WHO COLLECTS YOUR DATA, AND HOW DO THEY DO IT?

Carding 4 Carders

Professional
Messages
2,728
Reaction score
1,541
Points
113
Spy in your pocket
Your devices-computers, mobile phones, tablets-are constantly sharing information about your location. A mobile phone is very convenient for this task. Wherever you go, your phone is always with you. It captures where you are, even without an Internet connection.

Your life according to geolocation data
The data has been collected for some time, and now we have a surprisingly detailed picture of who you are and how you live. Add public addresses, tweets, photos, and phone details, and it will be hard to imagine a more complete picture of you.

Geolocation data reveals not only where you live and work, but also your visits to churches, clinics, bars, and friends and relatives. The data will tell you which protest actions you participated in, and which political or social groups you belong to.

0*bgomjE9MkqGrxuJJ.png

Image for post.

How this works can be seen in a special map (en)recently prepared by Open Data City. The map is based on communication data from Balthasar Glättli, a member of the Green party of Switzerland, collected over six months. It's amazing how deep into a person's life you can get thanks to location data.

In Germany, a member of the Green party, Malte Spitz, was subjected to a similar experiment. Mr. Spitz requested the data from his mobile operator. The results were published in the newspaper Die Zeit. The recordings included information about calls, text messages, and location. The newspaper processed the data and provided a detailed picture of the life of the politician (de). His daily movements and unusual deviations from routine tasks were clearly visible. Read more here.

And here you can see how Google tracks your movements around the city. (You need a Google account).

Social connection schemes
Geolocation data can be used to evaluate your relationships with other people. For example, you and someone else (one or more people) spend a certain amount of time in the same place every day. You probably have something in common, such as a common job, love or family relationship. Another example: you are a civil servant, and your location (lunch break, cafe) coincided with the coordinates of one journalist. Maybe you "leak" information to this journalist?

Who needs this data and why
The most detailed picture can fall into the hands of any people and organizations. Data can be sold for profit. You can make predictions about where a person will end up in the future. Finally, information can be used by the government.

Cell towers and your phone number
Mobile phone towers
To send and receive calls and messages, your phone must be in contact with cell towers. This activity is monitored and recorded by the operator. In fact, the mobile operator knows where you are and where you were before.

GPS tracking
Your smartphone is actually a GPS device. Most smartphones have a built-in GPS receiver. If the corresponding function is enabled, the receiver receives signals from GPS satellites, and the accuracy of coordinates increases.

Location records
Geolocation data can be used by your phone and various applications. Most smartphones have a mapping program installed. When you move, your current coordinates and where you were in the past are recorded.

Who has access
Your location data is available to anyone who has (or can access) your phone. Google and Apple presumably also have access to geolocation data, since they control both coordinate tracking apps and operating systems for most smartphones.

View geolocation data
0*zJmqdJuHomu9_abF.png

Image for post.

Some people disable location detection on their phone. If you didn't do this, your device may be recording the coordinates. The iPhone owner can see this information on the map.

If your iPhone is running on iOS7 or a more recent operating system, select Settings - > Privacy → geolocation Services → System services → Frequently visited places → select a city → > see the map.

How can they find out where I live?
On the iPhone, the app detects the "home" and "work" points. Apple's logic: if you regularly spend the night in the same place, it's probably home. And if you regularly spend daytime hours elsewhere, that's probably your job.

Are there any other ways to display my movements on your phone?
Yes. You can install the recommended Open Paths app (iPhone or Android).

Note: if you install Open Paths, the New York Times, the developer of this app, will have de facto access to your personal data.

Wi-fi history
0*bWY20Ub3GVehdhuL.png

Image for post.

There are two main ways that your phone can share location data when wi-fi is enabled.

Before connecting to the network
Let's say you go to a coffee shop you've never been to before and turn on your computer. Wi-fi is enabled by default. The computer is looking for a network, but not any random network. It's easier if they already know this network and have previously connected to it.

To find out if there are any familiar networks nearby, the computer will start transmitting their names. This list may include cafes, offices, airports, apartments and homes of your friends, and various public places.

