[DLMURL="https://radikal.ru/fp/2663996aa533469db91e8b634388f1a1"]
[/ DLMURL]
Dangerous networks and information warfare
Igor Bederov
In principle, intelligence methods can find out everything. But, we are talking only about its small share - the collection of information from the Internet (one of the open sources). So, for an example of collecting information about people, I can recommend a couple of sources personally from myself: This is my article on collecting information about job candidates [DLMURL] https://yadi.sk/d/SYDFzSdX9Bckt [/ DLMURL] and my test video on the same topic
These materials, at the moment, are already somewhat outdated, but will be useful to you and expand your horizons somewhat. Yes, and draw examples.
What can be found in the global network about an individual:
- Name, date of birth;
- registration and place of residence;
- the presence of movable and immovable property;
- communications and contacts;
- places of work and related organizations;
- negative, criminal record, debts, etc.
What are the mechanisms for collecting information? Partly, you could already see the mechanisms in the article and the video. I will add from myself. Gathering information is a lengthy process. Information is collected, analyzed, studied, and conclusions are drawn on its basis. So, a specialist can draw a lot even from a photo from a social network. By the way, photo metadata can store data about the time and place of shooting, the equipment used, etc. And a document casually placed on the network from a personal computer will allow you to set the user's metadata and their place of work.
Let's try to bring a small educational program. All modern search engines work with specialized queries. They differ from ordinary ones in that we are interested in finding some specific information. For example, instead of asking Bederov Igor Sergeevich in Yandex, the scout will enter Bederov / 1 (Igor / + 1 Sergeevich). In this case, the search engine will search for me regardless of what I call myself: Igor Sergeyevich Bederov or Igor Sergeyevich Bederov. Hint: do not forget to sort the results by date so that the most relevant information is at the very top of the search. You can download a certain lesson on specialized requests to Yandex here [DLMURL] https://yadi.sk/d/7UWi3hBPEuEbx [/ DLMURL]. Thanks for the link to my colleague Heinrich Lemke. Moreover, as open sources show, even TOR is not always able to save users
https://liberatum.ru/news/tor-ne-pomogaet
What dangers exist in connection with such publicity? The dangers are obvious - this is the theft of personal data and their use in fraudulent schemes. This is all that intelligence implies. And the goal of any intelligence is not to respond to changes that have occurred, but to predict them. Having mastered the methods of intelligence and becoming a competent analyst, you can predict the facts and phenomena that your study is aimed at.
In addition, there are still risks. They are in a relatively new direction in intelligence - information warfare. Every day you see the essence of information wars on television (Maidan, revolution, the collapse of Russia after 7 years, etc.). The West is waging such an information war with our country. It consists in infusing information and misinformation in order to form public opinion in a certain way. Do you still think how dangerous open sources are for a particular person when the state is already at risk? Moreover, the software itself, which is being created now, is being created for espionage. Here is an example of the Facebook Messenger
https://perevodika.ru/articles/23852.html
Is there a danger from adolescent networks? Teenagers have not yet formed as whole personalities, and this is used by the enemy (yes, the enemy, not to be called otherwise, because information wars have replaced the Cold War). The enemy shapes them for themselves, so that in a few years, when the latter grow up and become able to make decisions, these decisions will be in favor of the enemy. Moreover, in order to divide the nation, groups are formed (fascists, antifa, fans, democrats, opposition - call it what you want). They are generously paid and trained. Their goal is to decompose society, delimit it, and thus weaken it.
I will give one example of my work. You can conditionally call: "The action that did not take place." At one time, I received an order from the special services to identify the organizer of the VKontakte extremist groups. In the course of the audit, I identified the organizer of the groups, presumably with the “left” data, as well as the instigator, who directly pulled out and campaigned the people to carry out extremist actions. By knowing the VKontakte device, access to the user's private albums was opened, and his vehicle with a state number was installed. From here his data are received. Then the sniffer was sent to the organizer and instigator as the same link. By following this link, the organizer highlighted his ip-address and system information, the instigator appeared on the network immediately after the organizer left the system and did not follow the link. They would not have time to warn each other, which means that the organizer and instigator are one and the same person. The ip data allowed to control user actions in the future. In the course of the audit, other information confirming the primary data was obtained, as well as information was received on the upcoming extremist action and the person financing extremists. By the way, a very famous person in the city.
Original Source -
https://ohrana.ru/blogs/topic/61669/
[DLMURL="https://radikal.ru/fp/30ac5180072a49be831f7ed51ecd74cc"]
[/ DLMURL]