How to follow a person from a fake page. How to track the location of a person by phone number and more. Search service from mobile operators

How to quickly find out the truth while maintaining anonymity and without offending an innocent person with his suspicion? You can hire private detective! Call us! For any difficult question, a private detective agency in Moscow will soon provide a quick and meaningful answer, finding out the cause of the problems in the most delicate and absolutely legal way. Checking by private detectives will go unnoticed by the person whose life has been studied by the staff of the detective agency. After all, each of our private detectives has long-term experience in law enforcement.

What will the private detective agency "Resolution" provide for you?

  • Establishing facts, documented;
  • Reliable solution of complex tasks;
  • Collection of reliable information;
  • High speed.

Call and our private detective will solve your problem!

How to keep data confidential?

The specifics of your work require confidentiality at management meetings or during conversations with partners? Competitors are constantly watching you. To ensure that information intended for a small circle of people is not heard by competitors or private investigators hired by them, we recommend that you investigate the business meeting room, car interior and communications for the presence of listening devices. Manufacturers of this technology, popular with those who like to extract information that is not intended for outsiders, are constantly improving the technical capabilities of their products.

In the photo, examples of bugs we found:

Therefore, the probability of its detection by non-professionals is zero. By contacting a private detective, you will know for sure within a day after the arrival of our specialists whether there were bugs and other listening mechanisms at the facility. We will also help you install hidden video surveillance in the room, which only you and a representative of our detective agency will know about.

Private detectives consider crime prevention the most effective way to deal with intruders.

Our advantages

Serious approach to detective work

We employ only qualified, experienced, and most importantly - proven professionals.

Modern equipment

Today, technical equipment decides a lot.

Strict privacy policy

You can trust us, we become reliable assistants.

Reliability

In any situation, we offer the most effective solutions.

Opportunities

Our connections allow us to work in all corners of Russia.

Huge experience

The detective agency solved more than 400 cases in 10 years. All of our private detectives are retired law enforcement officers.

Prices

The cost of services in the detective agency "Decision" are formed on the basis of a set of necessary works that make up the event to solve your problem. And each part of the work of private detectives has a certain rate, for example:

  • Collection of data and information - from 5,000 rubles;
  • Wiretapping check - 1,000 rubles per m 2;
  • Search for debtors and investigation of thefts - from 20,000 rubles;
  • Security and protection - from 10,000 rubles;
  • Checking partners - from 5,000 rubles;
  • Surveillance and counter-surveillance services - by agreement.

Private detective services consist of a set of activities, therefore, to find out the exact cost - Call and sign up for a free consultation!

Secret Instructions CIA and KGB on collection of facts, conspiracy and misinformation Popenko Viktor Nikolaevich

Ways to detect surveillance and avoid surveillance

Search detection

The agent must constantly monitor for possible surveillance of himself.

An integral part of surveillance is usually a search by the relevant authorities at the apartment of a suspected subject. The agent, in order to determine whether the door was opened in his absence, before leaving (after closing the door) sets "controls" - various inconspicuous marks: glues the hair with one end to the door, and the other - to the casing; inserts a match into the gap between the door and the door frame. And if later it turns out that the hair is peeled off (the match is on the floor), then someone has been in the apartment. Another way to control is to remember before each departure the relative position of objects in the room. To facilitate memorization, objects are set each time in a certain (same) order, and before leaving, they look at them from the same point in the room. Let's say the room was left as in fig. 254, and upon arrival it looks like in Fig. 255. Some changes are visible: A- the floor lamp is moved to the right; b- fruits on the table are located to the left; V- books on the upper (second from the left) shelf are not tilted, but vertically; G- the bottle on the table is moved to the right. Thus, there is evidence of a search.

In the event of an upcoming long absence (departure), in order to avoid the possible forgetting of the detailed arrangement of objects in the room, they can be photographed, and upon arrival, the picture can be compared with the real picture.

Rice. 254.

Rice. 255.

