Listen to a phone knowing its imei. We listen to a “non-telephone” conversation using a telephone. Is it possible to eavesdrop on you through a switched off phone?

Many jealous husbands want to know not only how to wiretap mobile phone wives, but what kind of wiretapping program will be effective and truly invisible on her phone after installation? Below are comprehensive answers to these and other similar questions.

So, wiretapping wife via mobile phone is a spy program that must satisfy the following three main requirements for this type of application:

Firstly, wiretapping wife's iPhone must be multifunctional, i.e. not only listen to outgoing and incoming calls, but also intercept messages, photos, media files, give the exact coordinates of its location and much more;

Secondly, wife wiretapping and surveillance program must be hidden, in other words, if the phone is wiretapped, the wife should under no circumstances know about it - this is practically the main criterion for a high-quality spy program;

And thirdly, spy program for wiretapping wife's phone should make it so that you can view all intercepted text messages, photos and more at any time convenient for you, as love correspondence in instant messengers or in social networks can happen as in work time, and late at night.

The VkurSe program is multifunctional application for phone tapping and meets all the above requirements for spyware. The functionality of the VkurSe program includes:

  • wiretapping his wife's telephone conversations and recording them;
  • listening to ambient sound (the ability to turn on the microphone remotely);
  • receiving notifications (with the exact date) of outgoing and incoming calls, also from which phone number and to which they were made;
  • interception of messages in instant messengers and social networks (Viber, WhatsApp, Odnoklassniki and VKontakte);
  • the ability to intercept and read even those messages that will be deleted by the wife (if the program is already installed and running on her phone at that time);
  • save all data to your email or to your personal account on the website and view them at any time convenient for you;
  • save photos and media files received on your spouse’s phone to your email;
  • using the “list of wifi networks” command;
  • the ability to take screenshots of the screen at certain intervals;
  • 24-hour geolocation system (GPS), which will allow you to know exactly the location of your spouse, even if she does not answer your call;
  • detailed routing of the wife's movement in any time period and much more.

It is impossible to give here the entire list of actions that can be performed using the VkurSe program, since there are really a huge number of them. More details about the functionality of this program can be found in the “Features” tab.

Is there real hidden wiretapping of your wife's mobile phone?

The VkurSe program is one of the most hidden applications, which cannot be seen or by any signs understand that it was installed by an ordinary user (professionals and hackers are not taken into account):

  • during installation WON'T have to hold your wife’s phone in your hands for a lot of time - a program to wiretap your wife is installed in a matter of minutes;
  • no way will NOT affect for the operation of the phone and its charging - the program has practically no weight;
  • Will not detected during an antivirus scan – the application is not malware;
  • Will not appears in the list of applications - the VkurSe program is installed directly into the system folder;
  • the name of the program will NOT cause your wife has absolutely no suspicions - upon registration, you will be able to change the name of the program for wiretapping your wife’s phone once at your discretion for free;
  • Impossible identify the program by the icon - a standard robot of standard green color.

However, this also has its own “minus”: if Your wife wiretapped you, then you are now aware that you will not be able to “compute” our program and will be “hooked” by your wife until she deletes it herself.

How to wiretap your wife's phone?

Installing the VkurSe program is not difficult. In order to download program to wiretap wife's phone you need to go to the “Registration and installation of the application” tab, there you will find step-by-step instruction as our program installs. You can also download wife's phone wiretapping and through the tab. To do this, go to it and click on “Consultant”, where you will receive a download link automatically.
Wiretapping your wife's phone via the Internet for free will work seven days after registration. This free weekly use of the VkurSe program will allow you to try out all its capabilities and understand whether you really need to wiretap your wife or whether it is better to trust your significant other. And without time limit program for wiretapping your wife's phone for free will give out her location around the clock.
In order to continue to have access to all functions after a week, you will need to subscribe; for this, check out the tab

Jealousy is an unpleasant thing. And for both. But it’s also a fact that you can’t escape it. This is a feature of the psychophysical type of personality. But on the other hand, what if your other half really considers you only one quarter with a slight extra weight (+ horns)? Or he deceives you in other directions, which can be no less offensive. But, returning to your behavior, your suspicions can not only set you on the path to finding the truth, but can also destroy your relationship with your missus. Moreover, the stronger your jealousy, the more likely the second outcome is, because living under constant unfounded suspicion is extremely unpleasant.

