How do special services work?! How do I stay anonymous?

 

Mobile phone

is a sensor that constantly collects information regardless of the phone's operating mode. It is in standby or talk mode. Mobile operators log all your activities and store them for a certain period of time (at least 6 months). Thus, contact numbers, the full name of the owner, the duration of calls, the turning on and off of the phone, the content of SMS, the use of the Internet, movement, the use of different SIM cards and devices fall into the hands of operators.


How do I stay anonymous?

Refuse to use mobile operators or not at all. The fact is that all information about the SIM card is available to anyone for a certain amount. This means that by knowing your number or name, you can get a complete issue, including your current location and movement for the last 6 months. The operators' employees sell this information. At the end of the article, let's analyze what services are provided on shadow forums and how much it costs. And to begin with, let's understand the terminology and debunk popular myths.


Basic terms

Cellular Base Station (BS)

is a tower with antennas that is responsible for receiving and transmitting a signal from one subscriber to another. The radius of coverage is from 0.5 to 10 kilometers.


Cell

is the coverage area of the BS operation. Each cell has a unique CI (Cell ID). The operator can get information about all subscribers who are in the same cell.


IMEI

A long string of digits serves as a unique identifier by which the mobile operator recognizes the phone and registers its appearance on the network. This number can be used to determine the country of the device manufacturer. There are also global blacklists, where stolen or illegally obtained devices are added.



SIM Card

is a contact smart card with its own processor that can register on a mobile network. SIMKA can find the nearest transmitting station and store information: numbers, SMS and other data.


Direction finding

is a service that determines the location of a radiation source. The direction finder program or device determines the location of the mobile phone by the SIM card number.


Umbrella

— Punch type, which contains information on the 5 nearest subscribers at the phone number of interest.


Flash

— Simultaneous determination of the subscriber's location, indicated on the map or address.



1: If I use an old Siemens, they won't be able to identify me

Each device, when connected to the network, is connected to the base station with the strongest signal. After that, the operator has enough data to determine the location and get other information, regardless of the make and model of the phone. Also, each device has an IMEI, which is also logged by mobile operators. Accordingly, it is possible to determine which SIM cards went to the network with the same IMEI.


2: If I buy a SIM card for my left passport, they won't find me

When searching for a phone number, information is requested for the entire cell (coverage area of the base station). This information is stored for at least 6 months. The first action of the Major's comrade is to determine the nearest 5 subscribers to the phone. And then cut off and collect information along the chain. If you use a personal phone number along with a drop number, then it is easiest to identify it. After all, several samples from the cell will show that this phone was always as close as possible, although others were constantly changing their position.


3: If I turn off my real phone, and use a phone + a SIM card issued for a drop, then I will not be found out

Switching off and connecting to the base station is also logged. In this way, it is possible to trace the turning on and off of the main phone and the operation of the anonymous one. For example, a very obvious situation will be if the logs show that immediately after turning off the real phone, a fake phone began to be used. Judging by the logs, such actions were repeated several times. In this way, the real owner can be determined.


4: Using different SIM cards will allow me to solve all the issues with anonymity.

First of all, if we are talking about different SIM cards, then you also need to use devices with different IMEIs. After all, if this condition is not met, then everything comes down to just finding a specific IMEI. Again, the nearest other phone numbers, receiving a printout of calls and contacts, allows you to reach the services or other subscribers who were nearby, and then to the real owner.


5: A switched off phone can transmit coordinates. To avoid this, you need to remove the battery. Phones with built-in non-removable batteries appeared at the request of the special services

Another myth that has been shown in hundreds of films. In fact, once the phone is turned off, it doesn't interact with the base stations in any way. A similar situation will occur if you put your phone in airplane mode. At this point, all receivers and transmitters are switched off. Another issue is that the operator still has the data and locations of the last calls. And if you've been calling from the same place for 10 years, and then you suddenly decide to turn off your phone and take out the battery, then it won't help in any way.


How do special services work?

Special services can normally receive information about which devices and SIM cards are in the area in question without a request to operators. A sample of a month or a couple of weeks will allow you to filter out local residents, those who are permanently in the area. Even at the sampling stage, it is possible to analyze the information and obtain the full name of the owner or the closest environment, through which it is possible to de-anonymize the suspect. In this way, most of the options are cut off and only the "potential" ones remain.


There are different possible options, but one of the technical possibilities is this. A task force with a hand-held direction finder is deployed to the scene of the cell in which the suspect's phone is located. It is a simple radio receiver with an arrow that shows the signal strength and an antenna in the shape of the letter H, the letter G, a tricky tube or a hyperbolic/parabolic dish (often several antennas for different operating conditions are included). The base station has information about the exact frequency at which the device is currently operating. The operative tunes the receiver to this frequency, rotates the antenna around himself and looks at the needle. Where the signal is strongest is where it goes. He enters the entrance, climbs the stairs and measures the signal. In this way, he finds the right floor, then an apartment and that's it, the "anonymity" is over. For this purpose, they can use the Rohde & Schwarz DDF0xE Digital Direction Finder, which supports work with GSM.


How much do forum probing services cost?

The range of services on the forums is quite large. There are also quite a few sellers who provide such services. There is a choice among all popular operators. The only difference is the price. For example, the cheapest price is for Beeline services. The biggest price for services for Yota. This is a small pleasure for subscribers of this operator.


It's important to understand about location. It all depends on the number of BS around. If there are 5-6 of them, then the signal can be received up to the level of the entrance or the house. The distance to each base station allows you to accurately determine the subscriber's location. If 1-2, then the approximate location will be around 100-200 meters.



Conclusion

Mobile operators have a huge amount of information about their subscribers. It can be easily bought on shady forums. Thus, receiving information about movement, contact numbers, SMS, turning on and off the device, as well as other information. This is a big leak that can lead to de-anonymization and obtaining a sufficient amount of information about the subscriber. 

 

 

 We Got More Tools For #Price

https://t.me/redfishiaven

#Update #tutorial #rianews #software #hardware #technology #money #earning #ipmc #love #giveaways #computing #computers #informationtechnology #learning #AI #redfishiaven #servers #deepweb #darkweb #bitcoin #cybersecurity

See REDFISH IA VEN ( https://goo.gl/maps/LVKkEYNN2LTe9C34A ) in Google Maps.

https://www.youtube.com/channel/UC6k_cFigPCSEtRyALo1D-tA

Be the First To Know About The New #software

 

 

Comments

Popular posts from this blog

Short Codes for Mobile Networks in Ghana (2025)

How to Enable Audio over Remote Desktop?

Gold Or Bitcoin