How the secret services are watching you

Cloned Boy

Professional
Messages
1,076
Reaction score
820
Points
113
Did you know that every taxi ride, phone call, and even like on a social network is tracked by the secret services and can play a cruel joke on you?
Surveillance covers many aspects of our lives: covert surveillance, data collection from telecom operators, open-source intelligence, and even access to closed company databases. These methods are completely legal under Russian law, and in the world in general, but what does this mean for us?
Today I will tell you how exactly the secret services can track you and how you can determine your location even if your GPS is turned off.
Read the topic to the end and find out whether the secret services are tracking you or not. Enjoy reading!


Contents:
  • Collecting information via phone
  • Determining the location
  • Software
  • How to protect your phone
  • Movement control
  • Video surveillance
  • Facial recognition system
  • Transfer of your data
  • How will they find you?
  • Social media
  • Personal data
  • Are you being followed?

Speaker 1:
Did you know that every taxi ride you take, every like you make on a social network, every phone call you make is tracked by the secret services and can play a cruel joke on you? In fact, surveillance can take over many aspects of our lives. Video surveillance, data collection, access to various secrets, tracking your movements. These methods are legal for the secret services and are not prohibited by Russian law.
Well, actually, and not only by Russian law. And today I will tell you how the secret services can track you and what this can mean for you. So watch the video to the end and you will know, well, if not about all, then about most of the most popular ways in which you can be tracked.

Collection of information via phone.
Speaker 1:
Let's start, of course, with mobile phones, smartphones, which collect data about you.
There have been many rumors that phones, smartphones, can record and process information that you say when you are near the phone, that is, without even talking on it. But recently this was confirmed, and a little unexpectedly. A fairly large group of people living in the United States filed a lawsuit against Apple, claiming that when they discussed something near the phone, say sneakers or certain restaurants, then they began to see ads for these very sneakers and restaurants.
In court, Apple did not deny this circumstance and offered everyone who was subjected to such conditional wiretapping a fairly generous compensation of 20 US dollars, that is, about 2,000 rubles. This is the amount that Apple estimated for the violation of privacy that was committed.

Speaker 3:
Listen, well, 20 dollars is just ridiculous, they have been wiretapping my whole life.

Speaker 1:
Look, as far as I understand, the trial is not over yet, and $20 is a capitulation offered by Apple itself. The court may decide that it should be charged more, so $20 is the amount that Apple has assessed the lawsuit. But since this question has arisen, I wonder what your general attitude is to the fact that the company offered only $20 for violating privacy and essentially wiretapping conversations near the phone.
Write in the comments what you think about this, that is, is $20 too little or maybe too much, or maybe Apple has the right to do this or not. In general, write your opinion in the comments, I will be interested to read it. But if we talk about collecting information, of course, this can happen not only in the USA. It can happen in Europe, in Asia, and of course in Russia.
And in theory, not only Apple phones can listen to you, but also phones on the Android operating system and smart speakers, and basically any other devices that have a microphone and at least some kind of operating system. It is clear that most likely this data will be analyzed solely to understand what advertising to show you and will not leak anywhere else. Moreover, most likely no one will even listen to them, this will be processed by artificial intelligence, which in principle is not interested in you.
But nevertheless, on any such device it is enough to slightly adjust the program code and this device will already be able to record your conversation and forward it somewhere where it is not needed.

Determining location.
Speaker 1:
The next method of tracking concerns determining your location, and GPS is not even needed for this. Even if you have the most ordinary push-button phone, well, as they say, an ordinary dialer, then if desired, you can quite easily be found with a high degree of probability up to several meters.
And it works like this, as you know, a cellular signal goes through cellular towers, and it is through these towers that they will be able to find you, because it does not matter where you are, there are these towers around you, and it is by the signal level that they will be able to determine your location. And of course, if necessary, any cellular operator will have to provide information about where you were at a certain point in time. And they will do this precisely by analyzing the signals of cellular towers.
You thought that these towers were irradiating you with coronavirus, but in fact they can track you.

Speaker 2:
They both infect you with coronavirus and track you.

Speaker 1:
Well, this is not yet certain about the coronavirus, but regarding surveillance, yes, that is, it is true that with a high degree of probability they will be able to determine your location through cellular towers. By the way, this topic can also be used, for example, to search for people if they have disappeared somewhere in the forest. Well, I don’t know, they went to pick mushrooms, got lost and it is impossible to find them. In this case, using the signal above the cellular network, you can also roughly determine where the person is, and this can greatly help in the search.

Software.
Speaker 1:
Next, we will talk about software that can be installed on your phone without your knowledge. Either you can install it yourself, or you can install it without knowing about it. Well, in short, about some program that will be on your phone. I think you heard that in 2024, Israeli intelligence destroyed the leader of Hamas. And they did it by installing some program on his phone.
And it turned out that the person who purposefully did everything so that they could not find him, was eventually found and killed. Therefore, in case of great need, some similar program can be installed on you. It is clear that this is an extremely vivid example, and it is extremely unlikely that someone will hunt you in order to harm your health or life.
Most likely, if it comes to this, then they will be interested in you in some other aspects, for example, in the sense that you committed some crime, and it is necessary to obtain some information about you, for example, access to correspondence with your accomplices.