Surveillance detection

Enemy counterintelligence usually establishes a so-called tail behind the suspect - constant external surveillance. The task of the agent is to timely detect the tail and move away from it (or take any other actions that were provided for this case).

Eye contact with the same person more than twice can be a sign of surveillance. To test his suspicions, the agent can use various techniques, some of which are outlined below, the results of which confirm presence of surveillance.

... The agent, who left the house, enters the store and from the inside, through the glass window, looks at the car that had previously stood near his house, and then turned out to be driving in the same direction as the agent follows. The car stops in front of.

…The agent suddenly stops and pretends to be looking at a shop window. In the reflection of the glass window he sees that a man walking on the opposite side stopped under the cover of a tree.

... In rainy weather, the agent, covered with an umbrella, stops and stands for a very long time, pretending to be examining a store window. The person walking on the opposite side also stops and begins to look at the shop window on his side of the street, and, despite the pouring rain and the lack of an umbrella, he does not go further and does not enter the store.

... A female agent walks into a women's hat shop and pretends to try on a hat in front of a mirror. In the mirror, she sees that the man she noticed earlier has followed her, but he doesn't show much interest in the assortment of the women's shop.

... Leaving the store, the woman returns to it; the person who followed her also returns .... The agent stops in front of a closed shop and pretends to wait for it to open. A couple of lovers walking behind him pass by, stop, embrace, return and slowly starts walking back and forth.

... The agent pulls out any insignificant piece of paper from his pocket, pretends to carefully read it and then throws (“drops”) on the sidewalk. A person walking behind picks it up.

...The agent gets into the subway car (or other form of public transport), and then leaves, pretending to have sat in the wrong direction. The previously seen person jumps out after him.

Surveillance is often carried out from a car, both for the traveling and for the walking agent. When spying from a car, special services use interchangeable numbers so that the same number does not catch the eye. In some countries, such a number may be inserted into a special frame for its quick change. On closer examination, this frame is usually noticeable.

The special services use several cars, of different brands and colors, some of which move along parallel streets and connect to surveillance using radio communications. The presence of surveillance can be detected: by suddenly changing the direction of movement or speed; sharply rebuilding from row to row; unexpectedly stopping, having slightly driven away from the parking lot; drive through a red light; showing a turn and waiting for the same signal from the alleged tail; turn in the other direction, watching the pursuer in the mirror. If this is a "tail", then he will be forced to repeat all these dangerous maneuvers.

Surveillance avoidance

First, let's consider avoiding surveillance when an agent moves without a car. One of the rules that an agent should be guided by is: do not get into the first taxi that turns up, land at least in the second one, and even better, skip the second one, and get into the third one.

When an agent, when moving on foot, feels that he is being followed, he can try to break away from observation, using stereotyped techniques for this, based on changing the rhythm, direction and type of movement, creating certain barriers behind him, and lulling the “tail” into vigilance.

Depending on the situation, some of the following methods of avoiding the tail may be used by the agent:

1. Long winding in crowded places (metro, train stations).

2. Use of entrances, apartments or yards and other "back" passages.

3. Frequent change of modes of transport.

4. Transitions in the subway from one line to another.

5. The use of "labyrinth" routes.

6. Unexpected acceleration after turning a corner with the intention of going noticeably farther than would be expected at normal speed.

7. Leaving a moving vehicle.

8. Entering and leaving public transport at the last moment of closing the doors.

An important point in avoiding the "tail" is the ability of the agent to quickly change his appearance: clothes, shoes, headdress, gait, face. As for the latter, in principle, it can be made up beyond recognition, but this

it takes too much time, which, of course, is not available when evading persecution. However, there are other, quick ways to change the face, some of which will be discussed later.

