How do they get the whereabouts of a person by an anonymous phone number!?

Father

Professional
Messages
2,605
Reputation
4
Reaction score
589
Points
113
There are a huge number of myths and conjectures about how exactly they can find an anonymous number of an anonymous mobile phone. We know the truth and now we will share with you.

There are three common versions: determine the source of the radio signal, calculate with special equipment at the base stations of the cellular network and calculate through various hidden capabilities, supposedly specially available in each phone.

I took part in the real investigation of the real case, where the criminal was identified by his mobile phone. And I will say the following: the first version contains a little truth, but the main method of capturing has nothing to do with all three.

Generally speaking, investigators and criminologists use cool special equipment and expensive equipment only in the cinema. In reality, the main tool of the investigator is his head and pieces of paper. And the main method - the language will not turn to say "deduction" - let's call it "search for patterns" or "statistics". And then there is such a thing as Time.

Time is always against anonymity: we do something too on time, and something not at all on time. And if somewhere there are logs of our affairs with time stamps, we cannot hide. And logs in mobile communications are kept for each byte. Further details.

How do you calculate who works with the left SIM card?
You will not believe: on the "leading" phone - your real one. After carefully reading the next paragraph, you will understand how easy, simple and fast everything is. In the description, the term "switching on" is used - this is the moment when the "anonymous" device went online. So let's go, let's look at different situations.

Situation 1
You are using an "anonymous" mobile phone, and the real one is nearby and switched on. Investigators request the logs of the entire cell in which the "anonymous" apparatus operates (worked). That's all they need to figure out you (and not only "hot on the trail", but also in a week, a month, slowly, in the armchair of their office with a cup of coffee). They make recursive selections at the intervals of inclusion and see who else was in the cell except for the "anonymous" device.

For example, there were 1000 more phones in one cell. The next time you turn on 500 of those that were the first time. At the next - 20 of those who were for the first and second time. Most often, it is possible to find exactly a couple of phones from the logs of three or four inclusions that do not leave the cell. Less often, more inclusions are required: in this case, you can try to break through the history by the numbers of the sets of matches, as well as their owners. If this is a 90-year-old granny of which she has had a number for 10 years and she has not left the apartment for 5 years, then, obviously, the option disappears.

Thus, the investigators quickly enough go to the real phone number, one call history on which will reveal all the cards. Often, the special services are lucky with 2 switches: quickly examine and discard hundreds of numbers - it's only a matter of the number of employees. It even happens that the real number is reached from the first and only switch on "anonymous"! Don't believe me? But in vain. The dynamics in the cell, the behavior of other devices, weekdays / holidays can significantly simplify the work of the security forces. While the "anonymous" mobile phone is working, all the others can leave the cell, except for yours (well, the rest of the people took it and moved somewhere) or make outgoing calls, send SMS. Now is the time when everyone is not a minute without a mobile phone. And it scares you: you cannot simultaneously make outgoing calls from two phones. So while you "work" with "

Example
You surf the Internet "anonymously" and then they call you on your real phone. You start talking and your internet data traffic drops for a statistically different time from the time between average page loads. Matching all calls in the cell for an exact match with a traffic failure is a matter of seconds - and your number was found. It may be, of course, that you just went to the toilet, but it is not difficult to check whether the required number is "found". And if you get a call twice?

The criminal turned on the device, sent an SMS demanding a ransom, turned it off. A day later he turned it on, called to discuss the terms of the ransom, turned it off. The third time I turned it on - I told the meeting place and time, turned it off. We examined the logs for three "inclusions" - who at that moment was in the cell all three times. From the second "reconciliation" there are four numbers left, from the third - one. Situation two

You use an "anonymous" mobile phone, and turn off the real one prudently in advance. Incredibly, you only made things easier for the investigators. They will just see who disconnected - it was disconnected (the phone transmits a disconnection signal to the network), and did not leave the network shortly before the "anonymous" one appeared. We can safely say that there will be only a few of these in the cell, or even you are the only one. To clarify the data, you can compare who turned on after the "anonist" was turned off. And also to break through on grannies and others. As you can see, turning off this device while using the "left" only worsens anonymity.

Situation 2
You leave the real phone at home on, and you yourself go to another cell and only there you turn on the "anonymous" one. Thinking a tricky plan? But nifiga. Three factors still give out your real device. First, the same scheme is being worked out as in the first situation, only not one cell at a time, but several cells. First, one at a time, then the neighboring ones, and so on until it comes to comparing the cell of the "anonymous" with the hundredth of the present. Secondly, and most importantly: your device is at home without an owner and cannot answer calls. Therefore, sooner or later there will be missed ones, which are also visible in the logs. It is only necessary to compare on which device the anonymous "inclusion" was missed at all times.