And this is where such a useful event as wiretapping your wife's phone using special program spy. With him, you can leave your wife alone and at the same time get answers to all your questions for further decision-making about whether your wife is cheating on you, cheating, or someone is just paranoid... And your relationship will be an order of magnitude more acceptable than if you did not give personal space to your wife.

And you need to know one more small nuance in the matter - you won’t just be able to listen to phone conversations. Co spyware you organize full surveillance of your wife via phone. It’s just that such applications also collect coordinates from the phone’s GPS module (or from base stations of cellular operators, which is not very accurate) and then build routes for you on the map. Those. you will know where and when your madam was.

We install the program on my wife’s phone

Let's take a little more detail on how to install wiretapping on your wife's phone. In general, a lot has been written on our website about installing mobile spies (for example here:), so now we’re only talking about working with my wife’s smartphone. The peculiarity of the issue is the direct accessibility of the mobile phone. You can even practice installing, reinstalling or replacing the program with a more suitable one.

If the program suits you in terms of functionality, you can set up synchronization in the most appropriate way for you (synchronization means the transfer of collected spy data to a server on the Internet, from where you can then view it). For example, you can prevent a mobile spy from connecting to the Internet via mobile networks, allowing only data transfer via Wi-Fi, and independently, at a time convenient for you, access the Internet via Wi-Fi. Just turn on wi-fi for a minute or two and then turn it off. So unnoticed anyway mobile spy will become completely invisible.

If you need to spy on your wife’s phone in real time, then you can take care of tariff plan, adding to her unlimited Internet to keep it on all the time... So you can literally follow your wife on her heels, watching her route through your smartphone.

Of course, you can also ask the program to connect to mobile internet for synchronization, but some spy applications then do not disconnect the Internet or leave the connection icon, which gives them away.

Otherwise, regarding the installation of such programs, everything is standard and is described in the link above.

Understanding how to wiretap your wife’s phone, it’s worth considering your reaction and the consequences of receiving answers to your questions. And remember that the bitter truth is better... And even better if your fears were far-fetched.

Related materials:

Telephone wiretapping Someone else's phone Wiretapping program Reviews Questions Support

Operator:

MTS Beeline Megafon Tele2
Viber

ENTER PHONE NUMBER:

LISTENING TO SOMEONE ONE'S PHONE


In parallel with the invention of any means of communication, research begins on the possibility of intercepting information. And no matter how hard the developers try, creating absolute protection is impossible: even an ordinary conversation between two people in a closed room can be overheard from a fairly large distance, and the possibilities for this are several times greater.

A BRIEF EXCURSION INTO CELLULAR COMMUNICATION TECHNOLOGY


Many users perceive cellular communication for granted, without even thinking about the principles of data transfer. Of course, in-depth technical knowledge is not necessary to successfully use the services. Moreover, modern devices automatic mode perform all hidden operations to ensure communication - tune in to the nearest communication station, signal about low quality coverage, etc. However, the better you understand the operating principles of any mobile operator, the more benefits you can get from its services - including protecting your private life and get more information about other people.

Let's start with the fact that your phone is constantly monitoring the signal and is automatically configured to receive information from the base station whose signal is in currently stronger. The quality of communication at a specific point in your location is reflected on the gadget: from an empty or crossed out label (outside the coverage area) to a full scale indicating a high signal level. While your phone constantly picks up the operator’s signal, the communication station monitors your gadget in response, identifying the user by an individual SIM card number. This is why a service appeared where you can read someone else’s Viber correspondence or hack WhatsApp

What this gives to the operator: he is always aware of your exact location and can send you a call or message at any time.

What does this give you: you receive calls and SMS in real time, through the operator you can establish the reliable location of any subscriber, in an area of ​​poor coverage your phone will discharge faster, since it is more difficult for it to establish a strong connection with the operator.

All subscribers of the cellular operator are under constant control of communication stations in order to establish a connection at any time. Basically, it works like this: you direct a call or message to a specific number, your phone converts the sound into a wave of a certain frequency (each operator broadcasts at its own frequency, the wavelength may vary in different regions) and sends it to the nearest communication tower. Next, the tower redirects the signal to the station that is currently in radio contact with your recipient. As soon as the subscriber accepts the call, his tower establishes a connection similar to yours, and you can hear each other.

