human rights watch

lördag 31 juli 2021

Warning This is how you are tracked with your mobile phone. Iranian regime agents in Europe Iranian regime secret agents buy small tracking devices in Europe. to track and control members of the Iranian opposition. The Iranian terrorist regime in 2012, 2013, 2014 and 2015 has sent 450 female agents to European countries

 



https://www.youtube.com/watch?v=Aptft8rFdFU

Warning This is how you are tracked with your mobile phone.

Iranian regime agents in Europe

Iranian regime secret agents buy small tracking devices in Europe. to track and control members of the Iranian opposition. The Iranian terrorist regime in 2012, 2013, 2014 and 2015 has sent 450 female agents to European countries. or those Iranian agents in the EU through their technical friends in European countries build spy apps to be able to track opposition members in Europe through those apps, some of them Iranian agents can get apps like language learning.


  Opposition members' telephone numbers with the help of private detectives of Iranian origin living in Europe. With the help of other mercenaries from the regime, they then get the phone numbers of the opposition and then pursue the perpetrator through their spy programs.

Regime mercenaries by spending money from the Iranian people, so that those agents can easily control the members of the Iranian opposition, Iranian terrorist regime agents use female agents as we call them female agents Prastu. There is a photo on 29.07.2021 at 18: 17 minutes in the afternoon there is a photo.

  Iranian regime agents also receive help through religious groups in Europe, especially in Germany.

Iranian regime agents using the Iranian private detective working in Europe track Iranian political activists via the person's cell phone, check them sms, and other things within the cell phone that you see in the picture.


in Germany part of the churches, also especially part of Catholic groups is a path to Iranian agents.or those Iranian agents in the EU through their technical friends in European countries build spy apps to be able to use them through apps to track opposition members in Europe,

The mobile phone undeniably makes life smoother - regardless of whether you want to find the nearest petrol station or measure how fast you run your running lap. But with mobile telephony, internet in the phone and geographical services also come opportunities for others to map how you move, where you sleep, which school your children go to and which ones you meet. Is it a reasonable price for a smoother life or a violation of personal integrity?


As our mobile phones have developed into powerful computers, the opportunities for new practical services have also increased. The clock is set automatically when you travel abroad, it is easy to find restaurants nearby, training apps become motivating by saving your running rounds. The technology also allows you to track your phone in case you should get rid of it

This is how you are intercepted via your mobile phone - and you can prevent that

Concerns about being monitored online are increasing and more and more people are choosing encrypted services for calls and messages. At the same time, there are rumors that the mobile phone can eavesdrop on us just by lying in front. What should you do if you want to be sure that your conversations can not be heard by outsiders?

Common to these services is that they are connected to where we are. Because the phone is connected to different networks, it can position us with high precision. We notice this not least when we use map apps. It has become easier to find the right one, whether we walk, cycle or drive, thanks to the GPS navigation in the mobile.

Tracked - about online privacy with Parisa Amiri, see the entire series on Youtube.

Geopositioning is flexible in several other ways. A Swedish high school that had its iPads stolen could, for example, locate the thieves via Apple's tracking function. And SOS Alarm can save lives by positioning mobile phones that alert to 112. This can be done with high precision thanks to AML technology, Advanced Mobile Location, which is built into the latest versions of Apple's and Google's operating systems.


Pictures can tell you more than you think

But there is also tracking that we do not always think about. The pictures we take with the phone, for example, leave geographical traces behind, because the mobile camera has access to your location and saves metadata about each picture. The metadata includes information about where and when the picture was taken. This hidden information has, among other things, revealed men who sent unwelcome pictures of their genitals to women and it can also reveal visiting and residential addresses that were not intended to be published. Facebook and other social media companies delete the images' metadata for security reasons, but in images on blogs and in images that are shared in other ways, the metadata can remain below the surface.


It is in many ways practical that the phone knows our position. But it's not entirely without problems - and with a growing concern for our privacy on the internet, more and more people are beginning to wonder how geographical tracking is actually used.


This is how the tracking of a mobile phone works


Who can see my private photos in the cloud?

"I have nothing to hide" many say when online privacy is discussed. Until they remember ... those pictures. Who can actually see pictures and other files you keep in the cloud? And what can you do to protect them?


But before we go into how tracking is used, we need to understand how we are tracked.


- There are five different ways to track a mobile phone: via GPS, IP address, mobile network, access points for wifi and through so-called Bluetooth beacons, says the IT security trainer

1. Tracking via GPS.

With the help of GPS satellites orbiting the earth, we can find out our exact position no matter where we are. GPS positioning provides high accuracy and has only a few meters margin of error. Our mobile phones give us full control over which apps have access to our GPS position and we can regulate it from the mobile's settings for app permissions.