Who has access
The owner of the network and anyone who is able to intercept traffic, for example, by creating a fake network. An attacker can get a detailed picture of where you've been before.

Inside the network
There may be several access points in the network, for example, if the network belongs to a large company or conference hall (as an option-with support for Wireless Distribution System technology). When you connect to such a wi-fi network and move within it from one access point to another, your movements can also be tracked.

What it looks like
A similar observation was established for the participants of the Re:publica conference in Berlin (2013) as part of the Open Data City project. You can view the conference guests ' movements on the interactive map here.

View your wi-fi history
You can't view the history of wi-fi connections on iPhone or iPad devices, although you can get rid of all connection records by clicking on the links Settings → General → Reset → Reset network settings.

On Android phones and computers (including Macs), you can see a list of wi-fi connections and delete these entries one by one.
 

Mobile phones, GPS and security​


Question: Is it true that a mobile phone can be tracked?
Answer: Yes, it's true. A mobile phone that is turned on can be tracked by a Telecom operator. Any operator, not just the SIM card that is currently being used. You can track your mobile phone without a SIM card at all. And exactly with the same accuracy as a mobile phone with a SIM card. The conditions are as follows: the phone is turned on and located in the network area of the operator that tracks it.

Question: Is it true that you can turn on your mobile phone remotely?
Answer: Yes, it's true. The mobile operator is able to turn on the mobile phone remotely from its own equipment. This action does not require any super duper military secret equipment. All actions are performed on standard mobile operator equipment. The operator can enable it in both active and passive mode. In passive mode, the phone will not show any visual signs that it is turned on. To do this, it is necessary that the phone was powered, that is, it had a battery and it was charged, and that the phone had such an opportunity at all. Not all cellular standards and phone models support remote activation.

Question: Is it true that a mobile phone can conduct remote wiretapping and peeping through the camera?
Answer: Yes, it's true. But not all phone models are equipped with such functions. There are like old models of devices through which you can remotely listen (watch) so are the new ones. Among the new ones, there are also models that do not have this function at all. Large manufacturers help the special services and try to include this functionality in their models. But not all countries and manufacturers support amers in this endeavor. There is information (unverified) that our Korean-Japanese-Chinese friends are not very helpful in this matter.

Question: Is it true that a mobile phone with GPS can be tracked more accurately than a mobile phone without this function?
Answer: No, that's not true. A switched-on mobile phone is tracked by the signals of the cellular stations to which it is connected and in no other way. The reasons for this are very simple. If the phone is not in the range of the cellular network, then there is simply no way to connect to it, which means that data from the GPS module is simply useless. If the phone is online, it is usually connected to 6-7 cellular stations. Knowing their exact location and having the ability to make up to 35 triangulations, you can calculate the location of a mobile phone with an accuracy of one cubic meter in a few seconds. And then the question is why use the GPS module if it gives no higher accuracy? And the procedure for quiet activation of the GPS module is not so simple technically.

Question: Is it true that the mobile phone stores data about all SIM cards that were inserted into it?
Answer: Both Yes and no. Yes, until you reset the phone's settings to factory settings, it remembers several (depending on the model) last inserted SIM cards. After a hardware reset, the phone is clean. But all combinations of SIM+email numbers are stored in the operator's database. That is, as soon as the SIM+imei is lit up on the network, Telecom operators immediately remember about it. I do not know how long they store data about this. I think that for a long time.

Question: In other words you can change the phone number change the email address and the phone will be clean and untraceable?
Answer: No, it's not. All GSM chips have factory numbers nailed to them during manufacturing. These numbers are taken into account. That is, with a huge desire, you can trace the original email number by the chip number.

Question: And they say that if you have 2 mobile phones with you and one of them is turned off (the battery is removed), and the second one is monitored, then the first one will be calculated because it is nearby?
Answer: No, this is prejudice. It is technically impossible to turn on and track a de-energized device. The state can't cancel physics yet. There is a possibility that in the near future attempts will be made to install identification chips in phones that work without power. But at the moment I do not know such developments.