As for the rest, for this case, the agent (both a man and a woman) has a special wardrobe: clothes that change color when turned inside out with detachable floors and sleeves (making clothes shorter and changing their appearance) or (vice versa) letting go (turning away) floors and sleeves (making clothes longer); shoes from which the top is removed - a cover and it changes color and style; eversible bags and packages; false glasses; an umbrella that fits in your pocket. The drawings show part of such a wardrobe: a hat that changes color and style when turned inside out; a coat, when turning and unfastening the sleeves and the floor, turning into a jacket with a different color; changing skirt; coat jacket; changing shoes; changing (transformable) jacket. A quick change in appearance can be done when entering, for example, at the entrance. You can go to a store that sells clothes, where you can transform in a fitting room. A female agent to break away from a male "tail" can enter the ladies' toilet and leave unrecognizable, leaving the spy in complete bewilderment.

When an agent travels by car, an exit option may be, for example, giving the accompanying impression of movement in a direction well known to them from past trips and unexpectedly slipping away from the intended route. In general, the success of an agent's escape from counterintelligence vehicles depends on the agent's knowledge of local roads, on his ability to drive a car, and, finally, on the car itself (to what extent it will be adapted for such a situation). The first two points are achieved by the practice of driving on the ground. As for the agent’s car itself, although outwardly they should not differ much from those used in a given country, inside it must be equipped (re-equipped) accordingly, that is, it must be powerful enough (high-speed) and ensure the safety of the agent in different situations.

This text is an introductory piece. From the book Self-loading rifle arr. 1940 [NSD-38] author USSR Ministry of Defense

RIFLE SAVING AND CARE General Information89. Regardless of the conditions in which the shooter is, he must always keep his rifle clean, handle it carefully, inspect it daily to make sure it is in full working order and combat readiness.

From the book "Tigers" are on fire! The defeat of Hitler's tank elite by Caidin Martin

WHAT THE RUSSIAN SOLDIER REPRESENTED Each war sounds different. On different battlefields, the sounds were different. Russian shells have their own sound, perfectly distinguishable from the rest. When you are at the final destination of shells like the Germans are on

From the book Technique and weapons 2012 04 author Magazine "Technique and weapons"

I take everything I have with me Based on the materials of the RGVA, A. Kirindas and M. Pavlov prepared for publication in the early 1930s. for the delivery of ammunition in the conditions of shelling by the enemy, samples of tanks and tankettes were developed. The first project of a supply tank was made on the basis of a light

From the book Military Memoirs. Salvation, 1944–1946 author Gaulle Charles de

From the book Nowhere to hide. Edward Snowden and the watchful eye of Uncle Sam author Greenwald Glenn

Departure General de Gaulle's speech at the Arc de Triomphe in the Place de l'Etoile November 11, 1945 They gave their lives for France and triumph with France. They died on the battlefields, where our fate was decided in full view or far from human eyes. They returned today to us,

From the book How can Russia defeat America? author Markin Andrey Vladimirovich

Chapter 4 The Harm of Surveillance Across the world, governments are actively trying to teach their citizens not to treat their privacy as something too important. With long, incomprehensible phrases, they convince people that to tolerate an aggressive invasion of privacy is

From the book CIA and KGB Secret Instructions for Fact-Finding, Conspiracy and Disinformation author Popenko Viktor Nikolaevich

Other Observations A. On parapets for tank trenches There was one observation connected with parapets of the Tavakalna division in 1991. The bulk of the positions of armored vehicles were deployed to the direction of the expected attack at an angle of 20 to 60 degrees. It is often possible to shoot from positions

From the book Military Special Forces of Russia [Polite people from the GRU] author Sever Alexander

What were the Chinese barriers? Here it should be emphasized that the Chinese barriers on the road itself, often, were not. Moreover, they by no means always included the mining of the road, its damage by explosions, or the organization of forest blockages. The road is mostly

From book Great War not finished. Results of the First World author Mlechin Leonid Mikhailovich

Surveillance In some cases, the residency is required to conduct surveillance of a specific person. Its organization, among other things, depends on the personality of a particular object, which mainly determines the degree of complexity of the operation. So, surveillance can be arranged,

