Phone tracking: methods and tools. How to track a person without special skills? Is it possible to follow a person

Secret instructions CIA and KGB for gathering facts, conspiracy and disinformation Popenko Viktor Nikolaevich

Methods for detecting self-surveillance and avoiding surveillance

Identification of a search

The agent must constantly monitor for possible surveillance of himself.

An integral part of surveillance is usually the conduct of a search of the suspect's apartment by the relevant authorities. The agent, in order to determine whether the door was opened in his absence, sets before leaving (after closing the door) "controls" - various inconspicuous marks: glues the hair with one end to the door, and the other to the platband; inserts a match into the gap between the door and the door frame. And if later it turns out that the hair is peeled off (the match is on the floor), then it means that someone has visited the apartment. Another way of control is memorizing, before each departure, the relative position of objects in the room. To facilitate memorization, the objects are installed each time in a certain (the same) order, and before leaving, they look at them from the same point in the room. Let's say the room was left as shown in fig. 254, and upon arrival has the form as in Fig. 255. Some changes are visible: a- the floor lamp is shifted to the right; b- fruits on the table are located to the left; v- books on the upper (second from left) shelf are not tilted, but vertically; G- the bottle on the table is shifted to the right. Thus, the fact of the search is obvious.

In the event of an upcoming long absence (departure), in order to avoid the possible forgetting of the detailed arrangement of objects in the room, they can be photographed, and upon arrival, the picture can be compared with the real picture.

Rice. 254.

Rice. 255.

Identification of outdoor surveillance

Enemy counterintelligence usually sets a so-called tail for the suspect - constant surveillance. The agent's task is to detect the tail in time and avoid it (or take any other actions that were provided for in this case).

Eye contact with the same person more than twice can be a sign of surveillance. To check his suspicions, the agent can use various techniques, some of which are set out below and the results of which confirm surveillance.

… An agent who has left the house enters the store and from the inside looks through the glass window at the car that was previously parked not far from his house, and then turned out to be driving in the same direction the agent was following. The car stops in front of.

... The agent suddenly stops and pretends to look at the shop window. In the reflection of the display glass, he sees that a man walking on the opposite side stopped under the cover of a tree.

... In rainy weather, the agent, covered with an umbrella, stops and stands for a very long time, pretending to be examining a shop window. The person walking on the opposite side also stops and begins to examine the shop window on his side of the street, and, despite the pouring rain and the absence of an umbrella, he does not go further and does not enter the store.

... A female agent walks into a women's hat shop and pretends to try on a hat in front of a mirror. In the mirror, she sees that the man whom she had noticed earlier came after her, but he shows little interest in the assortment of the women's store.

... Leaving the store, the woman returns to it; the person who followed her is also returning…. The agent stops in front of a store closed for a break and pretends to wait for it to open. A couple of lovers who followed him nearby pass by, stop, hug, return and slowly starts to walk back and forth.

... The agent pulls out any insignificant piece of paper from his pocket, pretends to read it carefully and then throws (“drops”) onto the sidewalk. The man walking behind picks it up.

... The agent gets into a subway car (or other form of public transport) and then exits, pretending to sit in the wrong direction. A previously noticed person jumps out after him.

Surveillance is often carried out from a vehicle, both the driving and the walking agent. When spying from a car, special services use interchangeable numbers so that the same number is not conspicuous. In some countries, such a number can be inserted into a special frame for quick change. On closer inspection, this border is usually noticeable.

The special services use several cars of different brands and colors, some of which move along parallel streets and are connected to surveillance using radio communications. The presence of surveillance can be detected: by suddenly changing the direction of movement or speed; sharply rearranging from row to row; stopping unexpectedly, slightly driving away from the parking lot; drive through a red light; showing a turn and waiting for the same signal from the intended tail; turn the other way, watching the pursuer in the mirror. If this is a "tail", then he will be forced to repeat all these dangerous maneuvers.

Avoiding observation

First, consider avoiding surveillance when an agent moves around without a car. One of the rules that an agent should be guided by is: do not get into the first taxi that turns up, land at least in the second, or even better, skip the second, but get in the third.

When an agent, while moving on foot, feels that he is being watched, he can try to break away from observation, using stereotyped techniques based on changing the rhythm, direction and type of movement, creating certain barriers behind him, and lulling the vigilance of the “tail”.