Question: What is the error in calculating the coordinates of a mobile device when tracking?
Answer: I didn't calculate the exact error. But approximately now a stationary device can be calculated with an accuracy of up to 1 cubic meter. But all this is mathematics, physics and geodesy. I think that it is not so important to calculate the position of your phone with an accuracy of 1 cubic meter or 9 cubic meters. Cordoned off usually blocks.

Question: How do I know if I'm being tapped or not? Control measures?
Answer: If the phone does not have a battery, then they do not listen. If you are interested in whether your conversations are being monitored? Then it is not computable. Since wiretapping is performed by the mobile operator. And neither as on your phone is not reflected.
You can tell if your phone is turned on in silent mode by its (phone's) temperature. In the process of wiretapping, the actual GSM connection is made as if during a conversation. And the corresponding battery consumption. If the phone is just turned on quietly, for example, to find out the coordinates, then it seems to be in standby mode as usual.
My opinion is that if there are suspicions, then down with the battery.

Question: That is, if I have a phone with a zero IMEI and I often use SIM cards, then it can still be tracked?
Answer: If tracking means finding the coordinates of a mobile phone by means of a Telecom operator, then Yes. If we are talking about finding out who is the owner of the phone, then changing the email address complicates the process. You can identify your phone by restoring its original email address. You can do this by finding out the number of the GSM chip that is recorded in this chip during manufacturing. And then make a request to the factory. As far as I know, the number of the fuel and lubricants chip can only be found by direct connection to the chip. In other words, all these operations require the device itself. Although now most stores do not need a passport to buy a phone for cash, which means that the last name of the owner of the device is unknown.

Question: Can all types of mobile phones be tracked?
Answer: I'm not ready to argue for the NMT standard, But all more recent developments allow you to track the device that is turned on, regardless of its model. In other words, the fact that you have a brick for $ 2 does not increase your security. The misconception that older phones are less well tracked is not due to the devices themselves, but to the fact that as cellular networks have evolved, the ability to track them has improved. Previously, accuracy within a radius of 25 meters was considered the limit, but since then, computing power has increased.

Question: Legal security of your mobile phone.
Answer: If you have someone else's SIM card, the phone is not issued to you, then it is almost impossible to prove that you called someone on this particular phone and attract you on this basis for complicity in something. Since you can always say that you found the device exactly as it is.
However, if you were specifically followed and prepared to be taken for this call, then it is unlikely that you will be able to get out of it.

Question: My device imei has the form 0000000000000 does this mean that the device can not be traced.
Answer: No you can track any device for the system it is important that the number is not its type. This type of email cannot be sent from the factory. This is clearly a modified email address. Such "strange" email numbers attract more attention than necessary. It is better to put an email similar to the one that may be in your phone, but not the one that was there.

Question: How do I buy and use the device correctly so that it doesn't display the srso to me?
Answer: For added security, you can follow simple rules:
1. Buy mobile phones for black people only through a figurehead and without documents. (send a matchmaker's brother to a neighbor's kiosk, and most importantly, at the time of buying the device, do not Shine your face to the seller. If the device was not purchased by you personally, then you will not be identified at the face-to-face meeting.)
2. Use SIM cards that were not purchased in your name. Top up your account only with cash (and of course not at an ATM with cameras) or with anonymous money (for example, with a QIWI issued not for you).
3. change your SIM cards and phones Regularly. (the degree of regularity depends entirely on your paranoia)
4. NEVER insert someone else's SIM card into your (registered to you) device or your registered SIM card into SOMEONE else's device.
5. Let your colleagues know that if you answered with a passphrase, it's time for them to start hiding. The code phrase should contain a simple wording. For example, if your name is Dima, then the phrase may be: "I'm Listening, Dima!". To this answer, you should say that you probably got the wrong number and respond correctly. The phrase can be anything, but the main thing is that it should be simple and standard.