From the book The Book of Wind for Rifle Shooters author Cunningham Kate

Organization of interaction between units and subunits of the Special Forces with undercover intelligence, army and front-line aviation, local authorities and the Armed Forces of the Republic of Afghanistan in the interests of identifying and destroying caravans with weapons and ammunition, creating a network of well-wishers in

From the book Soviet Russia (USSR) and Poland. Russian anti-Soviet formations in Poland (1919–1925) author Simonova Tatyana Mikhailovna

Organization of observation Observation was the most accessible, widespread and effective way of obtaining information about the movement of caravans and groups of rebels. Observation was carried out visually using binoculars or night vision devices and technical means

From the book The Secret Canon of China author Malyavin Vladimir Vyacheslavovich

Part One The Balkans. The bloody dispute of the Slavs among themselves Everything will go down the drain because of some kind of absurdity in the Balkans, Otto von Bismarck, the iron chancellor and unifier of Germany, predicted. The Great War began with the assassination of the heir to the Austro-Hungarian throne in

From the book Basic Special Forces Training [Extreme Survival] author Ardashev Alexey Nikolaevich

OBSERVATION SKILLS “The shooter must create an accurate mental picture of wind indicators in his mind and remember it from shot to shot.” ​​The purpose of practicing observation skills is simply to improve your ability to see the details of wind indicators. Here you are not

From the author's book

§ 2. “These units can represent an anti-Bolshevik force…” As noted in the first chapter, the French General Staff and the French military mission in Poland played a special role in the implementation of the project to create anti-Soviet formations in Poland. 20

From the author's book

99. Naturally, everything already exists in the nature of things. Being engaged in any business, after a long time it is possible to reach such a state when everything is carried out as if by itself. Therefore, one who is skilled in the affairs of war sees only an army in front of him, speaks only of

From the author's book

Means of optical observation Visual observation is carried out using optical devices for daytime observation, and at night and in conditions of limited visibility - night vision devices. To enhance ground reconnaissance capabilities in visual surveillance and

Detailed instructions for spying on a person through a phone with an overview of cool applications. In various everyday situations, you have to figure out how to follow a person on the phone. This is necessary when suspicions arise regarding a company employee, husband or wife, there is concern for the life and health of relatives.

Spying on a person by phone can be:

  • illegal;
  • official.

People wishing to use this service should remember that the collection of information about a person from closed sources becomes a direct interference in his private life. Such interference is considered a violation of the law and is punishable by penalties of varying severity. How can you legally spy on a person? To do this, you must obtain his consent. Surveillance without permission is considered illegal. If a person has given permission to collect information or provides it himself (for example, location data), then such surveillance is considered official and does not contradict the norms of the law.

What information can be tracked

With the help of surveillance, you can get information that is usually stored on a mobile device:

  1. the contents of the subscriber's call log;
  2. the text of the messages along with the exact time and date of receipt;
  3. the content of letters sent to the user's e-mail box;
  4. user's current location.
  5. photo from cameras.
  6. recording from a voice recorder.

All 4 federal operators cellular communication offer those who wish to purchase from them the service of spying on their subscribers. The functionality and capabilities of the services of each operator are somewhat different, so it is worth talking about each separately.

How can I find out the location by phone number without the consent of the person

Cellular operators provide information about the location of a person only with his consent and under certain conditions. Federal companies operate in accordance with official legislation. But some citizens neglect these rules, trying to get information in a roundabout way. Realizing that they will not get the consent of the person, they establish mobile applications without the knowledge of the user. Applications provide the necessary information, but without the consent of the user, their work is illegal. It is not recommended to use this tracking option in this format.

Spyware for Android phone

There are several Android based effective programs with positive feedback to track the user. They are easily installed on a mobile device, operate in background and are unmarked. Popular options include the following:

  1. . The customer of the service receives on his e-mail a report on the calls of the subscriber, audio recordings of conversations, intercepted SMS, recordings from the microphone, the history of visited pages in the browser.
  2. . The program works in the same way as the previous application, it will determine the geolocation of the subscriber, but it asks for a password at startup. This is a significant disadvantage that can reduce the effectiveness of the program.
  3. . This spyware on a phone for the Android platform tracks the location of the smartphone, views the picture from the device's camera, records the sound of the environment. The program is suitable for people who want to monitor their children.