WHO CAN LISTEN TO SOMEONE ONE'S PHONE


Nobody really advertises this information, but anyone can. Unlike popular instant messengers, which encrypt their messages in several layers, a radio signal from phone to phone flies freely, like a bird - anyone can intercept it. A clear example of the defenselessness of citizens against wiretapping can be the famous “jammers” - at particularly important facilities or when protecting major government politicians, the special services turn on special devices that simply jam the airwaves and interrupt radio contact with the communications tower.

Works for you! We strive to help as many users as possible, because a happy family life and well-being sometimes depend on whether it works out. Read about our work and thousands of successful ZHUCHEK clients!

Latest reviews about the service

This is exactly what I needed!

- Nazarov

I changed my email address, how do I change my profile?

- Yuri A.

In general, everything is stable. Fine.

- Ratmir

I use it for reasonable purposes, but others don’t!

- Victoria

Was very pleased.

-Vilnus

Fuck you doing this, my girl controlled me for 2 months, then she admitted it herself, tortured her conscience, this is not right.

- Denis V.

Admins, I wrote to you by email, but didn’t get a response, is there a system failure?

- Edik

Guys, how much does the complex service cost?

- Cleopatra

Sometimes there are delays in printing, but I'm happy with it.

- Oleg - Vovan

Recently, one person bothered me and contacted the authorities, but they refused, but you helped, thank you.

- Yuri.N.

THANK YOU VERY MUCH!!!

- Vika N.

Tell me, can I put my phone on control?

- S. Oleg

We need Vimpelcom!!

- S. Oleg

Increase the number of operators!!!

- Kenedi

First time I see this.

- Basse

There are no analogues. so I'm happy.

- Azamat

Is it possible to eavesdrop on you through a switched off phone?

In addition to the legend about calculating the location of a phone using the triangulation method, there is another popular “horror story” periodically mentioned in the media.

It sounds like this: “Special services or criminal elements can secretly turn on the microphone in your phone and eavesdrop on the conversations you have while next to the phone.”

As with triangulation, carefully mixing fact and fiction can produce a fairly plausible-looking fiction.

Let's try to figure out how realistic such listening is.

The main tenets of the legend of eavesdropping

  • IN any A mobile phone is initially equipped with the ability to record and listen to conversations, even when the mobile phone is turned off. We are not talking about equipping just one specific phone means of listening to spy on one specific person - this feature is available in all GSM phones.
  • Eavesdropping can be activated at any time by intelligence agencies or attackers with sufficient resources. Listening happens remotely, without the use of additional equipment or human resources.
  • The phone user cannot independently detect the fact of eavesdropping - it happens secretly.
  • This opportunity secret. Any descriptions, documentation, etc. accessible only to special services and those close to them.

Let's start from the end - with secrecy.

Who came up with this and who has access to it?

Text of legislative acts regulating wiretapping of telephone conversations during operational-search activities and necessary for this technical means, in most countries it is available to anyone. It is not difficult to find on the Internet a description of the requirements for systems of assistance to operational investigative measures (SORM) used in Russia, or lawful interception systems used in the UK or the USA. Having familiarized yourself with them, you can be sure that they are talking about listening telephone conversations of specific subscribers(phone numbers). About listening carried out at the central switching nodes of the network. There is no talk about any “remote microphone activation”.

Could it be that documents that speak of such a possibility exist, but are classified?

Since listening tools are built into any GSM phone, there must be some specifications, which describe the parts and principles of their operation. Since intelligence agencies can use these capabilities, mobile operators have support for these functions in their equipment. In order for all this to be reliably classified, the following must be involved in the case:

  1. The GSM Consortium, which has developed specifications for these listening tools, but keeps them secret (despite the fact that all other GSM specifications are available to anyone on the website http://www.3gpp.org). The specifications must describe, at a minimum, how to activate and deactivate phone tapping - what commands are sent to the SIM card or phone, how they interact with each other, and how all elements of the operator's network (switches, base station controllers, base stations, etc.) etc.) participate in the transmission and processing of these commands.
  2. Manufacturers of GSM modules who do not produce phones themselves. They must have access to the secret specifications of the GSM Consortium and implement them in their products. That part of the documentation that describes the wiretapping system must be kept securely secret and transferred only to those clients who are also participating in the conspiracy of silence.
  3. Manufacturers of equipment for building mobile networks (switches, base stations, etc.). They must also have access to the secret specifications of the GSM Consortium. Accurate implementation of secret specifications is especially important because operators mobile communications like to build their networks from equipment from different manufacturers - it is necessary that different components The listening systems integrated well with each other, even if the system was made by different suppliers.
  4. Integrator companies building mobile networks. They must be able to organize the operation of all subsystems of the mobile operator, including listening. To do this, their employees must attend secret courses organized by equipment manufacturers.
  5. Mobile operators. They must provide access to the wiretapping system to the intelligence services of their country and ensure that the intelligence services of other countries do not gain access to them. But operators must also cooperate with each other to ensure that the listening system works even when the subscriber is roaming.
  6. Mobile phone manufacturers. It is their responsibility to ensure the secrecy of eavesdropping - so that the phone supports everything secret functions, but the subscriber could not guess about their activation. Their warranty repair services must know that phones have the corresponding secret modules, be able to diagnose and repair them.
  7. Intelligence services. They must be aware of how to work with operators.

This list could be continued further (adding SIM card manufacturers, etc.), but even in its current form it looks quite fantastic. After all, the secrecy of the specification implies that everyone who knows is silent, and no one knows. In the same time The current situation in the GSM equipment market is characterized by quite fierce competition, and there would definitely be manufacturers producing phones without a listening function. Extra microcircuits on phone boards and “bookmarks” in firmware would be found by enthusiasts whose bread is “unlocking” mobile phones. There would be specialists who would disable the ability to listen to your device for money. But nothing like this real life not visible.

For comparison, the standard lawful interception functions:

  1. Openly documented.
  2. Their support is implemented at exactly one point in the network - on switches. Manufacturers have available documentation on the operation and administration of this functionality; the name, schedule and program of relevant training courses, etc. can be freely accessed.
  3. They do not require any special support from manufacturers of phones, SIM cards, GSM modules, etc.
  4. They do an excellent job of listening to telephone conversations of a specific subscriber, complementing other possible covert surveillance mechanisms.

Let us assume that such a global “conspiracy of silence” does exist. How does the secret listening system work? How can you implement such listening and transmitting what you listened to “where it’s needed?”?

Since listening occurs secretly, we can assume, for example, that the phone has alternative systems for encoding and storing information that is transmitted over a radio channel to some special antennas using a radio wave modulation system that is not similar to GSM. This assumption does not stand up to criticism: firstly, the GSM modules of modern phones are similar to each other, the microcircuits used and their functions are well known and described. If such eavesdropping capabilities are built into any phone, this means that neither enthusiasts who disassemble phones for repairs and upgrades, nor third-party repair shops have noticed anything suspicious in their design. But hiding another module in the phone, similar in functionality to a GSM transceiver, and even with its own separate antenna, is completely impossible. “Extra” details will be visible to any specialist. In the end, there is simply no place for this in a modern phone.

Secondly, transmitting what you listened to via alternative channels implies the construction global network receivers, the scale of which any mobile operator would envy, not to mention the fact that the question of financing such a project and dividing access to it between the intelligence services of different countries remains open.

However, supporters of the presence of undocumented capabilities do not go that far in their statements. Typically they say that after “activating the microphone” the phone makes a call to a certain number without the owner’s knowledge, after which everyone “on the other side” listens carefully and writes down.

The "hidden call" hypothesis

Can a phone make a call (using standard GSM network functions) to a certain number without the owner’s knowledge, and secretly? A number of uncomfortable questions immediately arise:

  1. Why is the fact that there is an active call not visible in the phone interface?
  2. How long will your phone battery last with constant listening?
  3. What to do with the characteristic interference on the speakers of surrounding radio equipment that arises during a conversation?
  4. Why is the call used for listening not visible in the detailed printout of the subscriber's calls? Who pays for it?

Point 1 is usually explained either by the participation of mobile phone manufacturers in a global conspiracy, or they write that intelligence agencies or a mobile operator remotely implement software, which will hide from the user suspicious activity. Fortunately, there is currently no way to push active content to a phone that will run on any GSM phone.

There is no good counterargument to point 2, so in articles about miracle listening it is usually passed over in silence. After all, in modern phones the batteries last for about four to five hours of continuous conversation maximum - this is clearly not enough to organize constant listening.