Question: How long does mobile operator store data on its servers? Are long-term backups made? Are you interested in both SMS logs and just data IMEI+SIM number+number of the base station to which the device was connected?
Answer: By law, they are required to store all billing data for up to 3 years of age. The operator is not required to store data that allows you to find out the location of a particular mobile phone in a particular period of time. But one way or another, they store all this data. About five years ago, I witnessed a conversation between engineers of one of the small operators, the conversation concerned backups. Engineers agreed that it is easier to completely archive and store all service information from cells than to sort data into garbage and useful ones.
I then concluded that most likely all operators have a total archive of all SMS correspondence, all billing data (including cell connections for all SIM+email options) and tracking data.
And most likely there is no total archive of voice (conversation recordings), MMS, and Internet traffic. The approximate amount of loaded cell data from SMS, billing, and tracking is less than 10 MB per day in the archive. Consider for yourself if a million-plus city with a large area requires less than 100 mobile stations.

Question: And what communication standard is used to transmit video when it is switched on remotely?
Answer: From what is directly familiar to me, I can say that the standard means of the phone and the operator are used. Since the phone in silent mode simply does not respond to the keyboard, it does not turn on the screen and sound and vibration effects. Otherwise, it works quite normally.

Question: Location information, as well as listening, is provided to special services on demand? Or do you need any requests, permissions, etc.?
Answer: Officially, there should be a request. And in my opinion, the judge's decision. Our lawyers will tell you more correctly. But in reality, Operators work with local authorities on a call. In general, personal contacts decide EVERYTHING!

Question: Are phone conversations constantly analyzed to detect "dangerous" words and phrases?
Answer: Now we are preparing new equipment that will perform these functions. But due to the fact that operators are forced to buy and install this equipment, as well as certify it at their own expense, the process goes with a creak. This was also the case with SORM. A law came out, an order was issued to put everything within a month, but in reality SORM was put for more than 3 years.

Question: They sell relatively compact (up to 10 kg) equipment for intercepting and decrypting GSM traffic, i.e. listening to phone calls and SMS interception.
So it turns out that almost any person, with a penny, can purchase this technique and use it for their own purposes? It turns out that this is technically possible, without any extra computing power?
Answer: An ordinary person cannot legally purchase this equipment. This equipment also has limitations. Radius power etc. I have not worked with such equipment for a long time and for this reason I would not like to mislead you. Progress does not stand still. In addition, there are state restrictions on the export and import of decrypting equipment. Don't forget that the difference between advertising and reality is usually very large.

Question: Is it true that a phone conversation that is conducted from a moving car is much more difficult to intercept, since the distance between it and the intercepting equipment (if it is not in the car) increases and the signal weakens?
Answer: If direct interception equipment is used, then of course Yes. The farther away from the signal source, the weaker the signal is and the less effective interception is. But at the moment, the equipment of mobile operators is used to intercept conversations and traffic of mobile subscribers. And in this regard, running after the subscriber becomes unnecessary. All traffic between the mobile operator cellular equipment and the mobile phone is easily snipped in the mobile operator technical center. Including SMS, Internet traffic, and the location of the transmitting subscriber. The receiving subscriber's location is a bit more complicated. Its location can only be tracked using the equipment of the operator to which it is connected. The transmitting subscriber means the one who is being monitored, the receiving subscriber is the one that the transmitting subscriber called or who called the transmitting subscriber himself.

Question: If you are in a high-rise building, can you calculate the exact floor?
Answer: The accuracy I know is up to the MERT*meter*meter cube. That is, Yes, they can have a floor, an apartment, a room, and a corner of the room. But if the subscriber is located on high floors, then the possibilities for triangulation are lower than if on low floors. Features of geometry and physics. This does not mean the absolute height in floors, but the relative height for a given area. For example, if the average number of storeys of the city's development is 5 floors, and you are on the 20th, then I think the error of 1 floor will already be a reality. It is related to the height and density of the location of cellular stations. Which depends on the number of storeys and density of buildings.

Question: is the text of the SMS stored somewhere?
Answer: Yes. the text of the SMS goes inside the service traffic of operators and they store it. They don't have to, but they do. The fact that the operators have texts of your SMS messages 5 years ago, they are not recognized. These texts cannot be used as legal evidence against you.