Tracking apps for iphone

  • . This is an IOS program with a wide range of tools. The iPhone application is sold in two versions - Gold and Basic. The basic version offers a standard set of features. Features of the gold version allow you to view photos on your smartphone, emails, notifications of replacement SIM cards, creates backups data.
  • . No less advanced program that includes all spy functions, including Spy Call. Spy Call feature provides wiretapping telephone conversations in real time.

Tracking your phone using OS Android or iOS (Iphone)

How to follow other people without installing third party paid apps? This is possible with the built-in functionality IOS systems and Android. For example, the necessary information is obtained by the Google Maps program, which is available in any devices based on IOS and Android. Added "Show me where I am" feature to Google Maps. In order to follow a person in this way, you need to activate it on yourself and on his smartphone, have access to e-mail surveillance object. In the function menu, you need to select the tracking period, contact details, and the object of surveillance.

The "chronology" service, available for any mobile devices, works in a similar way. To obtain information about the movements of a person for a selected time period, you need to enter his account. Google entry through the browser and go to the "chronology" page.

GPS Trackers: An Alternative to Phone Tracking

GPS tracker- electronic equipment designed to determine the position of objects using satellite navigation systems. The tracker has a receiver that determines the coordinates of the object and a transmitter of information. The transmitter operates on GSM technology. Location data is transmitted via the GPRS Internet channel in the form of text messages. Also, the device is equipped with a rechargeable battery or removable batteries, an antenna and a memory unit. Modern models of trackers are small in size. Now they can be built into bracelets or key rings.

After activating the tracker, it connects to satellites using a GPS receiver. Satellites transmit information about the location of a person to mobile device or a server where the data is parsed.

We track the location of a person through popular instant messengers

The most popular instant messengers that have the function of determining the geolocation of a person remain Watsapp and Viber.

— How to track geolocation data via viber
This function in Viber is provided for exchanging location data with your interlocutor or a group of subscribers in a chat. Viber cannot determine the position of the user without his knowledge. This information is provided at will only by the subscriber himself. In the dialog box, to enable the location, you need to activate the arrow symbol next to the send message button. If the user wants to know the location of the interlocutor, he will need to perform a similar operation on his mobile device.

— How to receive geodata through watsapp
To provide geodata in WatsApp, as in Viber, only the subscriber himself can provide. For this you need:

  1. Go to the settings of your smartphone.
  2. Open the "Applications" section.
  3. Select the WhatsApp application.
  4. On the page dedicated to the application, select the "Permissions" section.
  5. Allow the app to determine the location.
  6. In any WhatsApp chat, click on the paperclip symbol.
  7. Send the place to the interlocutor by selecting the appropriate address from the list.

What does the law say? Liability for surveillance without consent

Under Russian law, information about a citizen of a country can only be obtained from open sources - pages in in social networks, from him personally, photos, comments. Installing spyware, hacking accounts, and other methods of obtaining information that is not publicly available is against the law. Reading correspondence without the consent of a person is considered a violation of privacy. The person who committed this violation is punished under Article 137 of the Criminal Code of the Russian Federation. Hacking social media or email accounts mailboxes is considered illegal access to computer data and is punishable under Article 272 of the Criminal Code of the Russian Federation. Installing spyware is regarded as spreading malware. The punishment for this violation is prescribed in Article 273 of the Criminal Code of the Russian Federation.

Establishing control over a particular person in some situations is vital. Especially when it comes to young children or elderly parents. But obtaining hidden information in Russia is strictly punishable by law. It is strongly recommended to carry out such activities only after obtaining the personal consent of the object of control in paper or electronic form.