Point number 3 is also usually passed over in silence. Obviously, for covert eavesdropping, the presence of such a “side effect” is completely unacceptable.

Point number 4 suggests that the intelligence services are in collusion with mobile operators. As part of this conspiracy:

  1. The operator has nothing against the fact that his voice channels are used for wiretapping, and he doesn’t receive a single cent for hours of calls (we don’t consider the “secret services pay for the wiretapped” option as completely fantastic).
  2. The operator excludes calls to intelligence service numbers from the detailed call printout and from all internal databases.
  3. If the listener is in the coverage area of ​​another network (or in roaming), the operator additionally bears the costs associated with international roaming.
  4. This conspiracy is valid at least for all operators in the country where the intelligence services in question operate.

Technically all this is feasible. However, what should be the motivation of the operators for them to agree to such a conspiracy, and a secret conspiracy at that?

The collusion involves significant financial losses on the part of the operators, so the incentive for cooperation must be quite significant. Obviously, we are not talking about the fact that operators were obliged to participate in the conspiracy by law or through blackmail - history shows that any attempts at extra-market pressure on operators by government structures immediately result in a wave of publications in the media. There is only one option left - the intelligence services paid the operators for work on modifying billing and the costs associated with wiretapping. You can, without a doubt, evaluate the realism of such a scenario for yourself.

So what do we have? Thanks to the global conspiracy of the main players in the mobile communications market, a secret method was invented and implemented to remotely activate the microphone of a mobile phone to carry out covert surveillance of the subscriber. Recorded conversations are transferred “wherever they need to be” using standard means GSM networks. The intelligence services of a particular country are using this secret capability, and they are not stopped by the fact that their potential opponents have developed it. The intelligence services agree with all local mobile operators to conceal the fact of calls to a secret number belonging to the intelligence services. Now, at the risk of being noticed every second by the rapid discharge of the battery and interference from nearby radio equipment, intelligence services have the opportunity to listen to you for about 4-5 hours if you played into their hands and pre-charged the phone.

Think about whether the gamble is worth the candle for the intelligence services, given that there are many less global, less expensive and more effective ways to listen to a specific person.

conclusions

Talk about the hidden ability to remotely activate the microphone of any phone is nothing more than talk. On the other hand, there is a standard documented technical feasibility listen to and record telephone conversations of a specific, previously known subscriber.

Many of the methods below are legal. But not all.

As a rule, if you are not doing anything illegal or are not under suspicion, then you will not be wiretapped. But this does not eliminate the chance of wiretapping by business competitors, criminals and other ill-wishers.

Just know all this information and sleep well.

SORM

The system of operational-search activities is official, state, total wiretapping. In the Russian Federation, all telecom operators are required to install SORM on their PBXs and provide law enforcement agencies with access to user conversations and correspondence.

If the operator does not have SORM, he will not be issued a license. If he disables SORM, the license will be revoked. By the way, not only in neighboring Kazakhstan and Ukraine, but also in the USA, Great Britain and many other countries, the same system operates.

The installation of SORM is determined by the Law “On Communications”, order of the Ministry of Communications No. 2339 of August 9, 2000, order of the Ministry information technologies and Communications of the Russian Federation dated January 16, 2008 N 6 “On approval of the Requirements for telecommunication networks for carrying out operational investigative activities”, as well as a dozen other regulatory documents.

SORM includes:

  • Hardware and software that is installed by the telecom operator;
  • Remote control center, which is located at law enforcement agencies;
  • Data transmission channels, the operation of which is provided by the provider to establish communication with a remote control point.

SORM is usually divided into three generations:


Operators in the Russian Federation predominantly use SORM 2. But in practice, for 70% of companies, the system either does not work at all or works with violations.

First of all, SORM is expensive to install (and the operator must do this at his own expense according to an individual plan approved by the local FSB department). For most operators, it is easier to pay about 30 thousand rubles in fines in accordance with Part 3 of Article 14.1 of the Code of Administrative Offenses of the Russian Federation.

In addition, the operator’s SORM may conflict with FSB complexes. And because of this, it is technically impossible to record user traffic.

Operators do not control how intelligence agencies use SORM. Accordingly, they cannot prohibit listening to your specific number.

