How to listen to telephone conversations over the Internet. How to listen to someone else's phone - a description of technology

The most obvious way is official wiretapping by the state.

In many countries around the world, telephone companies are required to provide access to telephone wiretapping lines to competent authorities. For example, in Russia, in practice, this is carried out technically through SORM - a system of technical means to ensure the functions of operational-search activities.

Each operator is required to install an integrated SORM module on its PBX.

If a telecom operator has not installed equipment on its PBX to wiretap the phones of all users, its license in Russia will be revoked. Similar total wiretapping programs operate in Kazakhstan, Ukraine, the USA, Great Britain (Interception Modernization Program, Tempora) and other countries.

The corruption of government officials and intelligence officers is well known to everyone. If they have access to the system in "god mode", then for the right price you can have it too. As in all state systems, the Russian SORM is a big mess and typically Russian carelessness. Most technical specialists actually have very low qualifications, which makes it possible to unauthorizedly connect to the system unnoticed by the intelligence services themselves.

Telecom operators do not control when and which subscribers are listened to on SORM lines. The operator does not check in any way whether there is a court sanction to wiretap a particular user.

“You take a certain criminal case about the investigation of an organized criminal group, in which 10 numbers are listed. You need to listen to a person who has nothing to do with this investigation. You simply get this number and say that you have operational information that this is the number of one of the leaders of a criminal group,” say knowledgeable people from the website “Agentura.ru”.

Thus, through SORM you can listen to anyone on “legal” grounds. This is such a secure connection.

2. Wiretapping through an operator

Cellular operators generally look at the call list and movement history of a mobile phone, which is registered in various base stations according to its physical location, without any problems. To obtain call records, like the intelligence services, the operator needs to connect to the SORM system.

There is little point for Russian law enforcement agencies to install Trojans, unless they need the ability to activate the smartphone’s microphone and record, even if the user is not talking on a mobile phone. In other cases, SORM does an excellent job of wiretapping. Therefore, Russian intelligence services are not very active in introducing Trojans. But for unofficial use it is a favorite hacking tool.

Wives spy on their husbands, businessmen study the activities of competitors. In Russia, Trojan software is widely used for wiretapping by private clients.

The Trojan is installed on a smartphone in various ways: through a fake software update, through an email with a fake application, through a vulnerability in Android or in popular software like iTunes.

New vulnerabilities in programs are found literally every day, and then they are closed very slowly. For example, the FinFisher Trojan was installed through a vulnerability in iTunes, which Apple did not close from 2008 to 2011. Through this hole, it was possible to install any software on behalf of Apple on the victim’s computer.

It is possible that such a Trojan is already installed on your smartphone. Have you ever felt like your smartphone battery has been draining a little faster than expected lately?

6. Application update

Instead of installing a special spy Trojan, an attacker can do an even smarter thing: choose an application that you yourself voluntarily install on your smartphone, after which you give it full authority to access phone calls, record conversations and transfer data to a remote server.

For example, it could be a popular game that is distributed through “leftist” mobile application catalogs. At first glance, it’s an ordinary game, but with the function of wiretapping and recording conversations. Very convenient. The user manually allows the program to access the Internet, where it sends files with recorded conversations.

Alternatively, malicious application functionality may be added as an update.

7. Fake base station

A fake base station has a stronger signal than a real base station. Due to this, it intercepts subscriber traffic and allows you to manipulate data on the phone. Fake base stations are known to be widely used by law enforcement agencies abroad.

In the USA, a model of fake BS called StingRay is popular.



And it's not just law enforcement agencies that use such devices. For example, merchants in China often use fake BS to send mass spam to mobile phones that are located within a radius of hundreds of meters around. In general, in China the production of “fake honeycombs” has been ramped up, so in local stores it is not a problem to find a similar device assembled literally on your knees.

8. Hacking a femtocell

Recently, some companies have been using femtocells - low-power miniature cellular stations that intercept traffic from mobile phones within range. Such a femtocell allows you to record calls from all company employees before redirecting the calls to the base station of cellular operators.

Accordingly, to wiretap a subscriber, you need to install your own femtocell or hack the operator’s original femtocell.

9. Mobile complex for remote wiretapping

In this case, the radio antenna is installed close to the subscriber (operates at a distance of up to 500 meters). A directional antenna connected to the computer intercepts all phone signals, and when the work is completed, it is simply taken away.

Unlike a fake femtocell or Trojan, here the attacker does not have to worry about getting into the site and installing a femtocell, and then removing it (or removing the Trojan without leaving any traces of hacking).

The capabilities of modern PCs are enough to record a GSM signal on a large number of frequencies, and then crack the encryption using rainbow tables (here is a description of the technique from a well-known specialist in this field, Carsten Nohl).

If you voluntarily carry a universal bug with you, you automatically collect an extensive dossier on yourself. The only question is who will need this dossier. But if he needs it, he can get it without much difficulty.