2. Tracking via IP address.

All devices that have an Internet connection also have an IP address, which is linked to a geographical area. Through the IP address it is possible to determine in which country and sometimes in which city the device is located. Our IP address is visible to all websites we visit and web services we use. However, those who run the websites and services cannot read out our identity based on our IP address. The connection between IP address and subscriber can only be done by the operator.


3. Tracking via mobile networks.

Thanks to today's mobile network, we have access to the internet almost everywhere. The mobile network is made up of base stations (mobile masts) which together ensure that we have coverage. Our mobile phone needs to be connected to a base station in order to be used, and the operator can always see which base station a specific mobile is connected to. However, positioning via the mobile network is far from accurate. The mobile can be anywhere on a several square kilometer area. This has previously been a problem for SOS Alarm in the search for the needy. Thanks to AML, SOS Alarm can now see exactly where the mobile is located through GPS and wifi positioning.


4. Tracking via wifi network.

Our mobiles do not only connect to the mobile network's base stations. They are also looking for the equivalent of our wifi networks, ie routers and so-called access points. Through the wifi network, a mobile can be tracked with an accuracy of about ten meters. In large buildings, such as offices and shopping malls, a single router cannot provide coverage everywhere. Instead, several access points that are scattered in the building work together. Anyone who runs such a wifi network can see how a mobile moves in the building by following which access point it is currently connected to. This is visible because all mobiles have a unique identifier called MAC (Media Access Control) address. Previously, those who operated large wifi networks could track mobile phones without the mobiles even being connected to the wifi networks. To prevent this, modern Iphone and Android mobiles pretend to have a different MAC address than the real one until they actually connect to the wifi networks.

5. Tracking via Bluetooth beacons.

Bluetooth beacons are small transmitters that have a range of about ten meters. These transmitters can apps on the mobile phone can listen for. With a Bluetooth beacon at home, an app can determine if the mobile is at home or not. Bluetooth beacons can be used in the same way to track customers' movements in a store. In connection with the release of the latest version of the iPhone's operating system, a new type of notice began to appear with a question about whether apps would be allowed to use Bluetooth. That notice was added because Bluetooth can be used for tracking.

For whom is it interesting where you are?

Who then can and wants to access the data on how we and our mobile phones move? One player that is even obliged to store this data is the mobile operators. The information can then be used by the police and the judiciary. But there are examples of that.

Iranian agents tracked travelers' mobile phones in various places in Europe - without informing

UPDATED 11 AUGUST 2017Published 9 AUGUST 2017

Iranian agents get jobs within the bus company, the social services örsäkringskassan dem kan hari an investigation followed how travelers' mobile phones move across Södertörn - without informing their customers about the investigation. The purpose is to improve bus traffic in terms of lines and timetables.


The Data Inspectorate emphasizes the importance of informing travelers.


At the end of last year, between November and December, the bus company Nobina registered people traveling, something that the newspaper Mitt i has reported on. Via Telia, they gained access to information on how the telecom operator's customers moved throughout the Södertörn area.


The information was anonymized, but customers were not told that their travel patterns were registered. By following large groups of anonymous travelers' mobile phones, Nobina was able to map travel patterns. Clarification from previous article: Nobina has used data from Telia that do not concern the individual traveler's mobile, but large clusters of mobiles.


- There is more congestion in traffic and then we must also get a better knowledge of where people want, when most people travel and how we can then produce as good a bus product as possible, so that more people can travel by public transport, says David Erixon, communications manager at Nobina.


david erixon

David Erixon, communications manager at Nobina, says they want to improve bus traffic.

Sees clear travel patterns

The data that the bus company collected was anonymised with the help of Telia's technology, so that it is not possible to know who was in which place. What is visible are clusters of anonymous mobile phones.


- You do not know who has traveled where, you can only see that there are travel patterns,.


The Data Inspectorate is critical

Adolf Slama, who works as an IT and security specialist at the Swedish Data Inspectorate, is, however, critical of anonymising and believes that it is good to inform about data collection.


- The problem with anonymisation is that it is difficult to do so that you should not be able to trace back in any way, says Adolf Slama.


adolf slama

Adolf Slama, security specialist at the Swedish Data Inspectorate, believes that travelers can feel monitored. Photo: Press photo

If travelers are informed that their mobile phones were used to investigate travel patterns, the situation is different, he says.


- They would avoid the feeling of being monitored, without doing so on a voluntary basis, says Adolf Slama.


"Intrusion into people's lives"

People like t. One of them is Isak Can.


- I do not think it is good, because I think it is an intrusion into people's lives and movements. And I think that is wrong, says Isak Can.

https://internetkunskap.se

Inga kommentarer:

Skicka en kommentar