Spying on his wife through the phone is one of the most simple ways private espionage. It is quite effective and at the same time as non-conflict as possible. You will save money, since spyware is installed on your mobile, and you will not need to involve a private detective to spy on the wrong one. You can track your wife's telephone activity without leaving home.

It should not be ruled out that those who wish not to be convicted of treason will skillfully hide their traces. For example, if you just take and check your spouse's phone, it may not contain unknown contacts, SMS, and other incriminating correspondence.

It is better to check the activity of the subscriber in secret from him. This operation is called mobile espionage and is becoming more popular every year. By installing a special spy app on your spouse's smartphone, you can constantly monitor her calls, correspondence and location.

When should you use the service?

Men resort to the services of a mobile spy in the following cases:

  • there were good reasons to believe that the wife had a lover;
  • she put a password on her mobile;
  • does not answer calls in your presence, is careful in statements;
  • she constantly has urgent matters that she does not talk about.

Is it possible to "bloodlessly" check that she is cheating? Will it help to reveal all the suspicions about her? Is it possible to prevent treason in this way? Our answer is yes. It’s not shameful to follow your wife through the phone, because it’s calmer, and besides, you are always on the alert. In which case, you will be ready for an unpleasant turn of events in your life together.

What program to use?

If you follow the link below, a special online tracking service will be available to you. The spy app needs to be activated on the wife's smartphone without her noticing. Software Designed for Android devices.

Quick and easy installation does not require special knowledge and effort. A separate profile with limited access is created on a special site. Only you will have a password to your account, where information about all subscriber activity is stored:

  • call details: number, duration, incoming or outgoing, audio recording;
  • correspondence: SMS, MMS, mobile chat, data exchange;
  • saving and deleting files, up to selfies taken by the wife.

What is the result?

You get 24/7 remote access to my wife's mobile. Anytime, anywhere, you can have real-time monitoring with your smartphone.

Before you follow your wife's phone, you must understand for sure that you have ceased to trust your beloved. The service described above provides each user with free monitoring for 12 hours.

Mobile spyware is an effective way to quickly collect the necessary evidence of a spouse's infidelity. Data collection is carried out in a hidden mode without the knowledge of the owner. You will always be aware of where your spouse spends time and with whom.

Why is it necessary to follow a person? Everyone pursues their own goal. Someone wants to convict a soul mate of treason, and someone wants to bring a business partner to the “clean water”. Regardless of your goals, the specialists of the Detective Online agency will carry out surveillance unnoticed by others, collecting the necessary evidence in a short period of time. We have modern equipment in our arsenal that allows us to conduct accurate observation with photo, audio or video reporting.

Human surveillance services

The services of a private detective, in addition to conducting an investigation, may include surveillance. It will allow you to find evidence to expose a person, or give reliable information about his real life. We are ready to establish surveillance of a wife, follow a husband, business partner, child or any other person of interest to the client.

The confidentiality of the client's identity is guaranteed by the contract concluded during the execution of the service. We do not disclose the secrets of our clients, so each customer can be calm for his reputation.

Methods of tracking a person:

  • outdoor surveillance;
  • phone calls;
  • social media.

Surveillance is the most popular. Our specialists will follow the person until all the circumstances of interest to the customer are clarified. In the process of surveillance, irrefutable evidence of guilt or refutation of the client's speculations is collected.

The price of spying on a person

The price of human surveillance services varies in a small price range. It depends on the number of people involved in the observation process, the chosen method of providing evidence, the complexity of the work, as well as other factors. So, spying on a wife or husband to reveal the fact of infidelity will cost less than spying on a business partner. The difference lies in the fact that a business person can visit a huge number of places in one day. Our experts will follow him on his heels to collect information. While incrimination of treason is much easier, since the lovers meet in one place, which allows you to collect evidence quickly.

You can find out the exact cost of surveillance by calling our office at the phone number indicated on the website. We do not insist on the provision of our services, so after discussing the cost, the client will have time to think or refuse the transaction.