Depending on the situation, the agent may use some of the following tail avoidance techniques:

1. Long looping in crowded places (metro, train stations).

2. Use of walkways, apartments or courtyards and other "back" passages.

3. Frequent change of modes of transport.

4. Transitions in the metro from one line to another.

5. Application of "labyrinth" routes.

6. Unexpected acceleration after turning a corner with the intention of overshooting significantly further than would be expected at normal driving speed.

7. Leaving moving vehicles.

8. Entering and exiting public transport at the last moment when the doors are closed.

An important point in avoiding the "tail" is the agent's ability to quickly change his appearance: clothes, shoes, headwear, gait, face. As for the latter, then, in principle, it can be made up until completely unrecognizable, but for this

it takes too much time, which, of course, does not exist when escaping persecution. However, there are others quick ways face changes, some of which will be discussed later.

As for the rest, for this case, the agent (both man and woman) has a special wardrobe: clothes that change color when turned inside out, with detachable floors and sleeves (making the clothes shorter and changing their appearance) or (vice versa) releasing (turning away) genders and sleeves (making clothes longer); shoes from which the top is removed - a cover and it changes color and style; roll-out bags and packages; false glasses; an umbrella that fits in a pocket. The pictures show a part of such a wardrobe: a hat that changes color and style when turned inside out; coat, when turning out and unfastening the sleeves and the floor, turning into a jacket with a different color; changing skirt; coat jacket; changing shoes; changing (transformable) jacket. A quick change in appearance can be carried out when entering, for example, into an entrance. You can go to a store that sells clothes, where you can transform in a fitting room. A female agent to break away from the male “tail” can enter the ladies' toilet and leave unrecognizable, leaving the spy in complete bewilderment.

When the agent travels by car, the escape option can be, for example, creating the impression of the accompanying people moving in a direction well known to them from past trips and unexpectedly leaving the intended route. In general, the success of an agent's departure from counterintelligence vehicles depends on the agent's knowledge of local roads, on his ability to drive a car, and, finally, on the car itself (to what extent it will be adapted for such a situation). The first two points are achieved by practice driving on the terrain. As for the agent's car itself, although outwardly they should not differ much from those used in a given country, inside it must be equipped (re-equipped) appropriately, that is, be powerful enough (high-speed) and ensure the agent's safety in different situations.

This text is an introductory fragment. From the book Self-loading rifle arr. 1940 [NSD-38] the author USSR Ministry of Defense

RIFLE SAVING AND CARE General 89. Regardless of the conditions in which the shooter is, he must always keep his rifle clean, handle it with care, inspect it daily to make sure it is in full serviceability and combat readiness.

From the book "Tigers" are burning! The defeat of Hitler's tank elite by Kaidin Martin

WHAT THE RUSSIAN SOLDIER PRESENTED Each war sounds different. The sounds were different on different battlefields. Russian shells have their own sound, perfectly distinguishable from the rest. When you are at the final destination of shells like the Germans on

From the book Technique and armament 2012 04 the author Technics and Armament Magazine

I carry everything with me According to the materials of the Russian State Archive, A. Kirindas and M. Pavlov prepared for publication In the early 1930s. for the delivery of ammunition in conditions of enemy shelling, samples of tanks and supply tankettes were developed. The first project of a supply tank was carried out on the basis of a light

From the book Military memoirs. Salvation, 1944-1946 author Gaulle Charles de

From the book Nowhere to Hide. Edward Snowden and Uncle Sam's keen eye the author Greenwald Glenn

Departure Speech by General de Gaulle at the Triumphal Arch in Place de la Etoile November 11, 1945 They gave their lives for France and are celebrating with France. They died on the battlefields, where our fate was decided in full view or far from human eyes. They returned to us today,

From the book How can Russia defeat America? the author Markin Andrey Vladimirovich

Chapter 4. The Harm of Surveillance Around the world, governments are actively trying to educate their citizens not to regard privacy as too important. With long, incomprehensible phrases, they convince people that tolerating an aggressive invasion of privacy is

From the book Secret Instructions of the CIA and the KGB on Fact Gathering, Conspiracy and Disinformation the author Popenko Victor Nikolaevich

Other Observations A. About breastworks for tank trenches One observation is related to the breastworks of the Tavakalna division in 1991. The bulk of the positions of the armored vehicles were deployed towards the direction of the expected attack at an angle of 20 to 60 degrees.