How to protect your phone.
Speaker 2:
But can I somehow protect myself so that such applications are not installed on my phone?

Speaker 1:
Well, in theory, yes, that is, of course, if you have one of the latest smartphones, where the latest personal system is, you will control what programs you install on this smartphone, you will be sure that they are completely safe, your smartphone will not fall into the wrong hands. In this case, it is extremely unlikely that this program will end up on your phone. Well, we will move on and talk about control of your movement.

Control of movement.
Speaker 1:
If you buy a train ticket, if you buy a plane ticket, if you buy some other transport ticket where your passport is required, then you are automatically included in a special database that collects data on all such trips.
And as you can understand, if necessary, this allows you to track your movement, or make a request and get information about when and where you moved, or, for example, if you are wanted, to understand that you bought a ticket somewhere, and you can be caught when boarding, say, a plane.

Speaker 2:
Is that why Morgenstern left the country by train?

Speaker 1:
Including, perhaps, yes, but, as far as I remember, there was no criminal case against him at that time, because if there had been, then, of course, his purchased ticket would have been tracked down. And let's say, perhaps you noticed that when you board a plane or approach a train, there may be police officers standing by the carriage or the steps of the plane. They are there in most cases in order to pick out the person they are looking for from the crowd.
That is, they found out that someone bought a ticket for this plane or train, who is interesting to them, and when they see that the person has approached, they simply pick him out of the crowd and take him for some action. By the way, it may even be you, but this is not certain. In fact, each person has a large number of questions about their rights and responsibilities, as well as legality. For example, you run a business and together with an LLC you opened another individual entrepreneur, that is, you are engaged in the so-called splitting.
Or, let's say, you need to divide property, you do not know what you are entitled to. Of course, in this video I can not tell you about all the situations, yes, but a little bit about this. Moreover, each situation is individual and usually there are many nuances. Therefore, if you have any legal questions, then sign up for a consultation using the contacts that are in the description of this video. We will analyze your situation, decide what can be done and, accordingly, how we can help you.

Video surveillance.
Speaker 1:
Now I would like to talk a little bit about video surveillance. And we will return to our favorite gadgets, that is, phones, laptops, tablets, and so on. I think you know that these devices have a front camera. Well, of course, you know, you take selfies with it. When you install certain software, this camera can also watch you, either record video, or, say, take some kind of frame, maybe once a minute, every 10 minutes, and so on.
Well, in short, it can be used to spy on you. And at the same time, if you use the camera yourself, I think you have noticed, for example, a light or backlight starts to light up on your computer, what is it. In general, an indicator that the camera is working. But in the case of surveillance, this light, this LED will not light. That is, you will not know that the camera is watching you. Perhaps this is why many people cover the camera on their laptop with electrical tape and do not want it to look at them.
Although, on the other hand, it is possible that these are the same people who are exposed to coronavirus by cell phone towers. That is, it has not been established for sure. Therefore, if you do not want someone to potentially hear or see you, then discuss issues that are important to you away from technical devices.
But again, I am not talking about any offenses, violations of the law, and so on. These could be your personal family secrets, some gossip, discussions of your health, and so on. But here everything really depends on the level of your paranoia. But even if you move away from technical devices, this does not mean that Big Brother will not see you.

Facial recognition system.
Speaker 1:
Therefore, now we will talk about the facial recognition system that is installed in large cities. For example, in Moscow, more than 160 thousand cameras are installed that can recognize faces.
And perhaps you heard the story about one guy, when mobilization began, he had a deferment from this mobilization, nevertheless, he was detained in the metro for three days in a row, because the military registration and enlistment office was looking for him. I don’t know, either he didn’t know about this guy’s deferment, or he didn’t want to know. Well, in short, the military registration and enlistment office was looking for this guy, and for three days in a row, the cameras in the metro noticed him, immediately transmitted a signal to the nearest police station, they are usually at every metro station, he was detained and taken to the military registration and enlistment office.
And therefore, if someone is wanted, someone needs to be found, then the image of this citizen is uploaded to the database, which is related to these cameras. Let me remind you that all the photographs in your passports are digitized, they are in the Ministry of Internal Affairs database, so they have something to upload, and as soon as you are in the field of view of a camera, a signal about this is sent to the nearest Ministry of Internal Affairs department and they will know about it.

Transfer of your data.
Speaker 1:
But of course that's not all, many marketplaces, mobile operators, banks, taxi services, they also collect data about you, store it and, if necessary, provide it to the police, the Investigative Committee, the Federal Security Service, and so on.

Speaker 3:
So who is it? Hackers?

Speaker 1:
Well, I haven't heard of it being hacked on a large scale, but in theory it's possible, in practice it's unlikely. But again, if we're talking about a small company that doesn't do active security, then in theory, of course, they can leak information about someone making a purchase or placing an order. But regardless of the size of the company, even if it's Ozon or Wildberries, they'll receive a request from the Investigative Committee to provide data, say, on the purchases of a certain citizen, that is, what he bought, for what amount, when, then they'll be obliged to provide this information.
And in fact, the investigation, the police, the FSB and other structures can make requests and receive information that, among other things, constitutes a banking secret, a commercial secret, and so on. That is, organizations will have to respond to these requests.

