the Minister of Internal Affairs of the Russian Federation, all cases of fraud are initiated at the place of committing (APPLICATIONS). That is, they set up a fraudulent person in Moscow while sitting in St. Petersburg, they will initiate a case in Moscow, in a week they will knock out that the number of St. Petersburg and send it to St. Petersburg, they will say that the material has been worked out badly and will be sent back, in less than a couple of weeks the swindler has iron. The second point, when working in your region, be careful. Details on the phone number are obtained by sending an official request by the employees of the authorities to the cellular company, but, in almost any anti-fraud department, there is garbage whose wife / sister / lover works in a cellular company, and in this case, your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. The second point, when working in your region, be careful. Details on the phone number are obtained by sending an official request by the employees of the authorities to the cellular company, but, in almost any anti-fraud department, there is garbage whose wife / sister / lover works in a cellular company, and in this case, your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), qiwi, poison, etc. The second point, when working in your region, be careful. Details on the phone number are obtained by sending an official request by the employees of the authorities to the cellular company, but, in almost any anti-fraud department, there is garbage whose wife / sister / lover works in a cellular company, and in this case, your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc. your IMEI will be pierced 15 minutes after filing an application. At the end of this stage, the garbage has the rogue's phone number, IMEI, its description (offline), kiwi, poison, etc.
The third point of our saga. OSA The Phantom Menace.
First of all, the garbage will be asked for details on the rogue's phone numbers and the history of the movement of funds over the past six months for wallets / cards that have been lit up in the case.
What is the detail? This is a fucking table in Excel, where there is information about the Date of the event, the duration of the event, the type of event (sms, call in / out, Internet) IMEI of the subscriber, the subscriber number of the remote subscriber (who was called) IMEI of the remote subscriber, the address of the base station. In fact, there is still a fucking bunch of data flashing, but they are not important for understanding the process.
In the history of cash flow, everyone will see. And deposits and withdrawals and transfers within the system + IP address from which each transaction was made. That is, in the worst case, at this stage, the garbage knows at what point from what point (within a radius of 500 meters) what operations from the mobile the rogue did and knows from which IP addresses the operations in the wallets were carried out. That is, if the swindler did not use the means of anonymization, then he was already figured out. Home Internet operators keep logs of connections with weekend nodes for a month. That is, if point 2 was completed in less than a month, then the swindler burned down the hut (conditionally).
Fourth point. OSA Attack of the Clones.
Let it seem to many on this resource that I am exaggerating the capabilities of the Ministry of Internal Affairs, but the hare never fuck and these are scissors.
In part four of the Marlezon ballet, the fun begins. As a rule, most of the swindlers by this moment have already been approximately figured out. How? By detail. Few know how to use the left phone. Someone does not turn it off at night. Someone (especially gifted) turns it off, but does not know that when it is turned on and off, the phone sends a special kind of signal to the base station and it is not difficult to figure out where such a smart guy stores the phone. Plus, as a rule, the crook works from the same place, from a hut / cafe. Most people avoid public places such as shopping centers (and rightly there are cameras up to the ass), but it is much easier to sleep in a hut. What happens at this stage? And at this stage, the "face" is established. Garbage having data on the movements of the subscriber on base stations in a period of time can roughly estimate where and at what moment the "face" located. And here we turn to our dictionary of terms, M-ka is connected. Technically written out measures for the calculation of the "face" with the help of cop car. The last base station where the "face" was beating is determined (it is logical that the rogue acts according to the usual pattern and works from one place, or spends the night in the same place). M-ka drives up to the base station and gets into the monitoring and search mode for the known IMEI, after the rogue commits any transaction in the coverage area of the base station, control over his further gestures falls on cop car. And here's an interesting moment. M-ka begins to receive the most interesting: azimuth and distance of the tube. The crew moves towards the "face". When the House in which the "face" has settled is determined, the marching component of cop car (such a small suitcase, who leads the operator all the way to the rogue's phone). Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. When the House in which the "face" has settled is determined, the marching component of M-ki (such a small suitcase, who leads the operator all the way to the rogue's phone). Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. When the House in which the "face" has settled is determined, the marching component of cop car (such a small suitcase, who leads the operator all the way to the rogue's phone). Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. Here the so-called direction finding occurs, that is, M-ka sends a call to the rogue's phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office. is calculated down to the apartment / office. s phone and terminates it before the connection is established. Thus, the "face" is calculated down to the apartment / office.
Bonus: M-ka does not work in 4G networks, and cannot call a 3G modem. So in this way you cannot find a tablet and a modem (they tried to find a stolen tablet in this way - it did not work)
Note: Information obtained by ORM is not evidence, serves only to establish something there, is not strong in jurisprudence. For the most part, ORMs are illegal to shit, therefore they are classified.
Stage five. OSA Revenge of the Sith.