From the book Military Special Forces of Russia [Polite People from the GRU] the author Sever Alexander

What were the Chinese screens? It should be emphasized here that there were often no Chinese barriers on the road itself. Moreover, they did not always include the mining of the road, its damage by explosions or the organization of forest blockages. The road is mostly

From the book The Great War is not over. Results of the First World War the author Mlechin Leonid Mikhailovich

Surveillance In some cases, the residency requires surveillance of a specific person. Its organization, among other things, depends on the personality of a particular object, which mainly determines the degree of complexity of the operation. So, surveillance can be arranged,

From the book The Book of the Wind for Rifle Shooters by Cunningham Keith

Organization of interaction of special forces units and subunits with undercover intelligence, army and front-line aviation, local authorities and the Armed Forces of the Republic of Afghanistan in the interests of identifying and destroying caravans with weapons and ammunition, creating a network of well-wishers in

From the book Soviet Russia (USSR) and Poland. Russian anti-Soviet formations in Poland (1919-1925) the author Simonova Tatiana Mikhailovna

Organization of observation Observation was the most accessible, widespread effective way obtaining information on the movement of caravans and rebel groups. Observation was carried out visually using binoculars or night vision devices and technical means

From the book The Secret Canon of China the author Malyavin Vladimir Vyacheslavovich

Part one Balkans. Bloody dispute of the Slavs among themselves Everything will go to waste because of some absurdity in the Balkans, predicted Otto von Bismarck, the iron chancellor and unifier of Germany. The Great War began with the assassination of the heir to the Austro-Hungarian throne in

From the book Basic Special Forces Training [Extreme Survival] the author Ardashev Alexey Nikolaevich

OBSERVING SKILLS “The shooter should be minding and remembering an accurate mental picture of the wind indicators from shot to shot.” ​​The goal of observing skills is simply to improve your ability to see the details of the wind indicators. Here you are not

From the author's book

§ 2. "These units can represent an anti-Bolshevik force ..." As noted in the first chapter, the French General Staff and the French military mission in Poland played a special role in the implementation of the project to create anti-Soviet formations in Poland. twenty

From the author's book

99. It goes without saying that everything already exists in the nature of things. Engaging in any business, after a long time, it is possible to reach such a state when everything is carried out as if by itself. Therefore, the one who is skilled in matters of war sees only an army in front of him, speaks only of

From the author's book

Optical surveillance equipment Visual surveillance is carried out using optical daytime surveillance devices, and at night and in conditions of limited visibility - night vision devices. To enhance the capabilities of ground reconnaissance in visual observation and

The work of a detective or a private detective has always been incredibly difficult, if only because not everyone is able to become a shadow, invisibly following on the heels of the ordered object. But in this millennium, espionage, like most other aspects of life, is moving into a new plane - the IT sphere. Sherlock Holmes distinguished forty-two bicycle tire prints alone - practically the entire London assortment of those times. But our contemporaries do not need most of the skills of the past centuries, it is enough just to have the necessary equipment at their personal disposal.

How to follow a person correctly - comparison of bugs

There are many methods of surveillance, and the advantages and disadvantages of each one depend on the specific type of device. Here are three main categories, which were dubbed by quite funny names at special forums:

  • "Sledgehammer". They hold the battery charge for a long enough time, but they are rather large in size, making them easy to find.
  • "Grasshopper". They are more compact in size, but quickly discharged, which is why they received the unofficial name "disposable".
  • "Ninja". They are miniature and "hardy", but, here's the bad luck: in order to get one, you will have to become an agent of the FSB, the only one for whom this technique is produced.

Thus, each of them has its own flaw, which nullifies the very essence of a personal bug. But those who do not know how to follow a person will not have to get a job in the special services. "Credit card" is a unique device that combines compactness with high energy consumption, but at the same time is open to the general public.

To track the desired object, it is enough to throw a beacon on it; this is not so difficult to do due to the many advantages of the model:

  • The device was called "credit card" for a reason - it corresponds to the shape and size bank card, slightly inferior in thickness. This allows the device to be hidden almost anywhere without the risk of detection.
  • The device can operate successfully for 9 months on a single charge. Thanks to this, there will be no problems with how to discreetly trace a person. You can hide the lighthouse anywhere you can't see it - for example, by sewing it into the lining of your clothes.
  • The device does not require any "feeding" in the form of a monthly fee. The only possible costs may arise in the context of the SIM card and are determined by the operator's tariff.