October 2, 2014 at 10:07 am

Wiretapping of mobile phones and their protection

  • Wireless technologies

What options exist for wiretapping cell phone conversations, how can one protect against this type of attack, and how can a subscriber determine that his phone may be being tapped? Due to the recent wave of spy scandals, these issues are becoming relevant again. Journalists turned to Ukrainian mobile operators with a request to explain how subscribers should behave in such cases.

What was striking was that almost all the operators that journalists contacted were simply unable to provide answers to the questions posed. The only company that agreed to help were representatives of MTS Ukraine. The operator Life:) did not give an answer at all to the sent request, and Kyivstar replied that they are not experts in such matters, and that such questions should be addressed to special government services (read, Ministry of Internal Affairs, SBU, etc. ) The article below also used information about wiretapping of mobile phones obtained from public sources.

How operators protect their networks
When developing GSM technology, as well as at the stage of its implementation, all requirements from the controlling government were taken into account. authorities to the level of protection. It is because of these requirements that in many countries around the world the sale and purchase of special equipment, such as powerful encryptors, crypto equipment, scramblers, as well as very secure technologies for public communications, are prohibited. But mobile operators themselves ensure the protection of their radio channels using signal encryption methods. Encryption uses very complex algorithms. Which cryptographic algorithm will be used for encryption is selected at the stage when a connection is established between the base station and the subscriber himself. The degree of probability of a leak of subscriber information from the operator’s equipment, as MTS employees assured journalists, is practically zero. Why to zero, we asked - and all because of the complexity and control of access to the operator’s facilities and equipment.
How can you “listen” to mobile phones?
There are only two methods of wiretapping subscribers - the active method and the passive method. When passively listening to a subscriber, you need to use very expensive equipment and have specially trained workers. If you have money (read - a lot of money), you can purchase special systems on the “black market”, using which you can listen to the conversations of any subscriber within a radius of up to 500 meters. Ask why you need to have a lot of money? The answer is simple - the price of one such set starts from several hundred thousand euros. What such a kit looks like can be seen in the next photo. There are many sites on the Internet where you can familiarize yourself with the description and operating principle of such kits and listening systems.

As the manufacturers of such listening systems convince, their systems can monitor GSM conversations in real time, because the operating principle of the equipment is based on access to the SIM card of the mobile subscriber, or directly to the database of the cellular operator itself. Although, if those listening to you do not have such access, they can listen to all your conversations with some delay. The amount of delay depends on the level of encryption of the communication channel that a particular operator uses. Such systems can also be mobile centers for listening and tracking the movement of objects.

The second way of wiretapping is to actively interfere live on the air with the authentication process and management protocols. For this purpose, special mobile complexes are used. Such mobile systems, which are essentially a pair of specially modified phones and a laptop, despite their apparent simplicity and small size, are also not a cheap pleasure - their price varies from a couple of tens of thousands to several hundred thousand US dollars. And again, only highly qualified specialists in the field of communications can work on such equipment.

The attack on the subscriber is carried out according to the following principle: since the complex is mobile and is located at a close distance to the subscriber - up to 500 meters - it “intercepts” signals to establish a connection and transmit data, replacing the operator’s base station. In fact, the complex itself becomes an “intermediary bridge” between the nearest base station and the subscriber himself.

After “capturing” the desired mobile subscriber in this way, this complex can actually perform any control function over the intercepted channel: for example, connect the person being listened to with any number necessary for those listening, lower the encryption algorithm or even disable this encryption for a specific communication session, etc. .d.

What such a complex looks like can be seen in the photo below.

As experts shared, it is impossible to determine 100% that the subscriber’s phone is being tapped at this very moment. But, you can get indirect evidence that may indicate that such a possibility exists. In the recent past, some mobile models (namely push-button phones) had a special symbol-icon in the form of a lock in their functionality. If the lock was closed, then the signal is encrypted, and vice versa - if the lock is open... well, you understand everything yourself.

But in phones over the last 5-6 years there is no such function... It’s a pity. Although, for some smartphone models there are special applications that will signal the phone owner about the configuration of the settings used in the current communication session. One option is to notify the user about the mode in which his conversation is transmitted - using encryption algorithms or openly. Listed below are a few of these applications:

EAGLE Security
It is one of the most powerful applications for protecting your mobile phone from wiretapping. This program prevents any connections to false base stations. To determine the reliability of a station, a check of signatures and station identifiers is used. In addition, the program independently monitors and remembers the location of all base stations, and if it detects that a base is moving around the city, or its signal disappears from time to time from its location - such a base is marked as false and suspicious and the application will notify the owner about this phone. Another useful feature of the program is the ability to show which of the applications and programs installed on your phone have access to your phone’s video camera and microphone. There is also a function to disable (prohibit) access to any software you don’t need to the camera.
Darshak
This program differs from the previous one and its main function is to monitor any suspicious activity on the network, including the use of SMS, which can be sent without the permission of the phone owner. The application evaluates in real time how secure your network is and what encryption algorithm is used at this moment and much more.
Android IMSI-Catcher Detector
This application also helps protect your smartphone from any connections to pseudo-bases. The only disadvantage of this program is that you will not find it on Google Play and if you still want to install it, you will have to tinker with this procedure.
CatcherCatcher
The CatcherCatcher program, like its analogues above, is engaged in identifying false base stations that attackers (or special services?) use as intermediate “intermediary bridges” between the subscriber and the real base station.