You, dear readers, have probably guessed that now they will let "legs" go after the swindler. Yes sir. At the fourth point of the garbage, they found where the "face" sits, after which they copied it (perhaps even installed it). Next, the legs are exposed behind the face (PTP). Legs can be set for a maximum of 20 days (in the case of part 3 of Art. 159) or 7-14 in the case of part 2. What are legs: the legs are specially trained garbage, which at the Institute of the Ministry of Internal Affairs have been learning to graze crooks for five years, if anyone -that to you, comrades, he will tell you that he burned the surveillance of the PTP - he is liar. These people are pros. Even the most seasoned crooks cannot burn them with all their pumped up senses. In the case of exposing the legs for 20 days.
So our "face" was retreating. Now the garbage has, in addition to the information on the "left pipe", data about where the "person" actually goes and where he lives. Further, it is not a problem to calculate the real pipe. (if it's necessary)
Stage six. ORM New Hope.
So, everything is known about the swindler. where he lives, with whom he communicates, with whom he meets, whom he fucks in between the first and second, in other words EVERYTHING. For reference, the results of the PTP are for evidence in court. That's a twist, isn't it? Let's continue about our ORMs. What will the curious reader ask next? And then trash and waste begins. Everything that is stated below will not be confirmed in any official public document and is the personal experience of the author of the topic or his fiction, hello. What else can the garbage find out. And what else:
For example, I authoritatively notify you, dear colleagues, that Vkontakte responds to any letters drawn up on a letterhead indicating a pretentious heading like ORCH No. 10 of the MOSCOW Department of Internal Affairs, etc. I personally sent a letter with a request to provide the history of correspondence for the user from mail such as ivan76mamkutvoyu***@mail.ru and received an official response to this with the data of interest. Plus, there are ORMs providing garbage with the entire history of viber, icq correspondence from a swindler's mobile device during arrest. And even if everything is encrypted as shit, give a shit. The pipe was seized from the swindler, ICQ is tied to this pipe. find out the UIN and request a correspondence at the head office, who will argue that this is not so - get caught in the trash - you will find out. Also with the vibe. I'm not sure about Whatsapp it is not popular with crooks in my region. In extreme cases, they expose **** ets what tough measures, I personally saw how one swindler was put under control, his messages in the vibe were first read by a trained person, asserted, and only then they were sent to the addressee ...
Stage seven. OSA The Empire Strikes Back.
Let's talk about wiretapping.
A lot of fucking people don't understand how it works. So,% username%, it's time for revelations. The pipe is put on wiretapping only with the permission of a federal judge, provided that the operatives have proved to him such expediency by the results of previous ORM, but then the opera can use its authority or mislead to obtain a warrant. What does wiretapping look like? You gentlemen will NEVER find yourself being listened to. it is possible to determine that they are bearing, but that they never listen. Trash is usually listened to a specific IMEI, it looks like this: when a signal arrives at the connection with the listener, the recording from the microphone and the phone speaker is turned on. When listening to such recordings, it is clearly clear that the recording begins a few seconds before the beeps and goes exactly from the microphone, since all extraneous noises are heard. Hence the wiretapping method, which some of you could burn on your pipes, when the pipe heats up, blinks, quickly sits down, etc. there are artificial connections with the pipe to listen to the microphone. You need to get rid of such a pipe without regrets, since the SIM card will then be punched and a new pipe will be calculated, then the SIM card is also in the furnace. The easiest way to deal with wiretapping is a Bluetooth headset. from her nichrome will not be able to write. The main thing is to keep the pipe away so that the microphone cannot give out the essence of the conversations. Faces in such cases can simply wiretap the subscriber's number from the operator, it is sooo hard for garbage to do this. Wiretapping will be evidence in court, subject to a phonoscopic examination. Here you can chew on legal details for a long time, if there is an intelligent criminal lawyer on the forum, let him chew, I don't want to, I will heap up mistakes, they'll christen an * good,
Stage eight. OSA Return of the Jedi.
Now, my dear readers, who have not decided that I am a blunt paranoid, I will tell you the truth about how "paired" phones and other subtle points are calculated.
It's no secret for you that there is such a type of operator report as a detail. By the detail of the garbage, they can determine who, when with whom and for how long they talked. They have software that allows you to conveniently visualize the data of such an analysis in order to show them to the judge and request data on the rogue's accomplices.
But this is all bullshit. Trash frenzy and sadomy occurs when garbage turns to data analysts for help.
So, specialists of this kind usually work with two types of reports from mobile operators: billing and I do not know what this shit is called.
Billing is a document containing the following information - the time of the transaction, subscriber number, type of operation, IMEI, target number and a bunch of other junk. Such billing is exported from each base station for a certain period of time is just a list of IMEIs that appeared in the coverage area of the base station and it does not matter whether they were used for actions such as SMS calls, etc.
Here's an example of a recent investigation:
Men of non-traditional sexual orientation were bred to the grandmother of pensioners.
OCG from drug addicts. One was sitting in the hut, using the phone book, pecking at the numbers of pensioners and instilling in them that he was from the social service, I would not publish the details of the divorce, so that other sadomites would not learn anything for themselves. The shit accomplices went to the addresses to take out bucks from the huts of pensioners.