Why SIM? Technical details of how to trace a person

The device actually does not differ in broadcast and bearing from mobile phone because it uses the GSM data transmission format. It is because of this that it is difficult to detect the device, even if you know about the surveillance in advance. It also facilitates the activation and configuration process, which consists of three simple steps:

  • First of all, you need to purchase the card itself. "Credit cards" are compatible with any operators of the Russian Federation.
  • After the initial activation, insert the card into a special slot inside the beacon, after fully charging its battery.
  • Further, with the help of special SMS commands, it remains only to "explain" the bug who is its owner and how often it is necessary to send report messages with their coordinates.

After these simple procedures, which will take no more than a few minutes, the device is ready to use. The owners of such a lighthouse will no longer be concerned with the question of how to track a person - the device itself will do all the work, and the owner's only concern will be that the bug is in the right place on time.

How to track anyone - from relatives to bystanders

Events are very different and unpredictable, and therefore it is almost impossible to describe all the ways to use lighthouses and the prerequisites for such a need. However, there are a number of common situations in which bugs are as indispensable as necessary:

  • If you know how to follow a person, you will be able to take care of your relatives, with whom, for one reason or another, you cannot be close. Whether it's a small child or elderly parents, the beacon will always show you where they are. Also, a hidden alarm button is built into each model, which allows you to discreetly notify you via your mobile in an unpleasant situation.
  • If relatives are suspicious - the children are walking in a bad company, and the wife lingers at a corporate party, you can always find out which of them was where and when. With a beacon, you do not need to learn the intricacies of how to secretly track a person with whom you live under the same roof - you just need to hide this amazing device in his things.
  • Tourists on the hike will feel completely safe if they take lighthouses with them. So the group will surely not get lost, and in the event of a disaster, it will be able to give a signal, even if all other methods have exhausted themselves.
  • Bugs will even help in career advancement - for example, in this way you can study where a potential partner or leader is in order to have a ready approach to him. The beacon is also useful when collecting various kinds of dirt on unwanted employees.
  • Have you become a witness or even a victim of a crime? If you manage to slip a beacon on the villain, he will not turn away from justice - including one that can be carried out without consequences and courts.

With the help of a bug, you will learn how to track not only a person

Who would have thought only 10 years ago that bugs would be widely used in everyday life, and in areas that were not previously associated with surveillance even in the minds of the most sophisticated science fiction writers - for example, in controlling the movement of animals. But you have to watch them in the same way as you follow a person, while the lighthouse allows you to secure even property:

  • By sending a parcel, you can be sure: it will never get lost among others and will not be received by a stranger. In addition, you will always know at what stage of delivery it is, which will reduce stress in the event of, for example, a delay at customs.
  • The car will be reliably protected from theft if you hide the beacon inside, which will serve as an excellent insurance in case of burglary. Finding a stolen car will take several minutes, which is tens of orders of magnitude faster than using the police.
  • Also, cars can be monitored in a commercial aspect. Taxi drivers, bus drivers, truck drivers, truckers and patrolmen all use accountable vehicles. Often in such situations, "paper" fuel consumption is much higher than the actual one. But how can you track a person who dumps gasoline and forges documents? The answer is simple: calculate the exact mileage and fuel costs according to the data of the beacon hidden in the car.

How to start following a person now?

To get this miracle bug, you just need to order it on our website. To do this, you need to fill out an online form, which will take no more than 5 minutes, and after the final confirmation of the order, the parcel with the beacon will be immediately sent to the specified address... Within a few days you will become the proud owner of the equipment that millions of spy boys and thousands of business men who use bugs in business dream of. Everyone who knows how to follow a person and what benefits it promises will not hesitate and advise: order the device right now.

Service cost from 3000 rubles.

Sometimes in the family, one of the spouses begins to suspect the other of treason. But no one wants to bring unfounded accusations to the other half. In this case, you should contact detective agency, whose staff will establish surveillance of the client's spouse.