Question: Do banks use special equipment, or do they have direct access to operators in order to listen to their employees?
Answer: Eavesdropping on employees without their consent is not legal. You could have signed the consent without looking at it together with the employment contract. (I've seen this agreement 1 time) Some very SPECIAL equipment, I don't think. There are fully standard building security systems with built - in listening of premises. In addition, the company may have an agreement with the operator under which all your conversations on work phones can be recorded and listened to. Wiretapping Of your personal mobile phone cannot be legally organized by the company where You work. Except in cases related to the fact that you are being investigated for operational activities, but even in this case, wiretapping is organized by the police on company a.

Question: I use a big-eared scooter I can't even get a ride on it they can also calculate me with an accuracy of up to a meter?
Answer: Yes, even an earless monkey. If Your phone works in the GSM standard, then regardless of its model, it can be calculated and maintained with the accuracy that the cellular network density allows in the place where You are located. This does not depend ON the model of your device.

Question: Please advise me how and what kind of device to use so as not to get caught?
Answer: There are no devices that can not be "cut through". There are security measures that can greatly reduce the likelihood that You will be detected by the phone. But our, and not only our srso work mainly focusing on classical methods of conducting an investigation. Calculating with your phone is more of a Supplement to the rest.

Question: ATMs and payment terminals are equipped with SIM cards that are located in the GPRS modem. Is it true that this SIM card safely burns Your phone and you need to upload it when you approach the ATM or terminal? Is this true for car keys if they have an alarm hanging with them?
Answer: This is not true. It doesn't burn. Because he can't. GPRS modem in an ATM or terminal and a mobile phone that is in your pocket are 2 devices that do not affect each other at all. They simply don't have the functionality to burn someone down. And a signaling from the same opera.

Question: The police can make requests to the mobile operator to provide information - which phones were registered on the network in such a period of time(when the cashout took place) at this site (ATM location) if there were several episodes and some mobile phone from the previously detected ones POPs up, then things are bad.
Answer: And here we have come to another superstition and its origins. Yes, srso employees can request such information during operational search activities. Fortunately, it can not be a proof. But it generates rumors that ATMs are firing mobile phones.

Question: If throwing out the mobile phone I keep the battery from it, then they can burn me on it.
Answer: The battery has no identification, and the serial number on it can only really be broken through very theoretically. So no is not true. A battery can only burn you if you put it in a fire. Coolly explode.

biggrin.gif

Question: There is some video that shows that the phone charges the main battery by almost 50% when you enter a special code. That is, the mobile phone has an additional battery that is not discharged even when the mobile phone is completely discharged. That is, you can use it to turn on your mobile phone even if it pulls out the main battery.
Answer: The circuitry of telephone sets is such that, except in the main battery, there is not enough energy anywhere to turn on the phone. Not to mention connecting to the fuel and lubricants network. And the video can be anything. But physics is still working. As for the special code, most likely a code was entered that misleads the chip controlling the main battery. And thus allows you to finish the so-called zero reserve from the battery. This leads to irreversible changes in the battery that fatally affect its capacity. Of course, 50% of the charge will not be collected there, but the phone will be able to work for a few minutes from the battery deceived in this way.

Question: If your keys are inside a locked car and you have spare keys at home, call someone at home's cell phone from your own cell phone. Hold your cell phone at a distance of about 30 cm from the car door, while the person at home presses the unlock button on the spare key, after holding it up to their mobile phone. Your car will open. A great opportunity to save time, because the person does not have to bring you spare keys. The distance doesn't matter in this case. Even if you are hundreds of kilometers away, if you can reach someone with spare keys, you can open the car (or trunk).
Answer: All described full shit. Because the phone doesn't transmit the frequencies that the alarm works on. Yablochnikov had a development that made it possible to use this particular scheme. But at the same time, both phones had to be Apple. As far as I can remember, it did not win the support of car manufacturers and alarm systems.

Question: There are such things. Jammers. Are they even allowed?
Answer: It is illegal to use jamming equipment without an appropriate license. You can say that this is a radio transmitter (which is actually a jammer). But then again, if the device operates outside the permitted frequency and power range, then using it without a license is illegal. So either get a license or you understand.
 
Top