Brother
Professional
- Messages
- 2,590
- Reaction score
- 533
- Points
- 113
Salyut, everyone is well acquainted with social networks, many actively use them, communicate with friends, listen to music, but do not realize what threat they carry in themselves and what potential they contain as a tool of social engineering. In this article, we'll take a closer look at how to properly use social media to your advantage.
Social networks are a storehouse of information, which contains photographs, a circle of friends and relatives, interests and hobbies are described, the chronology of your life in the place of work and study, and even musical preferences. Therefore, this information can be used by all people interested in your person.
We'll start with the potential threats posed by government agencies. The Ministry of Internal Affairs, the FSB, the Federal Drug Control Service, the Federal Tax Service, the SSP and even the traffic police look at the accounts of social networks for the initial analysis of personality. As soon as a person enters the field of vision of operatives, there is nothing easier than looking at his page, through which you can determine his appearance, circle of acquaintances, see interests, place of work or study, determine place of residence, standard of living, car or other vehicles. This information is obtained from open sources, simply by analyzing the user's page.
Very often, identification is carried out using photographs from social networks, because the photo from the passport office is of inadequate quality. Or they look at the standard of living, if the unemployed is in a group of young millionaires, in the photo he has expensive cars and other valuable property, then the operatives draw the appropriate conclusions.
Continuing the development, special services can deepen, and in addition to public information, make a request by which they can get the IP of the account included, which will lead to a mobile phone, or an address, in the case of a wired Internet , as well as personal correspondence and information from closed sections.
The above methods lead to full disclosure of identity, therefore, we recommend that you stop using social networks, except for the cases that we describe below. After all, the information that is in the networks can be of use to you.
The first thing I will suggest is the use of social media for advertising purposes. They contain a huge consumer potential, and there are advertising methods, which we will similarly talk about in the relevant topic.
The second is the use of social networks in order to falsify your identity, that is, you can let misinformation about your appearance, standard of living, place of residence, personal vehicles, place of work. An account is created with your personal data, full name, year of birth, place of study, etc., and the necessary photos, for example of a stranger, are already loaded into it, in order to confuse the operatives on identification, or to mislead about the place of residence in another country, for example Ukraine, with which we do not maintain diplomatic relations. Do not forget about the entry points, in this case, you must use the IP addresses of the country that you designate as a place of residence.
Third, we may use information on social media to analyze the purpose in the event of a theft or fraud. This is an assessment of the standard of living, according to the photo you can determine the plan of a house or apartment, evaluate a car, as well as find out where the homeowners are, for example, on vacation abroad. For these purposes, I recommend using Instagram.
Fourthly, social networks can serve as a tool for disclosing personal data of impersonal accounts on forums, messengers (jabber, skype, ICQ, etc.). A charged link is created, upon clicking on which it leads to a VKontakte account, with a transition to the desired page. That is, we will see who entered. Using this method, one cunning user revealed several scammers who were engaged in Skype scams on behalf of one large store. He made an order with them, with which there were problems about payment, and in the form of confirmation of payment, he dropped a link with a screenshot on the file sharing, but in reality the fraudster received a charged link, and if he was inattentive, he disclosed his identity.
Social networks are a storehouse of information, which contains photographs, a circle of friends and relatives, interests and hobbies are described, the chronology of your life in the place of work and study, and even musical preferences. Therefore, this information can be used by all people interested in your person.
We'll start with the potential threats posed by government agencies. The Ministry of Internal Affairs, the FSB, the Federal Drug Control Service, the Federal Tax Service, the SSP and even the traffic police look at the accounts of social networks for the initial analysis of personality. As soon as a person enters the field of vision of operatives, there is nothing easier than looking at his page, through which you can determine his appearance, circle of acquaintances, see interests, place of work or study, determine place of residence, standard of living, car or other vehicles. This information is obtained from open sources, simply by analyzing the user's page.
Very often, identification is carried out using photographs from social networks, because the photo from the passport office is of inadequate quality. Or they look at the standard of living, if the unemployed is in a group of young millionaires, in the photo he has expensive cars and other valuable property, then the operatives draw the appropriate conclusions.
Continuing the development, special services can deepen, and in addition to public information, make a request by which they can get the IP of the account included, which will lead to a mobile phone, or an address, in the case of a wired Internet , as well as personal correspondence and information from closed sections.
The above methods lead to full disclosure of identity, therefore, we recommend that you stop using social networks, except for the cases that we describe below. After all, the information that is in the networks can be of use to you.
The first thing I will suggest is the use of social media for advertising purposes. They contain a huge consumer potential, and there are advertising methods, which we will similarly talk about in the relevant topic.
The second is the use of social networks in order to falsify your identity, that is, you can let misinformation about your appearance, standard of living, place of residence, personal vehicles, place of work. An account is created with your personal data, full name, year of birth, place of study, etc., and the necessary photos, for example of a stranger, are already loaded into it, in order to confuse the operatives on identification, or to mislead about the place of residence in another country, for example Ukraine, with which we do not maintain diplomatic relations. Do not forget about the entry points, in this case, you must use the IP addresses of the country that you designate as a place of residence.
Third, we may use information on social media to analyze the purpose in the event of a theft or fraud. This is an assessment of the standard of living, according to the photo you can determine the plan of a house or apartment, evaluate a car, as well as find out where the homeowners are, for example, on vacation abroad. For these purposes, I recommend using Instagram.
Fourthly, social networks can serve as a tool for disclosing personal data of impersonal accounts on forums, messengers (jabber, skype, ICQ, etc.). A charged link is created, upon clicking on which it leads to a VKontakte account, with a transition to the desired page. That is, we will see who entered. Using this method, one cunning user revealed several scammers who were engaged in Skype scams on behalf of one large store. He made an order with them, with which there were problems about payment, and in the form of confirmation of payment, he dropped a link with a screenshot on the file sharing, but in reality the fraudster received a charged link, and if he was inattentive, he disclosed his identity.
