- No, in different ones

Unite professionals to advance email dataset knowledge globally.
Post Reply
rakhirhif8963
Posts: 540
Joined: Mon Dec 23, 2024 3:15 am

- No, in different ones

Post by rakhirhif8963 »

Security Tales: Intellectual Robbery
Vladimir Bezmaly | 05.26.2017
The police in city T were investigating a series of apartment robberies. Only antique items were stolen. The problem was that the police could not find a connection between the victims.

- Max, what connects the victims?

- I can't understand. That's the problem.

— Or maybe they insured their valuables with the same insurance company?


- Let's turn to our colleagues from the Imperial Security Service. I won't deny it, because their analysts are much more serious.

- Try it, boss. Unfortunately, we are powerless.

Three days passed.

- Max, my suggestion to contact the Security Service bore fruit. They spain whatsapp data that all insurance companies were reinsuring their risks with the same insurance company N. Thus, one of N's employees was receiving all the data on the owners of antiques. Last names, first names, social security numbers and phone numbers. It remains to be seen how they were looking for home addresses.

- Let's turn to the department of intellectual crimes. Their chief recently gave us a lecture. Smart guy.

- Max, you understand that here, like in the army, initiative is punishable. You said it, so you do it!

- Understand.

— So, colleagues, we received a request from the police of city T. How to establish home addresses, knowing only mobile numbers.

- Johann, it's quite simple. You either need to have someone in the mobile companies, or infect the phone with a trojan.

- Karl, you forgot one more option. You need to install antivirus software from a well-known manufacturer on the victims' phones and periodically send a request for coordinates at night. Where the phone is at night, there is home.
Post Reply