The most frightening way to destroy any person personal life is monitor the target by mobile telephone
(Picture 1) |
Kimmo Huosionmaa
Do you know what happens if somebody will spy the target by mobile telephone? In the most simple way, is the case, where the observer just opens the messaging program like WhatsApp and makes a call to the observers own telephone, and then puts the messaging program backward and then this person can break any person's privacy, what he or she wants. This is one of the simplest ways to observe the target even in 24 hours per day if that person doesn't open that telephone and notices that program.
Also if the tracker can get the GPS-systems code or connect another device to the user account, can the operator track every move, what the target does, and if the CEP (Circular Error Probability) jamming is removed, can the surveillance operators track the target even inside the house by the satellite. Another way to handle that kind of operation is the use of six UAV-helicopters. Those UAV:s must equip with the system, what can track the signal of the mobile telephones tracking signal, what is used in the GSM-network locating systems, also if somebody wants to attack against the person, whose mobile telephone is under tracking must the attacker use the weapon like Stinger-ARM or another anti-radiation missile.
That weapon can be launched by airplane, special forces operators shoulder like all other Stingers, or heavier missiles can be launched by ships or land-based launchers. There are rumors that even the Tomahawk-cruise missiles have been modified to an anti-radiation role to destroy commanding centers and hardener communication links. Also, normal GPS-guided bombs can be targetted by the information, what the GPS gives to the military strike force commanders.
Another way is to leave the mobile telephone somewhere hiding in the room and use the WhatsApp as the surveillance equipment. The telephone must only leave the right place with the power device, and then the observer must only open WhatsApp in the video mode and then make a phone call to that person's own GSM, and then this person can monitor anything, what happens in that room.
This person can record the video, and use the picture editors to zoom the objects and also this person might have the programs, what allows the sound editing, and this kind of tools can use for the full-time surveillance, and if those equipment are hidden good enough, the surveillance operator might get his equipment back after the job is done. The man can use normal SIM-cards if this person is sure, that nobody can find the equipment. Or this person can use the WLAN to connect the equipment to the Internet.
After that, this person must only be sure, that the codes of the telephone have been erased, and then nobody can track him. Of course, the Gmail or Skype address can be tracked, but if this man has enough financial resources, might this person hire some drug user to open him the Gmail, and then nothing can connect our man to the user account. When our man has been erased the IMEI-code and a serial number of the device, can our man leave the equipment in the room, and if this person uses gloves, the tracking can is really difficult.
Sources
Picture 1 http://businessforecastblog.com/wp-content/uploads/2014/04/surveillance.jpg
Comments
Post a Comment