Surveillance for many of the spouses is a last resort. Not everyone is ready to do this, fearing to violate the personal space of a loved one. But living in constant doubt is also impossible. Therefore, people decide to play it safe. They decide to hire a detective who will find out what the other half of the client is doing during the hours when she is not at home, with whom he communicates, how he spends time.

If you want to get rid of doubts, contact our detective agency "Private detective". We are located in Moscow and are ready to provide monitoring services for the client's spouse. We are often approached by people who begin to doubt the sincerity of their relationship with their partner. Our frequent clients- people with a big age difference, wealthy businessmen, employees of companies who, by the nature of their work, often travel.

Features of the detective's work

Our specialists monitor a person in such a way that he does not notice the detective who is continuously following him. In our work, we use specialized equipment. We often use a GPS beacon, which allows us to receive data on the location of an object. It is a small transmitter that the client needs to attach to the clothes of his other half, put it in her bag or briefcase, and install it in the car in which the husband or wife moves around the city. The peculiarity of GPS beacons is that they transmit signals over a long distance. Therefore, there is no risk that the detective will lose track of the object.

Surveillance will allow the client to find out the truth. And this the best way than to suffer all the time in ignorance. Contact us if you have doubts about the loyalty of your husband or wife. Our detectives will conduct an investigation, draw up a report that will indicate all the movements and meetings of your other half. In the case of divorce proceedings, you can use the information provided by us as evidence of the reason for separation from your spouse.

Why do you need to follow a person? Each has its own goal. Someone wants to catch a soul mate in treason, and someone wants to bring a business partner to the "clean water". Regardless of your goals, the specialists of the "Detective Online" agency will conduct surveillance unnoticed by others, collecting the necessary evidence in a short period of time. We have modern technology in our arsenal that allows accurate observation with photo, audio or video reporting.

Human Tracking Services

The services of a private detective, in addition to conducting an investigation, may include surveillance. It will allow you to find evidence to expose a person, or to give reliable information about his real life... We are ready to establish spy on the wife, to follow the husband, business partner, child or any other person of interest to the client.

The confidentiality of the client's personality is guaranteed by the contract concluded when registering the service. We do not divulge the secrets of our customers, so every customer can be calm about their reputation.

Tracking methods for a person:

  • outdoor surveillance;
  • phone calls;
  • social networks.

Outdoor surveillance is the most popular. Our experts will follow the person until all the circumstances of interest to the customer are clarified. In the process of surveillance, irrefutable evidence of guilt is collected, or the refutation of the client's conjectures.

The cost of spying on a person

The price for the services of spying on a person varies in a small price range. It depends on the number of people involved in the observation process, the chosen method of providing evidence, the complexity of the work, and other factors. So, spying on a wife or husband to identify the fact of infidelity will cost less than spying on a business partner. The difference is that a business person can visit a huge number of places in one day. Our specialists will follow him on his heels to collect information. While conviction of cheating is much easier, since the lovers meet in one place, which allows you to collect evidence quickly.

You can find out the exact cost of surveillance by calling our office at the phone number indicated on the website. We do not insist on the provision of our services, therefore, after discussing the cost, the client will have time to think about or refuse the deal.

« Can I track my phone without the owner's consent?», « How can you monitor your phone through a computer?», « How to track your wife's (husband's) phone? " - these and many other similar questions arise in people for various reasons.

Follow a person on the phone possible due to distrust, jealousy, as parental control, control over employees of their company or over elderly parents, etc. We accept that everyone has the right to do so and give concrete opportunities to implement all this in reality.

Our Vkurse program will allow you to monitor your phone a spouse, child or employees without their consent, moreover (if there is an urgent need for this) they will not even notice that their phone is under round-the-clock surveillance. Therefore, our answer to the above questions is one: “ Of course, you can follow any person through the phone.". It is very easy to do this - you just need to install the Vkurse program.

Vkurse program provides tremendous opportunities to spy on someone else's phone:

  • intercept SMS messages;
  • record telephone conversations;
  • read messages on VKontakte, Viber, WhatsApp and Odnoklassniki;
  • take screenshots at set intervals;
  • copy messages to your computer;
  • monitor incoming and outgoing calls;
  • determine the location of the subscriber and much more.

Installing the Vkurse application, monitoring the phone, listening to conversations and the like is not always doing something illegal, penetrating into private life - this is also a lot of opportunities that will help save the family, protect the elderly and track the movement of children in order to arrive on time to help them.