And finally, experts also recommended using special applications to ensure the security of personal conversations and data, including encrypting your conversations. Similar analogues are the anonymous web browsers Orbot or Orweb, for example. There are also special programs that encrypt your telephone conversations, photos, and many already use secure instant messengers.

Today I will try to describe the most important points and pitfalls that most people encounter when installing it themselves. In most cases, the installation process is quite easy, but you must follow the instructions carefully to ensure everything works correctly.

So, basically, the software installation process is the same for all versions of the programs, but there are minor differences for each platform - Android, Symbian, iOS, and so on.

Installation principle:

  • The phone must be in your hands, not password-protected or locked, or you know the password to unlock it! You must have enough time to install the software without worry!
  • Choose for your cell phone
  • We give you a link to download the program
  • You download the program to your phone - via a web browser, or copy it directly to the phone from your computer, or transfer it from your phone to the phone you want to control via Bluetooth
  • Install the program
  • Activate the program - enter the unique registration key that we will give you
  • Reboot your phone
  • Set up the program and test it
  • You delete all “traces of your activities” - clear your download history, delete the installation file, clear the history of your calls and SMS that you left when testing the program.

As you can see, the installation process is quite easy! But this is only an approximate sequence - for some programs you first need to Jailbreak (for iPhones and other iOS devices) or obtain Root rights for Android devices. You must strictly follow our instructions for each program. We send all detailed instructions to our clients by email or tell them and help with installation via Skype.


How long does installation take?

The process itself takes only 5 minutes – when you know what you are doing. If you are installing the program for the first time, then expect that you will need about 40 minutes! As practice shows, simple instructions can suddenly seem very complicated if you do everything in a hurry.

And keep in mind that before installing the program, you may have to spend time on preparatory steps:

  • If you have chosen a program on your iPhone, then before installing the program, you need to! The Jailbreak process differs depending on the firmware version on the phone, so I recommend that you first search the Internet for instructions on how to jailbreak your phone, for example, by searching for “jailbreake ios 5.1.1” or “jailbreake ios 6.1.2”
  • If you have chosen a program for Android and want the “listening to the phone’s environment in real time” function to work, you need to make root. How to get root rights for your phone, search the Internet yourself, since for almost every Android phone model the rooting process is different!

So, you have the phone in your hands, there is no password on it, you have already performed the preliminary steps (Jelbreaking or Rooting), you have studied our instructions and are ready to install the program yourself... What else do you need to know??

“Pitfalls” or “what you need to know so that there are no problems during installation”:

  • How to turn on GPS on iPhone — go to the “Settings” menu -> “Privacy” -> “Geolocation” and enable geolocation completely, or in manual mode leave only the necessary services.
  • How to turn on GPS on Android — go to the “Settings” menu -> “Location” and turn on GPS satellites.
  • How to turn on GPS in Symbian — go to the Settings menu > Settings. Apps > Location > Location Methods > Assisted GPS (A-GPS). On Nokia Belle FP1 devices: Select Menu > Settings > Settings. Applications > Location > Find my location > Location methods > Assisted GPS (A-GPS).
  • How to turn on GPS on BlackBerry — On the Home screen or in a folder, click the Options icon. Click Device > Location Settings. Set the Location Services field to On. location determination. Press the Menu key image > Save.

Well, that seems to be all... in any case, we are always in touch and will help you with installing and configuring programs.

Telephone wiretapping Someone else's phone Wiretapping program Reviews Questions Support

Operator:

MTS Beeline Megafon Tele2
Viber

ENTER PHONE NUMBER:

LISTENING TO SOMEONE ONE'S PHONE


In parallel with the invention of any means of communication, research begins on the possibility of intercepting information. And no matter how hard the developers try, creating absolute protection is impossible: even an ordinary conversation between two people in a closed room can be overheard from a fairly large distance, and the possibilities for this are several times greater.

A BRIEF EXCURSION INTO CELLULAR COMMUNICATION TECHNOLOGY


Many users take cellular communications for granted, without even thinking about the principles of data transmission. Of course, in-depth technical knowledge is not necessary to successfully use the services. Moreover, modern devices automatically perform all hidden operations to ensure communication - they tune in to the nearest communication station, signal about low quality coverage, etc. However, the better you understand the operating principles of any mobile operator, the more benefits you can get from its services - including protecting your privacy and getting more information about other people.