However, intelligence services formally need a court decision to wiretap. In 2016, courts of general jurisdiction issued 893.1 thousand such permits to law enforcement agencies. In 2017, their number decreased, but only slightly.

However, it doesn’t cost law enforcement officials anything to include someone’s number in a wiretapping kit as potentially suspicious. And refer to operational necessity.

In addition, the security level of SORM is often low. So there remains the possibility of unauthorized connection - unnoticed by the operator, subscriber and intelligence services.

The operators themselves can also view the history of calls, messages, and smartphone movements across base stations.

Signaling network SS7 (SS7)

SS7, OKS-7, or signaling system No. 7 is a set of signaling protocols that are used to configure PSTN and PLMN telephone exchanges around the world. Protocols use digital and analog channels to transmit control information.

Vulnerabilities in SS7 are found regularly. This allows hackers to connect to the operator's network and listen to your phone. Generally speaking, there were practically no security systems built into SS7 - it was initially believed that it was protected by default.

Typically, hackers infiltrate the SS7 network and send a Send Routing Info For SM (SRI4SM) service message through its channels. He specifies the wiretapping number as a message parameter. In reply home network sends the subscriber IMSI (International Subscriber Identity) and the address of the MSC switch that is currently serving the subscriber.

After this, the hacker sends another message - Insert Subscriber Data (ISD). This allows him to infiltrate the database and upload his address there instead of the subscriber's billing address.

When a subscriber makes a call, the switch accesses the hacker's address. As a result, a conference call is carried out with the participation of a third party (the attacker), who can listen and record everything.

You can connect to SS7 anywhere. So the Russian number may well be broken from India, China, or even from distant hot Africa. By the way, SS7 allows you to use USSD requests to intercept SMS or transfer balance.

In general, SS7 is the “mother of all holes” and the most vulnerable point mobile system. It is now used not only for wiretapping, but also to bypass two-factor authentication. In other words, to access your bank accounts and other protected profiles.

Trojan applications

This is exactly the simplest and most common method. Installing an application while your significant other is in the shower, or using social engineering methods to force you to follow a link, is much easier than negotiating with the authorities and the FSB.

Applications allow you not only to record cell phone conversations or read SMS. They can activate the microphone and camera to secretly listen and film everything that happens around them.

The most popular Trojan of this kind is FinFisher. In 2008-2011, it was installed on the iPhone through a hole in iTunes, which Apple for some reason did not close. Brian Krebbs wrote about the vulnerability back in 2008, but everyone pretended it didn't exist.

In 2011, the Egyptian government used FinFisher during the Arab Spring. Moreover, it acquired official version for 287 thousand euros. Shortly after this, WikiLeaks showed on video how FinFisher, FinSpy and other Gamma Group developments collect user data. And only after that Apple was forced to close the hole.

How can you be persuaded to install a spy for wiretapping? This could be an update of a popular game from a “left” catalog, an application with discounts, or a fake system update.

By the way, law enforcement agencies also use spy applications – for example, when they cannot go the official route and obtain court permission. Trojans for 0day vulnerabilities in Android and iOS are a multimillion-dollar market, products on it are in demand in many countries around the world.

Remote wiretapping

There are three options here - a mobile complex, a femtocell or a fake base station. All of them are not cheap, so the average user will not be tapped in this way. But we’ll still tell you how it works.

The mobile complex is installed at a distance of up to 300-500 m from the smartphone being monitored. A directional antenna intercepts all signals, the computer stores them and decrypts them using rainbow tables or other technologies. When the wiretapping is completed, the complex simply leaves.

The fake base station (IMSI interceptor) has a stronger signal than the real one. The smartphone sees what such a station will give best quality connection and automatically connects to it. The station intercepts all data. The size of the station is slightly larger than a laptop. It costs from $600 (handicraft) to $1500-2000 (industrial options).

By the way, fake stations are often used to send spam. In China, craftsmen assemble such devices and sell them to companies that want to attract buyers. Often, fake BS is used in combat areas to misinform the military or the population.

Femtocell is a smaller device. It is not as powerful as a full-fledged communication station, but it performs the same functions. Femtocells are usually installed by companies to listen to the traffic of their employees and partners. Data is intercepted before it is sent to base stations mobile operators. But the same femtocell can be installed for spot wiretapping.




Top