Drug addicts were "real pros" used only left-handed "disposable phones"
How were these clay-slugs caught? I'll tell you friends, for a bottle you can calculate not such pros.
Item times: Billing and huiling is taken from all base stations in the area of crime scenes.
Point two: An analysis is carried out in order to weed out permanent residents like those who are sitting at home and working (a week's history is taken for comparison) - only stray telephones remain. The names of who called or who were called are calculated. Thus, there are some Sadomites who walked around the huts. In this investigation, the sadomites each time used new clean phones, which did not prevent them from figuring out which ones. Then all the phones of the caller were calculated.
Point three: Requests for billing details and everything else for calculated phones in search of patterns: two phones were bought in one pawnshop. The pawnshop is taken out by the OMON forces, the pawnshop employees hand over the purchases, the pawnshop hands over the accomplices - the organized criminal group goes to the bunk for the next 10 years.
What should we take away from what has been said? There can always be weak points in any scheme. The roosters did not even have sopara telephones (personal) with them, only muddy pipes and then there was a clue. Companions are calculated once or twice according to such data, if someone did not understand how - welcome to the comments, I will explain in more detail.
Stage nine. OSA The Force Awakens.
In this section I am not going to tell you how ip and other things make their way. For online safety, read thematic resources. In this chapter, I'll talk about what else is in your garbage pocket and how to keep yourself safe.
It all depends on the laziness of the garbage. I give a guarantee, if you bred pensioners serially or, God forbid, threw a woman with a disabled child, they will take care of you with all their might. All rise up against such fallen ones.
Garbage has very funny things, as in the army they give blunt names to equipment, for example, they have two adjacent systems "hall" and "magnifying glass" well, isn't it a circus? So the "magnifying glass" system is designed to search for a subscriber in a crowd. You cannot resist this thing in any way. Just paranoid. I saw how it was used to calculate a swindler who was elusive as fucking Joe with other methods. They caught him with live bait and let his feet go.
Your safety is the lack of evidence at the time of your arrest, because if you WISH, sooner or later, you will be identified anyway. Scared to help analysts like in the case of junkies and still figure it out. Less evidence is your trump card. Black scheme? Change tubes and SIM cards as often as possible. Change the cards the same way. The fewer episodes you can prove, the better for you.
Rest assured that you will be divorced. Garbage only seems to be morons, they are subtle psychologists and will spin you so that it seems that you are not to blame and took you by mistake and caught a lump from the second floor - this is all a scam. After the very first meeting with the garbage, if they go free, they end up in the water. I understand that you are not idiots, but ENDS IN WATER. There are no exceptions. Tied up with all the affairs. no graters with accomplices nothing. They just went out. come up with a code word there, I don't know.
If you are stuck, do not confess. At least in my region there is a directive from the prosecutor's office that cases under Article 159 are accepted only if the swindler has confessed, since the garbage does not know how to investigate non-obvious crimes. There are too few experts on this topic, so use your legal right to remain silent. Article 51 of the Constitution of the Russian Federation. They will tell you if you are silent then you are guilty - be silent. You will be beaten - be silent, they will torture - be silent. And if they are sure of your guilt, they will torture you, believe me. I personally got a knee joint (so they wouldn't think that I was frightening here) in the process of torture (stretched like in the Middle Ages in the Inquisition), until I passed out from the pain, and then they overdid it a bit. And when I went to write a statement to the prosecutor's office, it turned out that the cameras did not work, and so I did and I went to be treated at my own expense. Keep in mind that they will only be tortured if you are certain that you are a criminal. They will try to break you, do not get fooled. Stand your ground, yours is silence. And how will the investigation go and figure out what is happening - bring up a lawyer and build a defense.
All the described methods may seem like a fairy tale to some forum participants. However, all the points were passed when the crooks were caught, who wrung out a total of less than 500k. The guys just stepped on, burned and did not want to change the phone. Garbage just began to take parts once a week, endured phoning and collected 70 episodes in two months. Plus, they proved to be organized crime groups because of their reluctance to change phones. I am silent about the roosters who bred pensioners, there it was a matter of principle to beat them up, but the swindler who was calculated in the crowd stole a little more than $ 3000.
Bonus pack.
About cameras. In shopping centers, cameras usually store a recording for a day (check for each specific shopping center). Outdoor cameras are up to a month, but the quality is such that everyone looks like Dzhigurda on them. Always be careful when approaching. I personally saw how the people were fired upon getting on the records of the registrars of vigilant citizens (security officers). That is, the cops came and looked at the recording, you can't see it, well, okay, and in the evening the employee was going to go home, and the swindler on his registrar showed up. Rarely, but it happens. When a card is punched in 100% of cases, they will ask for a video from an ATM. Bank stores 2 months. Banks of the first 10 month the rest in different ways. My recommendation is to buy a gauze bandage at the pharmacy. YOU are sabziro and no one will ever prove that sabziro is you, because read how to determine the correspondence of the "face" of a photograph. covering my face with a mask".