Let's start with the fact that your phone is constantly monitoring the signal and is automatically configured to receive information from the base station whose signal is currently stronger. The quality of communication at a specific point in your location is reflected on the gadget: from an empty or crossed out label (outside the coverage area) to a full scale indicating a high signal level. While your phone constantly picks up the operator’s signal, the communication station monitors your gadget in response, identifying the user by an individual SIM card number. This is precisely why a service appeared where you can read someone else’s Viber correspondence or hack WhatsApp

What this gives to the operator: he is always aware of your exact location and can send you a call or message at any time.

What does this give you: you receive calls and SMS in real time, through the operator you can establish the reliable location of any subscriber, in an area of ​​poor coverage your phone will discharge faster, since it is more difficult for it to establish a strong connection with the operator.

All subscribers of the cellular operator are under constant control of communication stations in order to establish a connection at any time. Basically, it works like this: you direct a call or message to a specific number, your phone converts the sound into a wave of a certain frequency (each operator broadcasts at its own frequency, the wavelength may vary in different regions) and sends it to the nearest communication tower. Next, the tower redirects the signal to the station that is currently in radio contact with your recipient. As soon as the subscriber accepts the call, his tower establishes a connection similar to yours, and you can hear each other.

WHO CAN LISTEN TO SOMEONE ONE'S PHONE


Nobody really advertises this information, but anyone can. Unlike popular instant messengers, which encrypt their messages in several layers, a radio signal from phone to phone flies freely, like a bird - anyone can intercept it. A clear example of the defenselessness of citizens against wiretapping can be the famous “jammers” - at particularly important facilities or when protecting major government politicians, the special services turn on special devices that simply jam the airwaves and interrupt radio contact with the communications tower.

Works for you! We strive to help as many users as possible, because a happy family life and well-being sometimes depend on whether it works out. Read about our work and thousands of successful ZHUCHEK clients!

Latest reviews about the service

This is exactly what I needed!

- Nazarov

I changed my email address, how do I change my profile?

- Yuri A.

In general, everything is stable. Fine.

- Ratmir

I use it for reasonable purposes, but others don’t!

- Victoria

Was very pleased.

-Vilnus

Fuck you doing this, my girl controlled me for 2 months, then she admitted it herself, tortured her conscience, this is not right.

- Denis V.

Admins, I wrote to you by email, but didn’t get a response, is there a system failure?

- Edik

Guys, how much does the complex service cost?

- Cleopatra

Sometimes there are delays in printing, but I'm happy with it.

- Oleg - Vovan

Recently, one person bothered me and contacted the authorities, but they refused, but you helped, thank you.

- Yuri.N.

THANK YOU SO MUCH!!!

- Vika N.

Tell me, can I put my phone on control?

- S. Oleg

We need Vimpelcom!!

- S. Oleg

Increase the number of operators!!!

- Kenedi

First time I see this.

- Basse

There are no analogues. so I'm happy.

- Azamat

Wiretapping wife's phone- a simple but very reliable way to find out the truth about her suddenly changed mood and behavior lately. In general, any changes in behavior (sudden affairs, delays at work, frequent get-togethers with friends, etc.) are a clear signal that something is wrong. The easiest way to dispel any suspicions or, on the contrary, confirm them is to take and check her phone. Contact lists, call durations, SMS costs - all this can be found through queries. How to check your wife's phone, if queries do not provide the necessary information? You can write an application to the cellular operator to provide detailed information about all transactions related to your personal account, but there must be compelling reasons for this, such as a criminal investigation. No one will give information just like that, due to personal need - information about each client is confidential. But wiretapping wife's mobile phone still possible.

Reliable and safe wiretapping

How to track your wife via phone and not get caught? It's simple - you just need to use a reliable application! The VkurSe application meets the two most important requirements for wiretapping programs - availability and use, which means the impossibility of being caught in surveillance.

The VkurSe application is a sure way to keep up with the personal life of anyone, as long as this person has a smartphone/tablet:

  • The program will provide all correspondence - both SMS and instant messenger messages.
  • You will be able to listen to all incoming and outgoing calls.
  • Using SMS with keywords, you can control your phone remotely (turn it on, turn it off, reboot, etc.).
  • You can be aware of a person's movements thanks to GPS.
  • The program disguises itself as a system file and without the help of special software it is impossible to find and remove the program.

A how to listen to your wife's phone for free? You can install the program and try it out for 7 days, and after that, if you like it, you can become a subscriber to the service and get access to all the functionality (remote file manager). Of course, using the features is not free, but the effectiveness of use and, most importantly, the truth are worth every penny spent.