Do you think many of the subscribers constantly do not answer the phone just at the time when you are leaving anonymous? Nobody but your real phone! In addition, this method helps well in general search: investigators can very quickly call the numbers, which remains after comparing the cell logs. And if the phone is not taken - as a suspect. Thirdly, you cannot leave this device anywhere - every time in a different place. Most likely he is at your home. That is, in one place for each inclusion. This can be used to construct an additional sample for the filter: how many of the same devices were in the same cell. In general, all this will lead to a quick, albeit slightly less rapid than in previous cases, access to the real number.

Situation 3
You turn off your real phone at home, and you yourself go to another cell and only there you turn on the "anonymous" one. See situation # 3 + situation # 2

It turns out that the whole scheme works on the fact that several inclusions are made from one number. That is, if you leave the number only once and then throw out your SIM card and phone, it will be impossible to find it? This will only help if the "case" is yours at one time and there were no other similar cases and will not be any more. Changing numbers will not make it difficult to find a real phone. For example, in the same example about blackmail: how can changing the number help - after all, calls are made to the victim of the same one.

Investigators will simply punch not on one number 3 inclusions, but three inclusions of different numbers. Similarly, "dark deals" on the Internet - numbers are easily combined in a common "case". Let's say more - frequent change of numbers only worsens security. investigators will receive groups of numbers and can easily punch, for example, where the SIM cards are from. And catch you red-handed during the purchase of new ones or contact the "seller" who will make a "robot" or merge the number from which you called him. Anonymity is not a lack of identification data. This simply cannot be in the modern world. Anonymity is a good imitation of an ordinary, but not real, person.

What will the secret services give a real phone number?
We have considered how easy and simple it is to "break through" the real number of the suspect by his "anonymous" one. But what will infa give about a real phone? Yes, everything, except for the information on whom the number is issued.

Investigators will see who you called and there are probably many of them who know you personally. They will see who contributed to the account and how. Most likely, there are payments from a real card through an ATM or from a real WebMoney wallet, etc. That is, in fact, you sailed.

How is mobile phone bearing?
A task force with a hand-held direction finder moves to the place in the area of operation of the cell in which the suspect's phone is located. This is not a screen with a dot, as shown in the films, but a simple radio receiver with an arrow that shows the signal strength and an antenna in the shape of the letter H, the letter Z, a tricky tube or a hyperbolic / parabolic dish (often several antennas are included in the kit for different operating conditions ). The base station has information on exactly what frequency the sought apparatus is currently operating on. Oper tunes the receiver to this frequency, turns the antenna around him and looks at the arrow. From where the signal is strongest, it goes there. He enters the staircase, climbs the stairs and measures the signal. In this way he finds the required floor, then an apartment and that's it, "anonymity" is over. In the case we observed, the time from the entrance of the "gazelle" of operas to the exit under the white pens was 25 minutes. Considering how many of them were spent on recommendations "open, for we will open anyway", fees and withdrawal of the suspect, you can estimate how many, among dozens of houses, hundreds of entrances and thousands of apartments, they found the right one.

So what do you do? Is anonymity a myth?
Above, we examined in detail that having a real personal mobile phone, we will never be anonymous, even from a newly purchased new phone and a SIM card just bought in the doorway without registration. As we said, accessible anonymity is a good imitation of an ordinary, but not real, person. And the absence of personality in general in our modern informational realities is simply impossible. After all, here you are, the person, sitting right here and reading this article.

Real hackers, whose freedom, and perhaps life, depends on anonymity, do not use mobile phones in everyday life. They don't use it at all. Only one-time calls, skype, etc. And they have no "everyday" life. Eternal darkness, nothingness. There are no friends, no relatives, no habits and "favorite" places. That's what anonymity is. But, in fact, there is a full-fledged other life, other friends and other "places" on the Web. And, often, not only not worse, but also better than in real life. So it's not all that sad. Just not like most. However, this is no longer "anonymity".

You have a name, albeit a nickname, but you are known by it, you have Internet friends and places where you can be found on the net. You can even be "punished" without going to Siberia. Thus, it is easy to understand that not only anonymity is conditional, but also freedom, and that "crime" and "laws" are not the same, but are relative to society. And "societies" are different.

By learning a little about the way investigators work, you can take steps to improve security on a case-by-case basis. For example, in situation # 3, you can set an answering machine on a real phone or ask a friend to answer if they call. Register a real phone to a real grandmother to pass the "granny filter". Try to randomly combine situations, leave your phone in different places, etc. This will somewhat complicate the work of investigators, but also complicate your "dark activities". Will it help in the "X-hour"? Far from being a fact.

So think carefully, with criminal inclinations, is the game worth the candle at all, or, perhaps, after one or two successful cases, it is better to buy an apartment, a car, some kind of white business and tie up with the "dark side" forever?
 
Top