How they will find you.
Speaker 1:
And of course, all of the above methods can work together.
Let's say there are plenty of cases where someone committed a crime, fled the scene of the crime, went somewhere, used a bank card somewhere, and so on. And so, in combination, this person can be found. Let's say, look at CCTV cameras, see where he paid with his card territorially, see where he bought a ticket if, say, he went to another region. And so on.
All these methods of tracking a person, they work great in combination. And of course, I can't ignore social networks and tracking your actions in these social networks. I think it's no secret to you that there are artificial intelligence programs that track actions in social networks and that are configured, let's say, to analyze certain words, expressions or hashtags and by which you can be found and taken note of.
If we are talking about social networks like VKontakte, Odnoklassniki, that is, those that belong to Russian companies, here, of course, everything is as simple as possible, if necessary, a request is made and the Russian company will be obliged to provide all the data about you. But if we are talking about foreign social networks, such as Instagram, Facebook, which, by the way, are banned in our country, recognized as extremist and all that, then, of course, your actions can also be tracked on them.
For example, you liked a post about a rally, therefore, it can already be assumed that you may have some relation to the opposition, or you commented on a post, or reposted it. In fact, there have been many cases recently where people were brought to criminal liability for reposts, comments, posts, and so on. Well, let's not ignore Telegram, which was blocked, but is no longer blocked.
Of course, your comments, your likes in it can also be tracked. And since we are talking about Telegram, I recommend subscribing to my Telegram channel, where I talk about news, law, your rights, responsibilities, interesting cases from practice. To subscribe to it, follow the link in the description of this video, and you will know more about your rights, and this will seriously distinguish you from other people.
And here, of course, there is a very fine line, because on the one hand, we have the Constitution, we have freedom of speech, freedom of expression, and so on. And there are certain laws that limit this. So write in the comments what, in your opinion, is more important, freedom of speech or still the restriction of this freedom of speech by the state at a certain point in time.

Social networks.
Speaker 1:
In any case, as for reposts, comments, and so on, if I were you, I would not be very naive here and would not rely only on the permitted freedom of speech.
But nevertheless, I read somewhere research that if people are subscribed to legal channels, they understand their rights, responsibilities better and, if necessary, can protect them. It does not matter whether you received a summons from the military registration and enlistment office, you were stopped by a traffic cop, or you, say, need to dissolve a marriage. Those who watch legal channels are in any case better versed in all this than those who do not watch these channels.
That is why I recommend subscribing to my channel, which you are watching now, to stay up to date with all the innovations, to know what rights and obligations you have and how to protect your rights.

Personal data.
Speaker 1:
And before answering the main question of this video, I would like to touch on another topic that concerns personal data. Yes, it is not exactly about the secret services, but, nevertheless, it takes place. If you have noticed that when you go to some site for the first time, you are asked to accept the policy for processing personal data.
If you draw up a bank agreement, you sign an agreement on the processing of personal data, and so on. That is, you provide your personal data almost everywhere and it may happen that this personal data can leak somewhere outside. Yes, this is illegal, but this happens regularly. Here I will upset you a little, because there is no effective control over the leakage of personal data.
You can leave, for example, an application for a loan on the website of a couple of banks and in 10 minutes some shady microcredit organizations will start calling you and it is not particularly clear who leaked your data. Therefore, leave all your personal data at your own risk.

Are you being followed?
Speaker 1:
And here it is time to answer the question for which, perhaps, you are watching this video, and whether you are being followed at all and what should be done to minimize the chances of surveillance. And here everything is as banal as possible. If you do not conduct any illegal activity and you are potentially of no interest to the special services, then 99% of the time you are simply not interesting to them and no one will follow you.
Because for many surveillances it is necessary to make requests, it is necessary to obtain permission from the court and so on. Therefore, if you are just an ordinary citizen who lives an ordinary life, then you are simply not interesting to anyone. Sorry for being blunt.
If we are talking about wiretapping, hidden video surveillance, even a request for your banking secrets, you have to screw it up really badly for the special services to be interested in you. But if you did something not so terrible, for example, you didn’t show up to the military registration and enlistment office when you were summoned, and they find you even on the surveillance cameras, well, okay, they’ll write you a fine and let you go on. That is, they even tracked you down, but globally nothing terrible happened to you.
That is, in this case, using the example of a subpoena, you broke the law, you did not show up, you received a fine, you will pay it later. Well, that's about it. In short, I'm sorry if I upset you, but it's quite possible that no one is interested. If we are talking about special services, I apologize again, but in order not to be followed, of course, follow the law, think about what you put on your phone, think about what you sign when you fill out some documents, read contracts, well, in short, exercise basic vigilance, in the overwhelming majority of cases this will be more than enough, because of you no one will be following.
That's probably all. Bye!
 
Top